• Title/Summary/Keyword: 자산상태

Search Result 181, Processing Time 0.023 seconds

Identifying Security Requirement using Reusable State Transition Diagram at Security Threat Location (보안 위협위치에서 재사용 가능한 상태전이도를 이용한 보안요구사항 식별)

  • Seo Seong-Chae;You Jin-Ho;Kim Young-Dae;Kim Byung-Ki
    • The KIPS Transactions:PartD
    • /
    • v.13D no.1 s.104
    • /
    • pp.67-74
    • /
    • 2006
  • The security requirements identification in the software development has received some attention recently. However, previous methods do not provide clear method and process of security requirements identification. We propose a process that software developers can build application specific security requirements from state transition diagrams at the security threat location. The proposed process consists of building model and identifying application specific security requirements. The state transition diagram is constructed through subprocesses i) the identification of security threat locations using security failure data based on the point that attackers exploit software vulnerabilities and attack system assets, ii) the construction of a state transition diagram which is usable to protect, mitigate, and remove vulnerabilities of security threat locations. The identification Process of application specific security requirements consist of i) the analysis of the functional requirements of the software, which are decomposed into a DFD(Data Flow Diagram; the identification of the security threat location; and the appliance of the corresponding state transition diagram into the security threat locations, ii) the construction of the application specific state transition diagram, iii) the construction of security requirements based on the rule of the identification of security requirements. The proposed method is helpful to identify the security requirements easily at an early phase of software development.

A Study on the Determinants of Private Long-Term Care Insurance and First Home Care Use in the United States: Using Discrete Time Model (미국의 민간장기요양보험 가입과 재가요양서비스 이용의 결정요인에 관한 연구: 이산시간모델을 사용하여)

  • Kim, So-Yun;Hong, Gong-Soog;Montalto, Catherine P.
    • Survey Research
    • /
    • v.11 no.2
    • /
    • pp.97-121
    • /
    • 2010
  • Using the 1998-2004 Health and Retirement Study(HRS), this study explored the determinants of private long-term care insurance(LTCI) ownership and the first home care use. To account for the interaction between LTCI purchase and home care use, this study used two-period utility model as theoretical framework. Discrete time model was used as an empirical model to incorporate the time-dependent feature of LTCI ownership. And this study accounted for the endogeneity of LTCI ownership and home care use by employing full information maximum likelihood estimation. This study indicated insignificant effects of private LTCI ownership and Medicaid eligibility on the home care use. Also, the effects of income and assets on home care utilization were negligible. Those who have poor health condition and who do not have potential informal caregivers were more likely to use home care. For private LTCI ownership, income and assets have positive relationship with LTCI purchase, and poor health status and age were negatively related to LTCI purchase. The elderly living with children and those who have more siblings were less likely to have private LTCI, and those who lived with spouses with no children were more likely to buy private LTCI. Based on the findings, this study provides implications to design long-term care(LTC) policies in the U.S. and to develop LTC planning education programs.

  • PDF

A Comparative Study on the Factors Influencing Residential Mobility of Households in Public and Private Rental Housing (공공과 민간 임대주택 거주가구의 주거이동 영향요인 비교)

  • Jae-Koo Lee;Ho-Cheol Kim
    • Land and Housing Review
    • /
    • v.15 no.3
    • /
    • pp.25-43
    • /
    • 2024
  • Using the 2021 Korea Housing Survey Data, this study compared and analyzed the factors influencing the residential mobility of residents in public and private rental housing by population and social characteristics, economic characteristics, and housing characteristics. The analysis results are as follows. As a result of descriptive statistics analysis, it was found that private rental households were young and economically active. While the proportion of apartment residents and new housing, and the level of housing satisfaction were low, the level of housing insecurity was high. Through logistic regression analysis, significant factors influencing the residential mobility of private and public leases were analyzed. In terms of demographic and social characteristics, private leases were affected by marital status, the number of household members, the age of the household head, and the residential area, while public leases were affected by marital status and the age of the household head. In terms of economic characteristics, private leases were affected by assets, debt, and housing management costs, while public leases were affected only by debt. In terms of residential characteristics, private leases were affected by periods of homelessness, housing satisfaction, housing insecurity, and a sense of homeownership, while public leases were affected by housing type, years of construction, housing satisfaction, housing insecurity, and a sense of homeownership.

A Study on the Metadata Schema for the Collection of Sensor Data in Weapon Systems (무기체계 CBM+ 적용 및 확대를 위한 무기체계 센서데이터 수집용 메타데이터 스키마 연구)

  • Jinyoung Kim;Hyoung-seop Shim;Jiseong Son;Yun-Young Hwang
    • Journal of Internet Computing and Services
    • /
    • v.24 no.6
    • /
    • pp.161-169
    • /
    • 2023
  • Due to the Fourth Industrial Revolution, innovation in various technologies such as artificial intelligence (AI), big data (Big Data), and cloud (Cloud) is accelerating, and data is considered an important asset. With the innovation of these technologies, various efforts are being made to lead technological innovation in the field of defense science and technology. In Korea, the government also announced the "Defense Innovation 4.0 Plan," which consists of five key points and 16 tasks to foster advanced science and technology forces in March 2023. The plan also includes the establishment of a Condition-Based Maintenance system (CBM+) to improve the operability and availability of weapons systems and reduce defense costs. Condition Based Maintenance (CBM) aims to secure the reliability and availability of the weapon system and analyze changes in equipment's state information to identify them as signs of failure and defects, and CBM+ is a concept that adds Remaining Useful Life prediction technology to the existing CBM concept [1]. In order to establish a CBM+ system for the weapon system, sensors are installed and sensor data are required to obtain condition information of the weapon system. In this paper, we propose a sensor data metadata schema to efficiently and effectively manage sensor data collected from sensors installed in various weapons systems.

Effects of Several Soil Medias on the Plant Growth in Artificial Planting Ground (인공지반용 식재용토의 배합이 목본식물의 생장에 미치는 영향)

  • Lee, Eun Yeob;Moon, Seok Ki
    • Journal of the Korean Society of Environmental Restoration Technology
    • /
    • v.2 no.3
    • /
    • pp.18-24
    • /
    • 1999
  • This study was aimed to develope appropriate soil media for the growth of Rhododendron hybrid $J_{ASANHONG}$ on the artificial ground five types of soil media was tested such as "sandy loam-general soil (T1)", "vermiculite-artificial soil (T5)", "sandy loam 50% + vermiculite 30% + sand 20% (improved of soil 2-T2)", "sandy loam 50% + carbonized rice hust 30% + sand 20% (improved of soil 3-T3)", "sandy loam 50% + humus sawdust 30% + sand 20% (improved of soil 4-T4)". The result of the research are as follows. 1. Among the type of soil media, the sandy loam(T1) soil type gave the worst effects on growth of above ground parts(height, No. of leaf, width of leaf, No. of flowering, dry weight of upper parts) and under ground parts(dry weight of roots). 2. Vermiculite(T5) showed the highest root growth(dry weight of roots). it seemed to be caused high saturated hydraulic conductivity and porosity. As a result, there is much available space for enabling the root spreads. 3. "sandy loam 50% + vermiculite 30% + sand 20%(improved of soil 2-T2)", "sandy loam 50% + carbonized rice hust 30% + sand 20%(improved of soil 3-T3)" showed good effects on growth of above ground parts and under ground parts compared with sandy 10am(T1) 4. "sandy loam 50% + humus sawdust 30% + sand 20% + (improved of soil 4-T4)" showed the highest effects on growth of above ground parts.

  • PDF

Synthesis and Characteristics of Organic Soluble Polyaniline by Emulsion Polymerization (유화 중합법에 의한 유기 용매 가용형 폴리아닐린의 합성 및 그 특성)

  • 김진열;권시중;한성원;김응렬
    • Polymer(Korea)
    • /
    • v.27 no.6
    • /
    • pp.549-554
    • /
    • 2003
  • Emeraldine salt of polyaniline-dodecylbenzenesulfdnic acid (PANI-DBSA) in organic solvents such as toluene and xylene was obtained by a direct one-step emulsion polymerization technique. When the molar ratio of DBSA to aniline monomer was 1.5:1, its solubility and electric property showed a maximum value and then the solid contents of PANI-DBSA was 8 wt% in toluene. The cast film of PANI-DBSA with no binder was obtained on glass or plastic substrates under ambient conditions. PANI solution can be also easily blended with polyurethane and polystyrene polymers in toluene. Improved electrical performance up to 5 S/cm was achieved with good light-transmittance up to 70% at 500 m thickness. They also showed more homogeneous morphology than that prepared with PANI-DBSA kom aqueous dispersion polymerization. The partially dispersed PANI-DBSA showed particles sizes of 50-400 m in organic solvents and their XRD pattern were observed from the powder sample.

A Study on Operational Element Identification and Integrated Time Series Analysis for Cyber Battlefield Recognition (사이버 전장인식을 위한 작전상태 요소 식별 및 통합 시계열 분석 연구)

  • Son-yong Kim;Koo-hyung Kwon;Hyun-jin Lee;Jae-yeon Lee;Jang-hyuk Kauh;Haeng-rok Oh
    • Convergence Security Journal
    • /
    • v.22 no.4
    • /
    • pp.65-73
    • /
    • 2022
  • Since cyber operations are performed in a virtual cyber battlefield, the measurement indicators that can evaluate and visualize the current state of the cyber environment in a consistent form are required for the commander to effectively support the decision-making of cyber operations. In this paper, we propose a method to define various evaluation indicators that can be collected on the cyber battlefield, normalized them, and evaluate the cyber status in a consistent form. The proposed cyber battlefield status element consists of cyber asset-related indicators, target network-related indicators, and cyber threat-related indicators. Each indicator has 6 sub-indicators and can be used by assigning weights according to the commander's interests. The overall status of the cyber battlefield can be easily recognized because the measured indicators are visualized in time series on a single screen. Therefore, the proposed method can be used for the situational awareness required to effectively conduct cyber warfare.

A Study on DSMS Framework for Data Security Certification (데이터보안인증을 위한 DSMS 프레임워크 구축 연구)

  • Yoo, Seung Jae
    • Convergence Security Journal
    • /
    • v.19 no.4
    • /
    • pp.107-113
    • /
    • 2019
  • Data security is the planning, implementation and implementation of security policies and procedures for the proper audit and authorization of access to and use of data and information assets. In addition, data serviced through internal / external networks, servers, applications, etc. are the core objects of information protection and can be said to focus on the protection of data stored in DB and DB in the category of information security of database and data. This study is a preliminary study to design a proper Data Security Management System (DSMS) model based on the data security certification system and the US Federal Security Management Act (FISMA). And we study the major security certification systems such as ISO27001 and NIST's Cybersecurity Framework, and also study the state of implementation in the data security manager solution that is currently implemented as a security platform for preventing personal data leakage and strengthening corporate security.

A Study on economic preparations for aging of middle-old aged women (중고령 여성의 경제적 노후준비에 관한 연구)

  • Park, Hyo-Jin
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.16 no.10
    • /
    • pp.6618-6626
    • /
    • 2015
  • This study was designed to explore the factors affecting economic preparations for aging of middle-old aged women. Using fourth Korean retirement and income study panel data of National Pension Reacher Institute. The researcher explored the characteristics of preparation for the old age life who middle-old aged women and analyzed the factors affecting economic preparations for aging of middle-old aged women. The results were as follows. The the factors affecting economic preparations for aging of middle-old aged women were education level, subjective health status, a number of adolescent children(14-19), a number of adolescent children(20-39), public pension, financial asset and debt. On the basis of this results, suggestions for policy were offered.

Trustworthy Repositories Audit Criteria: Self-Assessment of OASIS (믿을 수 있는 디지털 아카이브 인증기준: OASIS 적용사례)

  • Lee, So-Yeon
    • Journal of the Korean Society for information Management
    • /
    • v.25 no.3
    • /
    • pp.5-25
    • /
    • 2008
  • Individuals and organizations in the modern society produce diverse digital objects everyday, which are not only valuable information resources at present but also will be invaluable digital heritage for the future generation. TRAC(Trustworthy Repositories Audit & Certification: Criteria & Checklist) is one of the evaluating tools against which digital archives could be assessed for their preparedness to perform the task of long-term preservation. The current study uses TRAC to assess OASIS(Online Archiving & Searching Internet Source). The results show that the web archive has a greater room for strengthening in the object management infrastructure than in organizational and technical infrastructures.