• Title/Summary/Keyword: 정보관리요소

Search Result 3,426, Processing Time 0.029 seconds

Development on Early Warning System about Technology Leakage of Small and Medium Enterprises (중소기업 기술 유출에 대한 조기경보시스템 개발에 대한 연구)

  • Seo, Bong-Goon;Park, Do-Hyung
    • Journal of Intelligence and Information Systems
    • /
    • v.23 no.1
    • /
    • pp.143-159
    • /
    • 2017
  • Due to the rapid development of IT in recent years, not only personal information but also the key technologies and information leakage that companies have are becoming important issues. For the enterprise, the core technology that the company possesses is a very important part for the survival of the enterprise and for the continuous competitive advantage. Recently, there have been many cases of technical infringement. Technology leaks not only cause tremendous financial losses such as falling stock prices for companies, but they also have a negative impact on corporate reputation and delays in corporate development. In the case of SMEs, where core technology is an important part of the enterprise, compared to large corporations, the preparation for technological leakage can be seen as an indispensable factor in the existence of the enterprise. As the necessity and importance of Information Security Management (ISM) is emerging, it is necessary to check and prepare for the threat of technology infringement early in the enterprise. Nevertheless, previous studies have shown that the majority of policy alternatives are represented by about 90%. As a research method, literature analysis accounted for 76% and empirical and statistical analysis accounted for a relatively low rate of 16%. For this reason, it is necessary to study the management model and prediction model to prevent leakage of technology to meet the characteristics of SMEs. In this study, before analyzing the empirical analysis, we divided the technical characteristics from the technology value perspective and the organizational factor from the technology control point based on many previous researches related to the factors affecting the technology leakage. A total of 12 related variables were selected for the two factors, and the analysis was performed with these variables. In this study, we use three - year data of "Small and Medium Enterprise Technical Statistics Survey" conducted by the Small and Medium Business Administration. Analysis data includes 30 industries based on KSIC-based 2-digit classification, and the number of companies affected by technology leakage is 415 over 3 years. Through this data, we conducted a randomized sampling in the same industry based on the KSIC in the same year, and compared with the companies (n = 415) and the unaffected firms (n = 415) 1:1 Corresponding samples were prepared and analyzed. In this research, we will conduct an empirical analysis to search for factors influencing technology leakage, and propose an early warning system through data mining. Specifically, in this study, based on the questionnaire survey of SMEs conducted by the Small and Medium Business Administration (SME), we classified the factors that affect the technology leakage of SMEs into two factors(Technology Characteristics, Organization Characteristics). And we propose a model that informs the possibility of technical infringement by using Support Vector Machine(SVM) which is one of the various techniques of data mining based on the proven factors through statistical analysis. Unlike previous studies, this study focused on the cases of various industries in many years, and it can be pointed out that the artificial intelligence model was developed through this study. In addition, since the factors are derived empirically according to the actual leakage of SME technology leakage, it will be possible to suggest to policy makers which companies should be managed from the viewpoint of technology protection. Finally, it is expected that the early warning model on the possibility of technology leakage proposed in this study will provide an opportunity to prevent technology Leakage from the viewpoint of enterprise and government in advance.

Comparative Analysis of ViSCa Platform-based Mobile Payment Service with other Cases (스마트카드 가상화(ViSCa) 플랫폼 기반 모바일 결제 서비스 제안 및 타 사례와의 비교분석)

  • Lee, June-Yeop;Lee, Kyoung-Jun
    • Journal of Intelligence and Information Systems
    • /
    • v.20 no.2
    • /
    • pp.163-178
    • /
    • 2014
  • Following research proposes "Virtualization of Smart Cards (ViSCa)" which is a security system that aims to provide a multi-device platform for the deployment of services that require a strong security protocol, both for the access & authentication and execution of its applications and focuses on analyzing Virtualization of Smart Cards (ViSCa) platform-based mobile payment service by comparing with other similar cases. At the present day, the appearance of new ICT, the diffusion of new user devices (such as smartphones, tablet PC, and so on) and the growth of internet penetration rate are creating many world-shaking services yet in the most of these applications' private information has to be shared, which means that security breaches and illegal access to that information are real threats that have to be solved. Also mobile payment service is, one of the innovative services, has same issues which are real threats for users because mobile payment service sometimes requires user identification, an authentication procedure and confidential data sharing. Thus, an extra layer of security is needed in their communication and execution protocols. The Virtualization of Smart Cards (ViSCa), concept is a holistic approach and centralized management for a security system that pursues to provide a ubiquitous multi-device platform for the arrangement of mobile payment services that demand a powerful security protocol, both for the access & authentication and execution of its applications. In this sense, Virtualization of Smart Cards (ViSCa) offers full interoperability and full access from any user device without any loss of security. The concept prevents possible attacks by third parties, guaranteeing the confidentiality of personal data, bank accounts or private financial information. The Virtualization of Smart Cards (ViSCa) concept is split in two different phases: the execution of the user authentication protocol on the user device and the cloud architecture that executes the secure application. Thus, the secure service access is guaranteed at anytime, anywhere and through any device supporting previously required security mechanisms. The security level is improved by using virtualization technology in the cloud. This virtualization technology is used terminal virtualization to virtualize smart card hardware and thrive to manage virtualized smart cards as a whole, through mobile cloud technology in Virtualization of Smart Cards (ViSCa) platform-based mobile payment service. This entire process is referred to as Smart Card as a Service (SCaaS). Virtualization of Smart Cards (ViSCa) platform-based mobile payment service virtualizes smart card, which is used as payment mean, and loads it in to the mobile cloud. Authentication takes place through application and helps log on to mobile cloud and chooses one of virtualized smart card as a payment method. To decide the scope of the research, which is comparing Virtualization of Smart Cards (ViSCa) platform-based mobile payment service with other similar cases, we categorized the prior researches' mobile payment service groups into distinct feature and service type. Both groups store credit card's data in the mobile device and settle the payment process at the offline market. By the location where the electronic financial transaction information (data) is stored, the groups can be categorized into two main service types. First is "App Method" which loads the data in the server connected to the application. Second "Mobile Card Method" stores its data in the Integrated Circuit (IC) chip, which holds financial transaction data, which is inbuilt in the mobile device secure element (SE). Through prior researches on accept factors of mobile payment service and its market environment, we came up with six key factors of comparative analysis which are economic, generality, security, convenience(ease of use), applicability and efficiency. Within the chosen group, we compared and analyzed the selected cases and Virtualization of Smart Cards (ViSCa) platform-based mobile payment service.

Financial Fraud Detection using Text Mining Analysis against Municipal Cybercriminality (지자체 사이버 공간 안전을 위한 금융사기 탐지 텍스트 마이닝 방법)

  • Choi, Sukjae;Lee, Jungwon;Kwon, Ohbyung
    • Journal of Intelligence and Information Systems
    • /
    • v.23 no.3
    • /
    • pp.119-138
    • /
    • 2017
  • Recently, SNS has become an important channel for marketing as well as personal communication. However, cybercrime has also evolved with the development of information and communication technology, and illegal advertising is distributed to SNS in large quantity. As a result, personal information is lost and even monetary damages occur more frequently. In this study, we propose a method to analyze which sentences and documents, which have been sent to the SNS, are related to financial fraud. First of all, as a conceptual framework, we developed a matrix of conceptual characteristics of cybercriminality on SNS and emergency management. We also suggested emergency management process which consists of Pre-Cybercriminality (e.g. risk identification) and Post-Cybercriminality steps. Among those we focused on risk identification in this paper. The main process consists of data collection, preprocessing and analysis. First, we selected two words 'daechul(loan)' and 'sachae(private loan)' as seed words and collected data with this word from SNS such as twitter. The collected data are given to the two researchers to decide whether they are related to the cybercriminality, particularly financial fraud, or not. Then we selected some of them as keywords if the vocabularies are related to the nominals and symbols. With the selected keywords, we searched and collected data from web materials such as twitter, news, blog, and more than 820,000 articles collected. The collected articles were refined through preprocessing and made into learning data. The preprocessing process is divided into performing morphological analysis step, removing stop words step, and selecting valid part-of-speech step. In the morphological analysis step, a complex sentence is transformed into some morpheme units to enable mechanical analysis. In the removing stop words step, non-lexical elements such as numbers, punctuation marks, and double spaces are removed from the text. In the step of selecting valid part-of-speech, only two kinds of nouns and symbols are considered. Since nouns could refer to things, the intent of message is expressed better than the other part-of-speech. Moreover, the more illegal the text is, the more frequently symbols are used. The selected data is given 'legal' or 'illegal'. To make the selected data as learning data through the preprocessing process, it is necessary to classify whether each data is legitimate or not. The processed data is then converted into Corpus type and Document-Term Matrix. Finally, the two types of 'legal' and 'illegal' files were mixed and randomly divided into learning data set and test data set. In this study, we set the learning data as 70% and the test data as 30%. SVM was used as the discrimination algorithm. Since SVM requires gamma and cost values as the main parameters, we set gamma as 0.5 and cost as 10, based on the optimal value function. The cost is set higher than general cases. To show the feasibility of the idea proposed in this paper, we compared the proposed method with MLE (Maximum Likelihood Estimation), Term Frequency, and Collective Intelligence method. Overall accuracy and was used as the metric. As a result, the overall accuracy of the proposed method was 92.41% of illegal loan advertisement and 77.75% of illegal visit sales, which is apparently superior to that of the Term Frequency, MLE, etc. Hence, the result suggests that the proposed method is valid and usable practically. In this paper, we propose a framework for crisis management caused by abnormalities of unstructured data sources such as SNS. We hope this study will contribute to the academia by identifying what to consider when applying the SVM-like discrimination algorithm to text analysis. Moreover, the study will also contribute to the practitioners in the field of brand management and opinion mining.

Development of a Real-Time Mobile GIS using the HBR-Tree (HBR-Tree를 이용한 실시간 모바일 GIS의 개발)

  • Lee, Ki-Yamg;Yun, Jae-Kwan;Han, Ki-Joon
    • Journal of Korea Spatial Information System Society
    • /
    • v.6 no.1 s.11
    • /
    • pp.73-85
    • /
    • 2004
  • Recently, as the growth of the wireless Internet, PDA and HPC, the focus of research and development related with GIS(Geographic Information System) has been changed to the Real-Time Mobile GIS to service LBS. To offer LBS efficiently, there must be the Real-Time GIS platform that can deal with dynamic status of moving objects and a location index which can deal with the characteristics of location data. Location data can use the same data type(e.g., point) of GIS, but the management of location data is very different. Therefore, in this paper, we studied the Real-Time Mobile GIS using the HBR-tree to manage mass of location data efficiently. The Real-Time Mobile GIS which is developed in this paper consists of the HBR-tree and the Real-Time GIS Platform HBR-tree. we proposed in this paper, is a combined index type of the R-tree and the spatial hash Although location data are updated frequently, update operations are done within the same hash table in the HBR-tree, so it costs less than other tree-based indexes Since the HBR-tree uses the same search mechanism of the R-tree, it is possible to search location data quickly. The Real-Time GIS platform consists of a Real-Time GIS engine that is extended from a main memory database system. a middleware which can transfer spatial, aspatial data to clients and receive location data from clients, and a mobile client which operates on the mobile devices. Especially, this paper described the performance evaluation conducted with practical tests if the HBR-tree and the Real-Time GIS engine respectively.

  • PDF

Verification of accuracy detection of the cows estrus using biometric information measuring device (생체정보 측정장치를 활용한 젖소 발정탐지의 정확도 검증)

  • Yang, Ka-Young;Woo, Sae-Mee;Kwon, Kyeong-Seok;Choi, Hee-Chul;Jeon, Jung-Hwan;Lee, Jun-Yeob
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.19 no.6
    • /
    • pp.652-657
    • /
    • 2018
  • Breeding control in a farm is a very important factor affecting milk productivity. Breeding management is important for the early detection of estrus, and reliable, automatic, more accurate, and faster monitoring of the timing of dairy cows is essential for farmers. This study measured the accuracy of estrus using the estrus indications, changes in activities, rumination activities, ruminal temperature, and pH. The biomedical information device S1 used in this study provided an estrus notice using the rumen temperature, pH, cow activities, and number of drinking estimations, which were inserted in the rumen through the oral route. The S2 device was used in the estrus notice for the rumen activities and cow activities. The data collected on the instrument were collected at intervals of 2 hours per day at the reference days (RD: -7~-3, +7~+ 3) +2), 7 days before insemination, and 7 days after insemination. The activities of the S1 device used in this paper increased with increasing number of insemination days (-1: $12.5{\pm}1.03/day$; 0: $12.9{\pm}1.73/day$) compared to the reference day (RD: $10.2{\pm}1.0/day$). The activities of the S2 device was also found to increase from the reference day to the insemination day (0: $63.0{\pm}3.66$) compared to the reference day (RD: $40.3{\pm}2.68$). The number of daily drinks in S1 decreased from the reference day (RD: $5.9{\pm}0.89/day$) to before the insemination day (-2: $5.6{\pm}0.98$; -1: $5.7{\pm}0.96$); +2: $6.0{\pm}0.73$). The number of daily drinks on the insemination day (0: $6.3{\pm}0.86$; +2: $6.0{\pm}0.73$) was similar to the reference day. The number of daily rumination in S2 decreased from the reference day (RD: $493.8{\pm}10.92$) to the insemination day (-1: $390.2{\pm}13.36$; 0: $354.1{\pm}16.71$).

A Study on the Performance Certification System of Inspection and Diagnostic Equipment for Infrastructure using Advanced Technologies (첨단기술을 이용한 시설물 점검 및 진단장비 성능인증체계에 대한 연구)

  • Hong, Sung-Ho;Kim, Jung-Gon;Cho, Jae-Young;Kim, Do-Hyoung;Kim, Jung-Yeol;Kim, Young-Min;Lee, Dong-Wook
    • Journal of the Society of Disaster Information
    • /
    • v.17 no.1
    • /
    • pp.97-111
    • /
    • 2021
  • Purpose: It is expected that various infrastructures diagnosis equipment will be needed as infrastructures management is strengthened to implement the Framework Act on Sustainable Infrastructure Management. It is necessary for a certification system to supply certified products of a reasonable level in accordance with market requirements for various convergence equipment. This paper deals with the introduction of certification system of inspection and diagnosis equipment for infrastructure using advanced technologies. Method: The basic elements, systems and procedures of certification system were reviewed through analyzing and comparing the existing similar certification system in Korea. In addition, a survey was conducted on a catalog method and the minimum performance criterion (sampling survey and complete enumeration survey) to equipment developers (manufacturers), clients and equipment users. Result: This survey showed that clients preferred complete enumeration method on the basis of minimum performance, and equipment users also preferred complete enumeration survey and sample survey, for minimum performance, at a similar rate. On the other hand, equipment developers preferred the catalog method. Conclusion: Clients and users who are the users of the diagnostic equipment preferred the minimum performance criterion because their trust in quality is important. On the other hand, developers(manufacturers) preferred the catalog method which adopts self certification because it is regulated in developing various products. There is no specific plan for the minimum performance standards required for the introduction of the method which users demand, at present. In addition, it is not desirable to force to introduce a certification system because it requires a considerable period of study to prepare the specific standards. Therefore, it is appropriate to operate the system for a certain period of time centering around the catalog method for the stable and continuous development of the infrastructure diagnosis and test equipment market in Korea. Also, it is effective to expand and develop the certification system to the extent that it minimizes the impact on the market when specific plans for the standards are prepared in the future.

A Study on the Variation of River Vegetation by Seasonal Precipitation Patterns (계절별 강수 패턴에 따른 하천 식생 변화 양상 연구)

  • Hee-Jeong JEONG;Seung-Yeon YU;Eun-Ji CHO;Yong-Joo JI;Yong-Suk KIM;Hyun-Kyung OH;Jong-Sung LEE;Hyun-Do JANG;Dong-Gil CHO
    • Journal of the Korean Association of Geographic Information Studies
    • /
    • v.26 no.2
    • /
    • pp.1-19
    • /
    • 2023
  • In Korea, excessive vegetation in rivers made up of sand and gravel is emerging as a nationwide problem, which is attributed to increased spring precipitation and decreased annual precipitation. Therefore, this study was conducted for the purpose of identifying the effect of changes in precipitation patterns on river vegetation in Namcheon, Gyeongju, and analyzing the area of vegetation and ecological characteristics. As a result of the study, the amount of monthly precipitation in the summer of Namcheon decreased after 2007, and the area of vegetation increased continuously compared to the area of the sandbank. The proportion of naturalized plants increased steadily when precipitation continued to a level that did not cause flooding, but the area occupied by naturalized plants was small. Also, when the water level is maintained, the species diversity is low due to the dominance of a single species, and the dominant species was mainly native plants. Dominance of native plants inhibited the growth of naturalized plants, but the vegetation area increased even more. Therefore, it is necessary to manage the spread of vegetation itself rather than the division of native plants and naturalized plants in order to eliminate the active growth and prosperity of river vegetation. High water levels and continuous flooding caused by torrential rains in summer disturbed the plant communities, and vegetation formed afterwards was mainly native plants. Such flooding in river ecosystems is a positive factor for the emergence of native plants and over-formed vegetation communities, so it should be considered when establishing a vegetation management plan.

A Survey on the Consumer Attitude Toward Health Food in Korea (II) -Consumer Perception on Health Foods- (건강식품에 대한 소비자 인식 연구 (II) -건강식품에 관한 소비자 의식구조-)

  • Lee, Eun-Joo;Ro, Seung-Ok;Lee, Cherl-Ho
    • Journal of the Korean Society of Food Culture
    • /
    • v.11 no.4
    • /
    • pp.487-495
    • /
    • 1996
  • The consumer perception on health and food habit, the experience of health food use and the discrimination between health food and drug of Korean consumer were surveyed by using a questionnaire containing 20 items in order to obtain the basic data for the assessment of the benefit and risk of health foods in Korea. A total of 1,000 people over 20 years of age living in Seoul and the vicinities were interviewed and asked to fill out the questionnaire during the period from the October 1995 to the February 1996. Among the 882 answers collected 23 was incomplete data, and 859 answers were used for the statistical analysis by using SAS program. The survey revealed a strong interest of the consumer on health food by showing that more than a half of the subjects (58.8%) had the experience of actual use of health food, and 68.2% believed the effectiveness. What the consumer expect most from health food was to have beneficial effect to maintain overall health condition (59.8%), and the most negative aspect of health food was the overstatement on the effectiveness by the producers (52.1%). The most important source of information for the purchase of health food was the suggestion of friends and relatives (30.6%). Among the health foods registered and regulated by the food law, royal jelly (22.7%), squalene (16.0%), refined fish oil (15.1%), lactic acid bacteria (10.6%) and aloe (8.8%) were relatively well aware. Although 84% of the subjects perceived that health food is different from drug or traditional medicine, the largest percentage of the subject selected ginseng as the most well known type of health food (22.7%) as well as the most well known drug (or traditional medicine) (41.7%). Ginseng was also chosen as the most frequently used health food (17.0%), and vitamin tablets the third (13.0%). The vague definition of health food and unambiguous discrimination of it from medicine by the consumers were problematic for the correct use and reasonable purchasing behavior. The clear definition and proper regulation on the manufacture and distribution of health food, more strict control of labelling and advertisement, and a wide consumer education on health food were recommended.

  • PDF

Selection of Optimal Models for Predicting the Distribution of Invasive Alien Plants Species (IAPS) in Forest Genetic Resource Reserves (산림생태계 보호구역에서 외래식물 분포 예측을 위한 최적 모형의 선발)

  • Lim, Chi-hong;Jung, Song-hie;Jung, Su-young;Kim, Nam-shin;Cho, Yong-chan
    • Korean Journal of Environment and Ecology
    • /
    • v.34 no.6
    • /
    • pp.589-600
    • /
    • 2020
  • Effective conservation and management of protected areas require monitoring the settlement of invasive alien species and reducing their dispersion capacity. We simulated the potential distribution of invasive alien plant species (IAPS) using three representative species distribution models (Bioclim, GLM, and MaxEnt) based on the IAPS distribution in the forest genetic resource reserve (2,274ha) in Uljin-gun, Korea. We then selected the realistic and suitable species distribution model that reflects the local region and ecological management characteristics based on the simulation results. The simulation predicted the tendency of the IAPS distributed along the linear landscape elements, such as roads, and including some forest harvested area. The statistical comparison of the prediction and accuracy of each model tested in this study showed that the GLM and MaxEnt models generally had high performance and accuracy compared to the Bioclim model. The Bioclim model calculated the largest potential distribution area, followed by GLM and MaxEnt in that order. The Phenomenological review of the simulation results showed that the sample size more significantly affected the GLM and Bioclim models, while the MaxEnt model was the most consistent regardless of the sample size. The optimal model overall for predicting the distribution of IAPS among the three models was the MaxEnt model. The model selection approach based on detailed flora distribution data presented in this study is expected to be useful for efficiently managing the conservation areas and identifying the realistic and precise species distribution model reflecting local characteristics.

A Study on the Correlation between Road-kill Hotspot and Habitat Patches (야생동물 서식지 패치와 로드킬 핫스팟의 상관관계 연구)

  • Seok, Sangmuk;Lee, Jiyeong
    • Journal of Environmental Impact Assessment
    • /
    • v.24 no.3
    • /
    • pp.233-243
    • /
    • 2015
  • The ecosystem fragmentation due to transportation infrastructure causes road-kill phenomenon. When making policy for reducing road-kill it is important to select target-species in order to enhance its efficiency. However, many corridors installed in Korea have been raised issues about their effectiveness due to lack of considerations such as target-species selection, site selection, and management, etc. In this study, we are to grasp relationship between road-kill area and habitat patches and suggest that spatial location of habitat patches should be considered as one of the important factors when making policy for reducing road-kill. Habitat patches were presumed from overlying suitability index that chosen by literature review and road-kill hotspot was determined by Getis-Ord $G_i^*$ analysis. Afterwards, we performed a correlation analysis between $G_i$ Z-score and the distance from habitat patches to the roads. As a result, there is a negative correlation between two variables, It affects the $G_i^*$ Z-score going up if the habitat patches and the roads become closer.