• Title/Summary/Keyword: 정보취약

Search Result 4,367, Processing Time 0.03 seconds

A Study on the policy for export competitiveness enforcement of Korean Service Industry (한국 서비스산업의 수출경쟁력 강화정책에 관한 연구)

  • Lee, Ho-Gun
    • International Commerce and Information Review
    • /
    • v.15 no.4
    • /
    • pp.97-122
    • /
    • 2013
  • Korea's trade balance in service showed surplus in 2012 on the basis of BPM5. This is recorded by 14 years since 1999. This owes to decrease of deficit in tourism balance, increase of surplus in construction and transportation, and shift from deficit to surplus, even in small portion, in personal cultural recreational services balance. While externally the global economic growth becomes inactive and the Korean Won has appreciated, internally Korean service industry is very weak and is not equipped with international competitiveness. This study intends to look into service surplus items and services deficit items and to present measures that will be able to strengthen competitiveness in service industry. As a short case study, German and Japan was benchmarked, as they are the countries which are developed on the basis of manufacturing like Korea. And in this study, by analyzing surplus items and deficit items in trade balance sheet, it is attempted to suggest policies which would be available for strengthening service industry. As the service industry is a highly value-added one, it is necessary to designate promising categories and intensively foster as strategic industry. Service industry has their own characteristics distinguished with manufacturing goods. It has very different logistics and payment system with manufacturing industry. It means there must be independent support systems which reflect the nature of industrial classification in service industry. It is necessary to provide export support system, to organize export market development group, to support marketing, to set common logistics center, to support diplomatic means, to provide legal service and so on.

  • PDF

Review and Prospects on Venture Firm Accumulation Center: The Case of Kwan-Ak Venture Town (벤처기업집적시설의 현황과 문제점 및 개선방안에 관한 연구 서울시 관악구 벤처타운 사례를 중심으로)

  • 최지훈
    • Journal of the Economic Geographical Society of Korea
    • /
    • v.3 no.2
    • /
    • pp.81-96
    • /
    • 2000
  • The study examines the present condition and prospects of venture firm accumulation center in the case of kwan-ak venture town. The survey shows most of companies have been founded since 1997. Their major items are software development and the average employees are under 10 workers. According to the questionary about the type of R&D and the level of innovation, technology innovation such as the development of new product is advanced whereas tacit innovation like inter-firm cooperation is very weak. And the source of idea and information is concentrated on the within-firms and research center As a result of the analysis of regional linkage, the dependence of production and R & D is large on kwan-ak-gu, but sales and information services have emphasis on Seoul area. In the light of the affiliation of inter-firm, they response sympathy with cooperation, but could not strengthen their commercial ties yet. At last, the policy for venture firm accumulation center must intend to make tacit measures through inventing of system instead of the simple means such as the assistance of location, finance and tax.

  • PDF

Design and Implementation of Security System Based on Intrusion Tolerance Technology : Focus on Wargame System (침입감내기술 기반의 보안시스템 설계 및 구현 : 워게임체계를 중심으로)

  • Lee, Gang-Tack;Lee, Dong-Hwi;J. Kim, Kui-Nam
    • Convergence Security Journal
    • /
    • v.5 no.4
    • /
    • pp.41-48
    • /
    • 2005
  • Objective of this study is to design and implement security system based on intrusion tolerance technology for the improvement of dependability in defense system. In order to do so, I identify and extract core technologies through the research and analysis into characteristics, structures, main functions, and technologies of intrusion tolerance architecture. And I accomplish a design of security system through the redundant system based on these core technologies. To implement and verify intrusion tolerance system, I chose 'wargame system' as a subjected system, and accomplished 'Wargame Intrusion Tolerance System' and verified security required functions through a performance test. By applying showed security system into the development of application software based on intrusion tolerance, systematic and efficient system could be developed. Also applying 'WITDS' can solve the current security problems, and this will be basic model for design of security architecture in the federation system after.

  • PDF

Green Productivity Analysis of the Logistics Industry for the Global Competitiveness (물류산업의 녹색생산성 평가와 국제경쟁력 강화방안)

  • Choi, Yong-Rok
    • International Commerce and Information Review
    • /
    • v.14 no.4
    • /
    • pp.89-107
    • /
    • 2012
  • Recently, the successful appointment of the general directorate of GCF (Green Climate Fund) in Songdo of Korea made a great history for the golden triangle with GGGI (global Green Growth Institute) and GTC (Green Technology Center). Now, Korea became the Mecca for the global green growth and it gave a great opportunity foe the Korea to lead the global economy in the future. However, to successfully manage the GCF, the Korean government should show their willingness as well as the readiness for the green prowth and green productivity. It is really hard for the Korea, since it takes the second rank for the growth rate of carbon dioxide emission in the world. To overcome this shameful status, it should make the best effort to promote the green productivity, especially in a field of logistics industry, because it takes 21% of global CO2 emission, the second largest portion. The research aims to systematically introduce the Global Malmquist-Luenberger Index (GML) and to evaluate the logistics industry of Korea based on the GML approach. It concludes the innovative technology is utmost important to improve the green productivity of the logistics industry and thus the Korean government should make more aggressive role to fill this missing link in the innovation network.

  • PDF

A Study on Trade Expansion Strategies to Middle East Pharmaceutical Market: Focused on the UAE Market (중동 의약품시장 통상진출 전략에 대한연구: UAE 시장을 중심으로)

  • Seo, Byeong-Min
    • International Commerce and Information Review
    • /
    • v.16 no.2
    • /
    • pp.297-318
    • /
    • 2014
  • The study has try to analyze firm-level marketing strategy for making inroads into United Arab Emirate(UAE) in the Middle East Rrgion. Korea's pharmaceutical medicine industry can overcome that growth limit by strategically advancing into the world market even the its market share is slight as of 2013. The results of Marketing Mix strategies to enter the UAE pharmaceutical medicine market are as follows: STP strategy and Marketing Mix strategy based on the findings of this study, the practical implications of the following. First of all, domestic pharmaceutical industries in Korea due to the domestic market, growth in the various institutional devices have limits on the expansion. On the other hand, supports the Government's active policy of UAE health care industry is booming. UAE Government medical facilities and health care in the health care industry in 2010 to improve the level of 80 billion dollars of investment. The UAE's medical sector is equipped with independent regulatory regime by the Emirates. The UAE is a foreign worker influx has been showing a high population growth rate, over the last 30 years, UAE resident population has increased about 7 times. The UAE Government to improve the quality of medical services, the private sector and the public to encourage the signing of partnership (PPP) can also be found in the regulation of foreign direct investment. The results of this study would play a role in analyzing a marketing strategy to make inroads into UAE pharmaceutical medicine market.

  • PDF

Contents Based Partial Encryption of GIS Vector Map (GIS 벡터맵의 콘텐츠 기반 선택적 암호화 기술)

  • Jang, Bong-Joo;Lee, Suk-Hwan;Moon, Kwang-Seok;Kwon, Ki-Ryong
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.48 no.5
    • /
    • pp.88-98
    • /
    • 2011
  • Recently, according as the importance of GIS(geography information system) database security is embossed, much researches had been achieved about GIS network security. But most such researches are weak against sourceful illegal reproductions and distributions of GIS vector data map. In this paper, we proposed an efficient layer unit contents based partial encryption technique in the vector map compression domain to prevent illegal distributions and unauthorized accesses. This method achieves a partial encryption about each central coordinate and directional parameters of a MCA(minimum coding attribute) that is created at the vector map compression processing in the vector space. First, the position encryption is applied as permutating randomly the center coordinate of each record that is minimum unit of vector map shape. And second, the direction encryption that changing shapes of vector map topography is applied as encrypting the direction of vertices's coordinates of each record. In experimental results, we confirmed that our proposed method can encipher the large volumed vector map data effectively in low computational complexity. Also, we could minimize the decline of compression efficiency that occurred by conventional contents based encryption schemes using AES or DES algorithms.

A Development of the Unified Object-Oriented Analysis and Design Methodology for Security-Critical Web Applications Based on Object-Relational Database - Forcusing on Oracle11g - (웹 응용 시스템 개발을 위한 보안을 고려한 통합 분석·설계 방법론 개발 - Oracle11g를 중심으로 -)

  • Joo, Kyung-Soo;Woo, Jung-Woong
    • Journal of the Korea Society of Computer and Information
    • /
    • v.17 no.12
    • /
    • pp.169-177
    • /
    • 2012
  • In the development process of application systems, the most important works are analysis and design. Most of the application systems are implemented on database system. So, database design is important. Also, IT System are confronted with more and more attacks by an increase interconnections between IT systems. Therefore security-related processes belong to a very important process. Security is a complex non-functional requirement that can interaction of many parts in the system. But Security is considered in the final stages of development. Therefore, Their increases the potential for the final product to contain vulnerabilities. Accordingly, Early in development related to security analysis and design process is very important. J2EE gives a solution based on RBAC((Role Based Access Control) for security and object-relational database also has RBAC for security. But there is not a object-oriented analysis and design methodology using RBAC of J2EE and object-relational database for security. In this paper, the unified object-oriented analysis and design methodology is developed for security-critical web application systems based on J2EE and object-relational database. We used UMLsec and RBAC of object-relational database and J2EE for this methodology.

A Study of the Plan for Library Operation and Curation Provision as a Community Memory Preservation Center (공동체 기억보존센터로서의 도서관 운영 및 큐레이션 제공 방안 연구)

  • Kwak, Woojung;Noh, Younghee
    • Journal of the Korean BIBLIA Society for library and Information Science
    • /
    • v.31 no.2
    • /
    • pp.53-70
    • /
    • 2020
  • This study was intended to present the need for building the library as a hub of the community memory preservation which provides the collection, sharing, and curation services of the locality specific historical and local data based on the policy task, namely supporting the collection, preservation, and management system of the community's life memory. To this end, the current status of data collection, management, and operation of institutions serving regional-based materials such as cultural centers and regional archives was grasped, and the cases and status of curation services in libraries were investigated and analyzed. The discussion proposed via the results of the study are as follows. First, to the culture center, external demand has been increased from the aspect of social education including festivals, cultural and art event, cultural and art educational business, art activities business of local residents and managerial business is to be carried out, which makes it difficult for the culture center to manage its businesses. Accordingly, it is necessary to collect and preserve regional various data at the pubic libraries playing various roles including provision of informative services, cultural programs and information sharing places to local residents and provision of services to vulnerable social group. As the existing libraries have a plan to collect data systematically, it is considered that those libraries will smoothly operate the data management through cooperation with existing culture centers and various cultural organizations. Second, it appears that a plan will be needed to set up all the data including the ones owned by libraries, local administrative agencies, individuals and other competent agencies in online database so that they are easily available to the public and always available in the libraries because there are a lot of data which cannot be moved to other place and it is actually difficult to concentrate and set up all the data to those libraries.

A Secure Micro-Payment Protocol based on Credit Card in Wireless Internet (무선인터넷에서 신용카드기반의 안전한 소액 지불 프로토콜)

  • Kim Seok mai;Kim Jang Hwan;Lee Chung sei
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.29 no.12C
    • /
    • pp.1692-1706
    • /
    • 2004
  • Recently, there are rapid development of information and communication and rapid growth of e-business users. Therefore we try to solve security problem on the internet environment which charges from wire internet to wireless internet or wire/wireless internet. Since the wireless mobile environment is limited, researches such as small size, end-to-end and privacy security are performed by many people. Wireless e-business adopts credit card WPP protocol and AIP protocol proposed by ASPeCT. WAP, one of the protocol used by WPP has weakness of leaking out information from WG which conned wire and wireless communication. certification chain based AIP protocol requires a lot of computation time and user IDs are known to others. We propose a Micro-Payment protocol based on credit card. Our protocol use the encryption techniques of the public key with ID to ensure the secret of transaction in the step of session key generation. IDs are generated using ECC based Weil Paring. We also use the certification with hidden electronic sign to transmit the payment result. The proposed protocol solves the privacy protection and Non-repudiation p개blem. We solve not only the safety and efficiency problem but also independent of specific wireless platform. The protocol requires the certification organization attent the certification process of payment. Therefore, other domain provide also receive an efficient and safe service.

FH DFT-Spreading OFDM System for the Effective Channel Estimation and PAPR Reduction in Jamming Channel (재밍 채널에서 효과적 채널 추정과 PAPR 저감을 위한 주파수 도약 DFT-Spreading OFDM 시스템)

  • Kim, Jang-Su;Ryu, Heung-Gyoon;Lee, Seung-Jun;Ko, Dong-Kuk
    • The Journal of Korean Institute of Electromagnetic Engineering and Science
    • /
    • v.21 no.7
    • /
    • pp.796-804
    • /
    • 2010
  • It is important to use the comb type pilot allocation for the continuous channel and efficient processing. And DFT-spreading OFDM is used a lot to solve high PAPR problem of OFDM system. However, PAPR is increased again when comb type pilot is used to estimate channel characteristics. So, in this paper, we employ a new SLM method to DFT-spreading OFDM system to reduce increased high PAPR. And we suggest an effective method to transmit side information without additional bandwidth. Pilot and side information must be preserved from jamming or intentional interferences since those are very important in DFT spread OFDM system using SLM. So, in this paper, we like to analyze and simulate the performance of DFT spread OFDM system based on SLM against jamming signal. To remedy the vulnerable shortcomings of DFT spread OFDM about jamming or intentional interferences, we employ FH(Frequency Hopping) method and analyze system performance under the several jamming conditions such as MTJ(Multi Tone Jamming) and PBJ(Partial Band Jamming).