• Title/Summary/Keyword: 정책흐름

Search Result 730, Processing Time 0.024 seconds

Effect and Acculturation of Korean Animation by Policy of Korean Culture (한국애니메이션에 있어 문화정책의 영향과 그 변용 -1960~1980년대 중반, 반공애니메이션을 중심으로-)

  • Kim, Jeung-Yeun;Kim, Jae-Woong
    • The Journal of the Korea Contents Association
    • /
    • v.7 no.12
    • /
    • pp.55-65
    • /
    • 2007
  • The commercial value of the Korean animation was developed by the government's policies of revitalizing reform and national harmony from 1960 to the middle of 1980. Especially, the character of the anti communistic animation was organized by the structure of confrontation between South (good) and North (evil). The confrontation was viewed by communism and liberal democracy by red and white (or blue) and a pig or a boy. Such ideology and the policy of Korean culture gave some impact on its culture, for example, movie and animation. The animation became the tool of educating the idea of anti-communism and the policy of Korean culture by firming the policy of anti communism. But that animation of anti communism must not be blamed because it is a general animation of Korea which describes the reality. We have to take a hard view of the time and reconsider it by the new point of view.

The Policy Distribution Algorithm of Firewall in Integrated Security Management (통합보안관리시스템의 방화벽정책 분배를 위한 알고리즘 : FALCON)

  • Kim, Gwang-Hyeok;Gwon, Yun-Ju;Kim, Dong-Su;Jeong, Tae-Myeong
    • The KIPS Transactions:PartC
    • /
    • v.9C no.4
    • /
    • pp.467-472
    • /
    • 2002
  • Recently, Networks are required to adopt the security system and security consulting because of security threats and vulnerabilities of systems. Enterprise Security Management (ESM) is a system which establishes the security zone composed of security systems and Firewalls and applies the security policy to each security system. A relevant ESM is based on the effective policy and the proper security system. Particularly, multiple firewalls in ESM are concerned with the security policy about each traffic. In this paper, we describe the problems that can be occurred when we select the firewalls to apply security policy of access control in ESM composed of multiple firewalls and propose the FALCON algorithm, which is able to select the firewalis to apply the policy. We expect that FALCON algorithm offers stability, scalability and compactness for selecting firewall set.

A Meta-Analysis of Internet-Related Policy Research in Communication (인터넷 관련 규제정책 연구의 동향분석)

  • Kim, Yoojung
    • Informatization Policy
    • /
    • v.17 no.1
    • /
    • pp.3-22
    • /
    • 2010
  • This study reviewed and ascertained policy researches relating to the Internet in the field of communication. With using a meta-analysis, this study attempts to classify 44 academic papers from 2000 to 2009 by research theme, methodology, theoretic rationale, related sub-theme, and targeted service and area. It is found that the themes of preceding researches examined herein were limited to the 4th domain in Developmental Model of Media Research. Such researches mainly relied on exploratory studies and only a few of them addressed theoretic rationales. Also, most of Internet regulation discussions focused on content regulation and general internet service. Lastly, researchers discussed laws having bearing on the Internet and social-cultural issues of the Internet.

  • PDF

An empirical study on data governance: Focusing on structural relationships and effects of components (데이터 거버넌스 실증연구: 구성요소 간 구조적 관계와 영향을 중심으로)

  • Yoon, Kun
    • Informatization Policy
    • /
    • v.30 no.3
    • /
    • pp.29-48
    • /
    • 2023
  • This study aims to investigate empirically the structural relationships among the components of data governance and their impacts on data integration and data-based administration. Through literature review, various definitions, typologies, and case studies of data governance were examined, with the definition of data governance from a public policy perspective developed and applied. The study then analyzed the data from a survey conducted by the Korea Institute of Public Administration on the use of public data policies and confirmed that organizational factors play a mediating role between institutional and technical factors, and that institutional and technical factors have statistically significant positive relationships with data fusion and data-driven administration. Based on these results, interest and investment in the improvement and development of the legal system in data governance from the institutional, technical, and organizational perspective, clarification of means and purposes of data technology, interest in data organizations and human resources, and practical operation can be achieved. Policy implications such as the development of an effective mechanism were presented.

Understanding Public Opinion by Analyzing Twitter Posts Related to Real Estate Policy (부동산 정책 관련 트위터 게시물 분석을 통한 대중 여론 이해)

  • Kim, Kyuli;Oh, Chanhee;Zhu, Yongjun
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.56 no.3
    • /
    • pp.47-72
    • /
    • 2022
  • This study aims to understand the trends of subjects related to real estate policies and public's emotional opinion on the policies. Two keywords related to real estate policies such as "real estate policy" and "real estate measure" were used to collect tweets created from February 25, 2008 to August 31, 2021. A total of 91,740 tweets were collected and we applied sentiment analysis and dynamic topic modeling to the final preprocessed and categorized data of 18,925 tweets. Sentiment analysis and dynamic topic model analysis were conducted for a total of 18,925 posts after preprocessing data and categorizing them into supply, real estate tax, interest rate, and population variance. Keywords of each category are as follows: the supply categories (rental housing, greenbelt, newlyweds, homeless, supply, reconstruction, sale), real estate tax categories (comprehensive real estate tax, acquisition tax, holding tax, multiple homeowners, speculation), interest rate categories (interest rate), and population variance categories (Sejong, new city). The results of the sentiment analysis showed that one person posted on average one or two positive tweets whereas in the case of negative and neutral tweets, one person posted two or three. In addition, we found that part of people have both positive as well as negative and neutral opinions towards real estate policies. As the results of dynamic topic modeling analysis, negative reactions to real estate speculative forces and unearned income were identified as major negative topics and as for positive topics, expectation on increasing supply of housing and benefits for homeless people who purchase houses were identified. Unlike previous studies, which focused on changes and evaluations of specific real estate policies, this study has academic significance in that it collected posts from Twitter, one of the social media platforms, used emotional analysis, dynamic topic modeling analysis, and identified potential topics and trends of real estate policy over time. The results of the study can help create new policies that take public opinion on real estate policies into consideration.

Study on Web-related Spatial Design Research Trend (웹과 연계된 공간디자인 연구동향에 관한 연구)

  • An, Somi
    • Journal of Digital Convergence
    • /
    • v.12 no.8
    • /
    • pp.481-492
    • /
    • 2014
  • The goal of this research was to build comprehensive and systematic basic materials related to IT industry and spatial design. In this research, the trend in spatial design research and its categories are identified and analyzed. The research results show that spatial design researches related to web have declined for last five years. However, a new possibility appears to be latent. An attempt to build database of diverse design information has led to increase in fusion of spatial design education and IT technology from design perspective. Futhermore, residents of space are becoming more active, starting from spatial design to management. Finally, from th environmental perspective, researches on predicting and managing buildings are also growing. Accordingly, diverse researches and financial support for grafting creative education, design process, environment-friendly IT technology and spatial design are needed.

Study on Military Policy of North Korea (북한군사정책 특징 연구)

  • Kim, Sung Woo
    • Convergence Security Journal
    • /
    • v.16 no.3_1
    • /
    • pp.107-114
    • /
    • 2016
  • The North Korean regime, Kim Jungun's foreign policy is changed frequently. And their military policy has no gravity. North Korea has developed nuclear weapons and long range missile. Now they have Inter-Continental Ballistic Missile. These activities redound a great threat in Korean peninsula. There are a no possibilities to give up its nuclear weapons and missile development. For the peace in Korean peninsula, we should make North Korea to abandon its nuclear himself through effective sanctions. Now China should effort to control North Korea. To reduce the threat we should coordinate the strategic interests of China and US. This study is to predict the North Korea military activities to analyze "military policies."

The design and implementation of security kernel assured trusted path (신뢰경로가 보장되는 보안커널 설계 및 구현)

  • 이해균;김재명;조인준
    • Proceedings of the Korea Institutes of Information Security and Cryptology Conference
    • /
    • 2001.11a
    • /
    • pp.340-347
    • /
    • 2001
  • Security operating system applied to MAC(Mandatory Access Control) or to MLS(Multi Level Security) gives both subject and object both Security Level and value of Category, and it restrict access to object from subject. But it violates Security policy of system and could be a circulated course of illegal information. This is correctly IPC(Interprocess Communication)mechanism and Covert Channel. In this thesis, I tried to design and implementation as OS kernel in order not only to give confidence of information circulation in the Security system, but also to defend from Covert Channel by Storage and IPC mechanism used as a circulated course of illegal information. For removing a illegal information flow by IPC mechanism. I applied IPC mechanism to MLS Security policy, and I made Storage Covert Channel analyze system call Spec. and than distinguish Storage Covert Channel. By appling auditing and delaying, I dealt with making low bandwidth.

  • PDF

A Study on the Journal Evaluation Policy of Korea Research Foundation (학술지 평가정책에 관한 고찰 -학술진흥재단의 학술지정책을 중심으로-)

  • 장덕현
    • Journal of Korean Library and Information Science Society
    • /
    • v.35 no.1
    • /
    • pp.359-376
    • /
    • 2004
  • The role of scholarly journals in academic world is widely know and is recognized as the most important tool to improve the quality of scholarly communication. To do this, reasonable and legitimate evaluation methods are to be designed and to be applied. However, despite a lot of criticism regarding this issue, current journal evaluation policies have not drawn attention in related disciplines. In this regard, this paper attempts to shed light on some aspects related to the Korea Research Foundation's journal evaluation policy. Potential problems are particularly highlighted. It also addresses issues in using such data and tools in evaluating scholarly performance of researchers in academic institutions.

  • PDF

A Study on Human Resource Training Plan and Status of the New Reproduction Energy Industry in Gwangju area (광주지역 신재생에너지 산업의 현황과 인력양성방안에 관한 연구임)

  • Yim, Ki-Heung
    • Journal of Digital Convergence
    • /
    • v.8 no.4
    • /
    • pp.47-57
    • /
    • 2010
  • The purpose of this study is to suggest the effective alternative plan of the human resource training in the new reproduction energy industry, here in Gwang-Ju area. Nowadays, we, Korea is confronted with great changing moment to reform the developmental model in social situation & economical paradigms. Based on the aspect, the study showed that how suitable place to carry out the aims in Gwangju area ; first, the good equipped natural environment for activating is apt to build the new reproduction energy industry. And next, the good skilled human resource training is to get into the newly industry. According, the various policy of educating manpower for activating new reproduction energy industry need to be driven in short and long term.

  • PDF