• Title/Summary/Keyword: 초연함

Search Result 359, Processing Time 0.023 seconds

An Exploratory Study on Contactless Digital Economy: the Characteristics, Regulatory Issues and Resolutions (비대면 디지털 경제에 대한 탐색적 연구: 특성, 규제쟁점 및 개선방안을 중심으로)

  • Shim, Woohyun;Won, Soh-Yeon;Lee, Jonghan
    • Informatization Policy
    • /
    • v.29 no.2
    • /
    • pp.66-90
    • /
    • 2022
  • The radical digital transformation and development of the contactless digital economy in the wake of the COVID-19 pandemic are increasing the need to solve various problems such as conflicts of interest among market participants and delays in related laws and regulations. This study investigates the concept and characteristics of the contactless digital economy and identifies the related regulatory issues and resolutions through literature review, news article analysis, and expert interviews. From the literature review, it is identified that the contactless digital economy has eight hyper-innovation characteristics: hyper-intelligence, hyper-connectivity, hyper-convergence, hyper-personalization, hyper-automation, hyper-precision, hyper-diversity, and hyper-trust. From news article analyses and expert interviews, this study identifies various regulatory issues, such as competition between incumbents and new entrants, the collision of constitutional rights, collision of social values, conflict between market participants, absence of laws and regulations, and existence of excessive market power, and then proposes a series of resolutions.

Discourse on ICT Virtual Reality Media : Focusing on Immersible Space and Communication Theories (ICT기반 가상현실(VR) 미디어에 대한 담론 :몰입 공간과 소통이론을 중심으로)

  • Kim, Jung Kyu;Kim, Jong Kouk
    • The Journal of the Convergence on Culture Technology
    • /
    • v.7 no.2
    • /
    • pp.333-338
    • /
    • 2021
  • Development of 5th generation mobile telecommunication technology is visualizing ideal hyper-connected social information and communication technology (ICT). In particular, virtual reality (VR) technology is at the starting point for new expansion and leaps. This work defines virtual reality as media in this context and collects and analyzes discourse on its scalability around space and communication theory. We first elaborated the concept, starting with the early discussions of the virtual reality concept in 1990, and discussed the relationship between the physical world and digital information, expression and interaction immersion as a medium, simulation, art creation theory, and finally evolutionary development. In conclusion, beyond the discourse on the technology of virtual reality, academic subjects were required to have theoretical frameworks on cognitive science, neuroscience, social science, and humanities issues (ethics, personality, etc.) for the development and evolution of virtual reality. In other words, it is time for the evolution of virtual reality to be discussed, which can be moved beyond.

Analysis and implications on Ukrainian Military Intelligence Team's Decapitation Operation (우크라이나 군사정보팀의(Military Intelligence Team) 핀셋작전 분석과 시사점)

  • Cho, Sang Keun;Zhytko, Andrii;Park, Sung Jun;Kwon, Bum June;Seo, Kanh ll;Park, Sang-Hyuk
    • The Journal of the Convergence on Culture Technology
    • /
    • v.8 no.6
    • /
    • pp.435-439
    • /
    • 2022
  • ROK has a lot to benchmark from how Ukraine is fighting Russia back with its tactical wins. They have taken a targeted strategy to strike Russia's top generals with high precision. To carry out this strategy, Ukraine is operating a Special Operations Force, which utilizes US/NATO forces, civilian and own resources for maximum impact. Of note, they utilize Starlink for seamless connection from detection, decision-making to strike to maximize operational efficiency. As ROK faces security threat of weapons of mass destruction, Ukraine's military intelligence organization set-up, weapons system and operations can provide some guidance on how to leverage its various SOF as well.

Effect of Fertilization Rates on Growth, Root Yield and Essential Oil Composition in Korean Valerian (Valeriana fauriei var. dasycarpa Hara) (한국산 쥐오줌풀의 생육, 수량 및 정유성분 조성에 미치는 시비량의 영향)

  • Cho, Chang-Hwan;Han, Ouk-Kyu;Choi, Young-Hyun;Yun, Seung-Gil
    • KOREAN JOURNAL OF CROP SCIENCE
    • /
    • v.42 no.6
    • /
    • pp.814-820
    • /
    • 1997
  • This study was conducted to establish standard fertilization rates for the cultivation of Korean valerian(Valeriana fauriei var. dasycarpa Hara) which is useful for medicinal and aromatic resources. Nitrogen, phosphate and potassium were treated with four application levels, 0, 6, 9, 12kg per 10a, and the growth characteristics, root yield and essential oil compositions of valerian were measured. The growth and root yield of valerian were the highest in the rate of 9kg per 10a for nitrogen, phosphate and potassium, respectively. Nitrogen had the most powerful effective followed by potassium and phosphate. The contents and compositions of essential oil also varied with the amount of fertilization. The contents of the essential oil was the highest in the application level of 9kg per 10a for nitrogen, phosphate and potassium, respectively. The essential oil compositions were affected by the fertilization rate.

  • PDF

A Study on How to Build a Zero Trust Security Model (제로 트러스트 보안모델 구축 방안에 대한 연구)

  • Jin Yong Lee;Byoung Hoon Choi;Namhyun Koh;Samhyun Chun
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.12 no.6
    • /
    • pp.189-196
    • /
    • 2023
  • Today, in the era of the 4th industrial revolution based on the paradigm of hyper-connectivity, super-intelligence, and superconvergence, the remote work environment is becoming central based on technologies such as mobile, cloud, and big data. This remote work environment has been accelerated by the demand for non-face-to-face due to COVID-19. Since the remote work environment can perform various tasks by accessing services and resources anytime and anywhere, it has increased work efficiency, but has caused a problem of incapacitating the traditional boundary-based network security model by making the internal and external boundaries ambiguous. In this paper, we propse a method to improve the limitations of the traditional boundary-oriented security strategy by building a security model centered on core components and their relationships based on the zero trust idea that all actions that occur in the network beyond the concept of the boundary are not trusted.

Bearing Capacity Characteristic of Dredged and Reclaimed Ground Reinforced by Bamboo Net (대나무 망으로 보강된 준설매립지반의 지지력 특성)

  • Kang, Myoung-Chan;Yang, Kee-Sok;Lee, Song
    • Journal of the Korean Geotechnical Society
    • /
    • v.22 no.8
    • /
    • pp.5-11
    • /
    • 2006
  • A series of large scale plate loading tests are performed to assess bearing capacity characteristic of dredged and reclaimed ground that is reinforced by bamboo net and geotextile as a surface strengthen method. Bearing capacity ratio is distributed from 3.46 to 6.03 for bamboo net and from 2.19 to 3.59 for Geotextile In case of bamboo net, BCR was obtained from 1.6 to 1.7 times than Geotextile. As the comparison of each bearing capacity from test and theory shows, bearing capacity theory for geotextile was not suited for bamboo net. The bearing capacity analysis reinforced by bamboo net shows a good relationship between sand mat thickness (H) / bamboo net space (S), and bearing capacity ratio (BCR).

The Variation of Density and Settlement for Contaminated Sediments During Electrokinetic Sedimentation and Remediation Processes (오염퇴적토에 대한 동전기적 침전 및 정화 공정에서의 시료 밀도 및 침하 변화 특성)

  • Chung, Ha-Ik
    • Journal of the Korean Geotechnical Society
    • /
    • v.22 no.9
    • /
    • pp.5-14
    • /
    • 2006
  • Generally, the sediments contain significant water, clay, colloidal fraction and contaminants, and can result in soft strata with high initial void, and its potential hazards in subsurface environments exist. Electrokinetic technique has been used in sedimentation for volume reduction of slurry tailing wastes and in remediation for extraction of contaminants from contaminated soils. In this research, the coupled effects of sedimentation and remediation of contaminated sediments are focused using electrokinetic sedimentation and remediation techniques from experimental aspects. A series of laboratory experiments including variable conditions such as initial solid content of the specimen, concentration level of the contaminant, and magnitude of applied voltage are performed with the contaminated sediment specimens mixed with ethylene glycol. Commercially available high specification Kaolin was used to simulate slurried sediment. From the test results, the settlement of specimen increases with increasing of applied voltage and decreasing of solid content and contamination level. The density of specimen increases due to settlement of specimen in the process of electrokinetic sedimentation and decreases due to extraction of organic contaminant in the process of electrokinetic remediation.

Analyses of Security into End-to-End Point Healthcare System based on Internet of Things (사물인터넷 기반의 헬스케어 시스템의 종단간 보안성 분석)

  • Kim, Jung Tae
    • Asia-pacific Journal of Multimedia Services Convergent with Art, Humanities, and Sociology
    • /
    • v.7 no.6
    • /
    • pp.871-880
    • /
    • 2017
  • Recently, service based on internet is inter-connected and integrated with a variety of connection. This kind of internet of things consist of heterogenous devices such as sensor node, devices and end-to end equipment which used in conventional protocols and services. The representative system is healthcare system. From healthcare appliance used by IoT, patient and doctor can utilize healthcare information with safety and high speed management. It is very convenient management to operate mobility. But it induced security and vulnerability issues because it has small memory capacity, low power supply and low computing power. This made impossible to implement security algorithm with embedded engine based on hardware. Nowdays, we can't realize conventional standard algorithm due to these kinds of reasons. From the critical issues, it occurred security and vulnerability issues. Therefore, we analysed and compared with conventional method and proposed techniques. Finally, we evaluated security issues and requirement for end-to-end point healthcare system based on internet of things.

An Influence of the Fourth Industrial Revolution on International Trade and Countermeasure Strategies to Promote Export in Korea (4차 산업혁명이 무역에 미칠 영향과 이에 대비한 수출촉진전략)

  • Lee, Byung-Mun;Jeong, Hee-Jin;Park, Kwang-So
    • Korea Trade Review
    • /
    • v.42 no.3
    • /
    • pp.1-24
    • /
    • 2017
  • This study investigates any possible influences of the fourth industrial revolution on international trade in Korea and suggests strategies to promote export of Korea in order to secure one of the biggest international trade countries. The fourth industrial revolution is the fourth major industrial era since the third industrial revolution in the 18th century which used electronics and information technology to automate production. This can be characterized as a range of emerging technologies that are fusing the physical, digital and biological worlds, and impacting all disciplines, economies and industries. Since this revolution is expected to have effects on international trade as well as whole industrial society, it examines how it may affect international trade of Korea in terms of the subject, the object, markets and forms of international trade. After that, it provides the strategies to promote Korean export in order to overcome the risks around the low economic growth of the recent years and the depressed domestic economy.

  • PDF

Analyses of Requirement of Security based on Gateway Architecture for Secure Internet (사물인터넷망의 보안 및 프라이버시 문제 해결을 위한 게이트웨이 보안 구조 분석)

  • Kim, Jung Tae
    • Asia-pacific Journal of Multimedia Services Convergent with Art, Humanities, and Sociology
    • /
    • v.6 no.3
    • /
    • pp.461-470
    • /
    • 2016
  • As IoT is broadly used in many fields, the security of IoT is becoming especially important and critical issues. Security and privacy are the key issues for IoT applications, and still faced with some enormous challenges. Sensor has limited resources such as computing power, memory, battery. By means of deeply analyzing the security architecture and features in security framework. While a number of researchers have explored such security challenges and open problems in IoT, there is an unfortunate lack of a systematic study of the security challenges in the IoT landscape. This special issue features recent and emerging advances IoT architecture, protocols, services and applications. The alternative method is IoT security gateway. In this paper, we surveyed the demands and requirements. By means of deeply analyzing the security architecture and features, we analyzed the demands and requirements for security based on gateway application.