• Title/Summary/Keyword: 행위주

Search Result 1,310, Processing Time 0.034 seconds

Methodology of Analyze the Risk Using Method of Determinated Quantity (정량적 방법을 이용한 위험분석 방법론 연구)

  • Park, Joong-Gil
    • The KIPS Transactions:PartC
    • /
    • v.13C no.7 s.110
    • /
    • pp.851-858
    • /
    • 2006
  • The risk analysis's aim is analyze the risk for the asset of organization with asset assessment, vulnerability assessment, threat assessment. existing TTA risk analysis methodology model propose to overall flow, but can not propose to detail behavior or each level. That is, step of risk analysis is insufficient in classification of threat and detail proposal of considered the risk with classified threat. So this paper propose that analysis and evaluate the vulnerability and threat assessment with determinated quantity. this paper consider current national information system and threat of environment and technology. So can estimate the risk with determinated quantity. Finally, analyze the asset risk of organization.

The Politics of Space in Cultural Strategies of Japanese Local Cities (일본 지방도시의 문화전략과 '지역다움'의 논리)

  • Cho, A-Ra
    • Journal of the Korean association of regional geographers
    • /
    • v.14 no.5
    • /
    • pp.480-491
    • /
    • 2008
  • Recent globalization and de-industrialization have caused intensive competition among places; hence, cities worldwide are pursuing regeneration and enhanced competitiveness through cultural strategies. Focusing on the cultural strategies of local cities in Japan, this paper reveals that the concept of "being-a-region" is key to cultural strategies, and explores what logic is inherent in such regional developments. Since the period of rapid economic growth, Japanese local cities have played the role of "Furusato(home) for Japanese." With the recent decentralization, "being-a-region" is now emerging as a powerful discourse for the cultural strategies of local cities. This idea of "being-a-region" can be largely defined as a region's special character or even an existential sense of place, but in fact it is political relationships among agencies that define the region. "Being a region" in Japan appears to extend to "being a nation." Thus, it would be necessary to focus on the power relationships that surround the concept of "being a region" when we deal with the meaning of region in relationships to cultural strategies of local cities.

  • PDF

A Study on the development of mobile system for younger generation based on the experience-based product development process (경험디자인을 적용한 모바일 상품 컨셉 개발에 관한 연구)

  • 이종호
    • Archives of design research
    • /
    • v.17 no.3
    • /
    • pp.421-430
    • /
    • 2004
  • The aim of this research is to develop communication model and tools that would help in incorporating user experience into information appliance product development. To do so, this research suggested three major modelling techniques, including user-experience model, design strategy model and experience product model. Using these modelling tools, any members in design teams (investigator and designers) will be able to communicate their own ideas and research results each other at any period of the product development process. Each tools have distinct factors that would help identify elements in the user research stages, idea generation stages and product development stages. To verify the efficiency of these models, the case study was conducted with final year students at their studio class. As a result, the benefit of using these tools were identified as 1) these tools accelerate the communication between user researchers, designers and engineers and 2) evaluation process of the product is much more dearer that before. and 3) various user research techniques can be explored.

  • PDF

The Research on Data Concealing and Detection of SQLite Database (SQLite 데이터베이스 파일에 대한 데이터 은닉 및 탐지 기법 연구)

  • Lee, Jae-hyoung;Cho, Jaehyung;Hong, Kiwon;Kim, Jongsung
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.27 no.6
    • /
    • pp.1347-1359
    • /
    • 2017
  • SQLite database is a file-based DBMS(Database Management System) that provides transactions, and it is loaded on smartphone because it is appropriate for lightweight platform. AS the usage of smartphone increased, SQLite-related crimes can occur. In this paper, we proposed a new concealing method for SQLite db file and a detection method against it. As a result of concealing experiments, it is possible to intentionally conceal 70bytes in the DB file header and conceal original data by inserting artificial pages. But it can be detected by parsing 70bytes based on SQLite structure or using the number of record and index. After that, we proposed detection algorithm for concealed data.

A Study on Expression Visual of Metamorphosis Transition of Image Animation (영상애니메이션 트랜지션의 메타모포시스 시각 표현에 관한 연구)

  • Joo, Hae-Jeong;Kim, Chee-Yong
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2010.05a
    • /
    • pp.347-350
    • /
    • 2010
  • With the advent of new media era we are living in the world of motion picture image is not an exaggeration. With the development of the mass media with images and moments that passed the day feeling like part of it is communication. In this era a sensual and shapeable image more than the logical and realistic thinking may be passed. In the act of seeing a moving image, prior to linguistic and conceptual meaning, color and screen configuration delivery and formative element in the change they produce is first recognized. Particular kind of video animation having the narrative structure, this territory effect greatly. the film even more significant effect on the area and linking the image of the scene transitions in the scheme also features a simple means of natural communication functions are being expanded. These transitional effects provide visual pleasure from a simple transition traditional methods. And In terms of narrative functions performed to help a narrative flow of availability, visual representation should continue.

  • PDF

The End-to-End Encryption for Enhancing Safety of Electronic Financial Transactions (전자금융거래의 안전성 강화를 위한 종단간 암호화)

  • Seung, Jae-Mo;Lee, Su-Mi;Ahn, Seung-Ho;Noh, Bong-Nam
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.10 no.8
    • /
    • pp.1920-1925
    • /
    • 2009
  • '05. June, the first Internet banking accident occurred by the malignant cord. It discontinued security programs for protecting important financial informations. A computer hacker had made a collation of password, OTP(One Time Password) values etc and illegally withdraw one´s savings from the bank using the financial information. The attackers are continuously attempted with the hacking tool under bypass security programs as the vaccine program or the personal fire-wall. Therefore, an electronic financial system should be composed with the goal which is to protect financial informations from user's terminal to a banking server. In this paper, we make an analysis of menaces in electronic financial transactions and explain considerable security issues to enhance safety in Internet banking, CD/ATM and mobile banking.

Systematic Improvement of Safety Management-Related Laws in Domestic Demolition Works (국내 해체공사 안전관리 관련 법령의 체계적인 개선방안)

  • Ha, Gee-Joo;Ha, Jae-Hoon
    • Journal of the Korea institute for structural maintenance and inspection
    • /
    • v.14 no.5
    • /
    • pp.169-178
    • /
    • 2010
  • Generally speaking, the demolition works is the subsequent construction activity which has been done after building life-span of twenty two years or so. However, it was not prepared suitable systems and laws and regulations as long-term solutions. In this study, it was suggested the improvement guideline of safety management-related laws in domestic demolition works. The three improvement of laws was suggested as follows. ${\bullet}$ First, it was suggested proposals for demolition works standards in safety management plan of management law for construction activity. ${\bullet}$ Secondly, it was provided improvements for standard safety work guide of demolition works of industrial safety and health law. ${\bullet}$ Third, it was proposed integration method of redundancy in safety management plan and risk assessment regulations.

On the SimFlex Language Constructs for Object-Based Software Process Programming (객체기반 소프트웨어 프로세스 프로그래밍을 위한 SimFlex 언어의 구조)

  • Kim, Young-Gon;Lee, Myung-Joon;Kang, Byeong-Do
    • The Transactions of the Korea Information Processing Society
    • /
    • v.4 no.11
    • /
    • pp.2756-2768
    • /
    • 1997
  • The software Process can be defined as the set of activities, rules, procedures, techniques and tools used within the production of software. A software process model is a conceptual representation of a real world software Process and can be described by process programming languages. In this paper, we present the language constructs of SimFlex designed for object-based software process programming. The design of SimFlex is based on the object concept, so that it can model complex software processes concisely both in syntax and semantics. Since the language constructs of SimFlex are derived from the analysis of major PSEEs and their associated process programming languages, SimFlex includes the core characteristics required for a desirable object-based process programming language. In addition, SimFlex is designed to act as a template software process definition language which could be included in specific PSEEs through customization appropriate to those PSEEs.

  • PDF

A hybrid prioritized worker model for efficiency of shared resources in the real-time system (실시간 시스템에서 공유자원의 효율적 사용을 위한 혼합형 우선순위 작업자 모델)

  • Park, Hong-Jin;Chun, Kyung-Ah;Kim, Chang-Min
    • The Transactions of the Korea Information Processing Society
    • /
    • v.6 no.12
    • /
    • pp.3652-3661
    • /
    • 1999
  • To support multimedia applications such as a multimedia communication systems and multimedia broadcasting, an operating system need to predict their timing-constraints. So, In this real-time systems, we must solve the priority inversion problem that may make the behavior of unpredictable systems and need a real-time server model that provides a better preemptability and minimizes a system overhead. In current real-time systems, the single thread server model, the worker model and the dynamic server model are being used for synchronization but they cannot propose an effective structure for managing shared resources. In this paper, the priority inheritance protocol is used to solve the priority inversion problem and the hybrid prioritized worker model is proposed, which can provide a more effective structure and a faster response time minimizing a system overhead. The hybrid prioritized worker model is to combine the static and the dynamic prioritized worker model, and have a better performance than other models in response time which is an important factor in a real-time system.

  • PDF

Thr problem of Uyghur nationalism, Uyghur terrorism, and the state terrorism of the Chinese state (위구르 민족문제와 테러리즘, 그리고 중국의 국가테러리즘)

  • Yun, Min-Woo
    • Korean Security Journal
    • /
    • no.45
    • /
    • pp.107-127
    • /
    • 2015
  • The Chinese urge for the imperial power is a major threat to the today's peaceful international order. Such arrogant and delusional goal could be the very critical obstacle against the Korean security and national interests due to the geographical proximity. Today, the interesting dynamic of Uyghur nationalism, Uyghur terrorism, and the oppressive Chinese state terrorism could provide an meaningful prediction for the situation that the Korean nation may face in the future. In this regard, the present paper describes the interaction between Uyghur nationalism, Uyghur terrorism, and the Chinese state terrorism. The today's terrorism is a multi-dimensional security matter in that national independence, political and economic discrimination, non-state terrorism, and the hegemony competition among superpowers are intricately interrelated. Uyghur terrorism and related matter tend to show the nature of today's terrorism as a multi-dimensional security matter.

  • PDF