• Title/Summary/Keyword: Defense Model

Search Result 1,790, Processing Time 0.029 seconds

A Study on the Information Protection Intention of Digital Healthcare Service Providers (디지털 헬스케어 서비스 제공자의 정보보호의도에 관한 연구)

  • Yang, Chang-Gyu
    • Asia-Pacific Journal of Business Venturing and Entrepreneurship
    • /
    • v.17 no.4
    • /
    • pp.163-172
    • /
    • 2022
  • This study investigates the IPI (Information Protection Intention) of DHS (Digital Healthcare Service) providers by introducing PMT (Protection Motivation Theory). This study examines the effects of protection motivation, such as threat appraisal and coping appraisal, on IPI, such as ICI(Induction Control Intention) and SDI(Self Defense Intention). The research model, based on the PMT, adopted severity, vulnerability, reaction efficacy and self-efficacy as independent variables. The research model was validated through quantitative research, a survey of 222 DHS providers in South Korea, using structural equation modeling. The results show that (1) a clear awareness of the consequences of security threats increases the understanding of DHS providers on the severity of closure of healthcare information, and thus may decreases abuse of DHS by providers; (2) user confidence and satisfaction on the security system may make them be confident that they can handle the closure of healthcare information by themselves; and (3) although DHS providers are realizing the consequences of closure of healthcare information, they think that they are unlikely to encounter such situations. As a result of this study, venture companies that provide DHS need to provide contents that can continuously increase providers' security level in order to increase providers' information protection intention. It suggests that IPI is important through trust of healthcare service providers.

The Influences of Workplace Bullying on Organizational Silence: A Mediation of Job Burnout (직장 내 따돌림이 조직침묵에 미치는 영향: 직무소진의 매개효과)

  • Chan Woo Park;Jisung Park
    • Asia-Pacific Journal of Business
    • /
    • v.15 no.3
    • /
    • pp.205-231
    • /
    • 2024
  • Purpose - The purpose of this study is to investigate the relationship between workplace bullying and defensive silence/acquiescent silence, and to examine a mediation model of job burnout. Design/methodolgy/approach - The survey questionnaires were distributed to 974 employees of a public R&D institute, financial industry, and public officials in Daejeon and Chungnam, and a total of 322 surveys were collected. 288 valid responses were used for the final data analysis using SPSS 21.0 and Amos 22.0. Descriptive statistics were used to identify demographic characteristics of the sample. Reliability analysis of the measurement was conducted using Cronbach's alpha coefficient, and confirmatory factor analysis (CFA) was performed to check the validity of the measurement. Hierarchical regressions were used to examine the relationship between the variables including the moderating effect of job calling. The mediating effect of job burnout and the moderated mediation effect of job calling was analyzed using bootstrapping with PROCESS Macro installed on SPSS 21.0. Findings - The findings of the study are as follows: First, workplace bullying had a significant positive effect on both defensive silence and acquiescent silence. Second, workplace bullying had a significant positive effect on job burnout. Third, job burnout had a significant positive effect on both defensive silence and acquiescent silence. Fourth, job burnout significantly mediated the relationship between workplace bullying and defensive silence, and between workplace bullying and acquiescent silence. Research implications or Originality - The results of this study show that workplace bullying is an important variable that must be managed, because workplace bullying leads to job burnout that can hinder the performance improvement and innovation activities of the organization, which in turn leads to organizational silence. On the other hand, in the research model, the job calling was used as a moderating variable to alleviate the positive effect of workplace bullying and job burnout on the defensive and acquiescent silence, but there was no significant moderating effect. In addition to the job calling, which is the moderating variable used in this study, it is judged that it is necessary to consider specific measures to prevent members from reaching job burnout and reduce silent behavior by investing appropriate job resources such as supporting colleagues, supervisors and leadership in the workplace.

A Study on the Application of Block Chain Technology on EVMS (EVMS 업무의 블록체인 기술 적용 방안 연구)

  • Kim, Il-Han;Kwon, Sun-Dong
    • Management & Information Systems Review
    • /
    • v.39 no.2
    • /
    • pp.39-60
    • /
    • 2020
  • Block chain technology is one of the core elements for realizing the 4th industrial revolution, and many efforts have been made by government and companies to provide services based on block chain technology. In this study we analyzed the benefits of block chain technology for EVMS and designed EVMS block chain platform with increased data security and work efficiency for project management data, which are important assets in monitoring progress, foreseeing future events, and managing post-completion. We did the case studies on the benefits of block chain technology and then conducted the survey study on security, reliability, and efficiency of block chain technology, targeting 18 block chain experts and project developers. And then, we interviewed EVMS system operator on the compatibility between block chain technology and EVM Systems. The result of the case studies showed that block chain technology can be applied to financial, logistic, medical, and public services to simplify the insurance claim process and to improve reliability by distributing transaction data storage and applying security·encryption features. Also, our research on the characteristics and necessity of block chain technology in EVMS revealed the improvability of security, reliability, and efficiency of management and distribution of EVMS data. Finally, we designed a network model, a block structure, and a consensus algorithm model and combined them to construct a conceptual block chain model for EVM system. This study has the following contribution. First, we reviewed that the block chain technology is suitable for application in the defense sector and proposed a conceptual model. Second, the effect that can be obtained by applying block chain technology to EVMS was derived, and the possibility of improving the existing business process was derived.

A Real-Time Head Tracking Algorithm Using Mean-Shift Color Convergence and Shape Based Refinement (Mean-Shift의 색 수렴성과 모양 기반의 재조정을 이용한 실시간 머리 추적 알고리즘)

  • Jeong Dong-Gil;Kang Dong-Goo;Yang Yu Kyung;Ra Jong Beom
    • Journal of the Institute of Electronics Engineers of Korea SP
    • /
    • v.42 no.6
    • /
    • pp.1-8
    • /
    • 2005
  • In this paper, we propose a two-stage head tracking algorithm adequate for real-time active camera system having pan-tilt-zoom functions. In the color convergence stage, we first assume that the shape of a head is an ellipse and its model color histogram is acquired in advance. Then, the min-shift method is applied to roughly estimate a target position by examining the histogram similarity of the model and a candidate ellipse. To reflect the temporal change of object color and enhance the reliability of mean-shift based tracking, the target histogram obtained in the previous frame is considered to update the model histogram. In the updating process, to alleviate error-accumulation due to outliers in the target ellipse of the previous frame, the target histogram in the previous frame is obtained within an ellipse adaptively shrunken on the basis of the model histogram. In addition, to enhance tracking reliability further, we set the initial position closer to the true position by compensating the global motion, which is rapidly estimated on the basis of two 1-D projection datasets. In the subsequent stage, we refine the position and size of the ellipse obtained in the first stage by using shape information. Here, we define a robust shape-similarity function based on the gradient direction. Extensive experimental results proved that the proposed algorithm performs head hacking well, even when a person moves fast, the head size changes drastically, or the background has many clusters and distracting colors. Also, the propose algorithm can perform tracking with the processing speed of about 30 fps on a standard PC.

Thailand in 2017: The Resurgence of "Sarit Model" and Thai-Style Democracy (2017년 타이: '싸릿모델'의 부활과 타이식 민주주의)

  • PARK, Eun-Hong
    • The Southeast Asian review
    • /
    • v.28 no.2
    • /
    • pp.213-247
    • /
    • 2018
  • Thailand in 2017 the public sentiment has turned against the military government. The four pledges the military declared immediately after the 2014 coup, restoration of democracy, addressing of divisive politics, eradication of corruption, and stimulation of the economy have all failed. In the same year, however, Thai military junta began to recover it's diplomatic relationship with western countries including US and EU owing to promulgation of the new constitution endorsed by King Maha Vajiralongkorn and the lavish funeral of late King Bhumibol Adulyadej which was attended by huge number of condolence delegations from around the world including US Defense Secretary James Mattis. Since the 2014 coup, US has sanctioned the country under military junta led by General Prayuth Chan-o-cha for urging them back to the barracks. EU also joined this sanction measures. US signaled change in it's policy when General Prayuth got the chance to visit US and meet President Donal Trump in 2017. General Prayuth Chan-o-cha's military junta could start to restore it's reputation internationally. Domestically, he used absolute powers based on section 44 of the interim constitution, also guranteed in the new constitution. Oversea and national human rights groups have criticized that the interim constitution for permitting the NCPO, Thai military junta's official name, to carry out policies and actions without any effective oversight or accountability for human rights violations. On 1 December 2017, Thailand marked the one-year anniversary of King Maha Vajiralongkorn's accession to the throne as the country's new monarch, Rama X. In the first year of King Rama X's reign, arrests, prosecutions, and imprisonment under Article 112 of Thailand's Criminal Code (lese-majeste) have continued unabated in Thailand. NCPO has continued to abuse Article 112 to detain alleged violators and curb any form of discussion regarding the monarchy, particularly on social media. In this worsening human rights environment General Prayuth Chan-o-cha enforced continuously campaign like Thai-style democracy- an effort to promote largely autocratic 'Thainess' in such a way that freedom of expression is threatened. It is a resurgence of 'Sarit Model'. In the beginning of 2017 Thai military government raised the slogan of 'opportunity Thailand' in the context of 'Thailand 4.0' project which attempts to transform Thai economy based on industry-driven to innovation-driven for recovering robust growth. To consider freedom and liberty as a source of innovation, 'Thailand 4.0' led by 'Sarit Model' without democracy would be skeptical.

Automatic Target Recognition Study using Knowledge Graph and Deep Learning Models for Text and Image data (지식 그래프와 딥러닝 모델 기반 텍스트와 이미지 데이터를 활용한 자동 표적 인식 방법 연구)

  • Kim, Jongmo;Lee, Jeongbin;Jeon, Hocheol;Sohn, Mye
    • Journal of Internet Computing and Services
    • /
    • v.23 no.5
    • /
    • pp.145-154
    • /
    • 2022
  • Automatic Target Recognition (ATR) technology is emerging as a core technology of Future Combat Systems (FCS). Conventional ATR is performed based on IMINT (image information) collected from the SAR sensor, and various image-based deep learning models are used. However, with the development of IT and sensing technology, even though data/information related to ATR is expanding to HUMINT (human information) and SIGINT (signal information), ATR still contains image oriented IMINT data only is being used. In complex and diversified battlefield situations, it is difficult to guarantee high-level ATR accuracy and generalization performance with image data alone. Therefore, we propose a knowledge graph-based ATR method that can utilize image and text data simultaneously in this paper. The main idea of the knowledge graph and deep model-based ATR method is to convert the ATR image and text into graphs according to the characteristics of each data, align it to the knowledge graph, and connect the heterogeneous ATR data through the knowledge graph. In order to convert the ATR image into a graph, an object-tag graph consisting of object tags as nodes is generated from the image by using the pre-trained image object recognition model and the vocabulary of the knowledge graph. On the other hand, the ATR text uses the pre-trained language model, TF-IDF, co-occurrence word graph, and the vocabulary of knowledge graph to generate a word graph composed of nodes with key vocabulary for the ATR. The generated two types of graphs are connected to the knowledge graph using the entity alignment model for improvement of the ATR performance from images and texts. To prove the superiority of the proposed method, 227 documents from web documents and 61,714 RDF triples from dbpedia were collected, and comparison experiments were performed on precision, recall, and f1-score in a perspective of the entity alignment..

A Study on the Patient Exposure Doses from the Panoramic Radiography using Dentistry (치과 파노라마 촬영에서 환자의 피폭선량에 관한 연구)

  • Park, Ilwoo;Jeung, Wonkyo;Hwang, Hyungsuk;Lim, Sunghwan;Lee, Daenam;Im, Inchul;Lee, Jaeseung;Park, Hyonghu;Kwak, Byungjoon;Yu, Yunsik
    • Journal of the Korean Society of Radiology
    • /
    • v.7 no.1
    • /
    • pp.17-24
    • /
    • 2013
  • This study estimate radiation biological danger factor by measuring patient's exposed dose and propose the low way of patient's exposed dose in panoramic radiography. We seek correcting constant of OSL dosimeter for minimize the error of exposed dose's measurement and measure the Left, Right crystalline lens, thyroid, directly included upper, lower lips, the maxillary bone and the center of photographing that indirect included in panoramic radiography by using the human body model standard phantom advised in ICRP. In result, the center of photographing's level of radiation maximum value is $413.67{\pm}6.53{\mu}Gy$ and each upper, lower lips is $217.80{\pm}2.98{\mu}Gy$, $215.33{\pm}2.61{\mu}Gy$. Also in panoramic radiography, indirect included Left, Right crystalline lens's level of radiation are $30.73{\pm}2.34{\mu}Gy$, $31.87{\pm}2.50{\mu}Gy$, and thyroid's level of measured exposed dose can cause effect of radiation biological and we need justifiable analysis about radiation defense rule and substantiation advised international organization for the low way of patient's exposed dose in panoramic radiography of dental clinic and we judge need the additional study about radiation defense organization for protect the systematize protocol's finance and around internal organs for minimize until accepted by many people that is technological, economical and social fact by using panoramic measurement.

Construction and Application of Intelligent Decision Support System through Defense Ontology - Application example of Air Force Logistics Situation Management System (국방 온톨로지를 통한 지능형 의사결정지원시스템 구축 및 활용 - 공군 군수상황관리체계 적용 사례)

  • Jo, Wongi;Kim, Hak-Jin
    • Journal of Intelligence and Information Systems
    • /
    • v.25 no.2
    • /
    • pp.77-97
    • /
    • 2019
  • The large amount of data that emerges from the initial connection environment of the Fourth Industrial Revolution is a major factor that distinguishes the Fourth Industrial Revolution from the existing production environment. This environment has two-sided features that allow it to produce data while using it. And the data produced so produces another value. Due to the massive scale of data, future information systems need to process more data in terms of quantities than existing information systems. In addition, in terms of quality, only a large amount of data, Ability is required. In a small-scale information system, it is possible for a person to accurately understand the system and obtain the necessary information, but in a variety of complex systems where it is difficult to understand the system accurately, it becomes increasingly difficult to acquire the desired information. In other words, more accurate processing of large amounts of data has become a basic condition for future information systems. This problem related to the efficient performance of the information system can be solved by building a semantic web which enables various information processing by expressing the collected data as an ontology that can be understood by not only people but also computers. For example, as in most other organizations, IT has been introduced in the military, and most of the work has been done through information systems. Currently, most of the work is done through information systems. As existing systems contain increasingly large amounts of data, efforts are needed to make the system easier to use through its data utilization. An ontology-based system has a large data semantic network through connection with other systems, and has a wide range of databases that can be utilized, and has the advantage of searching more precisely and quickly through relationships between predefined concepts. In this paper, we propose a defense ontology as a method for effective data management and decision support. In order to judge the applicability and effectiveness of the actual system, we reconstructed the existing air force munitions situation management system as an ontology based system. It is a system constructed to strengthen management and control of logistics situation of commanders and practitioners by providing real - time information on maintenance and distribution situation as it becomes difficult to use complicated logistics information system with large amount of data. Although it is a method to take pre-specified necessary information from the existing logistics system and display it as a web page, it is also difficult to confirm this system except for a few specified items in advance, and it is also time-consuming to extend the additional function if necessary And it is a system composed of category type without search function. Therefore, it has a disadvantage that it can be easily utilized only when the system is well known as in the existing system. The ontology-based logistics situation management system is designed to provide the intuitive visualization of the complex information of the existing logistics information system through the ontology. In order to construct the logistics situation management system through the ontology, And the useful functions such as performance - based logistics support contract management and component dictionary are further identified and included in the ontology. In order to confirm whether the constructed ontology can be used for decision support, it is necessary to implement a meaningful analysis function such as calculation of the utilization rate of the aircraft, inquiry about performance-based military contract. Especially, in contrast to building ontology database in ontology study in the past, in this study, time series data which change value according to time such as the state of aircraft by date are constructed by ontology, and through the constructed ontology, It is confirmed that it is possible to calculate the utilization rate based on various criteria as well as the computable utilization rate. In addition, the data related to performance-based logistics contracts introduced as a new maintenance method of aircraft and other munitions can be inquired into various contents, and it is easy to calculate performance indexes used in performance-based logistics contract through reasoning and functions. Of course, we propose a new performance index that complements the limitations of the currently applied performance indicators, and calculate it through the ontology, confirming the possibility of using the constructed ontology. Finally, it is possible to calculate the failure rate or reliability of each component, including MTBF data of the selected fault-tolerant item based on the actual part consumption performance. The reliability of the mission and the reliability of the system are calculated. In order to confirm the usability of the constructed ontology-based logistics situation management system, the proposed system through the Technology Acceptance Model (TAM), which is a representative model for measuring the acceptability of the technology, is more useful and convenient than the existing system.

Influence of Mercury on the Repair of Ionizing Radiation-induced DNA Damage in Coelomocytes of Eisenia fetida (이온화 방사선에 의해 손상된 Eisenia fetida 체강세포의 DNA 수복에 수은이 미치는 영향)

  • Ryu, Tae-Ho;Nili, Mohammad;An, Kwang-Guk;Kim, Jin-Kyu
    • Korean Journal of Environmental Biology
    • /
    • v.29 no.3
    • /
    • pp.236-240
    • /
    • 2011
  • Mercury known as quicksilver, is the most common cause of heavy metal toxicity. Toxicity caused by excessive mercury exposure is now being recognized as a widespread environmental problem and is continuing to attract a great deal of public concerns. The mercury genotoxicity could be its effect on DNA repair mechanisms, which constitute the defense system designated to protect genome integrity. The objective of this study is to confirm that mercuric chloride inhibits the repair of gamma ray-induced DNA damage. The earthworm of Eisenia fetida was chosen for this study because it is an internationally accepted model species for toxicity testing with a cosmopolitan distribution. Experiments were done to identify the levels of DNA damage and the repair kinetics in the coelomocytes of E. fetida irradiated with 20 Gy gamma rays alone or with gamma rays after 40 mg $kg^{-1}$ $HgCl_2$ treatment by means of the single cell gel electrophoresis assay. The Olive tail moments were measured during 0~96 hours after irradiation. The repair time in the animals treated with the combination of $HgCl_2$ and ionizing radiation was nearly five times longer than that in the animals treated with ionizing radiation alone. Also, E. fetida exposed to mercury showed a statistically lower repair efficiency of gamma ray-induced DNA damage. The results suggest that the mercury could even have deleterious effects on the DNA repair system. Influence of mercury on the DNA repair mechanisms has been confirmed by this study.

Development of C2 Virtual Linked Simulator For Engineering and Engagement Level Battle Experimentation (공학-교전급 전투실험을 위한 C2 가상모의 연동 시뮬레이터 개발)

  • Lee, Sangtae;Lee, Seungyoung;Hwang, Kun-Chul;Kim, Saehwan;Lee, Kyuhyun
    • Journal of the Korea Society for Simulation
    • /
    • v.22 no.4
    • /
    • pp.11-19
    • /
    • 2013
  • The Korean naval weapon systems, combat experiments establish the concept of Battle operations, and create the future of the new weapons system. Doctrine development and training as well as ranging from experiments for evaluate the performance of mission operations for combat experiments are used. The battle lab is effectively support tool for the Korean Naval battle experiments. The battle lab is through a dedicated testing facility and to build efficient and effective simulation-based acquisition supporting environment. In this paper, the ship / submarines C2 operations virtual simulator was developed to support the concept of Battle operations of naval combat experiments in training and tactical development. The ship C2 operations virtual simulator makes the anti-ship and anti-aircraft the engagement scenario for performed experiments using the SADM. The submarines C2 operations virtual simulator makes the anti-submarine engagement scenario for performed experiments using EAS. EAS System was created before reuse. EAS system by modifying the additional interfaces HLA-RTI has been reused. Reflected in the tactics and training after analysis of the results through the battle experiment. Also increase training fidelity through operator involvement. The anti-ship and anti-aircraft system architecture (SADM) and anti-submarine system architecture (EAS) requires unique design of system framework since two separate architectures should be integrated into a system. An C2 virtual linked architecture was used to integrate different system architecture. A C2 virtual linked software framework, designed that have integrated protocol for battle experimental linkage and battlefield visualization environment.