• Title/Summary/Keyword: Distribution of Management

Search Result 8,287, Processing Time 0.039 seconds

A Model for Supporting Information Security Investment Decision-Making Considering the Efficacy of Countermeasures (정보보호 대책의 효과성을 고려한 정보보호 투자 의사결정 지원 모형)

  • Byeongjo Park;Tae-Sung Kim
    • Information Systems Review
    • /
    • v.25 no.4
    • /
    • pp.27-45
    • /
    • 2023
  • The importance of information security has grown alongside the development of information and communication technology. However, companies struggle to select suitable countermeasures within their limited budgets. Sönmez and Kılıç (2021) proposed a model using AHP and mixed integer programming to determine the optimal investment combination for mitigating information security breaches. However, their model had limitations: 1) a lack of objective measurement for countermeasure efficacy against security threats, 2) unrealistic scenarios where risk reduction surpassed pre-investment levels, and 3) cost duplication when using a single countermeasure for multiple threats. This paper enhances the model by objectively quantifying countermeasure efficacy using the beta probability distribution. It also resolves unrealistic scenarios and the issue of duplicating investments for a single countermeasure. An empirical analysis was conducted on domestic SMEs to determine investment budgets and risk levels. The improved model outperformed Sönmez and Kılıç's (2021) optimization model. By employing the proposed effectiveness measurement approach, difficulty to evaluate countermeasures can be quantified. Utilizing the improved optimization model allows for deriving an optimal investment portfolio for each countermeasure within a fixed budget, considering information security costs, quantities, and effectiveness. This aids in securing the information security budget and effectively addressing information security threats.

A Study of the Actual Condition for Inducing Container Cargos to Gunsan Port (군산항 컨테이너화물 유치를 위한 실태조사연구)

  • Song, Yong-Zong;Park, Hyoung-Chang;Kim, Myoung-Ryong
    • Journal of Korea Port Economic Association
    • /
    • v.23 no.4
    • /
    • pp.71-90
    • /
    • 2007
  • To induce container cargos to Gunsan port, we should struggle on securing the quantity of goods transported from the competitive Jeonbuk and Chungcheong areas by reducing transportation expenses by land, and make an activating plan for the international exchange between Gunsan port and nearby ports in China. As a result, if the plan to induce container cargos to Gunsan port is activated, the regular liners will stop at Gusan port. So the new sea route will be opened so that consignors can ship cargos in the proper time. The consignors will use Gunsan port frequently because of the reduction of distribution expenses. To do so, for the first, many incentives should be implemented to attract container cargos. In addition, various facilities should be fully equipped and improved. This paper is to improve the problems for which consignors, the shipping lines and forwarders may feel uncomfortable when they use Gunsan port. According to the research on the actual condition, the biggest problem in Gunsan port is the depth of water. The management, relation system, infrastructure and information system of Gunsan port are also insufficient. Therefore, this paper will make an alternative plan to improve these problems and help the container cargos induce to Gunsan port.

  • PDF

Projection of Future Snowfall and Assessment of Heavy Snowfall Vulnerable Area Using RCP Climate Change Scenarios (RCP 기후변화 시나리오에 따른 미래 강설량 예측 및 폭설 취약지역 평가)

  • Ahn, So Ra;Lee, Jun Woo;Kim, Seong Joon
    • KSCE Journal of Civil and Environmental Engineering Research
    • /
    • v.35 no.3
    • /
    • pp.545-556
    • /
    • 2015
  • This study is to project the future snowfall and to assess heavy snowfall vulnerable area in South Korea using ground measured snowfall data and RCP climate change scenarios. To identify the present spatio-temporal heavy snowfall distribution pattern of South Korea, the 40 years (1971~2010) snowfall data from 92 weather stations were used. The heavy snowfall days above 20 cm and areas has increased especially since 2000. The future snowfall was projected by HadGEM3-RA RCP 4.5 and 8.5 scenarios using the bias-corrected temperature and snow-water equivalent precipitation of each weather station. The maximum snowfall in baseline period (1984~2013) was 122 cm and the future maximum snow depth was projected 186.1 cm, 172.5 mm and 172.5 cm in 2020s (2011~2040), 2050s (2041~2070) and 2080s (2071~2099) for RCP 4.5 scenario, and 254.4 cm, 161.6 cm and 194.8 cm for RCP 8.5 scenario respectively. To analyze the future heavy snowfall vulnerable area, the present snow load design criteria for greenhouse (cm), cattleshed ($kg/m^2$), and building structure ($kN/m^2$) of each administrative district was applied. The 3 facilities located in present heavy snowfall areas were about two times vulnerable in the future and the areas were also extended.

Na Borosilicate Glass Surface Structures: A Classical Molecular Dynamics Simulations Study (소듐붕규산염 유리의 표면 구조에 대한 분자 동역학 시뮬레이션 연구)

  • Kwon, Kideok D.;Criscenti, Louise J.
    • Journal of the Mineralogical Society of Korea
    • /
    • v.26 no.2
    • /
    • pp.119-127
    • /
    • 2013
  • Borosilicate glass dissolution is an important chemical process that impacts the glass durability as nuclear waste form that may be used for high-level radioactive waste disposal. Experiments reported that the glass dissolution rates are strongly dependent on the bulk composition. Because some relationship exists between glass composition and molecular-structure distribution (e.g., non-bridging oxygen content of $SiO_4$ unit and averaged coordination number of B), the composition-dependent dissolution rates are attributed to the bulk structural changes corresponding to the compositional variation. We examined Na borosilicate glass structures by performing classical molecular dynamics (MD) simulations for four different chemical compositions ($xNa_2O{\cdot}B_2O_3{\cdot}ySiO_2$). Our MD simulations demonstrate that glass surfaces have significantly different chemical compositions and structures from the bulk glasses. Because glass surfaces forming an interface with solution are most likely the first dissolution-reaction occurring areas, the current MD result simply that composition-dependent glass dissolution behaviors should be understood by surface structural change upon the chemical composition change.

Design of Communication Protocol for Developing WISDOM(Wireless Interface Signal Control System for Dynamic and Optimal Management) (WISDOM(차세대 신호제어시스템) 개발을 위한 통신 프로토콜 설계)

  • Jung, Sung-Dae;Lee, Sang-Sun;Yoon, Young-Bum;Kim, Jong-Bok;Moon, Young-Jun
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.7 no.1
    • /
    • pp.92-100
    • /
    • 2008
  • The existing transportation systems is emerged as a major obstacle to solve the problems such as a traffic jam and the increasing cost for a distribution and a traffic safety. In hun, ITS targeting intellectual vehicles and transportation infrastructure like road and signals is getting more important and the standards of ITS wireless communication is also getting attention. New traffic control strategies are being developed to utilize real-time traffic information collected by detection method using ITS wireless technology. Especially, DSRC system is being expanded wit ETCS and the use of OBU is spreading. These infrastructures will have much influence on ITS industry and a profound study on the method of utilizing a present infrastructure is going on in various fields. The optimum traffic signal control system using quality real-time information through these infrastructure is under development and so is WISDOM. Accordingly, this paper proposes communication protocol utilizing DSRC to collect real-time traffic information in WISDOM.

  • PDF

Continuous Nearest Neighbor Query Processing on Trajectory of Moving Objects (이동객체의 궤적에 대한 연속 최근접 질의 처리)

  • 지정희;최보윤;김상호;류근호
    • Journal of KIISE:Databases
    • /
    • v.31 no.5
    • /
    • pp.492-504
    • /
    • 2004
  • Recently, as growing of interest for LBS(location-based services) techniques, lots of works on moving objects that continuously change their information over time, have been performed briskly. Also, researches for NN(nearest neighbor) query which has often been used in LBS, are progressed variously However, the results of conventional NN Query processing techniques may be invalidated as the query and data objects move. Therefore, they are usually meaningless in moving object management system such as LBS. To solve these problems, in this paper we propose a new nearest neighbor query processing technique, called CTNN, which is possible to meet accurate and continuous query processing for moving objects. Our techniques include an Approximate CTNN(ACTNN) technique, which has quick response time, and an Exact CTNN(ECTNN) technique, which makes it possible to search nearest neighbor objects accurately. In order to evaluate the proposed techniques, we experimented with various datasets. Experimental results showed that the ECTNN technique has high accuracy, but has a little low performance for response time. Also the ACTNN technique has low accuracy comparing with the ECTNN, but has quick response time The proposed techniques can be applied to navigation system, traffic control system, distribution information system, etc., and specially are most suitable when both data and query are moving objects and when we already know their trajectory.

A Categorization Method based on RCBAC for Enhanced Contents and Social Networking Service for User (사용자를 위한 향상된 콘텐츠 및 소셜 네트워킹 서비스 제공을 위한 RCBAC 기반 분류 방법)

  • Cho, Eun-Ae;Moon, Chang-Joo;Park, Dae-Ha
    • Journal of Digital Contents Society
    • /
    • v.13 no.1
    • /
    • pp.101-110
    • /
    • 2012
  • Recently, social network sites are very popular with the enhancement of mobile device function and distribution. This gives rise to the registrations of the people on the social network sites and the usage of services on the social sites is also getting active. However, social network sites' venders do not provide services enough compared to the demand of users' to share contents from diverse roots by users effectively. In addition, the personal information can be revealed improperly in processes sharing policies and it is obvious that it raises a privacy invasion problem when users access the contents created from diverse devices according to the relationship by policies. However, the existing methods for the integration management of social network are weak to solve this problem. Thus, we propose a model to preserve user privacy, categorize contents efficiently, and give the access control permissions at the same time. In this paper, we encrypt policies and the trusted third party classifies the encrypted policies when the social network sites share the generated contents by users. In addition, the proposed model uses the RCBAC model to manage the contents generated by various devices and measures the similarity between relationships after encrypting when the user policies are shared. So, this paper can contribute to preserve user policies and contents from malicious attackers.

Surveillance of Acanthamoeba spp. and Naegleria fowleri in environmental water by using the duplex real-time PCR (Duplex real-time PCR을 이용한 수계 중 가시아메바와 파울러자유아메바 조사)

  • Kim, Min-jeong;Lee, Gyu-Cheol;Kim, Kunwoo;Lee, Hyunji;Kim, Min Young;Seo, Dae Keun;Lee, Jeong Yeob;Cho, Young-Cheol
    • Korean Journal of Microbiology
    • /
    • v.54 no.2
    • /
    • pp.98-104
    • /
    • 2018
  • Naegleria fowleri and Acanthamoeba spp. are free-living amoebas that are widely distributed in natural environments. Although uncommon, infection with these protozoans can cause fatal disease in humans and animals. In this study, in order to select the appropriate method to survey Naegleria fowleri and Acanthamoeba spp. in water samples, four molecular biology techniques and one commercially available kit for real-time PCR were compared. The results indicated that the duplex real-time PCR was the most sensitive, and could be used to simultaneously detect two different free-living amoebas. Using the duplex real-time PCR approach, the two free-living amoebas were surveyed in three local streams in Daejeon, Republic of Korea. The concentrated free-living amoebas were inoculated onto non-nutrient agar plates which had been spread with heat-inactivated Escherichia coli and incubated for 5~7 days. After incubation, gDNA was extracted and used as the template for amplification by duplex real-time PCR. Acanthamoeba spp. and N. fowleri was detected from ten (83.3%) and two (16.6%) of the twelve samples, respectively. As these two free-living amoebas can be fatal, continuous surveillance is needed to track their distribution in the aquatic environment for the drinking water safety.

Design on Protection and Authentication System of IPTV Contents using OTP (OTP를 이용한 IPTV 콘텐츠 보호 및 인증 시스템 설계)

  • Kim, Dae-Jin;Choi, Hong-Sub
    • The Journal of the Korea Contents Association
    • /
    • v.9 no.8
    • /
    • pp.129-137
    • /
    • 2009
  • While the broadband network and multimedia technologies have been developing, the commercial market of digital contents also has been widely spreading with recently starting IPTV. As the IPTV services are getting to be generalized and popularized, the contents protection and authentication system tends to draw more attentions. So we need a system that can protect contents and allow only authenticated person to use right service by controling user authority and using content encryption. Until now, the conventional protection and authentication system is taking advantages of merits both in CAS and DRM. But the weak point of this system are in high costs, complexity and using HW. For resolving these problems, in this paper, we proposed IPTV contents protection and authentication system using OTP. When we transmit the content encrypted by OTP key using contents delivery technology, we operate XOR with contents using another settop-box's OTP key which was transmitted from distribution server. And contents are reconstructed and transmitted to the settop-box, In the end, downloaded content are encrypted by OTP key and are superior in content protection when contents redistribution. Since OTP use double-authentication elements in encryption process, this method is excellent in content protection. And it is very effective in cost aspect because it could be implemented by SW program. Another benefit is that we can shorten the development time period. In this paper, we propose and find its possibility as a new content protection and authentication method suitable for IPTV services.

Hierarchical Message Forwarding Scheme for Efficient Data Distribution in P2P Messaging System (P2P 출판-구독 메시징 시스템에서 효율적인 정보 전파를 위한 계층적 메시지 전송 기법)

  • Jung, Jin Sun;Oh, Sangyoon
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.8 no.9
    • /
    • pp.209-216
    • /
    • 2019
  • Publish-subscribe communication model is popular for various type of distributed applications because of its loosely coupled style connections. Among the various architecture style for publish-subscribe system, peer-to-peer architecture has been used for the mission critical application domain since it provides high scalability and real-timeness. On the other hand, to utilize the bandwidth of given networks, message filtering is frequently used to reduce the number of messages on the system. Even if P2P provides superior scalability, it is hard to apply filtering to the its messaging system because the filtering process should be done on the peer-side in P2P architecture that are usually done on the broker server in conventional pub/sub architecture. In this paper, we propose a hierarchical subscription management structure as well as message forwarding scheme for efficient data dissemination. Our proposed scheme reduces the number of received messages by filter-out un-wanted messages and offloading the message dissemination work to other subscribers to enhance the messaging throughput.