• Title/Summary/Keyword: Industrial Security Management

Search Result 588, Processing Time 0.033 seconds

The effect of Women' social networking on affective commitment and individual adaptation performance (인적 네트워킹이 정서적 조직몰입과 개인적응성과에 미치는 영향: 여성 공무원을 대상으로)

  • Na, Ki Hwan;Choe, Min Seok;Han, Su Jin
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.17 no.7
    • /
    • pp.499-509
    • /
    • 2016
  • The number of female government employees is increasing steadily; therefore, the importance of their effective management is also increasing. Recently, female government employees have organized and exploited their social networks to achieve career success. To obtain a better understanding of the consequences of social networking and its impact on female government employees, 262 female employees were asked to provide details about their experiences and attitudes regarding networking behavior (internal and external networking) and how they influenced affective commitment and individual adaptation performance. The results confirmed that social networking significantly increases emotional sharing, and leads to high levels of affective commitment and individual adaptation performance. The moderating roles that positive psychological capital play in the relationships between social networking (internal and external) and emotional sharing were also investigated. The results confirmed that positive psychological capital enhances the impact internal social networking has on affective commitment and individual adaptation performance. Managerial implications for developing effective female employee management strategies were provided for government managers. Based on these results, the theoretical and practical implications of the research findings are discussed, and recommendations for future research are provided.

Application and Policy Direction of Blockchain in Logistics and Distribution Industry (물류 및 유통산업의 블록체인 활용과 정책 방향)

  • Kim, Ki-Heung;Shim, Jae-Hyun
    • The Journal of Industrial Distribution & Business
    • /
    • v.9 no.6
    • /
    • pp.77-85
    • /
    • 2018
  • Purpose - The purpose of this study is to subdivide trade transaction-centered structure in a logistics/distribution industry system to apply blockchain, to establish and resolve with which types of technology, and to provide policy direction of government institution and technology to apply blockchain in this kind of industry. Research design, data, and methodology - This study was conducted with previous researches centered on cases applied in various industry sectors on the basis of blockchain technology. Results - General fields of blockchain application include digital contents distribution, IoT platform, e-Commerce, real-estate transaction, decentralized app. development(storage), certification service, smart contract, P2P network infrastructure, publication/storage of public documents, smart voting, money exchange, payment/settlement, banking security platform, actual asset storage, stock transaction and crowd funding. Blockchain is being applied in various fields home and abroad and its application cases can be explained in the banking industry, public sector, e-Commerce, medical industry, distribution and supply chain management, copyright protection. As examined in the blockchain application cases, it is expected to establish blockchain that can secure safety through distributed ledger in trade transaction because blockchain is established and applied in various sectors of industries home and abroad. Parties concerned of trade transaction can secure visibility even in interrupted specific section when they provide it as a base for distributed ledger application in trade and establish trade transaction model by applying blockchain. In case of interrupted specific section by using distributed ledger, blockchain model of trade transaction needs to be formed to make it possible for parties concerned involved in trade transaction to secure visibility and real-time tracking. Additionally, management should be possible from the time of contract until payment, freight transfer to buyers through land, air and maritime transportation. Conclusions - In order to boost blockchain-based logistics/distribution industry, the government, institutionally, needs to back up adding legal plan of shipping, logistics and distribution, reviewing standardization of electronic switching system and coming up with blockchain-based industrial road maps. In addition, the government, technologically, has to support R&D for integration with other high technology, standardization of distribution industry's blockchain technology and manpower training to expand technology development.

Design of an Integrated University Information Service Model Based on Block Chain (블록체인 기반의 대학 통합 정보서비스 실증 모델 설계)

  • Moon, Sang Guk;Kim, Min Sun;Kim, Hyun Joo
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.20 no.2
    • /
    • pp.43-50
    • /
    • 2019
  • Block-chain enjoys technical advantages such as "robust security," owing to the structural characteristic that forgery is impossible, decentralization through sharing the ledger between participants, and the hyper-connectivity connecting Internet of Things, robots, and Artificial Intelligence. As a result, public organizations have highly positive attitudes toward the adoption of technology using block-chain, and the design of university information services is no exception. Universities are also considering the application of block-chain technology to foundations that implement various information services within a university. Through case studies of block-chain applications across various industries, this study designs an empirical model of an integrated information service platform that integrates information systems in a university. A basic road map of university information services is constructed based on block-chain technology, from planning to the actual service design stage. Furthermore, an actual empirical model of an integrated information service in a university is designed based on block-chain by applying this framework.

Evaluation of Prevention System of Falls and Committing Suicide with Application Technology of Rollinder System (추락 및 투신자살 방지시스템의 조사 및 Rollinder System 적용기술)

  • Park, Sea-Man;Baek, Chung-Hyun;Choi, Byong-Jeong
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.20 no.5
    • /
    • pp.591-598
    • /
    • 2019
  • The statistics of committing suicide in S. Korea is ranked in top with serious attempts of falling among OECD countries since 2003. The rates is slightly dropped by 5 percent point, nevertheless the falling is still high for the age of over 10 years old and this matter must be solved. Most of the case of suicides are the falling based on a trend view of falling which is serious matter and cannot be solved easily for both domestic and foreign countries. For example, the steel net of falling prevent was installed in the Golden Gate Bridge costed by 200 million-dollar. In New Zealand, the steel net of falling prevention had been removed and re-installed beccause of the high suicide rates. Canada and Australia also surrounded the bridge with steel fences to prevent suicide without consideration of the beauty of bridge. Therefore, this paper suggested a comparison study on both falling prevention systems in all countries and patent technologies. Also, it covers the blocking skills of approach in both security and limited area. This paper suggested the technical Rollinder system equipped with the mechanical apprentice to prevent effectively the falling sucides and wall passing. Before the installation of Rollinder System by 2016, there were 33 person who tried to fall in the river in Machang Bridge. However, the number of the committing suicides were dramatically reduced to zero after the installation of the system.

Risk Management-Based Application of Anti-Tampering Methods in Weapon Systems Development (무기 시스템 개발에서 기술보호를 위한 위험관리 기반의 Anti-Tampering 적용 기법)

  • Lee, Min-Woo;Lee, Jae-Chon
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.19 no.12
    • /
    • pp.99-109
    • /
    • 2018
  • Tampering involves illegally removing technologies from a protected system through reverse engineering or developing a system without proper authorization. As tampering of a weapon system is a threat to national security, anti-tampering measures are required. Precedent studies on anti-tampering have discussed the necessity, related trends, application cases, and recent cybersecurity-based or other protection methods. In a domestic situation, the Defense Technology Protection Act focuses on how to prevent technology leakage occurring in related organizations through personnel, facilities and information systems. Anti-tampering design needs to determine which technologies are protected while considering the effects of development cost and schedule. The objective of our study is to develop methods of how to select target technologies and determine counter-measures to protect these technologies. Specifically, an evaluation matrix was derived based on the risk analysis concept to select the protection of target technologies. Also, based on the concept of risk mitigation, the classification of anti-tampering techniques was performed according to its applicability and determination of application levels. Results of the case study revealed that the methods proposed can be systematically applied for anti-tampering in weapon system development.

A Study on Evaluation of Water Supply Capacity with Coordinated Weirs and Multi-reservoir Operating Model (댐-보 최적 연계운영을 통한 용수공급능력 평가에 관한 연구)

  • Chae, Sun-Il;Kim, Jae-Hee;Kim, Sheung-Kown
    • Journal of Korea Water Resources Association
    • /
    • v.45 no.8
    • /
    • pp.839-851
    • /
    • 2012
  • When we evaluate the water supply capacity of a river basin, it is a common practice to gradually increase the water demand and check if the water demands are met. This practice is not only used in the simulation approach, but also in the optimization approach. However, this trial and error approach is a tedious task. Hence, we propose a two-phase method. In the first phase, by assuming that the decision maker has complete information on inflow data, we use a goal programming model that can generate the maximum water supply capacity at one time. In the second phase, we simulate the real-time operation for the critical period by utilizing the water supply capacity given by the goal programming model under the condition that there is no foresight of inflow. We applied the two-phase method to the Geum-River basin, where multi-purpose weirs were newly constructed. By comparing the results of the goal programming model with those of the real-time simulation model we could comprehend and estimate the effect of perfect inflow data on the water supply capacity.

A Study of the Establishment of Small and Medium Sized Architectural Design Firm BIM Environment based on Virtual Desktop Infrastructure (가상 데스크톱 인프라(VDI) 기술을 활용한 중소규모 설계사의 BIM 사용자 별 데스크탑 자원 할당 전략에 관한 연구)

  • Lee, Kyuhyup;Shin, Joonghwan;Kwon, Soonwook;Park, Jaewoo
    • Korean Journal of Construction Engineering and Management
    • /
    • v.17 no.5
    • /
    • pp.78-88
    • /
    • 2016
  • Recently BIM technology has been expanded for using in construction project. However its spread has been delayed than the initial expectations, due to the high-cost of BIM infrastructure development, the lack of regulations, the lack of process and so forth. In design phase, especially, collaboration based on BIM system has being a key factor for successful next generation building project. Through the analysis of current research trend about IT technologies, virtualization and BIM service, data exchange such as drawing, 3D model, object data, properties using cloud computing and virtual server system is defined as a most successful solution. In various industrial fields, cloud computing technology is utilized as a promising solution which can reduce time and cost of hardware infrastructure. Among the cloud computing technology, VDI is receiving a great deal of attention from it market as an essential part cloud computing. VDI enables to host multiple individual virtual machines by using hypervisor. It has an advantage to easy main device management. Therefore, this study implements a step-by-step user's DaaS by analyzing the desktop resource data of the workers from Pre-design phase to Schematic design, Design develop and Construction design phase. It also develops BIM environment based on test of BIM modeler and designers in architectural design firm. The goal of the study is to enable the cloud computing BIM server. It provides cost saving, high-performance quality of working environment and cooperation's convenience and high security when doing BIM work in small and medium sized architectural design firm.

Analysis of influential factors of cyanobacteria in the mainstream of Nakdong river using random forest (랜덤포레스트를 이용한 낙동강 본류의 남조류 발생 영향인자 분석)

  • Jung, Woo Suk;Kim, Sung Eun;Kim, Young Do
    • Journal of Wetlands Research
    • /
    • v.23 no.1
    • /
    • pp.27-34
    • /
    • 2021
  • In this study, the main influencing factors of the occurrence of cyanobacteria at each of the eight Multifunctional weirs were derived using a random forest, and a categorical prediction model based on a Algal bloom warning system was developed. As a result of examining the importance of variables in the random forest, it was found that the upstream points were directly affected by weir operation during the occurrence of cyanobacteria. This means that cyanobacteria can be managed through efficient security management. DO and E.C were indicated as major influencers in midstream. The midstream section is a section where large-scale industrial complexes such as Gumi and Gimcheon are concentrated as well as the emissions of basic environmental facilities have a great influence. During the period of heatwave and drought, E.C increases along with the discharge of environmental facilities discharged from the basin, which promotes the outbreak of cyanobacteria. Those monitoring sites located in the middle and lower streams are areas that are most affected by heat waves and droughts, and therefore require preemptive management in preparation for the outbreak of cyanobacteria caused by drought in summer. Through this study, the characteristics of cyanobacteria at each point were analyzed. It can provide basic data for policy decision-making for customized cyanobacteria management.

A Robust Biometric-based User Authentication Protocol in Wireless Sensor Network Environment (무선센서네트워크 환경에서 생체기반의 개선된 사용자 인증 프로토콜)

  • Shin, Kwang-Cheul
    • The Journal of Society for e-Business Studies
    • /
    • v.18 no.3
    • /
    • pp.107-123
    • /
    • 2013
  • In a wireless sensor network environment, it is required to ensure anonymity by keeping sensor nodes' identifiers not being revealed and to support real-time authentication, lightweight authentication and synchronization. In particular, there exist possibilities of location information leakage by others, privacy interference and security vulnerability when it comes to wireless telecommunications. Anonymity has been an importance issue in wired and wireless network environment, so that it has been studied in wide range. The sensor nodes are interconnected among them based on wireless network. In terms of the sensor node, the researchers have been emphasizing on its calculating performance limit, storage device limit, and smaller power source. To improve of biometric-based D. He scheme, this study proposes a real-time authentication protocol using Unique Random Sequence Code(URSC) and variable identifier for enhancing network performance and retaining anonymity provision.

Analysis of Experience Knowledge of Shooting Simulation for Training Using the Text Mining and Network Analysis (Text Mining과 네트워크 분석을 활용한 교육훈련용 모의사격 시뮬레이션 경험지식 분석)

  • Kim, Sungkyu;Son, Changho;Kim, Jongman;Chung, Sehkyu;Park, Jaehyun;Jeon, Jeonghwan
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.20 no.5
    • /
    • pp.700-707
    • /
    • 2017
  • Recently, the military need more various education and training because of the increasing necessity of various operation. But the education and training of the military has the various difficulties such as the limitations of time, space and finance etc. In order to overcome the difficulties, the military use Defense Modeling and Simulation(DM&S). Although the participants in training has the empirical knowledge from education and training based on the simulation, the empirical knowledge is not shared because of particular characteristics of military such as security and the change of official. This situation obstructs the improving effectiveness of education and training. The purpose of this research is the systematizing and analysing the empirical knowledge using text mining and network analysis to assist the sharing of empirical knowledge. For analysing texts or documents as the empirical knowledge, we select the text mining and network analysis. We expect our research will improve the effectiveness of education and training based on simulation of DM&S.