• Title/Summary/Keyword: Mobile Policy

Search Result 996, Processing Time 0.03 seconds

The study on the diagnosis and measurement of post-information society by ANP (ANP를 활용한 후기정보사회의 수준진단과 측정에 관한 연구)

  • Song, Young-Jo;Kwak, Jeong-Ho
    • Informatization Policy
    • /
    • v.23 no.2
    • /
    • pp.73-97
    • /
    • 2016
  • Social changes due to ICT like Big Data, IoT, Cloud and Mobile is progressing rapidly. Now, we get out of the old-fashioned frame was measured at the level of the information society through the introduction of PC, Internet speed and Internet subscribers etc and there is a need for a new type of diagnostic information society framework. This study is the study for the framework established to diagnose and measure post-information society. The framework and indicators were chosen in accordance with the technological society coevolution theory and information society-related indicators presented from authoritative international organizations. Empirical results utilizing the indicators and framework developed in this study were as follows: First, the three sectors, six clusters (items), 25 nodes (indicators) that make up the information society showed that all strongly connected. Second, it was diagnosed as information society development (50.34%), technology-based expansion (25.03%) and ICT effect (24.63%) through a network analysis (ANP) for the measurement of importance of the information society. Third, the result of calculating the relative importance of the cluster and nodes showed us (1)social development potential (26.04%), (2)competitiveness (15.9%), (3)ICT literacy (15.5%) (4) (social)capital (24.3 %), (5)ICT acceptance(9.54%), (6)quality of life(8.7%). Consequently, We should take into account the effect of the economy and quality of life beyond ICT infrastructure-centric when we measure the post-information society. By applying the weighting we should performs a comparison between countries and we should diagnose the level of Korea and provide policy implications for the preparation of post-information society.

An Analysis of Various Types of Social Movement Through the New Media -Focusing on the 2008 Candle Rally- (뉴미디어를 활용한 다양한 사회운동방식에 대한 고찰 -2008년 촛불집회를 중심으로-)

  • Lee, Chang-Ho;Bae, Ae-Jin
    • Korean journal of communication and information
    • /
    • v.44
    • /
    • pp.44-75
    • /
    • 2008
  • The candle rally against the import of American beef which lasted for a long time was full of various types of social movement. That is, new media including mobile phone, Internet, Internet cafes played an important role in mobilizing people around the rally. Thus, this research focuses on the meaning and effect of these kinds of movement. In particular, it analyzed the possibility of real time broadcasting through the Internet as civic journalism, which received much attention in the rally. For this, this research used case study and interview as main research method. Case study focused on Internet cafes based on the media coverage of the rally. Interviews were conducted with workers at OhmyTV, Color TV, and 615TV. These workers at progressive media emphasized on the scene coverage as the advantage of real time delivery. Transmitting many citizens' voices was another advantage. It is expected that personal media and progressive media which try to show the scent as it is will play an important role in the future journalism with the expansion of Wibro.

  • PDF

A study for efficient operation of the e-commerce guarantee financing system in domestic industries (국내 전자상거래 보증제도의 효율적 운영방안에 관한 연구)

  • Yoo, Soon-Duck;Choi, Kwang-Don;Shin, Seung-Jung
    • Journal of Digital Convergence
    • /
    • v.9 no.3
    • /
    • pp.31-46
    • /
    • 2011
  • This research suggests for efficient operation of the e-commerce guarantee financing system in domestic industries by reviewing the definition, current situation and problems of the e-commerce guarantee financing system in operation since 2001. Throughout the 10 years of the e-commerce guarantee financing system's implementation, technological development has solved many previously concerning factors. The goal of the study is to resolve the current issues of the e-commerce guarantee financing system and offer means by which to expand the accessibility of the system to domestic industries and further assistance to firms already using the system. One of the primary policies supported by the research is the reallocation of funds from archaic means of exchanging finances to the modem e-commerce guaranteed financing methods because of the increased transparency of the trading. Specifically, the funding operated by government guarantee agencies requires systematic promotion, justifying subsidies and tax breaks to companies that are using e-commerce guarantee financing because of the increased overall transparency. In addition, the benefits of e-commerce guarantee financing as a means of funding are numerous: the promotion of good business, relaxation of credit ratings for company loans, construction of the mobile operating system for small businesses, and creation of policy flexibility in operating fund agencies run by government. Future research areas include continued collection and analysis of the above data provided and new market feedback such as direct poll surveys of the operating staff in companies using e-commerce guarantee financing agencies.

Comparative Research on Global Policy in ICT Accessibility for Vulnerable Groups -Focusing on Implementation of Legislative System- (취약계층을 위한 정보통신 접근성 정책에 대한 국가 간 비교 연구 -관련제도 중심으로-)

  • Kim, Jung-Yeon;Park, Sung-Woo;Kang, Byung-Gwon;Son, Chang-Yong;Jung, Bong-Keun
    • 재활복지
    • /
    • v.20 no.1
    • /
    • pp.131-150
    • /
    • 2016
  • This study aims to compare global policies on ICT accessibility and to suggest possible solutions that help to enhance ICT accessibility for socially disadvantaged groups. The results indicated that related laws and standards in Korea are relatively well established than Asian countries' whereas they need improvements when compared to the US or the UK. Particularly, in spite of rapid development in information communication technology industry, incorporating the definition of newly developed technologies into existing laws related to ICT accessibility seemed slow that caused reluctancy of related parties to address accessibility issues the new technologies create. In addition, Korean government seems less effortful to develop policies and standards apart from web and mobile application accessibility. In order to resolve the problems, firstly, the period or process of enacting and amending laws can be shorten. Next, a government affiliated research institute can be established to do research and develop ICT accessibility related to user scenarios so that effective policies and standards could be readily provided. Even though other possible solutions can be suggested, what is more important than that is that any interested parties should sustainably make efforts to provide equal opportunities for the underserved populations.

A Study on Optimum Education Training Effect Scale Factor Analysis for Korea Polytechnic (한국폴리텍대학 적정교육훈련 규모 영향 요인 분석에 관한 연구)

  • Choi, Ji-young;Kim, Young-sook;Chung, Je-ryun
    • Journal of Practical Engineering Education
    • /
    • v.9 no.1
    • /
    • pp.69-75
    • /
    • 2017
  • In this paper, we analyzed the factors influencing the size of Korea Polytechnic as a public vocational education and training institution through analysis of demand, region, industry, and demand with established existing campus and new campus in Korea Polytechnic. By analyzing data on admission, training, and employment for 3 years out of 37 campuses, we have sampled 5 campuses by type of Korea Polytechnic, fused with the results derived from the literature analysis and in-depth analysis results, so that the regional campus will play a leading role and the direction of development. The selection of five campuses by type is a precedent study to analyze 37 campuses in the future. As a result of the study, the demand analysis through objective indicators such as the number of high school graduates, the number of employed persons, the presence of nearby industrial complexes, and policy variables is very important and reflects the reality well. Therefore, it is necessary to analyze the demand through the objective indicators in decision making related to the new campus at the pre-analysis stage. In addition to the general data proposed in this paper, that is, common variables in all regions, it is important to consider the factors that can reflect local demand characteristics when considering specific locations.

A Study on the Application of the Cyber Threat Management System to the Future C4I System Based on Big Data/Cloud (빅데이터/클라우드 기반 미래 C4I체계 사이버위협 관리체계 적용 방안 연구)

  • Park, Sangjun;Kang, Jungho
    • Convergence Security Journal
    • /
    • v.20 no.4
    • /
    • pp.27-34
    • /
    • 2020
  • Recently, the fourth industrial revolution technology has not only changed everyday life greatly through technological development, but has also become a major keyword in the establishment of defense policy. In particular, Internet of Things, cloud, big data, mobile and cybersecurity technologies, called ICBMS, were selected as core leading technologies in defense information policy along with artificial intelligence. Amid the growing importance of the fourth industrial revolution technology, research is being carried out to develop the C4I system, which is currently operated separately by the Joint Chiefs of Staff and each military, including the KJCCS, ATCIS, KNCCS and AFCCS, into an integrated system in preparation for future warfare. This is to solve the problem of reduced interoperability for joint operations, such as information exchange, by operating the C4I system for each domain. In addition, systems such as the establishment of an integrated C4I system and the U.S. military's Risk Management Framework (RMF) are essential for efficient control and safe operation of weapons systems as they are being developed into super-connected and super-intelligent systems. Therefore, in this paper, the intelligent cyber threat detection, management of users' access to information, and intelligent management and visualization of cyber threat are presented in the future C4I system based on big data/cloud.

Revisiting the e-Government Maturity Model: Significance, Limitations, and Suggestions (전자정부 성숙도 모델의 재검토: 모델의 의의와 한계, 실증분석을 통한 제언)

  • SUNG, WOOKJOON
    • Informatization Policy
    • /
    • v.30 no.3
    • /
    • pp.3-28
    • /
    • 2023
  • This study aims to analyze the usage behavior of e-government service users based on the e-government maturity model and provide suggestions for advancement of the e-government services. The changes in Korea's e-government services were analyzed as follows; 1) Proportion of use of e-government services in Korean public services, 2) E-government service types/stages use, 3) Service use by platform 4) User response to e-government service 5) Users' requests for future e-government service usage methods. For the analysis, this study used data from Korea's 2012-2020 e-government usage behavior survey data. As a result of the analysis, first, the proportion of e-government service has been continuously increasing, and second, the use of the e-participation stage is relatively low compared to the presenting information, interaction, and transaction stages. Third, by platform, e-government service has been expanded to various access platforms such as mobile, kiosk, and SNS centering on the web. Fourth, users' satisfaction with e-government service is very high. However, to vitalize e-government services, users requested improvements such as providing one-stop integrated services and simplifying authentication procedures. Based on the analysis results, this study 1) reflects the user's point of view in the maturity model of e-government, 2) considers access to various platforms according to the development of digital technology, 3) improves the e-government maturity model through data-based analysis such as user usage behavior suggested the need.

A secure authentication system on wired wireless integrated network using OpenFlow (OpenFlow를 이용한 유‧무선 통합 네트워크 환경에서의 인증 시스템)

  • Moon, Jeong-Kyung;Cho, Han Jin;Kim, Jin-Mook
    • Journal of Digital Convergence
    • /
    • v.12 no.4
    • /
    • pp.285-291
    • /
    • 2014
  • Recent, development of wireless communication devices are rapidly and these device being deployed to the user very fast. By this results, a wired network device and the new device such as wireless devices incorporate. Then a demand of new mesh network is rapidly growing. In this wired/wireless integrated network environment, the network is configured automatically, and a user or wireless communication devices must be provided for authentication services. But, these services do not in the real world. Therefore, in this paper, we propose that wired/wireless integrated network environment to automatically configure the network using OpenFlow and the authentication system using Kerberos method. Our proposed system to be able to provide authentication services, confidentiality, integrity services for user or wired/wireless communication devices. And it can be prvented as well to man-in-the-middle attacks.

Design and Implementation of 3-Tier App Development Training System (3-Tier App개발 교육시스템 설계와 구현)

  • Chang, Young-Hyun;Oh, Sang-Yeob
    • Journal of Digital Convergence
    • /
    • v.12 no.8
    • /
    • pp.265-270
    • /
    • 2014
  • This study in coping with the current trend is to propose the environment for training 3-Tier App development being focused on the system to develop mobile applications where its related developers are scarce. Design and implementation of training system for the development of 3-Tier App in this paper is to realize the environment for software development for colleges as same as that in IT companies. For 3-Tier App development training system, 3 students with 3 computers work as a group. The above-mentioned 3 computers include a computer for development, Gateway server, and DB server together with legacy system. Also, each of the 3 students shall be given roles of the foregoing sections. We have educated 3-Tier App training system as a practical class for 64 students in junior students of computer information major. Through training session, it was confirmed that we can foster the students as custom-made talents who understand company's development environment. Also, the Comparison of 3-Tier and Stand-alone App Development Training System for 10 distinct description, we know that 3-Tier app development training system was very superior to stand-alone app development training system in the educational effects.

Secure Data Gathering Protocol over Wireless Sensor Network (무선센서네트워크에서 안전한 데이터 수집 프로토콜)

  • Choi, Hae-Won;Ryoo, Myung-Chun;Lee, Chae-Soo;Kim, Hyun-Sung
    • Journal of Digital Convergence
    • /
    • v.11 no.12
    • /
    • pp.367-380
    • /
    • 2013
  • A secure data gathering in a Wireless Sensor Network(WSN) has given attention to one of security issues. In general, the process of secure data gathering causes difficulties: one process is exchanging the secured data and the other is constructing secured data path. The previous studies have been resolving the difficulties in terms of two problems: security and data gathering in WSNs. However, a WSN requires a protocol that has to guarantee a security of path between sensors and sink, or a cluster head. Thus how to gather data securely is an important issue. In this paper, we propose a secure data gathering protocol over WSNs, which consists of hierarchical key settlement and secure path construction, and aims at tackling two problems. The proposed protocol causes little overhead to sensor nodes for secured key settlement and path construction. This work provides security analysis focused on the key settlement protocol and evaluates network performance for the proposed data gathering protocol through simulation.