• 제목/요약/키워드: Policy Network Analysis

Search Result 1,118, Processing Time 0.027 seconds

Analysis on the Spatial Accessibility of Mental Health Institutions Using GIS in Gangwon-Do (GIS를 이용한 정신의료기관의 공간적 접근성 분석 - 강원도지역을 대상으로)

  • Park, Ju Hyun;Park, Young Yong;Lee, Kwang-Soo
    • Korea Journal of Hospital Management
    • /
    • v.23 no.2
    • /
    • pp.28-41
    • /
    • 2018
  • Purpose: This study purposed to analyze the spatial accessibility of mental health institutions in Ganwon-Do using Geographic Information System and to suggest policy implications. Methodology: Network analysis was applied to assess the spatial accessibility of mental health institutions in Gangwon-Do. To perform the network analysis, network data set was built using administrative district map, road network, address of mental health institutions in Gangwon-Do. After building network data set, Two network analysis methods, 1) Service area analysis, 2) Origin Destination cost matrix were applied. Service area analysis calculated accessive areas that were within specified time. And using Origin Destination cost matrix, travel time and road travel distance were calculated between centroids of Eup, Myeon, Dong and the nearest mental health institutions. Result: After the service area analysis, it is estimated that 19.63% of the total areas in Gangwon-Do takes more than 60 minutes to get to clinic institutions. For hospital institutions, 23.08% of the total areas takes more than 60 minutes to get there. And 59.96% of Gangwon-do takes more than 30 minutes to get to general hospitals. The result of Origin-Destination cost matrix showed that most Eup Myeon Dong in Gangwon-Do was connected to the institutions in Wonju-si, Chuncheon-si, Gangneung-si. And it showed that there were large regional variation in time and distance to reach the institutions. Implication: Results showed that there were regional variations of spatial accessibility to the mental health institutions in Gangwon-Do. To solve this problem, Several policy interventions could be applied such as mental health resources allocation plan, telemedicine, providing more closely coordinated services between mental health institutions and community mental health centers to enhance the accessibility.

Design and Analysis of Role-based Security Management Model for Policy-based Security Management in SNMPv3 Network (SNMPv3 통신망의 정책기반 보안관리를 위한 역할기반 보안관리 모델의 설계 및 분석)

  • Ju, Gwang-Ro;Lee, Hyeong-Ho;No, Bong-Nam
    • The KIPS Transactions:PartC
    • /
    • v.8C no.5
    • /
    • pp.573-584
    • /
    • 2001
  • Policy-Based Network Management (PBNM) architecture is to meet various needs of network users and to provide effective management facilities in distributed and large scale networks to network managers. In PBNM, network managers perform network management operations by stipulating a set of rules rather than control each network component. On the other hand, providing security services such as authentication, privacy of messages as well as a new flexible and extensible administration framework, SNMPv3 enables network managers to monitor and control the operation of network components more secure way than ever before. Despite of its enhanced security services, SNMPv3 has difficulties in managing distributed, large-scaled network because it does not provide centralized security management facilities. In this paper, we propose a new security model called Role-based Security Management model (RSM) with security management policy to support scalable and centralized security management for SNMP-based networks. Also, the structure and the operation of the security system as well as the efficiency analysis of RSM in terms of security management are also described.

  • PDF

A Network Analysis of the Library Bill Cosponsorship in the Legislative Process of the 19th National Assembly of Korea (도서관법안에 관한 19대 국회 입법과정의 공동발의 네트워크 분석)

  • Kim, Hyeyoung;Park, Ji-Hong
    • Journal of the Korean Society for information Management
    • /
    • v.37 no.2
    • /
    • pp.1-22
    • /
    • 2020
  • The legislative cosponsorship network shows the legislative process of the National Assembly through the relationship between the members of the National Assembly formed by cosponsorship. This study focused on the library bill proposed during the 19th National Assembly term, and conducted the cosponsorship network analysis, the centrality analysis of actors of the National Assembly, and a subgroup analysis of keyword-centric networks. As the result of the study, the library bill's cosponsorship network was segmented according to political parties, and lawmakers who played an intermediary role in close proximity to other political party members had an important influence on the network. When restructured into a keyword-oriented network, the network structure segmented into political parties improved as members of different parties shared the same keywords and formed subgroups. Based on the results, it was suggested that a strategy for spreading and sharing policy issues based on core keywords rather than library legislation, centered on lawmakers who play a mediating role between parties, is needed to activate library legislation.

Big-Data Traffic Analysis for the Campus Network Resource Efficiency (학내 망 자원 효율화를 위한 빅 데이터 트래픽 분석)

  • An, Hyun-Min;Lee, Su-Kang;Sim, Kyu-Seok;Kim, Ik-Han;Jin, Seo-Hoon;Kim, Myung-Sup
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.40 no.3
    • /
    • pp.541-550
    • /
    • 2015
  • The importance of efficient enterprise network management has been emphasized continuously because of the rapid utilization of Internet in a limited resource environment. For the efficient network management, the management policy that reflects the characteristics of a specific network extracted from long-term traffic analysis is essential. However, the long-term traffic data could not be handled in the past and there was only simple analysis with the shot-term traffic data. However, as the big data analytics platforms are developed, the long-term traffic data can be analyzed easily. Recently, enterprise network resource efficiency through the long-term traffic analysis is required. In this paper, we propose the methods of collecting, storing and managing the long-term enterprise traffic data. We define several classification categories, and propose a novel network resource efficiency through the multidirectional statistical analysis of classified long-term traffic. The proposed method adopted to the campus network for the evaluation. The analysis results shows that, for the efficient enterprise network management, the QoS policy must be adopted in different rules that is tuned by time, space, and the purpose.

Fiscal Policy Effectiveness Assessment Based on Cluster Analysis of Regions

  • Martynenko, Valentyna;Kovalenko, Yuliia;Chunytska, Iryna;Paliukh, Oleksandr;Skoryk, Maryna;Plets, Ivan
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.7
    • /
    • pp.75-84
    • /
    • 2022
  • The efficiency of the regional fiscal policy implementation is based on the achievement of target criteria in the formation and distribution of own financial resources of local budgets, reducing their deficit and reducing dependence on transfers. It is also relevant to compare the development of financial autonomy of regions in the course of decentralisation of fiscal relations. The study consists in the cluster analysis of the effectiveness of fiscal policy implementation in the context of 24 regions and the capital city of Kyiv (except for temporarily occupied territories) under conditions of fiscal decentralisation. Clustering of the regions of Ukraine by 18 indicators of fiscal policy implementation efficiency was carried out using Ward's minimum variance method and k-means clustering algorithm. As a result, the regions of Ukraine are grouped into 5 homogeneous clusters. For each cluster measures were developed to increase own revenues and minimize dependence on official transfers to increase the level of financial autonomy of the regions. It has been proved that clustering algorithms are an effective tool in assessing the effectiveness of fiscal policy implementation at the regional level and stimulating further expansion of financial decentralisation of regions.

Policy Network Analysis on Korean Child Care Cash Benefit Expansion (한국 양육수당의 확대는 어떠한 정책형성과정을 거쳤는가?: 정책네트워크 분석을 활용하여)

  • Lee, Sophia Seung-yoon;Kim, Min Hye;Lee, Ju-yong
    • 한국사회정책
    • /
    • v.20 no.2
    • /
    • pp.195-232
    • /
    • 2013
  • Child care cash benefit policy in Korea started in 2009 limited to the those under 2 years old in the poverty group entitled to National Basic Living Security Act and the near poor group (100,000 won a month). However, in 2013 the coverage has been expanded to everyone under 5 (200,000 won for those between babies in their first year, 150,000 won for the second year and 100,000 won for those between 2 to 5 years old) regardless of the household income level. The policy change between year 2012 and year 2013 requires a rapid increase in child care budget - 760% increase. This paper examines this exceptional expansion in child care cash benefit using policy network analysis. We found that local election as well as general election immediately effect the interaction between policy actors and the types of networks. This suggest that policy actors recognize child care cash benefit to be more directly related to the election result compared with child care services. Also conflictive interaction between the parties and government bodies with budget restraint also facilitated the diversification on the child care cash benefit discussion. The policy making process of child care cash benefit was led to policy adoption immediately after the presidential election suggesting that policy formation process and the policy adoption had an close relationship in the Korean child care cash benefit policy process.

Quantitative Analysis of Research Trends in Korean E-Government Using Text Mining and Network Analysis Methods (국내 전자정부 연구동향에 대한 정량적 분석: 텍스트 마이닝과 네트워크 분석 기법을 중심으로)

  • Lee, Soo-In;Shin, Shin-Ae;Kang, Dong-Seok;Kim, Sang-Hyun
    • Informatization Policy
    • /
    • v.25 no.4
    • /
    • pp.84-107
    • /
    • 2018
  • The existing research on domestic e-government trends in Korea has weaknesses in that it depends only on qualitative research methods. Therefore, a quantitative analysis was conducted through this study as of September 2018 based on the data from 1996 to 2017. A total of seven research topics were derived from text mining, of which the network centrality of the framework and public policy effect were identified as highly significant. The results of this study provide academic and policy implications for the development of e-government. including that using a quantitative analysis method instead of a qualitative method contributes to ensuring relative objectivity and diversity of learning.

The effect of mutual cooperation between the Patent applicants on the Technological Innovation in ICT (특허 출원인 간 상호협력이 기술혁신에 미치는 영향)

  • Ju, Seong-Hwan
    • Journal of Digital Convergence
    • /
    • v.14 no.10
    • /
    • pp.83-93
    • /
    • 2016
  • In this paper, I study to determine the effect on patent applicants across the network characteristics of innovation in the ICT sector in Korea. For that, I use the Social Network Analysis(SNA) and the Negative Binomial Regression(NBR). The results about the innovation network in Korea ICT is very dense type. And the degree centrality and the closeness centrality had such a positive effect on innovation performance. Also, the efficiency had not reached a significant effect and the constraint was found to have a negative effect on innovation performance. In the future, based on these results, we need to plan a proper policy of the Korea Technology Innovation Policy.

A study on frame transition of personal information leakage, 1984-2014: social network analysis approach (사회연결망 분석을 활용한 개인정보 유출 프레임 변화에 관한 연구: 1984년-2014년을 중심으로)

  • Jeong, Seo Hwa;Cho, Hyun Suk
    • Journal of Digital Convergence
    • /
    • v.12 no.5
    • /
    • pp.57-68
    • /
    • 2014
  • This article analyses frame transition of personal information leakage in Korea from 1984 to 2014. In order to investigate the transition, we have collected newspaper article's titles. This study adopts classification, text network analysis(by co-occurrence symmetric matrix), and clustering techniques as part of social network analysis. Moreover, we apply definition of centrality in network in order to reveal the main frame formed in each of four periods. As a result, accessibility of personal information is extended from public sector to private sector. The boundary of personal information leakage is expanded to overseas. Therefore it is urgent to institutionalize the protection of personal information from a global perspective.

A study on the legal structure of the nuclear law system using social network analysis (사회 연결망분석을 활용한 법제 네트워크 구조에 관한 연구: 원자력산업의 관계 법령정보를 중심으로)

  • Jeon, Jieun;Lee, Sanghoon
    • Journal of Digital Convergence
    • /
    • v.17 no.8
    • /
    • pp.47-60
    • /
    • 2019
  • The purpose of this study is to explore the overall structural relationship between the statutory provisions of nuclear energy legislation and to identify the coherence of the nuclear law system using social network analysis. In particular, we analyze the legal structure of the "Nuclear Safety Act", which plays a central role in nuclear safety regulation, to examine the key provisions in legal network structure of Nuclear Safety Act. Therefore, we found the structural problems of the nuclear legal system and suggest the legislative improvement plan for reducing excessive legislative activity and determining the need for legal amendments in nuclear safety management and regulation. This study is expected to provide a analytical framework for making legal system of further policy in other science and technology industries as well as nuclear energy related industries.