• Title/Summary/Keyword: Policy-Based

Search Result 12,370, Processing Time 0.036 seconds

Analysis of School-based Mental Health Policy Stream based on Kingdon's Policy Stream Model (학교기반 정신건강정책의 흐름 분석: Kingdon의 정책흐름모형을 중심으로)

  • Min, Hea Young;Kang, Kyung Seok
    • Journal of the Korean Society of School Health
    • /
    • v.28 no.3
    • /
    • pp.139-149
    • /
    • 2015
  • Purpose: This study aims to analyze the factors affecting the agenda-setting process and the formation process of school-based mental health policies by applying a policy stream model. Methods: For this purpose, Kingdon's policy stream model was used as the analytical framework. Results: First, when establishing a school-based mental health policy, the agenda was set going through unpredictable and nonlinear changes. Second, for the school-based mental health policy to be selected onto the agenda and to be developed and implemented as an actual policy, the role of policy makers was considered most important in the process. Third, the policy window for school-based mental health policy was closed around the year 2013. Finally, an analysis of the school-based mental health policy stream identified two key features. One is that the school-based mental health policy first emerged when school violence prevention policy expanded its scope into relevant neighboring policies. The other is that the school-based mental health policy has taken shape through a linear decision-making process (being put on the government's agenda, searching for an alternative, selection, and implementation) during the policy implementation period after it has been selected as an alternative policy. Conclusion: Conclusions can be summed up as follows. The school-based mental health policy needs continuous development and improvement in case the window for the policy may open in the coming future. The government's support is needed to draw policy makers' interest and participation who play the biggest role in establishing policies.

A study on the Application of Policy-Based Networking for QoS in The Defense Information System (국방정보체계의 서비스 품질(QoS) 보장을 위한 정책기반(Policy-Based)네트워킹 적용에 관한 연구)

  • 김광영;이승종
    • Journal of the military operations research society of Korea
    • /
    • v.29 no.1
    • /
    • pp.57-75
    • /
    • 2003
  • Policy-based networking offers a network manager the ability to manage the network in a holistic and dynamic fashion rather than force a network manager to manage the network by dealing with each device individually. Policy-based networking is focusing on users and applications instead of emphasizing devices and interfaces. An important part of the policy-based networking is to simplify the task of administration and management for different disciplines. The Defense Information System(DIS) of today are complex and heterogeneous systems. Operational needs are not a trivial task and Quality of Service(QoS) is not generally guaranteed. So, important data may be missed or congested by trivial data. Policy-based networking provide a way to support QoS and simplify the management of multiple devices deploying complex technologies. This paper suggest implementation of policy-based networking in DIS to improvement of performance, and implementation is progressed step by step. Especially this paper is focusing on the providing QoS with policy-based networking using Lightweight Directory Access Protocol(LDAP) Server.

A Study on the Effect of the Inventory Policy on Military Supply Chain Performance - Focused on System Dynamics - (재고정책에 따른 군 공급체인 성과에 관한 연구 - 시스템 다이나믹스를 중심으로 -)

  • 안병기;김태현;문성임
    • Journal of the military operations research society of Korea
    • /
    • v.28 no.2
    • /
    • pp.1-19
    • /
    • 2002
  • This study shows the effect of inventory policy change from supplier-based to customer-based. We focus on the service level, cost, and information distortion of the Military Supply Chain(MSC) with System Dynamics. We design MSC model according to field practician interviews by using Vensim. The simulation makes a comparison between supply-based inventory policy performances and order-based inventory policy performances. In order to evaluate the MSC performances, we measure the accumulation of backlog(service level), supply chain cost, and order percentage overshoot(information distortion). The results show that 1) changing inventory policy from supplier-based to end customer order-based gets a good customer service, reduces MSC cost, and prevents information distortion, 2) changing inventory policy from supplier-based to immediate customer order-based reduces a small amount of MSC cost and deteriorates customer service, and 3) supply level is main factor for MSC performances improvement. This study implicates the policy change makes a improvement of MSC performance without introducing information system.

Modeling and Simulation of Policy-based Network Security

  • Lee, Won-young;Cho, Tae-ho
    • Proceedings of the KAIS Fall Conference
    • /
    • 2003.11a
    • /
    • pp.155-162
    • /
    • 2003
  • Today's network consists of a large number of routers and servers running a variety of applications. Policy-based network provides a means by which the management process can be simplified and largely automated. In this paper we build a foundation of policy-based network modeling and simulation environment. The procedure and structure for the induction of policy rules from vulnerabilities stored in SVDB (Simulation based Vulnerability Data Base) are developed. The structure also transforms the policy rules into PCIM (Policy Core Information Model). The effect on a particular policy can be tested and analyzed through the simulation with the PCIMs and SVDB.

  • PDF

Policy-based Loans to Korean SME Exporters and the Intensive Margin of Exports

  • Whang, Unjung;Koo, Kyong Hyun
    • East Asian Economic Review
    • /
    • v.26 no.3
    • /
    • pp.179-204
    • /
    • 2022
  • This study examines the extent to which policy-based loans to SME exporters affect their export performance (the intensive margin of exports). We also investigate the heterogeneous export effects of policy-based loans that may depend on firm- and industry-specific characteristics, such as credit ratings, debt-to-assets ratios, firm size and age. To do so, we conduct a survey, of 1,000 Korean SMEs, that collect information on firm-level exports and policy-based loans. The main empirical findings strongly support that SMEs that receive policy-based loans tend to increase their export volumes. However, these loans' positive impact on exports are only valid for SME exporters with credit scores of 12 or greater (that is, SMEs that have difficulty accessing the external financial market). The estimation results with respect to SMEs' dependence on external financing imply that policy-based loans for SMEs in sectors that are heavily dependent on external finance are effective in that they are instrumental in increasing these firms' exports. These empirical findings emphasize the importance of the external financial market to SME exporters who face various up-front investments that are related to their exporting activities.

Policy-based Security System Modeling using Vulnerable Information (취약성 정보를 활용한 정책 기반 보안 시스템 모델링)

  • Sea, Hee-Suk;Kim, Dong-Soo;Kim, Hee-Wan
    • Journal of Information Technology Services
    • /
    • v.2 no.2
    • /
    • pp.97-109
    • /
    • 2003
  • As the importance and the need for network security is increased, many organization uses the various security systems. They enable to construct the consistent integrated security environment by sharing the vulnerable information among firewall, intrusion detection system, and vulnerable scanner. And Policy-based network provides a means by which the management process can be simplified and largely automated. In this article we build a foundation of policy-based network modeling environment. The procedure and structure for policy rule induction from vulnerabilities stored in SVDB (Simulation based Vulnerability Data Based) is conducted. It also transforms the policy rules into PCIM (Policy Core Information Model).

Detection and Recovery of Policy Conflicts in Policy-based Network Management Systems (정책기반 네트워크 관리 시스템의 정책 충돌 탐지 및 복구)

  • Lee, Kyu-Woong
    • Journal of Information Technology Services
    • /
    • v.6 no.2
    • /
    • pp.177-188
    • /
    • 2007
  • Policy-based Network Management (PBNM) has been presented as a paradigm for efficient and customizable management systems. The approach chosen is based on PBNM systems, which are a promising and novel approach to network management. These systems have the potential to improve the automation of network management processes. The Internet Engineering Task Force (IETF) has also used policy concepts and provided a framework to describe the concept as the Policy Core Information Model (PCIM) and its extensions. There are policy conflicts among the policies that are defined as the policy information model and they are not easily and effectively detected and resolved. In this paper, we present the brief description of PBNM and illustrate the concepts of policy core information model and its policy implementation for a network security. Especially we describe our framework for detecting and resolving the policy conflicts for network security.

A Study on Energy Policy Governance Cases and Policy Suggestions of Major Countries (주요국의 에너지정책 거버넌스 사례와 정책제언)

  • Lim, Ki Choo
    • Journal of Energy Engineering
    • /
    • v.25 no.4
    • /
    • pp.226-235
    • /
    • 2016
  • This study intends to present policy proposals to make the transition from policy adjustment system based on hierarchial authority to deal with energy policy to network establishment based on the central government, local government, industry and civic group, that can be converted into governance. To this end, the legal foundation to make the network-based policy adjustment for government's energy policy possible first. Second, contribution should be made to establish governance related to central government's energy policy. Third, contribution should be made to establish governance related to local government's energy policy. Based on this, this study intends to secure policy measures to establish and improve governance related to energy policy in Korea.

The Block-Based Storage Policy and Order Processing in Logistics Warehouse (물류창고에서 블록별 저장방식 및 주문 처리에 관한 연구)

  • 김명훈;김종화
    • Journal of the Korea Society of Computer and Information
    • /
    • v.8 no.4
    • /
    • pp.159-164
    • /
    • 2003
  • Location of stock in a warehouse directly affects the total materials handling expense of all goods moving through the warehouse. The purpose of this paper is to develop a storage policy in order picking warehouse, the block-based storage policy to minimize the total order picking time. In block-based storage policy, the rack is divided into blocks and items are assigned to each block based on the turn-over rate of each item and the average distance between the blocks and the dock. To demonstrate the performance of the proposed policy, we compare with the existing method called class-based storage policy under various matching methods.

  • PDF

ADesign and Implementation of Policy-based Network Management System for Internet QoS Support Mobile IP Networks (인터넷 QoS 지원 이동 IP 망에서의 정책기반 망 관리 시스템 설계 및 구현)

  • 김태경;강승완;유상조
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.29 no.2B
    • /
    • pp.192-202
    • /
    • 2004
  • In this paper we have proposed policy-based network management system architecture for Internet QoS support Mobile IP networks that is divided into four layers(application layer, information management layer, policy control layer, device layer), then we propose an implementation strategy of policy-based network management system to enforce various control and network management operations and a model of policy server using SCOPS(Simple Common Open Policy Service) protocol that is developed in this research. For policy-based mobile IP network management system implementation, we have derived four policy classes(access control, mobile IP operation, QoS control, and network monitoring) and we showed operation procedures for each policy scenarios. Finally we have implemented Internet QoS support policy-based mobile IP network testbed and management system and verified out DiffServ policy enforcement behaviors for a target class service that is arranged a specific bandwidth on network congestion conditions.