• Title/Summary/Keyword: Protect Management Information System

Search Result 308, Processing Time 0.034 seconds

Improvement on Development Permit System after the Abolition of the Regulation against Continuous and Adjacent Development (연접개발제한 폐지 이후 개발행위허가 심의제도 개선방안)

  • Kim, Young-Woo;Yoon, Jeong-Joong
    • Land and Housing Review
    • /
    • v.3 no.2
    • /
    • pp.159-167
    • /
    • 2012
  • The regulation of continuous and adjacent development was introduced to prevent unplanned and improper development and to protect environment in green zone and non-urban area that was deficient in infrastructure. Though it has been effective, it was repealed in 2011 by disorderly development problem caused by crafty tricks around restrictions. Alternatively, the Urban Planning Commission is now deliberating on the development permit, but there are still much to be resolved such as improper committee formation and abuse of power, insufficient green corridor preservation, a lack of use of planning information system, discordance between landscape management guidelines in laws, etc. Therefore, we suggest several ideas for improvement of development permit system as follows; intensive deliberation system in the Urban Planning Commission, integrated commission for green corridor prevention, early establishment of urban planning information system, making a development permission guideline to minimize discretional act of the Urban Planning Commission, etc.

A Study on Similar Trademark Search Model Using Convolutional Neural Networks (합성곱 신경망(Convolutional Neural Network)을 활용한 지능형 유사상표 검색 모형 개발)

  • Yoon, Jae-Woong;Lee, Suk-Jun;Song, Chil-Yong;Kim, Yeon-Sik;Jung, Mi-Young;Jeong, Sang-Il
    • Management & Information Systems Review
    • /
    • v.38 no.3
    • /
    • pp.55-80
    • /
    • 2019
  • Recently, many companies improving their management performance by building a powerful brand value which is recognized for trademark rights. However, as growing up the size of online commerce market, the infringement of trademark rights is increasing. According to various studies and reports, cases of foreign and domestic companies infringing on their trademark rights are increased. As the manpower and the cost required for the protection of trademark are enormous, small and medium enterprises(SMEs) could not conduct preliminary investigations to protect their trademark rights. Besides, due to the trademark image search service does not exist, many domestic companies have a problem that investigating huge amounts of trademarks manually when conducting preliminary investigations to protect their rights of trademark. Therefore, we develop an intelligent similar trademark search model to reduce the manpower and cost for preliminary investigation. To measure the performance of the model which is developed in this study, test data selected by intellectual property experts was used, and the performance of ResNet V1 101 was the highest. The significance of this study is as follows. The experimental results empirically demonstrate that the image classification algorithm shows high performance not only object recognition but also image retrieval. Since the model that developed in this study was learned through actual trademark image data, it is expected that it can be applied in the real industrial environment.

Risk assessment of di(2-ethylhexyl) phthalate in the workplace

  • Kim, Hyeon-Yeong
    • Environmental Analysis Health and Toxicology
    • /
    • v.31
    • /
    • pp.11.1-11.6
    • /
    • 2016
  • Objectives A hazard assessment of di(2-ethylhexyl) phthalate (DEHP), a commonly used workplace chemical, was conducted in order to protect the occupational health of workers. A literature review, consisting of both domestic and international references, examined the chemical management system, working environment, level of exposure, and possible associated risks. This information may be utilized in the future to determine appropriate exposure levels in working environments. Methods Hazard assessment was performed using chemical hazard information obtained from international agencies, such as Organization for Economic Cooperation and Development-generated Screening Information Data Set and International Program on Chemical Safety. Information was obtained from surveys conducted by the Minister of Employment and Labor ("Survey on the work environment") and by the Ministry of Environment ("Survey on the circulation amount of chemicals"). Risk was determined according to exposure in workplaces and chemical hazard. Results In 229 workplaces over the country, 831 tons of DEHP have been used as plasticizers, insecticides, and ink solvent. Calculated 50% lethal dose values ranged from 14.2 to 50 g/kg, as determined via acute toxicity testing in rodents. Chronic carcinogenicity tests revealed cases of lung and liver degeneration, shrinkage of the testes, and liver cancer. The no-observed-adverse-effect level and the lowest-observed-adverse-effect level were determined to be 28.9 g/kg and 146.6 g/kg, respectively. The working environment assessment revealed the maximum exposure level to be $0.990mg/m^3$, as compared to the threshold exposure level of $5mg/m^3$. The relative risk of chronic toxicity and reproductive toxicity were 0.264 and 0.330, respectively, while the risk of carcinogenicity was 1.3, which is higher than the accepted safety value of one. Conclusions DEHP was identified as a carcinogen, and may be dangerous even at concentrations lower than the occupational exposure limit. Therefore, we suggest management of working environments, with exposure levels below $5mg/m^3$ and all workers utilizing local exhaust ventilation and respiratory protection when handling DEHP.

Sharing the Cyber Threat Intelligence on Cyber Crises: The Appropriate Role of the National Intelligence Agency (사이버위기에 대응하기 위한 국가정보기관의 사이버위협정보 공유 역할에 대한 고찰)

  • Kim, Daegeon;Baek, Seungsoo;Yoo, Donghee
    • Journal of Digital Convergence
    • /
    • v.15 no.6
    • /
    • pp.51-59
    • /
    • 2017
  • The role of government is to defend its lands and people from enemies. The range of that defense has now extended into the cyber domain, regarded as the fourth domain of the conventional defense domains (i.e., land, sea, sky, and universe). Traditionally, a government's intelligence power overrides that of its civilians, and government is exclusively responsible for defense. However, it is difficult for government to take the initiative to defend in the cyber domain because civilians already have a greater means for collecting information, which is known as being "intelligence inverse" in the cyber domain. To this end, we first define the intelligence inverse phenomenon and then analyze its main features. Then we investigate foreign countries' efforts to overcome the phenomenon and look at the current domestic situation. Based on these results, we describe the appropriate role of the National Intelligence Agency to handle cyber threats and offer a cyber threat intelligence model to share with civilians to help protect against these threats. Using the proposed model, we propose that the National Intelligence Agency should establish a base system that will respond to cyber threats more effectively.

A Development of Central Policy Database for managing Heterogeneous Firewall Systems (이종의 침입 차단시스템 관리를 위한 중앙 정책 데이터베이스 개발)

  • Lee, Dong-Young;Chung, Tai-Myoung
    • The KIPS Transactions:PartD
    • /
    • v.9D no.6
    • /
    • pp.1063-1070
    • /
    • 2002
  • With a remarkable growth and expansion of Internet, the security issues emerged from intrusions and attacks such as computer viruses, denial of services and hackings to destroy information have been considered as serious threats for Internet and the private networks. To protect networks from intrusions and attacks, many vendors have developed various security systems such as firewalls and intrusion detection systems. However, managing these systems individually demands too much work and high cost. Thus, integrated and autonomous security management for various security products has become more important. In this paper, we present the architecture of the WISMSF (Web-based Integrated Security Management System for Firewalls) and the merits of centralized approach for managing heterogeneous firewalls and implement the prototype of the central policy database that is a component of the WISMSF engine. The WISMSF engine supports an integrated view for policies, the integrity of polities and the easy recovery and addition of policies. And also, we define the policy conflicts of WISMSF and present the policy recovery process to support to the policies consistence.

Design and Implementation of Tool Server and License Server REL/RDD processing based on MPEG-21 Framework (MPEG-21 프레임워크 기반의 REL/RDD 처리를 위한 라이센스 서버와 툴 서버의 설계 및 구현)

  • Hong, Hyun-Woo;Ryu, Kwang-Hee;Kim, Kwang-Yong;Kim, Jae-Gon;Jung, Hoe-Kyung
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • v.9 no.2
    • /
    • pp.623-626
    • /
    • 2005
  • The technique of developing Digital Contents have still not be a standard, and it is cause some problems in the Digital Contents's creating, circulation and consumption, So solve the problem, MPEG suggest MPEG-21 framework. In the standard, The IPMP take charge of the Digital Contents's protection and management, and also it is the same as the rights expression language REL and the dictionary defining the word of REL. But. the study of the IPMP is later than the study of REL and RDD, such as the other study of the MPEG-21 standard. So, there is few system based REL and RDD. In this paper, in order to management and protect contents right. So facing the latest standard, we designed and implementation the Tool Server and the License Server based on REL/RDD.

  • PDF

An analysis of small-medium retailers' vulnerable factors in competition with SSM (SSM 사업조정을 위한 중소유통사업자의 경쟁취약요인 분석)

  • Kim, Soon-Tae;Kim, Sang-Wook
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.12 no.2
    • /
    • pp.686-693
    • /
    • 2011
  • Small-to-medium retailers in local neighborhood have been managing to survive without outside influence. However rapid change in business environment including consumer needs for goods and the quality of life has brought turbulence into retail business. Petty retailers are facing a crisis as large-sized discount stores owned by big enterprises are entering into traditional markets. To protect small-to-medium retailers from such threats and revive the traditional commercial markets the government is taking on the policy of subsidizing small-to-medium businesses. However, recent emergence of SSM (an industrialized supermarket in forms of direct management and affiliation) in local commercial areas has brought about conflicts and frictions between large companies and local merchants. Under this background this study attempted to make an analysis of vulnerable factors of small-to-medium retailers coping with SSM and probe for the alternatives to SSM business restructuring.

A Study on the Countermeasures against APT Attacks in Industrial Management Environment (산업경영환경에서 지속적 APT 공격에 대한 대응방안 연구)

  • Hong, Sunghyuck
    • Journal of Industrial Convergence
    • /
    • v.16 no.2
    • /
    • pp.25-31
    • /
    • 2018
  • An APT attack is a new hacking technique that continuously attacks specific targets and is called an APT attack in which a hacker exploits various security threats to continually attack a company or organization's network. Protect employees in a specific organization and access their internal servers or databases until they acquire significant assets of the company or organization, such as personal information leaks or critical data breaches. Also, APT attacks are not attacked at once, and it is difficult to detect hacking over the years. This white paper examines ongoing APT attacks and identifies, educates, and proposes measures to build a security management system, from the executives of each organization to the general staff. It also provides security updates and up-to-date antivirus software to prevent malicious code from infiltrating your company or organization, which can exploit vulnerabilities in your organization that could infect malicious code. And provides an environment to respond to APT attacks.

Implementation of Secure Vehicular Communication System in u-TSN (u-TSN에서의 안전한 차량 통신 시스템 구현)

  • Park, Yo-Han;Park, Young-Ho;Moon, Sang-Jae
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.48 no.4
    • /
    • pp.100-106
    • /
    • 2011
  • u-TSN is a promising technology facilitating road safety and traffic management for drivers and passengers. To deploy this technology in a real environment, personal information and communicated data should be protected against malicious adversaries. Even though such adversaries would appear relatively infrequently, in such cases, the benefits of u-TSN could be disrupted and disabled. Therefore, one of the ultimate goals in the design of secure u-TSN is to protect against attacks of malicious adversaries. In this paper, we present secure communication scenario for u-TSN and implement security protocols and algorithms that are the components of the scenario on an IXP425 board. The security systems, implemented as a security module, supports secure and efficient communication for the u-TSN.

A Study on the Policy for Disaster Recovery of Company (기업의 재해복구 대책 방안에 대한 연구)

  • Kim, JaeKyeong;Jeong, Yoon-Su;Oh, ChungShick;Kim, JaeSung
    • Journal of Digital Convergence
    • /
    • v.11 no.1
    • /
    • pp.39-45
    • /
    • 2013
  • Recently, the rate of dependence on information system in company is increase through domestic and international trends with the cases of developed similar institutions. In this paper, we analysis current state of company that protect company information resources from disaster, rapid and systematic recovery and business continuity strategic planning. Especially, proposed model was designed. disaster emergency response capacity to enhance disaster preparedness simulation training for standardized measures were established and maintained. In addition, operational continuity, building on the methodology to meet the international standard methodology is presented.