• Title/Summary/Keyword: Security Importance

Search Result 1,147, Processing Time 0.024 seconds

A Study on Layout and Operation of Suk-seol-so and Jung-bae-seol-cheong at Court Banquets in the Late Joseon - Focusing on Uigwe(Ritual Manual) for Court Banquets - (조선후기 궁중연향 시 숙설소와 중배설청의 배치와 운영에 관한 연구 -궁중연향의궤를 중심으로-)

  • Kyoung, Se-Jin;Cho, Jae-Mo
    • Journal of architectural history
    • /
    • v.24 no.6
    • /
    • pp.67-82
    • /
    • 2015
  • With regard to Gung-jung Yeon-hyang(宮中宴享; court banquet), the frequency of banquets that were held at one time beginning Mu-ja J in-jak(戊子進爵; a royal banquet held in 1828) in 1828 (the 28th year of King Sunjo (純祖)'s reign). In proportion to this frequency, there was an increase in the need and importance of Suk-seol-so(熟設所; a kitchen built in temporarily house for court banquet) and Jung-bae-seol-cheong(中排設廳; a temporary place to put offerings) as a space to assist court banquets. Although Suk-seol-so was a temporary but large-scale facility, it was frequently used for long periods. This facility was flexibly established using the variability of Dong-gung(東宮; Palace for Crown Prince) and enhanced the efficiency of censorship and security in conjunction with palace gates and Suk-wi-cheo(宿衛處; guard station, guard room). In addition, it was reused according to the period when the nation and royal family gave finances or banquets. Jung-bae-seol-cheong was established in the place connected to the central space of court banquets and worked as buffer space to resolve the tension on the day of the event. The location where Jung-bae-seol-cheong was established enabled us to confirm the applicability of Bok-do(複道; corridor) connected to Chimjeon(寢殿; royal residence) when holding court banquets. In short, Suk-seol-so and Jung-bae-seol-cheong were auxiliary spaces, but were considered importantly in the palace operation when holding court banquets.

A Study of protective measures of the source program for the development of the Internet of Things (IoT): Protection of the program as well as plagiarism research (사물인터넷(IoT)발전을 위한 소스프로그램 보호방안 연구: 프로그램의 보호와 유사표절 연구)

  • Lee, Jong-Sik
    • Journal of the Korea Convergence Society
    • /
    • v.9 no.4
    • /
    • pp.31-45
    • /
    • 2018
  • Recent dramatical development of computer technology related to internet technology intensifies the dispute over software of computer or smart device. Research on software has been flourished with political issuing of fierce competition among nations for software development. Particularly industrial growth in ethernet based big data and IoT (Internet of Things) has promoted to build and develop open source programs based on java, xcode and C. On these circumstances, issue on software piracy has been confronted despite the basic security policy protecting intellectual property rights of software and thus it is of substantial importance to protect the rights of originality of source program license. However, the other issue on source technology protection of developer is the possibility of hindrance to advancement in industry and culture by developing programs. This study discuss the way of enhancing legal stability of IoT application program development and reinforcing precision in inspection of program plagiarism by analyzing the source programs with newly introducing text mining technique, thus suggests an alternative protective way of infringement of personal information due to duplicating program.

Factors affecting the Health Promotion Behaviors of the Low-Income Elderly Living Alone -Focusing on the Mediating Effect of Social Support (저소득 독거노인의 건강증진행위에 관한 융합적 연구 -사회적 지지의 매개효과를 중심으로-)

  • Cho, Sung-Hui
    • Journal of Digital Convergence
    • /
    • v.13 no.12
    • /
    • pp.423-431
    • /
    • 2015
  • This study aimed to examine the mediating effect of social support in the influence of depression on the health promotion behavior of low-income elderly living alone. The data were collected from 294 elderly recipients of national basic livelihood security who are living alone and the data were analyzed by path analysis. The results were that depression and social support had direct effect on health promotion behaviors and depression had indirect effect on health promotion behaviors through mediating effect of social support. Results showed the importance of depression and social support in the health promotion behaviors of the low-income elderly living alone, which should be considered in the intervention. On the basis of the results, practical suggestions to increase the health promotion behaviors of the low-income elderly living alone were discussed.

A Study on the Open Platform Architecture for the Integrated Utilization of Spatial Information and Statistics (공간정보와 통계정보의 융합 활용을 위한 오픈플랫폼 아키텍처에 관한 연구)

  • Kim, Min-Soo;Yoo, Jeong-Ki
    • Journal of Cadastre & Land InformatiX
    • /
    • v.46 no.2
    • /
    • pp.211-224
    • /
    • 2016
  • Based on the 'Government 3.0', the government opens the public data and encourages the active use in the private sector. Recently, the spatial and statistical information that is one of the public data is being widely used in the various web business as a high value-added information. In this study, we propose an architecture of high-availability, high-reliability and high-performance open platform which can provide a variety of services such as searching, analysis, data mining, and thematic mapping. In particular, we present two different system architectures for the government and the public services, by reflecting the importance of the information security and the respective utilization in the private and public sectors. We also compared a variety of server architecture configurations such as a clustered server configuration, a cloud-based virtual server configuration, and a CDN server configuration, in order to design a cost- and performance-effective spatial-statistical information open platform.

A Priority Evaluation Methodology for Spin-off of Defense Technology : Patent Analysis and AHP Approach (국방 기술의 민수화 우선순위 평가 방법론 : 특허 분석 및 계층분석과정 (AHP) 기반)

  • Park, Yun-Mi;Seol, Hyeon-Ju
    • Journal of the military operations research society of Korea
    • /
    • v.36 no.3
    • /
    • pp.15-27
    • /
    • 2010
  • Dual-use technology, upon its effective development, can be a highly efficient technology that may be utilized for both achieving industry competitiveness and building National Security. Although research needs for such development methodology and call for corresponding efforts have long been proposed, actual outputs have not reached its desired level. Hence, this paper aims to provide more concrete and quantitative process in technology planning used to activate development of dual-use technology, considering dual usability and transferability of such technologies. In such effort, we propose use of patent analysis and the Analytic Hierarchy Process (AHP) for determining priorities for spin-off defense technology. First, the necessity of R&D and potential spin-off are measured based on patent information. Second, the necessity of R&D results from a quantitative analysis and the potentials spin-off are derived from analysis of patent citations. Then, AHP is used to calculate the importance of evaluating factors, and to assess alternative scores. Finally, we present the result of spin-off priority. A case study on the Korea defense technology is presented to illustrate the proposed method. We expect this study to make contribution in vision making of the military R&D spending.

A Study on Relations Between Trust in e-Government and Trust in Government - Focused on the Factors of Truster and Trustee - (전자정부 신뢰와 정부신뢰의 영향관계에 관한 연구 - 신뢰주체 및 신뢰대상 요인을 중심으로 -)

  • Lee, Sun Joong
    • Informatization Policy
    • /
    • v.18 no.2
    • /
    • pp.49-71
    • /
    • 2011
  • This study aims at finding what factors influence trust in e-government and how trust in e-government and satisfaction with e-government services affect trust in government. Despite of the importance of trust in e-government, there has not been sufficient research. Giving light on the factors of affecting trust in e-government is of academic significance. Therefore, the purpose of this study is to explore the nature, driving forces and consequences of citizens'trust in e-government and in government. The empirical results indicated that temporal embeddedness, network embeddedness, information provision quality, information security quality and e-participation quality affect satisfaction with e-government services and trust in e-government. Also, satisfaction with e-government services and trust in e-government influence trust in government, and satisfaction with e-government services affect trust in e-government.

  • PDF

Development of a Prototype for Access Control in ICT Monitoring System Using Plasma (플라즈마를 이용한 ICT 모니터링 축사 출입관리 시제품 개발)

  • Kim, Jin-Ha;Kim, Eung-Kon
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.14 no.6
    • /
    • pp.1221-1226
    • /
    • 2019
  • The importance of livestock production of agriculture in Korea is very large. Investments in sanitation facilities and environmental factors such as animal health and odor have been relatively crude, and over the past few years animal disease has emerged as the leading cause of domestic livestock farmers' income stability. There is a need for an access control system that can be purchased and installed by small and medium-sized farmers who are suffering from pollutants and small farmers who can not afford to install costly sterilization on an economical basis. In this paper, based on the plasma access control system proposed previously, we developed an ICT surveillance access control prototype system that can ensure safety and security through access control and integrated control system that introduces a sterilization system using plasma required by farmers affected by pollutants.

Design and Evaluation of a Rough Set Based Anomaly Detection Scheme Considering Weighted Feature Values (가중 특징 값을 고려한 러프 집합 기반 비정상 행위 탐지방법의 설계 및 평가)

  • Bae, Ihn-Han;Lee, Hwa-Ju;Lee, Kyung-Sook
    • Journal of Korea Multimedia Society
    • /
    • v.9 no.8
    • /
    • pp.1030-1036
    • /
    • 2006
  • The rapid proliferation of wireless networks and mobile computing applications has changed the landscape of network security. Anomaly detection is a pattern recognition task whose goal is to report the occurrence of abnormal or unknown behavior in a given system being monitored. This paper presents an efficient rough set based anomaly detection method that can effectively identify a group of especially harmful internal masqueraders in cellular mobile networks. Our scheme uses the trace data of wireless application layer by a user as feature value. Based on the feature values, the use pattern of a mobile's user can be captured by rough sets, and the abnormal behavior of the mobile can be also detected effectively by applying a roughness membership function considering weighted feature values. The performance of our scheme is evaluated by a simulation. Simulation results demonstrate that the anomalies are well detected by the method that assigns different weighted values to feature attributes depending on importance.

  • PDF

A STUDY ON DEVELOPING A DESIGN OF SUPERSONIC HUMIDIFIER FOR HOME USE. - With a focus on 3 domestic companys Household electric appliances - (가정용 초음파 가습기 디자인개발에 관한 연구 - 국내가전 3사를 중심으로 -)

  • 오성진
    • Archives of design research
    • /
    • v.6 no.1
    • /
    • pp.23-46
    • /
    • 1993
  • The development of technology in modern industrial world which grows and changes every day is shortening the cycle of life span of products, so there is a flood of products around us. It is enough to say that this phenomenon leads to further emphasis on the aspect of design for human being. It is not a new fact that to design for the rational function and the modeling from to make a combination and to satisfy consumers' desire is a short cut to gain competitive superiority in developing new products for MIS security. Therefore the design which plays a leading role in the activity of creating more convenient, more aesthetic, and more econemical products is called 'NEW CORPORATE WEAPON'. The amount of effort made for developing products is different in each company, but recently the plan to develope new products and its process arouse more interest. This thesis purports to improve objective understanding about the development of design by investigating products development research and the process of analysis and designing as a case study on developing a domestic supersonic humidifier. This thesis consists of five chapters in all. In chapter one as a preface, the purpose the method and the scope of the study is described. Chapter two contains my effort to grasp the background of study on the design and the basic structure of supersonic humidifier. Chapter three is an examination into the present conditions of supersonic humidifier used in domestic and foreign area, and the shape of design. In chapter four, a guide for the development of design is established. The idea sketch based on a fundamental shape and the drawing are added to this. In chapter five on the basis of the result of analysis in the preceding research I describe the development of design of products on the premise that marketing gives proof for them but the products oriented by manufacturer are not included in this case. In this thesis, I try to recognize the process of the develpment of design and the importance of the plan for design in developing products by examining an investigative and analytic study on the design of products.

  • PDF

Current State of Domestic Records and Record Management Related to Dispatch of ROK Armed Forces (한국군 해외파병 관련 국내 기록의 현황과 기록관리 실태)

  • Yoo, Jeong A;Yim, Jin Hee
    • Journal of the Korean Society for information Management
    • /
    • v.33 no.3
    • /
    • pp.287-319
    • /
    • 2016
  • Dispatch of ROK Armed Forces is a significant contemporary event that enhances the ROK's position in the international communities and ensures the solid national security by contributing international peace keeping operations. Indirectly, dispatch of armed forces also can contribute to strengthen the national defense. However, despite its importance, record management related to the dispatch is not done properly. Because variable records produced in the process of dispatching troops are transferred to distributed archives, searching or accessing each record is not easy and making a collection from a series of record related to certain dispatch is more difficult. Moreover, since most transferred records were produced in the public domain, production and management of record in the aspect of archive of everyday life is needed. In this paper, we summarize the current state of domestic records by dispatch procedure, organization, and dispatched troops. And we also explore the problem of record management.