• Title/Summary/Keyword: Security Techniques

Search Result 1,571, Processing Time 0.03 seconds

Development on Early Warning System about Technology Leakage of Small and Medium Enterprises (중소기업 기술 유출에 대한 조기경보시스템 개발에 대한 연구)

  • Seo, Bong-Goon;Park, Do-Hyung
    • Journal of Intelligence and Information Systems
    • /
    • v.23 no.1
    • /
    • pp.143-159
    • /
    • 2017
  • Due to the rapid development of IT in recent years, not only personal information but also the key technologies and information leakage that companies have are becoming important issues. For the enterprise, the core technology that the company possesses is a very important part for the survival of the enterprise and for the continuous competitive advantage. Recently, there have been many cases of technical infringement. Technology leaks not only cause tremendous financial losses such as falling stock prices for companies, but they also have a negative impact on corporate reputation and delays in corporate development. In the case of SMEs, where core technology is an important part of the enterprise, compared to large corporations, the preparation for technological leakage can be seen as an indispensable factor in the existence of the enterprise. As the necessity and importance of Information Security Management (ISM) is emerging, it is necessary to check and prepare for the threat of technology infringement early in the enterprise. Nevertheless, previous studies have shown that the majority of policy alternatives are represented by about 90%. As a research method, literature analysis accounted for 76% and empirical and statistical analysis accounted for a relatively low rate of 16%. For this reason, it is necessary to study the management model and prediction model to prevent leakage of technology to meet the characteristics of SMEs. In this study, before analyzing the empirical analysis, we divided the technical characteristics from the technology value perspective and the organizational factor from the technology control point based on many previous researches related to the factors affecting the technology leakage. A total of 12 related variables were selected for the two factors, and the analysis was performed with these variables. In this study, we use three - year data of "Small and Medium Enterprise Technical Statistics Survey" conducted by the Small and Medium Business Administration. Analysis data includes 30 industries based on KSIC-based 2-digit classification, and the number of companies affected by technology leakage is 415 over 3 years. Through this data, we conducted a randomized sampling in the same industry based on the KSIC in the same year, and compared with the companies (n = 415) and the unaffected firms (n = 415) 1:1 Corresponding samples were prepared and analyzed. In this research, we will conduct an empirical analysis to search for factors influencing technology leakage, and propose an early warning system through data mining. Specifically, in this study, based on the questionnaire survey of SMEs conducted by the Small and Medium Business Administration (SME), we classified the factors that affect the technology leakage of SMEs into two factors(Technology Characteristics, Organization Characteristics). And we propose a model that informs the possibility of technical infringement by using Support Vector Machine(SVM) which is one of the various techniques of data mining based on the proven factors through statistical analysis. Unlike previous studies, this study focused on the cases of various industries in many years, and it can be pointed out that the artificial intelligence model was developed through this study. In addition, since the factors are derived empirically according to the actual leakage of SME technology leakage, it will be possible to suggest to policy makers which companies should be managed from the viewpoint of technology protection. Finally, it is expected that the early warning model on the possibility of technology leakage proposed in this study will provide an opportunity to prevent technology Leakage from the viewpoint of enterprise and government in advance.

An Intelligent Intrusion Detection Model Based on Support Vector Machines and the Classification Threshold Optimization for Considering the Asymmetric Error Cost (비대칭 오류비용을 고려한 분류기준값 최적화와 SVM에 기반한 지능형 침입탐지모형)

  • Lee, Hyeon-Uk;Ahn, Hyun-Chul
    • Journal of Intelligence and Information Systems
    • /
    • v.17 no.4
    • /
    • pp.157-173
    • /
    • 2011
  • As the Internet use explodes recently, the malicious attacks and hacking for a system connected to network occur frequently. This means the fatal damage can be caused by these intrusions in the government agency, public office, and company operating various systems. For such reasons, there are growing interests and demand about the intrusion detection systems (IDS)-the security systems for detecting, identifying and responding to unauthorized or abnormal activities appropriately. The intrusion detection models that have been applied in conventional IDS are generally designed by modeling the experts' implicit knowledge on the network intrusions or the hackers' abnormal behaviors. These kinds of intrusion detection models perform well under the normal situations. However, they show poor performance when they meet a new or unknown pattern of the network attacks. For this reason, several recent studies try to adopt various artificial intelligence techniques, which can proactively respond to the unknown threats. Especially, artificial neural networks (ANNs) have popularly been applied in the prior studies because of its superior prediction accuracy. However, ANNs have some intrinsic limitations such as the risk of overfitting, the requirement of the large sample size, and the lack of understanding the prediction process (i.e. black box theory). As a result, the most recent studies on IDS have started to adopt support vector machine (SVM), the classification technique that is more stable and powerful compared to ANNs. SVM is known as a relatively high predictive power and generalization capability. Under this background, this study proposes a novel intelligent intrusion detection model that uses SVM as the classification model in order to improve the predictive ability of IDS. Also, our model is designed to consider the asymmetric error cost by optimizing the classification threshold. Generally, there are two common forms of errors in intrusion detection. The first error type is the False-Positive Error (FPE). In the case of FPE, the wrong judgment on it may result in the unnecessary fixation. The second error type is the False-Negative Error (FNE) that mainly misjudges the malware of the program as normal. Compared to FPE, FNE is more fatal. Thus, when considering total cost of misclassification in IDS, it is more reasonable to assign heavier weights on FNE rather than FPE. Therefore, we designed our proposed intrusion detection model to optimize the classification threshold in order to minimize the total misclassification cost. In this case, conventional SVM cannot be applied because it is designed to generate discrete output (i.e. a class). To resolve this problem, we used the revised SVM technique proposed by Platt(2000), which is able to generate the probability estimate. To validate the practical applicability of our model, we applied it to the real-world dataset for network intrusion detection. The experimental dataset was collected from the IDS sensor of an official institution in Korea from January to June 2010. We collected 15,000 log data in total, and selected 1,000 samples from them by using random sampling method. In addition, the SVM model was compared with the logistic regression (LOGIT), decision trees (DT), and ANN to confirm the superiority of the proposed model. LOGIT and DT was experimented using PASW Statistics v18.0, and ANN was experimented using Neuroshell 4.0. For SVM, LIBSVM v2.90-a freeware for training SVM classifier-was used. Empirical results showed that our proposed model based on SVM outperformed all the other comparative models in detecting network intrusions from the accuracy perspective. They also showed that our model reduced the total misclassification cost compared to the ANN-based intrusion detection model. As a result, it is expected that the intrusion detection model proposed in this paper would not only enhance the performance of IDS, but also lead to better management of FNE.

Suggestion for Comprehensive Quality Assurance of Medical Linear Accelerator in Korea (국내 선형가속기의 포괄적인 품질관리체계에 대한 제언)

  • Choi, Sang Hyoun;Park, Dong-wook;Kim, Kum Bae;Kim, Dong Wook;Lee, Jaiki;Shin, Dong Oh
    • Progress in Medical Physics
    • /
    • v.26 no.4
    • /
    • pp.294-303
    • /
    • 2015
  • American Association of Physicists in Medicine (AAPM) Published Task Group 40 report which includes recommendations for comprehensive quality assurance (QA) for medical linear accelerator in 1994 and TG-142 report for recommendation for QA which includes procedures such as intensity-modulated radiotherapy (IMRT), stereotactic radiosurgery (SRS) and stereotactic body radiation therapy (SBRT) in 2010. Recently, Nuclear Safety and Security Commission (NSSC) published NSSC notification no. 2015-005 which is "Technological standards for radiation safety of medical field". This notification regulate to establish guidelines for quality assurance which includes organization and job, devices, methods/frequency/tolerances and action levels for QA, and to implement quality assurance in each medical institution. For this reason, all of these facilities using medical machine for patient treatment should establish items, frequencies and tolerances for proper QA for medical treatment machine that use the techniques such as non-IMRT, IMRT and SRS/SBRT, and perform quality assurance. For domestic, however, there are lack of guidelines and reports of Korean Society of Medical Physicists (KSMP) for reference to establish systematic QA report in medical institutes. This report, therefore, suggested comprehensive quality assurance system such as the scheme of quality assurance system, which is considered for domestic conditions, based the notification of NSSC and AAPM TG-142 reports. We think that the quality assurance system suggested for medical linear accelerator also help establishing QA system for another high-precision radiation treatment machines.

Design and Implementation of Medical Information System using QR Code (QR 코드를 이용한 의료정보 시스템 설계 및 구현)

  • Lee, Sung-Gwon;Jeong, Chang-Won;Joo, Su-Chong
    • Journal of Internet Computing and Services
    • /
    • v.16 no.2
    • /
    • pp.109-115
    • /
    • 2015
  • The new medical device technologies for bio-signal information and medical information which developed in various forms have been increasing. Information gathering techniques and the increasing of the bio-signal information device are being used as the main information of the medical service in everyday life. Hence, there is increasing in utilization of the various bio-signals, but it has a problem that does not account for security reasons. Furthermore, the medical image information and bio-signal of the patient in medical field is generated by the individual device, that make the situation cannot be managed and integrated. In order to solve that problem, in this paper we integrated the QR code signal associated with the medial image information including the finding of the doctor and the bio-signal information. bio-signal. System implementation environment for medical imaging devices and bio-signal acquisition was configured through bio-signal measurement, smart device and PC. For the ROI extraction of bio-signal and the receiving of image information that transfer from the medical equipment or bio-signal measurement, .NET Framework was used to operate the QR server module on Window Server 2008 operating system. The main function of the QR server module is to parse the DICOM file generated from the medical imaging device and extract the identified ROI information to store and manage in the database. Additionally, EMR, patient health information such as OCS, extracted ROI information needed for basic information and emergency situation is managed by QR code. QR code and ROI management and the bio-signal information file also store and manage depending on the size of receiving the bio-singnal information case with a PID (patient identification) to be used by the bio-signal device. If the receiving of information is not less than the maximum size to be converted into a QR code, the QR code and the URL information can access the bio-signal information through the server. Likewise, .Net Framework is installed to provide the information in the form of the QR code, so the client can check and find the relevant information through PC and android-based smart device. Finally, the existing medical imaging information, bio-signal information and the health information of the patient are integrated over the result of executing the application service in order to provide a medical information service which is suitable in medical field.

Legal Relations of the Contract of International Carriage of Goods by Air (국제항공화물운송계약(國際航空貨物運送契約)의 법률관계(法律關係) -화주(貨主)의 권리의무(權利義務)를 중심(中心)으로-)

  • Lee, Kang-Bin
    • The Korean Journal of Air & Space Law and Policy
    • /
    • v.1
    • /
    • pp.193-222
    • /
    • 1989
  • The purpose of this study is to review the rights and duties of cargo owners, the party to the contract of international carriage of goods by air under the Warsaw Convention System and the IATA conditions. It is generally known that air freight is the most-cost mode of transportation. However, should there be considerations of total distribution cost, the use of air freight leads exporters to be advantageous in physical distribution. The Warsaw Convention System defined and limited the rights and duties of cargo owners and air carriers paticipating in the international carriage of goods, but it does not regulate every aspect of air transportation. Therefore, the unregulated parts are governed by national laws and by individual contracts of carriage. The International Air Transport Association(lATA), a worldwide organization of airlines, has formulated model conditions of contract for the carriage of cargo. These models are not uniformly followed but they serve as a basis for many of the individual standard form of contracts prepared by air carriers. The contract of air carriage of goods is a contract of adhesion, 'the consignor recognizing and accepting the conditions laid down by the carrier'. There are consignors and carriers as the parties to the contract of international carriage of goods. In addition to his basic right, implied in Warsaw Convention Article 18 and 19, to require devery of the goods in good condition and at the date agreed upon, the consignor has the right to dispose the goods in the course of the journey up to the moment when the consignee is entitled to require delivery. If it is impossible to carry out the orders of the consignor, the carrier must so inform him forthwith. The right conferred on the consignor ceases at the moment when that of the consignee begins in accordance with Warsaw Convention Article 13. Nevertheless, if the consignee declines to accept the air waybill or the goods, or if he cannot be communicated with, the consignor resumes his right of disposition. Unless it is otherwise agreed, it is the duty of the carrier to give notice to the consignee as soon as the goods arrive. The consignee is entitled, on arrival of the goods at the place of destination, to require the carrier to hand over to him the air waybill and to deliver the goods to him, on payment of the charges due and on complying with the conditions of carriage set out in the air waybill. The air waybill is supposed to be made out by the consignor. If the carrier makes it out, he is deemed, subject to proof to the contrary, to have done so on behalf of the consignor, whether there is one air waybill or several, each must be made out in three original parts. The first is for the carrier, the second is for the consignee, and the the third is handed to the consignor when the shipment has been accepted. The consignor is responsible for the correctness of the particulars and statement concerning the cargo appearing in the air waybill. Each of the original parts of the air waybill has evidential value and possession of his part is a condition for the exercise by the consignor or consignee of his rights under the contract of carriage. Hague Protocol set forth in Article 9 that nothing in this. Convention prevents the issue of a negotiable air waybill, but Montreal Additional Protocol No. 4 deleted this article. All charges applicable to a shipment are payable in cash at the time of acceptance thereof by the carrier in case of a prepaid shipment or at the time of delivery thereof by the carrier in case of a collect shipment. The carrier shall have lien the cargo for unpaid charges and, in the event of non-payment thereof, shall have the right to dispose of the cargo at public or private sale and pay itself out of the proceeds of such sale any and all such amounts. In conclusion, the Warsaw Convention System has the character of ambiguity in various respects, not only in the part of the forms of documents but also in conditions of contract. Accordingly, the following propositions might be considered: (1) If the carrier does not obey the orders of the consignor for the disposition of the goods without proper reasons, he will be liable strictly for any damage which may be caused thereby to the cargo owner. The special agreement and carrier's conditions of carriage which limit unreasonably the consignor's right of disposition of the goods will be nullified. (2) The instrument of the Warsaw Convention System which is not yet in force(Montreal Additional Protocol No. 4) would considerably simplfy the processing and keeping of computerized records of the carriage. Until this instrument enters into force, the airlines will be faced with practical problems preventing them to substitute computerized data processing techniques for the formal issuance of the documents. Accordingly, Montreal Additional Protocol No. 4 should become effective as soon as posisble. From a practical point of view in the international trade, the issuance of negotiable air waybill should be permitted for the security of the bank.

  • PDF

An Analysis of IT Trends Using Tweet Data (트윗 데이터를 활용한 IT 트렌드 분석)

  • Yi, Jin Baek;Lee, Choong Kwon;Cha, Kyung Jin
    • Journal of Intelligence and Information Systems
    • /
    • v.21 no.1
    • /
    • pp.143-159
    • /
    • 2015
  • Predicting IT trends has been a long and important subject for information systems research. IT trend prediction makes it possible to acknowledge emerging eras of innovation and allocate budgets to prepare against rapidly changing technological trends. Towards the end of each year, various domestic and global organizations predict and announce IT trends for the following year. For example, Gartner Predicts 10 top IT trend during the next year, and these predictions affect IT and industry leaders and organization's basic assumptions about technology and the future of IT, but the accuracy of these reports are difficult to verify. Social media data can be useful tool to verify the accuracy. As social media services have gained in popularity, it is used in a variety of ways, from posting about personal daily life to keeping up to date with news and trends. In the recent years, rates of social media activity in Korea have reached unprecedented levels. Hundreds of millions of users now participate in online social networks and communicate with colleague and friends their opinions and thoughts. In particular, Twitter is currently the major micro blog service, it has an important function named 'tweets' which is to report their current thoughts and actions, comments on news and engage in discussions. For an analysis on IT trends, we chose Tweet data because not only it produces massive unstructured textual data in real time but also it serves as an influential channel for opinion leading on technology. Previous studies found that the tweet data provides useful information and detects the trend of society effectively, these studies also identifies that Twitter can track the issue faster than the other media, newspapers. Therefore, this study investigates how frequently the predicted IT trends for the following year announced by public organizations are mentioned on social network services like Twitter. IT trend predictions for 2013, announced near the end of 2012 from two domestic organizations, the National IT Industry Promotion Agency (NIPA) and the National Information Society Agency (NIA), were used as a basis for this research. The present study analyzes the Twitter data generated from Seoul (Korea) compared with the predictions of the two organizations to analyze the differences. Thus, Twitter data analysis requires various natural language processing techniques, including the removal of stop words, and noun extraction for processing various unrefined forms of unstructured data. To overcome these challenges, we used SAS IRS (Information Retrieval Studio) developed by SAS to capture the trend in real-time processing big stream datasets of Twitter. The system offers a framework for crawling, normalizing, analyzing, indexing and searching tweet data. As a result, we have crawled the entire Twitter sphere in Seoul area and obtained 21,589 tweets in 2013 to review how frequently the IT trend topics announced by the two organizations were mentioned by the people in Seoul. The results shows that most IT trend predicted by NIPA and NIA were all frequently mentioned in Twitter except some topics such as 'new types of security threat', 'green IT', 'next generation semiconductor' since these topics non generalized compound words so they can be mentioned in Twitter with other words. To answer whether the IT trend tweets from Korea is related to the following year's IT trends in real world, we compared Twitter's trending topics with those in Nara Market, Korea's online e-Procurement system which is a nationwide web-based procurement system, dealing with whole procurement process of all public organizations in Korea. The correlation analysis show that Tweet frequencies on IT trending topics predicted by NIPA and NIA are significantly correlated with frequencies on IT topics mentioned in project announcements by Nara market in 2012 and 2013. The main contribution of our research can be found in the following aspects: i) the IT topic predictions announced by NIPA and NIA can provide an effective guideline to IT professionals and researchers in Korea who are looking for verified IT topic trends in the following topic, ii) researchers can use Twitter to get some useful ideas to detect and predict dynamic trends of technological and social issues.

A Study on the Hipped-and-Gable-Roof Framework of Muryangsujeon of Buseoksa Temple (부석사 무량수전 측면 지붕부 결구의 구성방식에 관한 재고(再考) - 중국 원대(元代) 이전 목조건축과의 비교를 중심으로 -)

  • Cha, Ju-hwan
    • Korean Journal of Heritage: History & Science
    • /
    • v.49 no.3
    • /
    • pp.78-103
    • /
    • 2016
  • This research is a study on the side framework structure of the hipped and gable roof of Muryangsujeon at Buseoksa Temple. There is a record that Muryangsujeon was deconstructed and repaired in the period of Japanese Occupancy, and its authenticity has continuously been called into question because the structure of the hipped and gable side roofs, and the bonding of the rafters and eaves were not in good order and very different from those of Joseon Dynasty. Scholars date it differently. It is either dated at 13th century or 12th century. This study compares the non-planar configuration of the middle and front proportions of Muryangsujeon's hipped-and-gable-roof framework with those of the Tang(唐) and Song(宋) Dynasties in China. It concludes that the hipped-and-gable-roof framework of those architecture were built with the same technique. The style of architecture that side rafters directly touch the internal security (梁), like in Muryangsujeon, is not usual even among the hipped and garble roofs of the Tang(唐) and Song(宋) Dynasties. The technique of constructing the hipped roofs developed much further after the Tang Dynasty because they began to use garble eaves to build the side structure. The technique seems to have developed greatly by the period of Ming and Qing Dynasties. It also seems that the parallel-flat (平行輻射椽) rafter, which is the form of rafters used between the parallelrafter period and the half-flat-rafter period is very similar to the construction style of the current rafters of Muryangsujeon. However, the Muryangsujeon's eaves do not touch the corner rafter from the middle part. This seems to be a unique style, which is not common in China. In conclusion, the style of the side roof framework of Muryangsujeon at Buseoksa Temple is not of the China's southern regions, but of the northern regions of Tang(唐), Song(宋) and Liao(遼) Dynasties. And when considering the construction year and proportions of the middle front and side front on the same flat, this must be an ancient technique of the northeastern regions of Asia. Since it is likely that the structure of the side roof framework of Muryangsujeon at Buseoksa Temple has not been altered but is a unique style of hipped and gable roofs, this roof can serve as a good guide to restoring the hipped and garble roofs of the pre-Goyreo Dynasty period.

Military science's understanding on Daodejing of Wangzhen (왕진의 『도덕경』에 대한 병학적 이해)

  • Kim, Tae-yong
    • The Journal of Korean Philosophical History
    • /
    • no.23
    • /
    • pp.295-316
    • /
    • 2008
  • This is to study the military philosophy of Wangzhen's Commentary on Daodejing written by a famous military officer in the end of Tang Dynasty, Wangzhen. Historically, many scholars consider Laozi's Daodejing as a book on military science. Wangzhen, however, is the only person to interpret Daodejing genealogically from a military perspective. Wangzhen thinks that the fact that human beings like competing naturally causes the constant competition in the world. Human beings are born with the most outstanding spirit among all beings. But, when God created human beings, they had greed and avarice in the middle of their heart. Accordingly, human beings look for a success and a profit, and follow the wicked way, leaving the right way. The contractions among each greed and avarice bring about small or big competitions. Human beings have greed and avarice. It means human beings have emotions. As a result, the competitions in the world are not able to disappear because human beings have emotions. To win the completion human beings use weapons. According to Wangzhen, the war is the most devilish deed due to the weapon's atrocious, dangerous quality. Yet, the world's interests are decided by how efficiently the weapons are used. Consequently, the weapon techniques are worthy and play an important role in the real world. Morality, however, should be in the first priority in ruling over a country and commanding the army. The national security and the war victory could be secured when civil and military affairs have a balance. Wangzhen thinks that Laozi emphasizes "Not-Competing" as a basic solution of competition. The competition is the root cause of war and disorder. Therefore, Not-Competing is the main idea of Daodejing. Not-Competiting is a basis of Wangzhen's military philosophy as well. For Wangzhen, Not-Competing is Wuwei. Wuwei has political and military meanings at the same time. Wangzhen build up the "Not-Competing" military philosophy by applying Loazi's Daodejing to his military philosophy.

Application of Deep Learning for Classification of Ancient Korean Roof-end Tile Images (딥러닝을 활용한 고대 수막새 이미지 분류 검토)

  • KIM Younghyun
    • Korean Journal of Heritage: History & Science
    • /
    • v.57 no.3
    • /
    • pp.24-35
    • /
    • 2024
  • Recently, research using deep learning technologies such as artificial intelligence, convolutional neural networks, etc. has been actively conducted in various fields including healthcare, manufacturing, autonomous driving, and security, and is having a significant influence on society. In line with this trend, the present study attempted to apply deep learning to the classification of archaeological artifacts, specifically ancient Korean roof-end tiles. Using 100 images of roof-end tiles from each of the Goguryeo, Baekje, and Silla dynasties, for a total of 300 base images, a dataset was formed and expanded to 1,200 images using data augmentation techniques. After building a model using transfer learning from the pre-trained EfficientNetB0 model and conducting five-fold cross-validation, an average training accuracy of 98.06% and validation accuracy of 97.08% were achieved. Furthermore, when model performance was evaluated with a test dataset of 240 images, it could classify the roof-end tile images from the three dynasties with a minimum accuracy of 91%. In particular, with a learning rate of 0.0001, the model exhibited the highest performance, with accuracy of 92.92%, precision of 92.96%, recall of 92.92%, and F1 score of 92.93%. This optimal result was obtained by preventing overfitting and underfitting issues using various learning rate settings and finding the optimal hyperparameters. The study's findings confirm the potential for applying deep learning technologies to the classification of Korean archaeological materials, which is significant. Additionally, it was confirmed that the existing ImageNet dataset and parameters could be positively applied to the analysis of archaeological data. This approach could lead to the creation of various models for future archaeological database accumulation, the use of artifacts in museums, and classification and organization of artifacts.

Policy Direction for The Farmland Sizing Suitable to Regional Trait (지역특성을 반영한 영농규모화사업의 발전방향-충남지역을 중심으로-)

  • Shim, Jae-Sung
    • The Journal of Natural Sciences
    • /
    • v.14 no.1
    • /
    • pp.83-121
    • /
    • 2004
  • This study was carried out to examine how solid the production foundation of rice in Chung-Nam Province is, and, if not, to probe alternative measures through the size of farms specializing in rice, of which direction would be a pivot of rice industry-oriented policy. The results obtained can be summarized as follows : 1. The amount of rice production in Chung-Nam Province is highest in Korea and the size of paddy field area is the second largest : This implying that the probability that rice production in Chung-Nam Province would be severely influenced by a global trend of market conditions. The number of farms specializing in rice becoming the core group of rice farming account for 7.7 percent of the total number of farm household in Korea. Average field area financial support which had been input to farm household by Government had a noticeable effect on the improvement of the policy of farm-size program. 2. Farm-size program in Chung-Nam Province established from 1980 to 2002 in creased the cultivation size of paddy field to 19,484 hectares, and this program enhanced the buying and selling of farmland and the number of farmland bargain reached 6,431 household and 16,517 hectares, respectively, in 1995-2002. Meanwhile, long-term letting and hiring of farmland appeared so active that the bargain acreage reached 6,970 hectares, and farm involved was 7,059 households, however, the farm-exchange-and-unity program did not satisfy our expectation, because the retirement farm operators reluctantly participated to sell their farms. Another reason that had delayed the bargain of farms rested on the general category of social complication attendant upon the exchange and unity operation for scattered farm. Such difficulties would work negative effects out to carry on the target of farm-size work in general. 3. The following measures were presented to propel the farm-size promotion program : a. Occupation shift project, followed by the social security program for retirement and elderly farm operators, should be promptly established and also a number of types of incentives for promoting the letting and hiring work and farm-exchange-and-unity program would also be set up. b. To establish the effective key system of rice production, all the farm operators should increase the unit area yield of rice and lower the production cost. To do so, a great deal of production teams of rice equipped with managerial techniques and capabilities need to be organized. And, also, there should be appropriate arrays of facilities including information system. This plan is desirable to be in line with a diversity of the structural implement of regional integration based on farm system building. c. To extend the size of farm and to improve farm management, we have to devise the enlargement of individual size of farm for maximized management and the utilization of farm-size grouping method. In conclusion, it can be said that the farm-size project in Chung-Nam Province which has continued since the 1980s was satisfactorily achieved. However, we still have a lot of problems to be solved to break down the barrier for attainment of the desirable farm-size operation work.. Farm-size project has fairly close relation with farm specialization in rice and, thus, the positive support for farm household including the integrated program for both retirement farmers and off-farm operators should be considered to pursue the progressive development of the farm-size program, which is key means to successful achievement of rice farming enforcement in Chung-Nam Province.

  • PDF