• Title/Summary/Keyword: Two-level Game

Search Result 141, Processing Time 0.038 seconds

A Study on Usage and Demand of the Business Simulation Game, and Design of the Course Model (경영시뮬레이션게임의 활용실태와 교과모형)

  • Lee, Jae-Won
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.13 no.1
    • /
    • pp.73-86
    • /
    • 2012
  • This study has the purpose to increase the suitability for the introduction and operation of the curriculum utilizing business simulation games from university education. So we investigated about the usage in management education department of domestic and foreign universities, institutions target for enterprise level education, and giant companies such as Samsung and LG. We surveyed about the demand of it from college students at the management and engineering departments and then designed two basic course models. As research methods, literature research, on-site experts and operators interview on domestic enterprises and institutions of representative companies was conducted. We analysed the course syllabi of some domestic and about 50 foreign universities utilizing it with the literature review. Then we analysed the result of usage investigation and demand survey. According to the results, the relatively small number of universities and corporate institutions compared to U.S. were utilizing it for their training courses in short-term and partial Lab. Results are expected to be used in the training courses of business administration in universities and corporate.

A Study on Service-based Secure Anonymization for Data Utility Enhancement (데이터 유용성 향상을 위한 서비스 기반의 안전한 익명화 기법 연구)

  • Hwang, Chikwang;Choe, Jongwon;Hong, Choong Seon
    • Journal of KIISE
    • /
    • v.42 no.5
    • /
    • pp.681-689
    • /
    • 2015
  • Personal information includes information about a living human individual. It is the information identifiable through name, resident registration number, and image, etc. Personal information which is collected by institutions can be wrongfully used, because it contains confidential information of an information object. In order to prevent this, a method is used to remove personal identification elements before distributing and sharing the data. However, even when the identifier such as the name and the resident registration number is removed or changed, personal information can be exposed in the case of a linking attack. This paper proposes a new anonymization technique to enhance data utility. To achieve this, attributes that are utilized in service tend to anonymize at a low level. In addition, the anonymization technique of the proposal can provide two or more anonymized data tables from one original data table without concern about a linking attack. We also verify our proposal by using the cooperative game theory.

Game Theoretic Optimization of Investment Portfolio Considering the Performance of Information Security Countermeasure (정보보호 대책의 성능을 고려한 투자 포트폴리오의 게임 이론적 최적화)

  • Lee, Sang-Hoon;Kim, Tae-Sung
    • Journal of Intelligence and Information Systems
    • /
    • v.26 no.3
    • /
    • pp.37-50
    • /
    • 2020
  • Information security has become an important issue in the world. Various information and communication technologies, such as the Internet of Things, big data, cloud, and artificial intelligence, are developing, and the need for information security is increasing. Although the necessity of information security is expanding according to the development of information and communication technology, interest in information security investment is insufficient. In general, measuring the effect of information security investment is difficult, so appropriate investment is not being practice, and organizations are decreasing their information security investment. In addition, since the types and specification of information security measures are diverse, it is difficult to compare and evaluate the information security countermeasures objectively, and there is a lack of decision-making methods about information security investment. To develop the organization, policies and decisions related to information security are essential, and measuring the effect of information security investment is necessary. Therefore, this study proposes a method of constructing an investment portfolio for information security measures using game theory and derives an optimal defence probability. Using the two-person game model, the information security manager and the attacker are assumed to be the game players, and the information security countermeasures and information security threats are assumed as the strategy of the players, respectively. A zero-sum game that the sum of the players' payoffs is zero is assumed, and we derive a solution of a mixed strategy game in which a strategy is selected according to probability distribution among strategies. In the real world, there are various types of information security threats exist, so multiple information security measures should be considered to maintain the appropriate information security level of information systems. We assume that the defence ratio of the information security countermeasures is known, and we derive the optimal solution of the mixed strategy game using linear programming. The contributions of this study are as follows. First, we conduct analysis using real performance data of information security measures. Information security managers of organizations can use the methodology suggested in this study to make practical decisions when establishing investment portfolio for information security countermeasures. Second, the investment weight of information security countermeasures is derived. Since we derive the weight of each information security measure, not just whether or not information security measures have been invested, it is easy to construct an information security investment portfolio in a situation where investment decisions need to be made in consideration of a number of information security countermeasures. Finally, it is possible to find the optimal defence probability after constructing an investment portfolio of information security countermeasures. The information security managers of organizations can measure the specific investment effect by drawing out information security countermeasures that fit the organization's information security investment budget. Also, numerical examples are presented and computational results are analyzed. Based on the performance of various information security countermeasures: Firewall, IPS, and Antivirus, data related to information security measures are collected to construct a portfolio of information security countermeasures. The defence ratio of the information security countermeasures is created using a uniform distribution, and a coverage of performance is derived based on the report of each information security countermeasure. According to numerical examples that considered Firewall, IPS, and Antivirus as information security countermeasures, the investment weights of Firewall, IPS, and Antivirus are optimized to 60.74%, 39.26%, and 0%, respectively. The result shows that the defence probability of the organization is maximized to 83.87%. When the methodology and examples of this study are used in practice, information security managers can consider various types of information security measures, and the appropriate investment level of each measure can be reflected in the organization's budget.

Sustainability and International Environmental Agreements

  • Lin, Yu-Hsuan
    • Environmental and Resource Economics Review
    • /
    • v.24 no.2
    • /
    • pp.251-281
    • /
    • 2015
  • This paper examines the perceptions of sustainability, which is conceptualised as cross-generational social preferences, on the formation of international environmental agreements (IEAs) in a two-stage game in two periods. There are two scenarios are considered: myopic and sustainable development scenarios. The myopic scenario assumes the decision makers only concern the present welfare. Whilst the scenario of sustainable development has two characters: cross-generational fairness and altruism. When both are taken into account, a coalition will be expanded. The numerical example indicates that the marginal cost of the total emissions is the crucial factor for the formation of IEAs. Only when the marginal cost is low, a sustainable system can be succeeded. While, the technological advancement may lead to a more efficient production per unit of emissions, it also encourages countries to emit more in total and have a lower level of welfare. The results confirm the importance of sustainability to IEAs. The lesson learnt from this study is: when decision makers are myopic, the system is unsustainable even if an IEA is formed. Only when the perception of sustainability is considered, the system could be sustainable. Regardless of the existence of IEAs, international environmental conventions shall not neglect the fundamental goal to pursue sustainable development.

The Effects of Internal-External Locus of Control on Level of Aspiration in Korean Children (아동(兒童)의 내(內)·외통제신념(外統制信念)이 포부수준(抱負水準)에 미치는 영향(影響))

  • Joen, Kyoung Mie
    • Korean Journal of Child Studies
    • /
    • v.4
    • /
    • pp.53-61
    • /
    • 1983
  • The purpose of this study was to investigate the effects of internal-external locus of control on level of aspiration in Korean Children. The locus of control was measured by means of the Nowicki & Strickland's "A Locus of Control Scale for Children (1973)". The level of aspiration was measured by "Throw Balls into the Basket Game" Sixty internal controlled children(30 girls and 30 boys) and 60 external controlled children(30 girls and 30 boys) were selected among 853 children in fifth grade. For the data analysis, two - way analysis of variance and t-test were applied, Pearson correlation coefficient was computed. The results of this study were as follows; 1. Goal discrepancy score were significantly higher in the internal controlled children than in the external controlled children. 2. Shift value were significantly higher in the external controlled children than in the internal controlled children. 3. School achievement were significantly higher in the internal controlled children than in the external controlled children. 4. There was no significant difference in the school achievement between the children who showed high goal discrepancy score and the children who showed low one. 5. There was no significant difference in the locus of control between girls and boys. 6. Goal discrepancy score were significantly higher in boys than in girls, but there was no significant difference in the shift value between girls and boys.

  • PDF

Influence Factors of Online-Based Interpersonal Relationships by Developmental Level -Centered on Social Networking Service Users - (대인관계 발달 단계에 따른 온라인기반 대인관계에 미치는 영향요인 - 소셜네트워크 서비스(SNS) 사용자를 중심으로 -)

  • Heo, Song-Ji;Kim, Ja-Young;Jang, Hee-Jin;Ko, Hye-Young;Park, Su-E
    • Journal of Korea Game Society
    • /
    • v.12 no.2
    • /
    • pp.75-89
    • /
    • 2012
  • In this paper, the correlation which is at work between affecting factors and interpersonal relationships' dimension depend on developmental level has been studied to search for clues about how to develop the online based interpersonal relationships -the fundamental aims of SNS related services- efficiently. People who'd ever entered into a relation through the 'online-based generated relationship' by SNS were divided into two groups on the development level. They were conducted a survey, and the results were derived using PLS statistics. As the result, 7 kinds of factors as social attraction, physical attraction, reciprocity, content quality, coexistence perception, information provision and similarity had an impact on the initial level of relationships, and 6 kinds of factors as social attraction, physical attraction, reciprocity, content quality, web appearance and coexistence perception had an impact on the developed level of relationships. This study could be utilized for the service design for facilitating interpersonal relationships efficiently by their level of development.

Space-Time Warp Curve for Synthesizing Multi-character Motions

  • Sung, Mankyu;Choi, Gyu Sang
    • ETRI Journal
    • /
    • v.39 no.4
    • /
    • pp.493-501
    • /
    • 2017
  • This paper introduces a new motion-synthesis technique for animating multiple characters. At a high level, we introduce a hub-sub-control-point scheme that automatically generates many different spline curves from a user scribble. Then, each spline curve becomes a trajectory along which a 3D character moves. Based on the given curves, our algorithm synthesizes motions using a cyclic motion. In this process, space-time warp curves, which are time-warp curves, are embedded in the 3D environment to control the speed of the motions. Since the space-time warp curve represents a trajectory over the time domain, it enables us to verify whether the trajectory causes any collisions between characters by simply checking whether two space-time warp curves intersect. In addition, it is possible to edit space-time warp curves at run time to change the speed of the characters. We use several experiments to demonstrate that the proposed algorithm can efficiently synthesize a group of character motions. Our method creates collision-avoiding trajectories ten times faster than those created manually.

Proper Incentives to Promote Information Exchange

  • Obayashi, Atsuomi
    • Industrial Engineering and Management Systems
    • /
    • v.6 no.1
    • /
    • pp.55-63
    • /
    • 2007
  • Exchange of information is essential to the process of innovation such as product development. However, in many cases innovation fails because of a lack of knowledge sharing among parties concerned, even if parties individually have pieces of useful knowledge and skills. Besides physical factors like communication costs, the possibility of opportunistic behavior by parties like stealing ideas can discourage information exchange. This paper introduces a model to analyze incentives of information exchange. The model is a game by two players who alternately opt to offer information to the partner. It is suggested that information exchange can stop before reaching the efficient level. In order to attain the efficient information exchange, expectation of mutual benefit and absence of opportunistic motives in both players are needed. Methods for promoting information exchange include modifying payoff structure to meet the condition of information exchange. The fluidity of partnership may increase a variety of information exchange partners, but discourage building trust between partners which promotes information exchange.

Solving Mixed Strategy Nash-Cournot Equilibria under Generation and Transmission Constraints in Electricity Market

  • Lee, Kwang-Ho
    • Journal of Electrical Engineering and Technology
    • /
    • v.8 no.4
    • /
    • pp.675-685
    • /
    • 2013
  • Generation capacities and transmission line constraints in a competitive electricity market make it troublesome to compute Nash Equilibrium (NE) for analyzing participants' strategic generation quantities. The NE can cause a mixed strategy NE rather than a pure strategy NE resulting in a more complicated computation of NE, especially in a multiplayer game. A two-level hierarchical optimization problem is used to model competition among multiple participants. There are difficulties in using a mathematical programming approach to solve a mixed strategy NE. This paper presents heuristics applied to the mathematical programming method for dealing with the constraints on generation capacities and transmission line flows. A new formulation based on the heuristics is provided with a set of linear and nonlinear equations, and an algorithm is suggested for using the heuristics and the newly-formulated equations.

A Study on the International R&D Competition and Optimal Tariff (국제 R&D 경쟁과 최적관세)

  • Li, Dong-Sheng;Lee, Jong-Min
    • Korea Trade Review
    • /
    • v.41 no.2
    • /
    • pp.29-60
    • /
    • 2016
  • Research and Development(R&D) investment is an issue of central importance in any economy. In this paper we analyze the relationship between R&D spillovers and trade-related variables, using a two-stage model where duopolists simultaneously decide on R&D in the first stage and engage in Cournot competition in the second stage. We characterized and compared the free-trade and trade-restriction R&D equilibrium in a two-stage game of R&D investment followed by Cournot market competition. We also assessed the impact of varying the R&D spillover on the equilibrium outcomes and tariff. We showed for both free trade and protection cases that there exists a unique symmetric solution(subgame perfect Nash equilibrium). As the solution, while analytical, cannot be stated in closed form, we resorted to numerical experiments to investigate the equilibrium results. Our estimates indicate for both free trade and protection cases that the level of R&D investment and the rate of R&D expenditure decrease as the degree of R&D spillovers increases, and that there is an inverse relation between the degree of R&D spillovers and level of protection. The latter implies that the larger the degree of R&D spillovers, the lesser the level of protection.

  • PDF