• Title/Summary/Keyword: Weak Keys

Search Result 25, Processing Time 0.017 seconds

The Structural and Spatial Characteristics of Network Actors in Mini Cluster for Creative Milieu: The Case of Digital Media City (창조환경을 위한 미니클러스터 네트워크 주체들 간의 구조적.공간적 특성 -디지털미디어시티를 사례로-)

  • Choi, Hae-Ok
    • Journal of the Korean Geographical Society
    • /
    • v.47 no.3
    • /
    • pp.375-389
    • /
    • 2012
  • Many policy makers believe that geographically clustered business activities, in order to stimulate regional innovation, are the keys to development. Underlying the assumption between cluster and development, mere co-located forms engaged in innovative process helped from knowledge transmission locally. To address the constraints of creative economy, creative milieu require networking to support innovation activities. This paper examines the development of the mini cluster reconsidered in creative milieu that shifted environment development through network activities. It shows that the powerful node get more powerful, weak node get weaker in institutional network. Moreover, the significant of cluster in creative milieu is that brings out synergy to spill over knowledge through inter-relationship based on face-to-face meeting. Creative milieu benefits from and contributes to the competitiveness of the city, they are also embedded in its network activities.

  • PDF

A Qualitative Study on Lived Experiences of Children Who Live in a Poor Neighborhood -"Hard Life in Our Village"- (빈곤지역아동의 거주체험에 대한 질적 연구 - 우리 동네살이 -)

  • Kim, Kyung-Hee;Kim, Sun-Min;Park, Keon-Hye
    • Korean Journal of Social Welfare
    • /
    • v.63 no.3
    • /
    • pp.109-131
    • /
    • 2011
  • This qualitative study aimed to explore and understand the impacts of the poor neighborhood on children from their own perspectives. To this end, the meaning and the structure of children's lived experiences were explored. The participants were recruited from elementary school high grade students living in poor neighborhood. Focused group interviews were conducted in each of the 24 World Visions social work agencies. The collected data were analysed qualitatively. According to the results, the following main themes could be extracted from the children's lived experiences: "Conflict between connection and differentiation", "Resigning to the fate of being neglected in danger" "Learning to live in the dark cave", "Anticipating a bowl of trust from the neighborhood". The children living in poor neighborhood were threatened by the physical and emotional danger highly probable in weak social infrastructure. Also, they have internalized negative self-identity by chaotic environment and, even the negative role models from alcoholic and sometimes violent adults. However, they were experiencing positive caring from and solidarity with surrounding neighborhood, and were participating in volunteered activities for asserting their citizen rights. These may be the keys to empowerment and, ultimately, to change for themselves and the community. The implications of the study results for the policy making and the actual practice were discussed focusing on the children's rights and well-being.

  • PDF

A Study on Institutional Foundation on the Korea Counter-Terrorism System (한국 테러대응 시스템의 제도적 구축방안)

  • Kwon, Jeong-Hoon
    • Korean Security Journal
    • /
    • no.25
    • /
    • pp.27-61
    • /
    • 2010
  • This study looks at plans for the efficient functions of the current terror response system in Korea. The results are derived from by comparing and analyzing American, British, German, Japanese, and Korean terror response systems. It focuses especially on addressing some problems with Korea's terror response system and how to operate it effectively. The study will systematically compare and analyze each nation's terror countermeasure studying organizational, functional, and legal aspects as standards. This study shows that there is not an exclusive terror response center in Korea compared with other nations such as America, the United Kingdom, Germany, and Japan. Also it is difficult to expect effective and vigorous operations due to weak cooperation across the relevant organizations. The presidential directive of the state's anti-terrorism action guidelines is legally ineffective. This means that on legal grounds, it is difficult to take actions to prevent the terrorism. Therefore, keys to counteracting terrorism derived from this study are summarized below. In the first place, an integrated terror response system should be set up for expansion of information sharing which leads to emergence effect. In the second place, the superior legislative systems should be made for the cleardefinition and extent of what the terror is, rigid enforcement of investigation, immigration, and keeping an eye on the funds raised by terrorists and tracking down the terrorists, the plan for eco-terrorism. In the third place, to augment security of vital facilities and peoples' awareness of terrorism safety should be emphasized and a cooperative system between civil and government organizations need to be built. In the fourth place, system for crisis management must be provided in an effort to maximize management system of terrorism and unify a decentralized emergency countermeasures effectively.

  • PDF

A Key Management Technique Based on Topographic Information Considering IoT Information Errors in Cloud Environment (클라우드 환경에서 IoT 정보 오류를 고려한 지형 정보 기반의 키 관리 기법)

  • Jeong, Yoon-Su;Choi, Jeong-hee
    • Journal of Digital Convergence
    • /
    • v.18 no.10
    • /
    • pp.233-238
    • /
    • 2020
  • In the cloud environment, IoT devices using sensors and wearable devices are being applied in various environments, and technologies that accurately determine the information generated by IoT devices are being actively studied. However, due to limitations in the IoT environment such as power and security, information generated by IoT devices is very weak, so financial damage and human casualties are increasing. To accurately collect and analyze IoT information, this paper proposes a topographic information-based key management technique that considers IoT information errors. The proposed technique allows IoT layout errors and groups topographic information into groups of dogs in order to secure connectivity of IoT devices in the event of arbitrary deployment of IoT devices in the cloud environment. In particular, each grouped terrain information is assigned random selected keys from the entire key pool, and the key of the terrain information contained in the IoT information and the probability-high key values are secured with the connectivity of the IoT device. In particular, the proposed technique can reduce information errors about IoT devices because the key of IoT terrain information is extracted by seed using probabilistic deep learning.

Reversible data hiding technique applying triple encryption method (삼중 암호화 기법을 적용한 가역 데이터 은닉기법)

  • Jung, Soo-Mok
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.15 no.1
    • /
    • pp.36-44
    • /
    • 2022
  • Reversible data hiding techniques have been developed to hide confidential data in the image by shifting the histogram of the image. These techniques have a weakness in which the security of hidden confidential data is weak. In this paper, to solve this drawback, we propose a technique of triple encrypting confidential data using pixel value information and hiding it in the cover image. When confidential data is triple encrypted using the proposed technique and hidden in the cover image to generate a stego-image, since encryption based on pixel information is performed three times, the security of confidential data hidden by triple encryption is greatly improved. In the experiment to measure the performance of the proposed technique, even if the triple-encrypted confidential data was extracted from the stego-image, the original confidential data could not be extracted without the encryption keys. And since the image quality of the stego-image is 48.39dB or higher, it was not possible to recognize whether confidential data was hidden in the stego-image, and more than 30,487 bits of confidential data were hidden in the stego-image. The proposed technique can extract the original confidential data from the triple-encrypted confidential data hidden in the stego-image without loss, and can restore the original cover image from the stego-image without distortion. Therefore, the proposed technique can be effectively used in applications such as military, medical, digital library, where security is important and it is necessary to completely restore the original cover image.