• Title/Summary/Keyword: policy design

Search Result 3,376, Processing Time 0.032 seconds

A Pilot Evaluation Study for the Establishment of CPTED Criteria of Flat or Multiple Dwelling Houses (범죄로부터 안전한 다세대·다가구주택 계획기준 마련을 위한 시범평가 연구)

  • Kim, Yong-Gook;Cho, Young-Jin
    • Journal of the Architectural Institute of Korea Planning & Design
    • /
    • v.34 no.4
    • /
    • pp.27-34
    • /
    • 2018
  • Flat or Multiple Dwelling Houses are relatively vulnerable to crime safety. Crime prevention measures are urgently needed because crime is 2.6 times higher than in real apartments. Through the analysis of domestic and foreign crime prevention design standards, field survey, and interviews with experts, 27 items of crime prevention design criteria for flat or multiple dwelling house were derived, and ten design criteria that should be considered first by the expert AHP were derived. As a result of the pilot evaluation of existing flat or multiple dwelling house, the houses completed after 2015 have relatively high level of crime prevention, but the houses constructed before that are very vulnerable. The policy and system improvement plan based on the analysis result is as follows. First, new housing should be promoted to meet minimum criteria by supplying and educating public officials, architects, and building owners in the short term to provide criteria for flat or multiple dwelling house crime prevention plans. Second, existing housing should be supported with basic crime prevention support projects such as security windows for flat or multiple dwelling house where security of residential environment such as urban renewal policy is poor. Third, the Enforcement Decree of the Building Act shall be revised to make the crime prevention environment design of flat or multiple dwelling house obligatory, and the criteria of flat or multiple dwelling house crime prevention plan should be reflected in the notice of crime prevention building standard.

Cache-Filter: A Cache Permission Policy for Information-Centric Networking

  • Feng, Bohao;Zhou, Huachun;Zhang, Mingchuan;Zhang, Hongke
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.12
    • /
    • pp.4912-4933
    • /
    • 2015
  • Information Centric Networking (ICN) has recently attracted great attention. It names the content decoupling from the location and introduces network caching, making the content to be cached anywhere within the network. The benefits of such design are obvious, however, many challenges still need to be solved. Among them, the local caching policy is widely discussed and it can be further divided into two parts, namely the cache permission policy and the cache replacement policy. The former is used to decide whether an incoming content should be cached while the latter is used to evict a cached content if required. The Internet is a user-oriented network and popular contents always have much more requests than unpopular ones. Caching such popular contents closer to the user's location can improve the network performance, and consequently, the local caching policy is required to identify popular contents. However, considering the line speed requirement of ICN routers, the local caching policy whose complexity is larger than O(1) cannot be applied. In terms of the replacement policy, Least Recently Used (LRU) is selected as the default one for ICN because of its low complexity, although its ability to identify the popular content is poor. Hence, the identification of popular contents should be completed by the cache permission policy. In this paper, a cache permission policy called Cache-Filter, whose complexity is O(1), is proposed, aiming to store popular contents closer to users. Cache-Filter takes the content popularity into account and achieves the goal through the collaboration of on-path nodes. Extensive simulations are conducted to evaluate the performance of Cache-Filter. Leave Copy Down (LCD), Move Copy Down (MCD), Betw, ProbCache, ProbCache+, Prob(p) and Probabilistic Caching with Secondary List (PCSL) are also implemented for comparison. The results show that Cache-Filter performs well. For example, in terms of the distance to access to contents, compared with Leave Copy Everywhere (LCE) used by Named Data Networking (NDN) as the permission policy, Cache-Filter saves over 17% number of hops.

A Study on the needs of Service Design within the Environment of Trade Shows - Focused on Attendees - (산업전시환경 내 서비스디자인의 필요성에 관한 연구 - 참관객을 중심으로 -)

  • Seo, Na-Hyun
    • Korean Institute of Interior Design Journal
    • /
    • v.20 no.1
    • /
    • pp.43-50
    • /
    • 2011
  • According to the recent expansion of Trade Shows within the government's policy in exhibition industry, studies about the trade shows needs to be focused more on the attendees related to the environment. In most of the researches related to this topic until now had been biased in terms of economic benefits and the standpoint of organizers. Considering that this study is to improve environment of Trade Shows from an attendees' point of view as an attempt to apply the concept of Service Design which is the activity of planning and organizing people, infrastructure, communication and material components of a service. It is about the idea of bringing service design principles to services in Trade Shows. Good design process brings in a good understanding of the context : understanding the environment and redefining problems from the standpoint of attendees, in order to improve its quality, the interaction between service provider and attendees and the attendees' experience.

A Study of Ecology for Development of Industrial Designer's Basic Course (산업디자인 기초학문 개발을 위한 생태원리 연구)

  • 고석천
    • Archives of design research
    • /
    • v.4 no.1
    • /
    • pp.7-30
    • /
    • 1991
  • From the past to the future, the great nature has been long standing good text and has never been behind the fashion. All problems of human being had been occured and been solved by 'Lives' and the biological chemistry ststem which are inside the nature. They say that "Ecology is the applications of biological shape in man made system design." We should find out the basic principles of nature and apply to the necessity of study. Biology, Ecology, and the other relational theory of design have abundant sources of idea in which designers can take new policy and creativities. When designers design new products they should consider socialogy and psychological circumstances that are related to them, and should find out various possibilities trying to contact biological systems and ecological systems which are chosen in the nature. The seed of ash samara can be applied to firehydrant for mountain on fire and application of the spider's web can lead to the device for road work. As soon as possible, we should find out the methods introducing the nautre which supplies infinite sources of idea to the basic theory of design.of design.

  • PDF

An Analytical Study on the Trends and Contexts of American Furniture Design in the post World War II period (2차 대전 후 미국 가구 디자인의 경향과 맥락에 관한 분석 연구)

  • 이영화
    • Journal of the Korea Furniture Society
    • /
    • v.12 no.1
    • /
    • pp.91-101
    • /
    • 2001
  • This study explored the trend of postwar period American furniture design and analyzes the contexts of the trend. To be more specific, this study categorized the types of the styles or "looks" of furniture which were dominant in postwar period America: the machine look ; the handicraft look ; the biomorphic look. The background and the context for each look were traced back and analyzed both diachronically and synchronically. Based on the analysis, this study provided two conclusions. First, postwar period American furniture design is in many ways indebted to the World War II, because the war itself and postwar economic revival produced high demands for furniture, which consequently produced a variety of looks of furniture. Second, the furniture design in this period is attributed to commercialism and consumer-oriented design policy formulated in the mid 1920′s when American design established its own identity separating from European avant-gardism.

  • PDF

Improving Public Services Through Methods of Service Design: A Case Study of the Service Design Workshop, Design Dive

  • Yoon, Seong-Won
    • Journal of the Ergonomics Society of Korea
    • /
    • v.31 no.1
    • /
    • pp.85-92
    • /
    • 2012
  • Objective: This paper aims to discuss the case study of Design Dive: Service Design Workshop that was held to improve public services by applying service design methods(February 2011~May 2011). In so doing, it suggests the ways in which public services can be innovated from a design-oriented perspective. Background: As citizens' social and cultural awareness of services is enhanced, there have been emerging needs for innovation of public services. Accordingly, the methods of service design which is to design holistically users' experiences have been considered as an important means to innovate public services. Method: In this regard, the present paper introduces and explores the example of the Design Dive Workshop as a platform whereby service design is achieved. In particular, it analyzes the results of the workshop. Results: The paper presents the results of the workshop and the 10 possible scenarios of public services that were explored in the workshop and suggests models for empowering the workshop participants. Conclusion: Service design is a very effective methodology for providing a new perspective on user-oriented design of public services. The workshop had educational effects on enhancing the participants' awareness of the role of public service design. Application: The Design Dive workshop contributed to improving public services and achieved positive educational results. The methods developed in the workshop can effectively be applied to various occasions on which public services should be improved.

Design of SPS Model using Mobile Agent System (이동 에이전트 시스템을 이용한 SPS 모델 설계)

  • Park, Jin-Ho;Chung, Jin-Wook
    • Convergence Security Journal
    • /
    • v.3 no.3
    • /
    • pp.19-24
    • /
    • 2003
  • This research presents the development of a certain highly efficient model for group security policy negotiation using mobile agents in the IPSec environment. The conventional IP security systems has some problems. A drawback to these systems is that the required policy between each security area is different. Another problem is not possible to guarantee whether a packet is transmitted through the same path by both directions and is protected by the same policy due to the topology of the network. Unlike conventional systems, the model developed herein can be resolved by using a mobile agent technology. If each domain needs a negotiation of security policy, a mobile agent manages the result of the negotiation in the form of a passport and guarantees the authentication and reliability each other by using the passport.

  • PDF

Value Chain Analysis on Business Difficulties of Information Security Industry (가치사슬분석을 통한 지식정보보안산업의 애로사항 분석)

  • Jun, Hyo-Jung;Kim, Tae-Sung
    • Journal of Information Technology Services
    • /
    • v.12 no.1
    • /
    • pp.229-245
    • /
    • 2013
  • The information security industry market is sluggish despite high expectation for its growth, and thus policies are required to define the causes and to address these issues. The policy formulation requires various historical market and human resource data for analyzing the industry, which cannot be guaranteed secured. This study executed face-to-face in-depth interviews with the frontline businesses in order to gather live opinions and to analyze industry's value chain, problems, and difficulties with a view to defining policy tasks for the development of the industry. The findings of the study revealed the current technical level of the information security industry, the frontline difficulty, and industrial ecosystem status. Based on these findings, the industry revitalization policy was devised and proposed. Objectives of the policy included the fostering of capacity to conceptualize, plan, and design industrial strategies based on the analysis of the industry's value chain and ecosystem, the expansion of the industry's value-added through the enhanced securing and management of the Intellectual Property Rights (IPR), and the nurturing of the security Human Resources (HR) in line with the industrial demand.

Enabling Fine-grained Access Control with Efficient Attribute Revocation and Policy Updating in Smart Grid

  • Li, Hongwei;Liu, Dongxiao;Alharbi, Khalid;Zhang, Shenmin;Lin, Xiaodong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.4
    • /
    • pp.1404-1423
    • /
    • 2015
  • In smart grid, electricity consumption data may be handed over to a third party for various purposes. While government regulations and industry compliance prevent utility companies from improper or illegal sharing of their customers' electricity consumption data, there are some scenarios where it can be very useful. For example, it allows the consumers' data to be shared among various energy resources so the energy resources are able to analyze the data and adjust their operation to the actual power demand. However, it is crucial to protect sensitive electricity consumption data during the sharing process. In this paper, we propose a fine-grained access control scheme (FAC) with efficient attribute revocation and policy updating in smart grid. Specifically, by introducing the concept of Third-party Auditor (TPA), the proposed FAC achieves efficient attribute revocation. Also, we design an efficient policy updating algorithm by outsourcing the computational task to a cloud server. Moreover, we give security analysis and conduct experiments to demonstrate that the FAC is both secure and efficient compared with existing ABE-based approaches.

Do Firm and Bank Level Characteristics Matter for Lending to Firms during the Financial Crisis?

  • Lee, Mihye
    • The Journal of Industrial Distribution & Business
    • /
    • v.9 no.5
    • /
    • pp.37-46
    • /
    • 2018
  • Purpose - This paper explores the determinants of bank lending to firms during and after the global financial crisis using firm- and bank-level data to answer the questions what caused the contraction of lending to firms despite the loosening monetary policy during this crisis period. Research design, data, and methodology - We investigate the effects of the monetary policy that followed the global financial crisis on firms borrowing. We use a dynamic panel model to address how firms lending respond to monetary policy. The data are obtained from CRETOP and we consider the manufacturing sector for the analysis to control for unobserved heterogeneity such as industry-specific shocks. Results - The findings from the empirical analysis suggest that both bank- and firm-level characteristics are significant determinants of bank lending. Especially, we find that corporate risk, measured by default risk, is one of the key factors that led to a decline in lending during the crisis. Conclusions - This paper shows that companies borrow more from liquid banks, and high bank capital can also contribute to an increase in a firm's borrowing from banks. Especially, the results confirm that the default rate measured at the firm level has increased during and after the global financial crisis, which implies that default risk interplays with other firm and bank-level characteristics.