• Title/Summary/Keyword: security management

Search Result 5,462, Processing Time 0.035 seconds

A Study on the Impact of Competency of Technology: Based Startups on Performance Using ETRI Technology (ETRI 기술을 활용한 기술창업기업의 역량이 경영성과에 미치는 영향에 관한 연구)

  • Bae, Hongbeom;Song, Minkyung;Kim, Seokyun
    • Asia-Pacific Journal of Business Venturing and Entrepreneurship
    • /
    • v.13 no.1
    • /
    • pp.61-72
    • /
    • 2018
  • In a rapidly changing environment, such as globalization, technology-based startups are attracting attention as a new growth engine that creates jobs and added value and promotes national competitiveness. At present, countries around the world recognize the development of technology-based start-up companies as a major policy task and strive to make policy efforts to revitalize start-ups and strengthen innovation capabilities of companies. Especially, in order to secure superiority in the fierce market competition, it is becoming more and more important for the growth and development of technological start-up companies that pioneer new markets and energize the economy based on original and innovative technologies. Therefore, it is necessary to study systematically and plan for survival and growth of technology start-up companies. The purpose of this study is to investigate the entrepreneurial spirit of Innovation, Entrepreneurship, Risk Sensibility and Technology Innovation Capacity, R&D ability, Technology Accumulation Capacity, Technology Innovation System, The results of this study are as follows. the effects of marketing ability on technical performance and financial performance are examined. First, the CEO 's entrepreneurial spirit has an effect on the technical performance and financial performance of the management performance. Second, the technology accumulation ability and the R & D capability have a positive effect on the technical performance. Finally, it was found that the ability to commercialize the technology commercialization capacity affects both technical performance and financial performance. The policy implications that can be gained through this are as follows. First, by strengthening cooperation between universities and research institutes, related technology entrepreneurship education programs should be upgraded so that technology entrepreneurs or preliminary entrepreneurs can capture business opportunities and secure market price competitiveness. Secondly, R & D for the purpose of start-up should be developed and marketable technology should be developed and linked to direct start-up. Third, it is necessary to activate the program to match the company with the honorary retirement manpower of large enterprises and SMEs, which have more experience in field experience than the founders.

An Intelligent Intrusion Detection Model Based on Support Vector Machines and the Classification Threshold Optimization for Considering the Asymmetric Error Cost (비대칭 오류비용을 고려한 분류기준값 최적화와 SVM에 기반한 지능형 침입탐지모형)

  • Lee, Hyeon-Uk;Ahn, Hyun-Chul
    • Journal of Intelligence and Information Systems
    • /
    • v.17 no.4
    • /
    • pp.157-173
    • /
    • 2011
  • As the Internet use explodes recently, the malicious attacks and hacking for a system connected to network occur frequently. This means the fatal damage can be caused by these intrusions in the government agency, public office, and company operating various systems. For such reasons, there are growing interests and demand about the intrusion detection systems (IDS)-the security systems for detecting, identifying and responding to unauthorized or abnormal activities appropriately. The intrusion detection models that have been applied in conventional IDS are generally designed by modeling the experts' implicit knowledge on the network intrusions or the hackers' abnormal behaviors. These kinds of intrusion detection models perform well under the normal situations. However, they show poor performance when they meet a new or unknown pattern of the network attacks. For this reason, several recent studies try to adopt various artificial intelligence techniques, which can proactively respond to the unknown threats. Especially, artificial neural networks (ANNs) have popularly been applied in the prior studies because of its superior prediction accuracy. However, ANNs have some intrinsic limitations such as the risk of overfitting, the requirement of the large sample size, and the lack of understanding the prediction process (i.e. black box theory). As a result, the most recent studies on IDS have started to adopt support vector machine (SVM), the classification technique that is more stable and powerful compared to ANNs. SVM is known as a relatively high predictive power and generalization capability. Under this background, this study proposes a novel intelligent intrusion detection model that uses SVM as the classification model in order to improve the predictive ability of IDS. Also, our model is designed to consider the asymmetric error cost by optimizing the classification threshold. Generally, there are two common forms of errors in intrusion detection. The first error type is the False-Positive Error (FPE). In the case of FPE, the wrong judgment on it may result in the unnecessary fixation. The second error type is the False-Negative Error (FNE) that mainly misjudges the malware of the program as normal. Compared to FPE, FNE is more fatal. Thus, when considering total cost of misclassification in IDS, it is more reasonable to assign heavier weights on FNE rather than FPE. Therefore, we designed our proposed intrusion detection model to optimize the classification threshold in order to minimize the total misclassification cost. In this case, conventional SVM cannot be applied because it is designed to generate discrete output (i.e. a class). To resolve this problem, we used the revised SVM technique proposed by Platt(2000), which is able to generate the probability estimate. To validate the practical applicability of our model, we applied it to the real-world dataset for network intrusion detection. The experimental dataset was collected from the IDS sensor of an official institution in Korea from January to June 2010. We collected 15,000 log data in total, and selected 1,000 samples from them by using random sampling method. In addition, the SVM model was compared with the logistic regression (LOGIT), decision trees (DT), and ANN to confirm the superiority of the proposed model. LOGIT and DT was experimented using PASW Statistics v18.0, and ANN was experimented using Neuroshell 4.0. For SVM, LIBSVM v2.90-a freeware for training SVM classifier-was used. Empirical results showed that our proposed model based on SVM outperformed all the other comparative models in detecting network intrusions from the accuracy perspective. They also showed that our model reduced the total misclassification cost compared to the ANN-based intrusion detection model. As a result, it is expected that the intrusion detection model proposed in this paper would not only enhance the performance of IDS, but also lead to better management of FNE.

A Study on the Performance of Cloud-based VDI Adoption: Comparing between IS administrators and business users (클라우드 기반 VDI 도입 성과에 관한 연구 - 시스템 관리자와 일반 사용자의 비교를 중심으로 -)

  • Kim, Il-Han;Kwon, Sun-Dong
    • Management & Information Systems Review
    • /
    • v.37 no.2
    • /
    • pp.149-167
    • /
    • 2018
  • The purpose of this study is to analyze the performance of Virtual Desktop Infrastructure(VDI) adoption. VDI performance was measured by IS manager (system quality, security, and managerial operation) and business user (usability, access, and user satisfaction). The survey questionnaires were developed for measuring VDI performance. 84 data samples were collected from the companies that had adopted cloud-based VDI. This research model was verified by Smart-PLS and SPSS. The research findings were as follows: First, the companies using VDI experienced actual performance, but they did not attain their expectation. Second, as results of comparing between IS managers and business users, IS administrators had considerably higher performance than business users, which indicates that there were big differences in performance perception among users. Compared with prior research such as technical trend, system construction, and performance improvement, this study has the following implications. First, by comparing the expected performance with the actual performance of the companies that have implemented and operating VDI, it was suggested how a company that wants to adopt VDI can manage the expectation level of VDI and achieve higher actual performance. Second, because the perception of VDI performance differs between business users and system managers, it is meaningful that a fair evaluation of VDI performance requires a balanced consideration of business users and system managers.

Evaluation of lines of NERICA 1 introgressed with Gn1a and WFP for yield and yield components as affected by nitrogen fertilization in Kenya

  • Makihara, Daigo;Samejima, Hiroaki;Kikuta, Mayumi;Kimani, John M.;Ashikari, Motoyuki;Angeles-Shim, Rosalyn;Sunohara, Hidehiko;Jena, Kshirod K.;Yamauchi, Akira;Doi, Kazuyuki
    • Proceedings of the Korean Society of Crop Science Conference
    • /
    • 2017.06a
    • /
    • pp.323-323
    • /
    • 2017
  • In many sub-Saharan African countries, boosting rice production is a pressing food security issue. To contribute to the increase in rice production, we have developed lines of NERICA 1 introgressed with the gene for spikelet number, Gn1a, and the gene for primary rachis-branch number, WFP by cross breeding. The performance of rice lines introgressed with the genes for yield related traits can be affected by cultivation environment and management. Thus, in this study, we aimed to evaluate the lines of NERICA 1 introgressed with Gn1a or/and WFP for yield and yield components under different nitrogen fertilization conditions in Kenya. A field trial was conducted at a paddy field in Kenya Agricultural and Livestock Research Organization-Mwea, Kirinyaga County ($0^{\circ}39^{\prime}S$, $0^{\circ}20^{\prime}E$) from August 2016 to January 2017. Eight lines of NERICA 1 introgressed with Gn1a and/or WFP, and their parents, NERICA 1 and ST12, were grown under 0 (NF) and $75(SF)kg\;N\;ha^{-1}$. At maturity, five hills per plot were harvested to determine the yield and yield components. The number of primary and secondary rachis-branches per panicle was measured on the longest panicle in each hill. Under SF, the introgression of WFP to NERICA 1 increased the number of primary and secondary rachis-branches by 27 and 25%, respectively. On the other hand, Gn1a did not increase the number of primary rachis-branches, whereas the number of secondary rachis-branches was increased by 38% on average. The number of primary and secondary rachis-branches of the lines introgressed with both genes increased by 25 and 56%, respectively. Although grain number per panicle increased 33% by Gn1a, 34% by WFP, and 43% by Gn1a+WFP, the yield increase by Gn1a, WFP, and Gn1a+WFP was only 14, 7, and 14%, respectively. The suppression of the yield increase was mainly attributed to the decline in the filled grain ratio. Under NF, WFP increased the number of primary and secondary rachis-branches by 20 and 19%, respectively. The introgression of both genes increased the former and the later by 19 and 35%, respectively. However, Gn1a did not change them under NF. Thus, even under NF, grain yield increased 11% by WFP and 24% by Gn1a+WFP due to the increased grain number although filled grain ratio declined. Our findings suggest that the introgression of Gn1a and WFP could contribute to the rice productivity improvement in sub-Saharan Africa even under low fertility conditions. Improving filled grain ratio of the lines introgressed with these genes by further breeding and fertilization management will be the focus of subsequent work.

  • PDF

Health Care Utilization Pattern and Its Related Factors of Low-income Population with Abnormal Results through Health Examination (저소득층 건강검진 유소견자의 의료이용 양상 및 관련요인)

  • Kwon, Bog-Soon;Kam, Sin;Han, Chang-Hyun
    • Journal of agricultural medicine and community health
    • /
    • v.28 no.2
    • /
    • pp.87-105
    • /
    • 2003
  • Objectives: The purpose of this study was to examine the health care utilization pattern and its related factors of low-income population with abnormal results through health examination. Methods: Analysed data were collected through a questionnaire survey, which was given to 263 persons who 30 years or over with abnormal results through health examination at Health Center. This survey was conducted in March, 2003. This study employed Andersen's prediction model as most well known medical demand mode and data were analysed through 2-test, and multiple logistic regression analysis. Results: The proportion of medical utilization for thorough examination or treatment among study subjects was 51.0%. In multiple logistic regression analysis as dependent variable with medical utilization, the variables affecting the medical utilization were 'feeling about abnormal result(anxiety versus no anxiety: odds ratio 2.25, 95% confidence intervals 1.07-4.75)', 'type of health security(medicaid type I versus health insurance: odds ratio 2.82, 95% confidence intervals 1.04-7.66; medicaid type II versus health insurance: odds ratio 3.22, 95% confidence intervals 1.37-7.53)', 'experience of health examination during past 2 years(odds ratio 2.39, 95% confidence intervals 1.09-5.21)' and 'family member's response for abnormal result(recommendation for medical utilization versus no response: odds ratio 4.90, 95% confidence intervals 1.75-13.75; family member recommended to utilize medical facilities with him/her versus no response: odds ratio 19.47, 95% confidence intervals 5.01-75.73)'. The time of medical utilization was 8-15 days after they received the result(29.9%), 16-30 days after they receive the result(27.6%), 2-7 days after they received the result(20.9%) in order. The most important reason why they didn't take a medical utilization was that it seemed insignificant to them(32.4%). Conclusions: In order to promote medical utilization of low-income population, health education for abnormal result and its management would be necessary to family member as well as person with abnormal result. And follow-up management program for person with abnormal result through health examination such as home-visit health care would be necessary.

  • PDF

A Study on the Interdependencies of Payment and Settlement Systems in Korea (우리나라 지급결제시스템의 상호의존성에 관한 연구)

  • Yi, Junesuh;Kang, KyeongHoon
    • KDI Journal of Economic Policy
    • /
    • v.32 no.2
    • /
    • pp.171-216
    • /
    • 2010
  • With the payment and settlement systems becoming more and more complex and interconnected, the issue of their interdependency rises as an important academic issue as well as a policy topic. This study examines causes, forms, and risk management of interdependencies of payment and settlement systems in Korea, and presents their current situation. By way of simulations using BOF-PSS2 developed by the Bank of Finland, we quantify the effects of an operational disruption on the payment and settlement systems so as to figure out the degree of interdependency. As a result, the secondary round effect reaches up to ₩13.6 trillion a day, which amounts to 7.8% of the daily settlement value. Furthermore, if we also consider the amount of direct operational disruption, the volume of operational disruption occupies 22.3% of total value of the daily settlement, evidencing that the interdependencies of the payment and settlement systems in Korea is enormously widespread. The secondary round effects are found to be more severe with security companies rather than with banks, and to be more depended upon when it is perceived rather than it actually happens. In case that we expand the liquidity to include cash holdings and deposits as assets, the secondary round effect dramatically decreases in all types of financial institutions while foreign banks account for more share of all the secondary round effects increases. Based on these results, we suggest various policy tasks and directions to improve the risk management of settlement systems: expansion of off-setting settlements, introduction of a new settlement system for securities transactions, rapid provision of liquidity to financial institutions, more effective monitoring on participant institutions, and intensified information sharing and cooperation among the systems.

  • PDF

Water Landscape Displaying Techinques of Traditional Gardens between China and Korea - With Soswaewon and ZhuozhengYuan - (한.중 전통원림의 수경관 연출기법 비교 연구 - 소쇄원과 졸정원을 중심으로 -)

  • Lee, Hang Lyoul;Kim, Sun Rye
    • Journal of the Korean Institute of Traditional Landscape Architecture
    • /
    • v.30 no.4
    • /
    • pp.1-13
    • /
    • 2012
  • Landscape Garden tradition of excellent examples of places that are focused on hydroponics management. South Korea and China, this thing was noticeable among them South Korea which emphasizes the natural contours of the natural streams in accordance with the basic idea to use examples that feature will do. Gardens in China by constructing a flat terrain also naturally expect to find examples of conscious ideas depending on the water and the mountains are characterized. These differences and similarities through the Gardens of the tradition of separating the two countries to build their Garden by site Soswaewon and Zolzengwon appear in the target hand is to identify the characteristics between the director. Research methods literature survey, field survey of the natural environment through the plantation, background history, the people who intend to study, to configure the ground water space, Jian, construction and management has been studied in hydroponics. As a result, Damyang-gun, Jeollanam-do, South Korea in the Garden of the Soswaewon(瀟灑園) organization with inner garden and outer garden of a small, but the scale of production to Yang San-Bo's 'eunilgwan' implement security based rock mooring takes the form of a linear channel and the water came down from riding pending to avoid artifacts gathered again took the form of streams flowing into that. Hutton was a rubble pile structure Jian. Building an Gwangpunggak, Jewoldang, as Daebongdae consist, respectively, depending on the purpose of the mooring was deployed by focusing. The other hand, is located at Suzhou, Jiangsu of China Zolzengwon(拙政園) flat terrain is located on. Largely divided eastern gardens, Central Gardens and the Gardens of the West was conducted by five thirds of the total area of Water accounted for. Pavilion the center of the pond, Seokgasan achieve a variety of landscapes and architectural features that are most of the Ming. The two countries, each region's natural environment and human environment, different, unique characteristics to each other in the implementation of a unique hydroponic Garden tube and ideological backgrounds, but especially the 'eunilgwan' and the terrain that is divided according to the conditions of this study, so fulfilling Garden was conducted.

A Comparative Study about Industrial Structure Feature between TL Carriers and LTL Carriers (구역화물운송업과 노선화물운송업의 산업구조 특성 비교)

  • 민승기
    • Journal of Korean Society of Transportation
    • /
    • v.19 no.1
    • /
    • pp.101-114
    • /
    • 2001
  • Transportation enterprises should maintain constant and qualitative operation. Thus, in short period, transportation enterprises don't change supply in accordance with demand. In the result, transportation enterprises don't reduce operation in spite of management deficit at will. In freight transportation type, less-than-truckload(LTL) has more relation with above transportation feature than truckload(TL) does. Because freight transportation supply of TL is more flexible than that of LTL in correspondence of freight transportation demand. Relating to above mention, it appears that shortage of road and freight terminal of LTL is larger than that of TL. Especially in road and freight terminal comparison, shortage of freight terminal is larger than that of road. Shortage of road is the largest in 1990, and improved after-ward. But shortage of freight terminal is serious lately. So freight terminal needs more expansion than road, and shows better investment condition than road. Freight terminal expansion brings road expansion in LTL, on the contrary, freight terminal expansion substitutes freight terminal for road in TL. In transportation revenue, freight terminal's contribution to LTL is larger than that to TL. However, when we adjust quasi-fixed factor - road and freight terminal - to optimal level in the long run, in TL, diseconomies of scale becomes large, but in LTL, economies of scale becomes large. Consequently, it is necessary for TL to make counterplans to activate management of small size enterprises and owner drivers. And LTL should make use of economies of scale by solving the problem, such as nonprofit route, excess of rental freight handling of office, insufficiency of freight terminal, shortage of driver, and unpreparedness of freight insurance.

  • PDF

Multiple SL-AVS(Small size & Low power Around View System) Synchronization Maintenance Method (다중 SL-AVS 동기화 유지기법)

  • Park, Hyun-Moon;Park, Soo-Huyn;Seo, Hae-Moon;Park, Woo-Chool
    • Journal of the Korea Society for Simulation
    • /
    • v.18 no.3
    • /
    • pp.73-82
    • /
    • 2009
  • Due to the many advantages including low price, low power consumption, and miniaturization, the CMOS camera has been utilized in many applications, including mobile phones, the automotive industry, medical sciences and sensoring, robotic controls, and research in the security field. In particular, the 360 degree omni-directional camera when utilized in multi-camera applications has displayed issues of software nature, interface communication management, delays, and a complicated image display control. Other issues include energy management problems, and miniaturization of a multi-camera in the hardware field. Traditional CMOS camera systems are comprised of an embedded system that consists of a high-performance MCU enabling a camera to send and receive images and a multi-layer system similar to an individual control system that consists of the camera's high performance Micro Controller Unit. We proposed the SL-AVS (Small Size/Low power Around-View System) to be able to control a camera while collecting image data using a high speed synchronization technique on the foundation of a single layer low performance MCU. It is an initial model of the omni-directional camera that takes images from a 360 view drawing from several CMOS camera utilizing a 110 degree view. We then connected a single MCU with four low-power CMOS cameras and implemented controls that include synchronization, controlling, and transmit/receive functions of individual camera compared with the traditional system. The synchronization of the respective cameras were controlled and then memorized by handling each interrupt through the MCU. We were able to improve the efficiency of data transmission that minimizes re-synchronization amongst a target, the CMOS camera, and the MCU. Further, depending on the choice of users, respective or groups of images divided into 4 domains were then provided with a target. We finally analyzed and compared the performance of the developed camera system including the synchronization and time of data transfer and image data loss, etc.

A Study on the Perception of Research Data Managers to Establish a Korea Research Data Commons System (국가연구데이터커먼즈 체계 수립을 위한 연구데이터 관리자들의 인식에 관한 연구)

  • Seong-Eun Park;Mikyoung Lee;Minhee Cho;Sa-Kwang Song;Dasol Kim;Hyung-Jun Yim
    • Journal of the Korean Society for information Management
    • /
    • v.41 no.1
    • /
    • pp.465-486
    • /
    • 2024
  • The purpose of this study is to identify the current status of infrastructure and services for analyzing research data for research data managers at government-funded research institutions under the National Research Council for Science and Technology (NST) who will actually use the Korea Research Data Commons (KRDC), which is being developed by the Korea Institute of Science and Technology Information (KISTI) and to investigate the perceptions of research data managers related to the establishment of KRDC system. For the study, we conducted a survey targeting 24 government-funded research institutes, excluding KISTI, and interviewed research data managers from 9 of the 15 institutions surveyed who agreed to follow-up interviews. As a result of the survey, most institutions were providing related services, and their willingness to introduce an integrated analysis framework for the use of research data and provide a system for using externally released analysis software was also high. Meanwhile, when we investigated the external disclosure status of each institution's analysis services through follow-up interviews, only a minimal number of institutions were disclosing them to the outside world. The findings reveal that there is a demand to utilize analysis infrastructure and services when provided through the framework. However, it is difficult to disclose and share the analysis resources held by each organization. In order to establish the KRDC system, it is essential to share research sites' analysis infrastructure and services, and in addition, changes in the perception of research sites and institutional changes are necessary. Furthermore, there is a need to establish policies that consider the system's convenience, security, and compensation system raised in the follow-up interviews.