• Title/Summary/Keyword: 감시강화

Search Result 216, Processing Time 0.022 seconds

Cloud Security Scheme Based on Blockchain and Zero Trust (블록체인과 제로 트러스트 기반 클라우드 보안 기법)

  • In-Hye Na;Hyeok Kang;Keun-Ho Lee
    • Journal of Internet of Things and Convergence
    • /
    • v.9 no.2
    • /
    • pp.55-60
    • /
    • 2023
  • Recently, demand for cloud computing has increased and remote access due to home work and external work has increased. In addition, a new security paradigm is required in the current situation where the need to be vigilant against not only external attacker access but also internal access such as internal employee access to work increases and various attack techniques are sophisticated. As a result, the network security model applying Zero-Trust, which has the core principle of doubting everything and not trusting it, began to attract attention in the security industry. Zero Trust Security monitors all networks, requires authentication in order to be granted access, and increases security by granting minimum access rights to access requesters. In this paper, we explain zero trust and zero trust architecture, and propose a new cloud security system for strengthening access control that overcomes the limitations of existing security systems using zero trust and blockchain and can be used by various companies.

Development of IoT-based Hazardous Gas Environment Control System (IoT 기반 유해 가스 환경 제어 시스템 개발)

  • Chul-Hoon Kim;Dae-Hyun Ryu;Tae-Wan Choi
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.19 no.5
    • /
    • pp.1013-1018
    • /
    • 2024
  • This study developed and evaluated a real-time monitoring system utilizing IoT technology to prevent disasters caused by hazardous gases in industrial settings. The developed system detects harmful gases in real-time and issues prompt alerts, achieving over 98% data accuracy and response times under 3 seconds. The system consists of sensor nodes, a central processing unit, and a user interface, monitoring the work environment and worker status in real-time through a cloud-based remote surveillance and control program. Performance evaluation results show that this system presents a new approach for effectively managing safety in industrial sites. Future developments are expected to include improvements in multi-gas detection capabilities, development of AI-based prediction models, and enhanced security measures, evolving into a more advanced monitoring system.

Study on Recognition Attitudes of Residents on Safety Management against Disasters of Local Governments: Focused on Chungcheongbuk-do (지방자치단체의 재난안전 관리에 대한 주민 인식태도 연구 - 충청북도 지역을 중심으로 -)

  • Lee, Sang-Yeol;Nam, Jae-Sung
    • Korean Security Journal
    • /
    • no.58
    • /
    • pp.81-106
    • /
    • 2019
  • This study analyzed safety management system against disasters perceived by local residents of Chungcheongbuk-do and then examined the policy directions to be considered in order for local governments to improve the safety level of residents and build an effective safety management system against disasters. The findings were as follows. First, in their recognition of risks of safety against disasters, recognition on the possibility of the occurrence of natural disasters was higher than that of social disasters or safety accidents. Secondly, also in the aspect of the importance of category of safety management against disasters, they recognized that of natural disasters far higher than others. Third, they showed satisfaction higher than average with basic job performance of local governments related with safety management, whereas they showed relatively less satisfaction with the aspects of check and publicity of risk factors, and short-term restoration system out of phased job performance. Fourth, in the aspect of capability of local governments for safety management against disasters, they rated positively capability of the responsible departments and the professionality, whereas they relatively underestimated the scale or budget of safety-related organizations. Fifth, the policy directions to be taken for safety against disasters by local governments included strengthening of regular education like experience-based training, expansion of education among local residents, more support for relevant facilities and resources, activation of residents-participating campaigns, improvement of apparatus and personnel treatment related with firefighting and security, frequent patrol and oversight, more exercises against disasters. So, to strengthen safety management system against disasters in local governments and build a effective responding system may need to extend programs assisting vulnerable class to safety against disasters, build a community-friendly safety management system, extend the cooperation system by participation of residents, enhance collaboration and support system with safety-related bodies like police, firefighters.

A Study on Presidential Security Activities of Military Intelligence Investigation Agency - Since the Korean War, from 1950 to the present - (군(軍) 정보수사기관의 대통령 경호활동 고찰: 1950년 한국전쟁 이후부터 현재까지)

  • Choi, Jong-Young;Jung, Ju-Ho
    • Korean Security Journal
    • /
    • no.53
    • /
    • pp.63-79
    • /
    • 2017
  • Defence Security Command is the only military intelligence and investigation agency which is in charge of safeguarding military information and investigating specific crimes such as subversion and disloyalty in military. While the presidential security provided by Defence Security Command, along with Presidential Security Service(PSS) and the police, forms one of three pillars sustaining presidential security, its works and activities have been rarely known to the public due to the military confidentiality. This study looks into some data specialized into the presidential security among works of Defense Security Command by using various resources such as biographies of key people, media reports, and public materials. It reviews the presidential security works in a historical sense that the works have developed and changed in accordance with the historical changes of Defense Security Command, which was rooted in Counter-Intelligence Corps (Teukmubudae in Korean) in 1948 and leads to the present. The study findings are as follows. First, when the Korean War broke out in 1950 and since then the South Korea was under the threat of the North Korean armed forces and left wing forces, Counter-Intelligence Corps(Bangcheopdudae in Korean) took the lead in presidential security more than the police who was in charge of it. Secondly, even after the Presidential Security Office has founded in 1963, the role of the military on presidential security has been extended by changing its titles from Counter-Intelligence Corps to Army Security corps to Armed Forces Security Command. It has developed their provision of presidential security based on the experience at the president Rhee regime when they could successfully guard the president Rhee and the important government members. Third, since the re-establishment into Defence Security Command in 1990, it has added more security services and strengthened its legal basis. With the excellent expertise, it played a pivotal role in the G20 and other state-level events. After the establishment of the Moon Jaeinin government, its function has been reduced or abolished by the National Defense Reform Act. However, the presidential security field has been strengthening by improving security capabilities through reinforcing the organization. This strengthening of the security capacity is not only effective in coping with the current confrontation situation with the hostile North Korean regime, but also is important and necessary in conducting constant monitoring of the military movement and security-threat factors within military during the national security events.

  • PDF

Applying an IPA(Importance-Performance Analysis) Model to Comparative Study on the Elementary School Students' Parents' Crime Prevention Design Element(CPTED) Awareness for Crime Prevention (범죄예방을 위한 초등학교 학부모의 범죄예방설계(CPTED)요소 인식에 관한 비교 연구: IPA(중요도-실행도 분석)기법을 중심으로)

  • Choi, Hyun-Sick
    • Korean Security Journal
    • /
    • no.40
    • /
    • pp.209-242
    • /
    • 2014
  • This study is to understand sure the primary crime prevention has been incidence as a social problem intended for parents through the analysis of the Crime Prevention Design (CPTED) CPTED element of recognize elements that target crime prevention strategy to effectively help students be and an object of the present invention is to provide a policy suggestion haryeoneunde proposed basic data required for orientation. To achieve the study objectives such as the core framework in this study IPA: Importance-Performance Analysis) also was selected. Subjects of study in 2010 Gyeongju Elementary parents name and were 203 first research group investigating the secondary school population of the region in 2014 to nomadic parents of 297 people sampled selection. Questionnaire that use by this study applies "Important-Performance Analysis : IPA" technique that Martilla & James(1977) presented and analyzed awareness for CPTED elements of strategy for student's crime prevention to elementary school pupil students' parentse. It was the first group, 0.886, 0.920, 0.895 and 2nd group 0.880, 0.906, 0.878 that reliability of (Cronbach' s ${\alpha}$) the importance, and believability of run chart was the first group, 0.880, 0.917, 0.878 and 2nd group, 0.735, 0.840, 0.830. Analysis of the data carried out frequency analysis, reliability analysis, Frequency analysis was performed, paired sample t-Test for the reliability analysis, and the technical statistical analysis of the data is. The analysis of lattice bars execution through the IPA, the importance of the primary parents elements of CPTED strategies are generally very high, but found that the variation depending on the components that Performance. This study, an important element of the strategy to eliminate the school building for students from inside and outside the criminal fears CPTED is a mechanical surveillance in the first group, organizational surveillance, and the second group is the region intensified I'll showed mechanically and organizational factors in the investigation, and request that the investment is urgently important element is also execution low, crime prevention personnel security higher importance than expanding the front door. The analysis result of this study expects that basic data can be used in policy direction presentation that examines closely CPTED elements of strategy for crime prevention of students and applies CPTED's component effectively at elementary school hereafter.

  • PDF

Development of Self-Managed Food Sanitation Check-List and On-Site Monitoring of Food Sanitation Management Practices in Restaurants for Control of Foodborne Illness Risk Factors (식중독 발생 위험요인 관리를 위한 외식업체 자가위생관리점검표 개발 및 현장모니터링)

  • Chung, Min-Jae;Choi, Jung-Hwa;Ryu, Kyung;Kwak, Tong-Kyung
    • Korean journal of food and cookery science
    • /
    • v.26 no.5
    • /
    • pp.603-616
    • /
    • 2010
  • Based on recent dramatic increases in foodborne outbreaks in restaurants, self-managed sanitation systems are now recommended to control contributing risk factors. This study aimed to improve sanitation management practices in restaurants and had two objectives. First, we tried to develop a self-managed sanitation check-list, including risk factors contributing to foodborne illness and Korean food hygiene regulation articles. We also tried to evaluate current sanitation management practices in restaurants according to operation and restaurant type. Thirty restaurants were evaluated by on-the-spot inspectors using an auditing tool consisting of four dimensions, seventeen categories, and forty-one items. Total compliance rate categorized by operation type significantly differed between chain restaurants and self-managed restaurants, with values of 85.5% and 51.6%, respectively. Therefore, self-managed restaurants, which showed the lowest compliance rate of below 30.0%, need more strict control to improve current unsanitary management practices, specifically relating to 'sterilization of knives, chopping boards, and wiping cloths', 'sanitation training', 'not allowing access into the kitchen to outsiders', 'handling of food or utensils on shelves at a 15 cm distance away from floor', 'prevention of cross-contamination of cooked foods or vegetables', and 'records of kitchen access or inspection'. Thus, an effective food sanitation system is essential and should be implemented to improve the existing sanitary conditions in restaurants. However, the most important factor to achieving food sanitation management objectives is food handlers' self-motivation.

Satisfaction Realization of Apartment House Inhabitants for CPTED Design Element: To with Group by CPTED Application Level, Reciprocal Action Effect of Crime Prevention Effort (CPTED 설계요소에 대한 공동주택주민의 만족도 인식: CPTED 적용수준별 집단과 거주기간, 범죄예방노력의 교호작용효과)

  • Choi, Hyun-Sick;Park, Hyeon-Ho
    • Korean Security Journal
    • /
    • no.22
    • /
    • pp.231-258
    • /
    • 2010
  • A study apartment house inhabitants of to, crime prevention effort is done satisfaction analysis and that deduce design plan of CPTED that can overcome safe life space embodiment and criminal fear from crime in Juminin viewpoint through atomize group's interaction by background fantast. Is positive because factor analysis wave and satisfaction index of deduce universe (Total group) 8 factor are presented more than all 0, and quite was expose by level that is worth accommodating. Satisfaction index of The secondary design group (Group1) 8 factor is positive because is presented more than all 0, and mechanical access control, mechanical surveillance is level that is worth accommodating quite, and level that is proper in remainder 6 dimension appear. Can know that 1 The secondary design group(Group2) is expose by level that satisfaction characteristic of 8 factor can be presented more than all 0 and appeared positively, and accommodate quite in all dimensions. Result that analyze Two-way ANOVA satisfaction difference of environment design of group by satisfaction of the primary and the secondary design group is high in 8 all dimensions of CPTED, and satisfaction by appeared satisfaction high in group less than natural access control, 2 years of natural surveillance, and reciprocal action effect that go with group is high satisfaction in 2 years low in The secondary design group more than the primary and the secondary design group of systematic access control and natural access control, and the primary and the secondary design group appeared high in subgroup of 2 remainders. Satisfaction difference by group by crime prevention effort satisfaction of the primary and the secondary design group is high in 8 all dimensions of CPTED, and satisfaction difference by crime prevention effort appeared satisfaction high in 'A prize' group to The secondary design group, and reciprocal action efficiency is high in 'A prize' group in The secondary design group more than the primary and the secondary design group in mechanical access control, systematic access control, natural access control, territoriality reinforcement, and satisfaction of 'Between' and 'Very' group appeared high in the primary and the secondary design group.

  • PDF

From Frankenstein to Torture Porn -Monstrous Technology and the Horror Film (프랑켄슈타인에서 고문 포르노까지 -괴물화하는 테크놀로지와 호러영화)

  • Chung, Young-Kwon
    • Journal of Popular Narrative
    • /
    • v.26 no.1
    • /
    • pp.243-277
    • /
    • 2020
  • This paper examines a social and cultural history of horror films through the keyword "technology", focusing on The Spark of Fear: Technology, Society and the Horror Film (2015) written by Brian N. Duchaney. Science fiction film is closely connected with technology in film genres. On the other hand, horror films have been explained in terms of nature/supernatural. In this regard, The Spark of Fear, which accounts for horror film history as (re)actions to the development of technology, is remarkable. Early horror films which were produced under the influence of gothic novels reflected the fear of technology that had been caused by industrial capitalism. For example, in the film Frankenstein (1931), an angry crowd of people lynch the "monster", the creature of technology. This is the action which is aroused by the fear of technology. Furthermore, this mob behavior is suggestive of an uprising of people who have been alienated by industrial capitalism during the Great Depression. In science fiction horror films, which appeared in the post-war boom, the "other" that manifests as aliens is the entity that destroys the value of prosperity during post-war America. While this prosperity is closely related to the life of the middle class in accordance with the suburbanization, the people live conformist lives under the mantle of technologies such as the TV, refrigerator, etc. In the age of the Vietnam War, horror films demonize children, the counter-culture generation against a backdrop of the house that is the place of isolation and confinement. In this place, horror arises from the absolute absence of technology. While media such as videos, internet, and smartphones have reinforced interconnectedness with the outside world since the 1980s, it became another outside influence that we cannot control. "Found-footage" and "torture porn" which were rife in post-9/11 horror films show that the technologies of voyeurism/surveillance and exposure/exhibitionism are near to saturation. In this way, The Spark of Fear provides an opportune insight into the present day in which the expectation and fear of the progress of technology are increasingly becoming inseparable from our daily lives.

The Effects of Female Auditors on the Sensitivity of Executive Compensation to Performance (여성감사가 경영자 보상의 성과 민감도에 미치는 영향)

  • Luo, Jing;Cho, Young-Gon
    • The Journal of the Korea Contents Association
    • /
    • v.20 no.11
    • /
    • pp.184-191
    • /
    • 2020
  • Using 850 disclosures of individual executive compensation from 2014 to 2017, this study examines the impact of female auditors on the sensitivity of executive compensation-performance relation. The major findings as follow: First, Female auditors have positive effects on the sensitivity of executive compensation to performance, implying that when auditors are appointed to be females who are more ethical, of high moral development, risk averse and conservative as well, they play an efficient monitoring role in aligning executive compensation to performance. Second, the monitoring effects of female auditors on the sensitivity of executive compensation to performance are significant when they are full time employed, suggesting that gender-based differences are more likely to be realized on the condition that they are in position to commit to their jobs for their owns. The results overall support that female auditors exercise efficient monitoring roles in aligning executive compensation to performance in Korean listed firms. The research contribute to complement the study of gender effects on corporate decision making, which have been focused on gender diversity of the board, by providing empirical evidence of the impact of female auditors on the sensitivity of executive compensation-performance relation.

Review on the Cooperative Policing System in Japan (일본의 민경협력치안제도에 대한 고찰 및 시사점)

  • Kim, Gyoo-Sik;Choi, Eung-Ryul
    • Korean Security Journal
    • /
    • no.36
    • /
    • pp.29-55
    • /
    • 2013
  • In modern society, citizen's expectation about policing levels have been rising over time and it limited resources of the police to deal with the security services are insufficient. Until now, the state monopoly of the police activity was changing to subject of a variety in cooperation with public security system. The citizens considers community not the destination to police enforce the law but space for effective policing partners. Japanese police focus on cooperation oriented policing to strengthen the police and local residents with crime prevention for a long time. Also, the community through a variety of problem-solving policing activities to identify problems such as anxiety and anguish of the people. The legal basis for cooperative policing activity is that Nagaoka city crime prevention regulation in 1979. In recent years, Tokyo local government legislated the safe town development regulations(東京都安全 安心まちづくり條例) and set up the hot-spot area to promote the safety of public facilities. Cooperative policing not police intervention for crime prevention but national policy for the city reclamation in Japan. Police as well as the Ministry of Land and Transport, Ministry of Justice, Ministry of Education, Prime Minister and all government departments thread safe city, crime prevention, and has been working to make the safe city. Japan's cooperative policing is a system that receives the most attention and greater implications.

  • PDF