• Title/Summary/Keyword: 보안성 검토

Search Result 233, Processing Time 0.03 seconds

A Study on Emergency Evacuation Route Planning and USN-Based Induction Activities of Correctional Facilities (교정시설의 비상시 피난경로계획 및 USN기반 대피유도활동에 관한 연구)

  • Park, Joo-Hyung;Park, Jong-Hyun
    • Fire Science and Engineering
    • /
    • v.25 no.2
    • /
    • pp.39-46
    • /
    • 2011
  • In correctional facilities with majority of occupants in custody, the safe evacuation guide without getaway accidents should be very important due to complexity in escape paths. Fire causes are various in correctional facilities, for example, arson fire is a major cause in mental treatment facilities, however, old facilities or carelessness of flammable materials consist of fire causes in jail facilities. Both types of correctional facilities are the same in terms of many casualties from the fire cases. The thesis focus on escape paths and evacuation guide plans on the basis of analysis on fire cases and structural vulnerability, and then an electronic unlocking system is concededly installed for safe evacuation of occupants in custody without getaway accidents. Especially, the effect of the electronic unlocking system is going to be analyzed on the basis of RSET (required safe egress time) in order to realize for the occupants to evacuate safely to the front yard in case of emergency. In conclusion, if electronic security allowed system with USN (Ubiquitous Sensor Networks) technology should be installed in multi-storey correctional buildings, it is proposed that the occupants in custody might be a guided safely without getaway trials.

The Improvement Plan for Personal Information Protection for Artificial Intelligence(AI) Service in South Korea (우리나라의 인공지능(AI)서비스를 위한 개인정보보호 개선방안)

  • Shin, Young-Jin
    • Journal of Convergence for Information Technology
    • /
    • v.11 no.3
    • /
    • pp.20-33
    • /
    • 2021
  • This study is to suggest improvements of personal information protection in South Korea, according to requiring the safety of process and protection of personal information. Accordingly, based on data collection and analysis through literature research, this study derived the issues and suitable standards of personal information for major artificial intelligence services. In addition, this cases studies were reviewed, focusing on the legal compliance and porcessing compliance for personal information proection in major countries. And it suggested the improvement plan applied in South Korea. As the results, in legal compliance, it is required reorganization of related laws, responsibility and compliance to develop and provide AI, and operation of risk management for personal information protection laws in AI services. In terms of processing compliance, first, in pre-processing and refining, it is necessary to standardize data set reference models, control data set quality, and voluntarily label AI applications. Second, in development and utilization of algorithm, it is need to establish and apply a clear regulation of the algorithm. As such, South Korea should apply suitable improvement tasks for personal information protection of safe AI service.

A Study on the Improvement of Domestic Policies and Guidelines for Secure AI Services (안전한 AI 서비스를 위한 국내 정책 및 가이드라인 개선방안 연구)

  • Jiyoun Kim;Byougjin Seok;Yeog Kim;Changhoon Lee
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.33 no.6
    • /
    • pp.975-987
    • /
    • 2023
  • With the advancement of Artificial Intelligence (AI) technologies, the provision of data-driven AI services that enable automation and intelligence is increasing across industries, raising concerns about the AI security risks that may arise from the use of AI. Accordingly, Foreign countries recognize the need and importance of AI regulation and are focusing on developing related policies and regulations. This movement is also happening in Korea, and AI regulations have not been specified, so it is necessary to compare and analyze existing policy proposals or guidelines to derive common factors and identify complementary points, and discuss the direction of domestic AI regulation. In this paper, we investigate AI security risks that may arise in the AI life cycle and derive six points to be considered in establishing domestic AI regulations through analysis of each risk. Based on this, we analyze AI policy proposals and recommendations in Korea and validate additional issues. In addition, based on a review of the main content of AI laws in the US and EU and the analysis of this paper, we propose measures to improve domestic guidelines and policies in the field of AI.

A Study on the Advance Transportation System for Inter Terminal Transshipment: Focused on the Busan New Port (타부두 환적화물에 적합한 운송수단에 관한 연구;부산항 신항을 중심으로)

  • Jo, Mi-Ji;Lee, Seung-Pil;Kim, Hwan-Seong
    • Journal of Navigation and Port Research
    • /
    • v.44 no.4
    • /
    • pp.298-304
    • /
    • 2020
  • The purpose of this study was to identify evaluation factors and analyze the relative importance among factors to select a suitable transportation method for transferring the increasing amount of transshipment at multiple terminals at the Busan new port. To accomplish this, the evaluation factors were selected through a literature survey and brainstorming of a group of experts associated with the port operation, and were classified into five major factors and 15 middle factors. The evaluation factors classified hierarchically were surveyed relative to workers in organizations such as shipping companies, port corporations, container terminals, and related ministries. The importance of each factor was calculated using the hierarchical analysis process (AHP). As a result of the importance analysis, priority was assigned in order of safety, productivity, investment efficiency, operational efficiency, and policy conformity. Through this, it was necessary to select a suitable transportation method for the transshipment cargo in terminals while focusing on the cargo and terminal security and preventing accidents. As a result of calculating from six ITT transportation candidates, the priority was determined in order of monorail, Autocon, and so on as ITT transportation suitable for the Busan new port..

A Study on the Illustrations of Male and Female on the Middle School 「Technology·Home Economics」 Textbooks from the Gender Equality Perspective (양성평등 관점에서 본 중학교 「기술·가정」 교과서의 남녀 삽화 연구)

  • Lee, Eun Seon;Jun, Mikyung
    • Journal of Korean Home Economics Education Association
    • /
    • v.31 no.2
    • /
    • pp.137-153
    • /
    • 2019
  • This study reviewed the Technology & Home Economics Education textbooks to examine if their illustrations would be appropriate for students' balanced view of gender. To this end, the textbooks of 'Technology & Home Economics Education 1 and 2' from 12 publishers (24 books in total) were analyzed focusing on the formative and content characteristics of illustrations in the textbooks. The results of this study is as follows. There were areas in the textbooks that may not be considered gender-equal. Although the textbooks have been improved to some extent from the previous versions, they still show gender stereotypes biased towards men. If students are constantly exposed to the prescriptive characteristics that are in favor of certain gender, they would find it difficult to develop their personality strengths, due to the gender role pressures. In order to help students cultivate sensitivity and activism toward the gender equality issues, it is important that the textbooks are gender-equal. To summarize, in order to suggest to students a balanced image of society with male and female cooperating with each other in diverse domains, it is deemed necessary to constantly examine and revise the textbooks for their gender stereotypic contents, and thereby, improve them for gender equality.

A Study on Current Status of Detection Technology and Establishment of National Detection Regime against Nuclear/Radiological Terrorism (핵테러/방사능테러 탐지 기술 현황 및 국내 탐지체계 구축 방안에 관한 연구)

  • Kwak, Sung-Woo;Jang, Sung-Soon;Lee, Joung-Hoon;Yoo, Ho-Sik
    • Journal of Radiation Protection and Research
    • /
    • v.34 no.3
    • /
    • pp.115-120
    • /
    • 2009
  • Since 1990s, some events - detection of a dirty bomb in a Russian nation park in 1995, 9/11 terrorist attack to WTC in 2001, discovery of Al-Qaeda's experimentation to build a dirty bomb in 2003 etc - have showed that nuclear or radiological terrorism relating to radioactive materials (hereinafter "radioactive materials" is referred to as "nuclear material, nuclear spent fuel and radioactive source") is not incredible but serious and credible threat. Thus, to respond to the new threat, the international community has not only strengthened security and physical protection of radioactive materials but also established prevention of and response to illicit trafficking of radioactive materials. In this regard, our government has enacted or revised the national regulatory framework with a view to improving security of radioactive materials and joined the international convention or agreement to meet this international trend. For the purpose of prevention of nuclear/radiological terrorism, this paper reviews physical characteristics of nuclear material and existing detection instruments used for prevention of illicit trafficking. Finally, national detection regime against nuclear/radiological terrorism based on paths of the smuggled radioactive materials to terrorist's target building/area, national topography and road networks, and defence-in-depth concept is suggested in this paper. This study should contribute to protect people's health, safety and environment from nuclear/radiological terrorism.

A Study on Safe Electronic Commerce Activation Plan (안전한 전자상거래 활성화 방안에 관한 연구)

  • Park, Sun-Ae;Choi, Seong-Wook;Kim, Bong-Hyun
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2006.11a
    • /
    • pp.741-744
    • /
    • 2006
  • The e-commerce introduction at the Internet in base accept the renovation dimension from the organised side because of follow of the business in order to the big change. So when I considering the e-commerce introducing the problem easy to originate from the efficiency and expectation without radical preparation. Each commodities over the dimension of Internet information search it is using the various transaction of service as a matter of bank, securities, education, game that many business on the alternation of e-commerce and commerce tool the essentiality. Therefore the transactions at the Internet e-commerce under hold specific gravity and rule in the future with the propection increase the interest concern about the security skill. A study on this paper presentation through the planning method about the analysis on the objective which e-commerce follow the inflection of efficiency strategy and induction the plan on the penetration's revitalization about Internet e-commerce.

  • PDF

A Study on the New Education and Training Scheme for Developing Seafarers in Seafarer 4.0 - Focusing on the MASS - (선원 4.0시대에 적합한 새로운 선원교육훈련 체계에 대한 연구 - 자율운항선박을 중심으로 -)

  • Lee, Chang-Hee;Yun, Gwi-ho;Hong, Jung-Hyeok
    • Journal of the Korean Society of Marine Environment & Safety
    • /
    • v.25 no.6
    • /
    • pp.726-734
    • /
    • 2019
  • The current maritime industry is expected to have a significant impact on the role of maritime-related technologies and systems, especially seafarers, in the rapidly changing Fourth Industrial Revolution. The Maritime Autonomous Surface Ship (MASS) aims to reduce the number of safety accidents and improve seafarers' working environment. With regard to MASS, the International Maritime Organization has been trying to minimize unexpected impact in the maritime education and training sector by establishing international conventions such as the Standards of Training, Certification and Watchkeeping for Seafarers. However, domestic designated educational institutions have not yet established an education and training scheme to develop seafarers who will be on board for MASS. Therefore, this paper reviews the technology of MASS, analyzes the changes in education and training in order to upgrade the qualifications, and suggests the competencies of smart seafarers equipped with the integrated management ability required for Artificial Intelligence, Big Data, Cybersecurity, and the Digital System Revolution through education and training. In addition, this study provides basic information for the education and training of seafarers who are optimized for the rapidly changing technological environment.

Vacuum Modeling for Development of Product Design (제품디자인개발을 위한 진공주형기의 사용에 관한 연구)

  • Kim, Sung-Hyun
    • The Journal of the Korea Contents Association
    • /
    • v.12 no.12
    • /
    • pp.119-125
    • /
    • 2012
  • It is not an overstatement to say that the functions of the products change and the results determine the size and weight of the product. It took a long time to develop the small size everyday tools. One of the ways to shorten the development time was the emergence of vacuum moulds that decreased the design process significantly. In other words, the manufacturing of the product may be limited by the size and shape, but the replication of a simple structure is possible within a few hours. This study aims to review and suggest the design development through vacuum moulds as an area to realize the future additional values to the economic growth under the rapidly changing industry structures as well as securing the weaknesses of the industry structures through the productivity and competitiveness of the corporations.

Multi Server Password Authenticated Key Exchange Using Attribute-Based Encryption (속성 기반 암호화 방식을 이용한 다중 서버 패스워드 인증 키 교환)

  • Park, Minkyung;Cho, Eunsang;Kwon, Ted Taekyoung
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.40 no.8
    • /
    • pp.1597-1605
    • /
    • 2015
  • Password authenticated key exchange (PAKE) is a protocol that a client stores its password to a server, authenticates itself using its password and shares a session key with the server. In multi-server PAKE, a client splits its password and stores them to several servers separately. Unless all the servers are compromised, client's password will not be disclosed in the multi-server setting. In attribute-based encryption (ABE), a sender encrypts a message M using a set of attributes and then a receiver decrypts it using the same set of attributes. In this paper, we introduce multi-server PAKE protocol that utilizes a set of attributes of ABE as a client's password. In the protocol, the client and servers do not need to create additional public/private key pairs because the password is used as a set of public keys. Also, the client and the servers exchange only one round-trip message per server. The protocol is secure against dictionary attacks. We prove our system is secure in a proposed threat model. Finally we show feasibility through evaluating the execution time of the protocol.