• Title/Summary/Keyword: 보안업

Search Result 291, Processing Time 0.031 seconds

An Integrated Approach for Korea's e-Navigation Development Project to Playing the Global Lead in Maritime Safety Logistics of IMO's Next Generation (한국의 이네비게이션개발사업이 IMO차세대 해사안전보안물류상 세계 주역을 맡기 위한 통합적 접근)

  • Gim, Jin-Goo
    • Proceedings of the Korean Institute of Navigation and Port Research Conference
    • /
    • 2016.05a
    • /
    • pp.58-58
    • /
    • 2016
  • This study aims to enhance Korea's competitiveness by taking the lead in the international standardization and relevant global market. This is to be achieved by performing the role of First Mover through the resolute investment from Fast Follower that is servile to the decision of the organization in the e-Navigation strategy that has been promoted by the IMO. The study methodology is an integrated approach. It is established by modelling LSCM G2B2C2 Platform in maritime safety/security logistics and applied to the enhancement of maritime safety/security in global LSCM. This paper externally contributes to the reduction of world maritime accidents and exalt the national prestige; internally, the enhancement of the national competitiveness through the improvement of shipping port logistics and others. These eventually contribute to Korea's economic development that is combined by both theory and practice and of practical use of the integrated approach.

  • PDF

EDI감사용 의사결정시스템의 개발

  • 이상재;한인구
    • Proceedings of the Korean Operations and Management Science Society Conference
    • /
    • 1995.04a
    • /
    • pp.234-251
    • /
    • 1995
  • 본 연구에서는 EDI감사 의사결정지원시스템을 개발하였다. 이를 위해서 기존의 EDP감사 의사결정지원시스템 및 감사전문가시스템분야의 연구를 고찰했다. EDI감사를 위한 의사결정지원시스템은 통계, 위험, 회사의 개요, 테스트 항목등의 데이타를 저장한 데이타베이스 시스템이다. 시스템 개발을 위해서 E/R(Entity Relation)이나 DFD(Data Flow Diagram)분석을 통해서 논리적인 설계를 하였다. 시스템 개발은 개인용 데이타베이스팩키지인 FoxPro를 사용하였다. 이 시스템을 통해서 감사인이 필요한 테스트 결과를 조회하거난 저장할 수 있고 통제, 위험, 회사등의 상호조회를 통한 필요한 통제나 위험정도를 쉽게 조회해 볼수 있다. 회사마다 필요한 통제, 위험, 테스트 항목등의 체크리스트가 달라지는 경우에 이 시스템을 통해서 입력 저장하여 각각의 회사에 대해 다른 체크리스트를 저장하여 놓을수 있다. 본 시스템은 EDI감사뿐만 아니라 일반 EDP감사분야에도 적용가능할 것이다. 종이를 사용한 감사증적이 없음으로 인해 수작업에 의한 EDI감사는 어려움이 있고 EDP감사시스템분야의 국내 연구가 전무한 실정에서 EDI감사를 지원하는 시스템의 연구는 의의를 갖는다고 생각된다. 본 시스템을 통해서 EDI의 보안 및 감사업무의 효율성이 높아지고 EDI에 대한 위험에 효율적으로 대처할수 있게 될 것이다. 그리고 이러한 보안 및 감사기법과 통제모형을 지식베이스로 구축해서 실제의 위험노출상황에서 가능한 보안을 위한 통제방안이 여러가지가 있는 경우에 비용/편익 분석, 효율성, 회사방침 및 법률적인 문제등을 고려해서 최적의 보안통제 및 감사기법을 선택하는 것을 지원할 수 있을 것이다.고리듬을 개발 함으로써 내부점 선형계획법의 수행속도의 개선에 도움이 될 것이다.성요소들을 제시하였다.용자 만족도가 보다 높은 것으 로 나타났다. 할 수 있는 효율적인 distributed system를 개발하는 것을 제시하였다. 본 논문은 데이타베이스론의 입장에서 아직 정립되어 있지 않은 분산 환경하에서의 관계형 데이타베이스의 데이타관리의 분류체계를 나름대로 정립하였다는데 그 의의가 있다. 또한 이것의 응용은 현재 분산데이타베이스 구축에 있어 나타나는 기술적인 문제점들을 어느정도 보완할 수 있다는 점에서 그 중요성이 있다.ence of a small(IxEpc),hot(Tex> SOK) core which contains two tempegatlue peaks at -15" east and north of MDS. The column density of HCaN is (1-3):n1014cm-2. Column density at distant position from MD5 is larger than that in the (:entral region. We have deduced that this hot-core has a mass of 10sR1 which i:s about an order of magnitude larger those obtained by previous studies.previous studies.업순서들의 상관관계를 고려하여 보다 개선된 해를 구하기 위한 연구가 요구된다. 또한, 준비작업비용을 발생시키는 작업장의 작업순서결정에 대해서도 연구를 행하여, 보완작업비용과 준비비용을 고려한 GMMAL 작업순서문제를 해결하기 위한 연구가 수행되어야 할 것이다.로 이루어

  • PDF

Priority Analysis of Information Security Policy in the ICT Convergence Industry in South Korea Using Cross-Impact Analysis (교차영향분석을 이용한 국내 ICT 융합산업의 정보보호정책 우선순위 분석)

  • Lee, Dong-Hee;Jun, Hyo-Jung;Kim, Tae-Sung
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.3
    • /
    • pp.695-706
    • /
    • 2018
  • In recent years, industrial convergence centered on ICBM (internet of things (IoT), cloud, big data, mobile) has been experiencing rapid development in various fields such as agriculture and the financial industry. In order to prepare for cyber threats, one of the biggest problems facing the convergence industry in the future, the development of the industry must proceed in tandem with a framework of information security. In this study, we analyze the details of the current industrial development policy and related information protection policies using cross impact analysis and present policy priorities through the expert questionnaire. The aim of the study was to clarify the priorities and interrelationships within information security policy as a first step in suggesting effective policy direction. As a result, all six information security policy tasks derived from this study belong to key drivers. Considering the importance of policies, policies such as improving the constitution of the security industry and strengthening of support, training of information protection talent, and investing in the information security industry need to be implemented relatively first.

A Study on the Partnership of the Japanese Police and Private Security (일본 경찰과 민간의 협력에 관한 연구)

  • Ahn, Hwang Kwon;Ahn, Chung Joon
    • Convergence Security Journal
    • /
    • v.12 no.5
    • /
    • pp.61-70
    • /
    • 2012
  • The security law and security industry of Japan have a great impact on Korea. In a modern sense, there are little large disparities between the two nations in the history and development of private security. However, the way they look at private security is not the same in large part. In Japan, private security companies are highly regarded by Japanese people as organizations that guarantee their safety, owing to the efforts of private security companies themselves, the National Security Association and civic groups. Private security has especially been approved and supported since it was decided in the anticrime cabinet council in December, 2003, in line with the action plan for the realization of anticrime society to boost private security as an industry to ensure people's safety in daily routine life by curbing crimes that might pose a threat to peaceful life. Afterwards, there has been a dynamic collaboration between the Japanese police and private security in terms of education, crime prevention, disaster prevention/restoration and everyday life safety. As for Korea, the necessity of cooperation between private security and the police is increasingly stressed, and it's required to strengthen their partnership to ensure successful crime prevention in consideration of Japanese partnership cases. In Japan, the police, civic groups, the security association and security companies make every effort to satisfy Japanese people's safety needs in diverse ways and take disaster-prevention measures as well.

A Design of Authentication Method for Secure Communication based on Wearable Device (웨어러블 디바이스 기반의 안전한 통신을 위한 인증기법 설계)

  • Park, Jung-Oh
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.16 no.4
    • /
    • pp.41-46
    • /
    • 2016
  • Recently, many domestic and foreign corporates are concentrating in investment to wearable devices and users are provided with various service based on wearable devices 26% more than compared to last year. It is widely used in previous healthcare, smart work, smart home environment, and it is now introduced to get connection to fused service environment. However, as products of G company are commercialized, the security issue of personal information is causing dispute in society, and the danger of data management and security regarding telecommunication is increasing. Also, because the password system used in previous wireless environment is still in use, there are possible vulnerability considering the new and mutant security threat. This thesis conducted study about protocols that can exercise safe telecommunication in the basis of wearable devices. In the registration and certification process, the signature value is created based on the code value. The telecommunication method is designed to conduct safe telecommunication based on the signature value. As for the attack method occurring in the wearable device environment, the safety was analyzed and conducted performance evaluation of previous password system and proposal system, and verified about 14% of efficiency.

The Improving Method of Facial Recognition Using the Genetic Algorithm (유전자 알고리즘에 의한 얼굴인식성능의 향상 방안)

  • Bae, Kyoung-Yul
    • Journal of Intelligence and Information Systems
    • /
    • v.11 no.1
    • /
    • pp.95-105
    • /
    • 2005
  • As the security system using facial recognition, the recognition performance depends on the environments (e. g. face expression, hair style, age and make-up etc.) For the revision of easily changeable environment, it's generally used to set up the threshold, replace the face image which covers the threshold into images already registered, and update the face images additionally. However, this usage has the weakness of inaccuracy matching results or can easily active by analogous face images. So, we propose the genetic algorithm which absorbs greatly the facial similarity degree and the recognition target variety, and has excellence studying capacity to avoid registering inaccuracy. We experimented variable and similar face images (each 30 face images per one, total 300 images) and performed inherent face images based on ingredient analysis as face recognition technique. The proposed method resulted in not only the recognition improvement of a dominant gene but also decreasing the reaction rate to a recessive gene.

  • PDF

The Factors Affecting Acceptance of Mobile App Service : Using Extending UTAUT for Real Estate Service (모바일 앱 서비스에 대한 서비스 수용 : 부동산 중개서비스에 대한 확장된 UTAUT모형 시각에서의 접근)

  • Park, Yoonjoo;Choe, Yoowha
    • The Journal of the Convergence on Culture Technology
    • /
    • v.6 no.3
    • /
    • pp.327-334
    • /
    • 2020
  • Recently, mobile and smart devices are rapidly spreading. As a result, real estate services, which were formerly face-to-face, have now been replaced by mobile environments. This study focuses on the real estate app service and 261 samples were used for the empirical analysis. The results of the hypotheses test using structural equation model are summarized as follows. First, performance expectancy, facilitating conditions, security and aesthetic perceived by users of real estate services have positively influence on positive attitude, but effort expectancy and social influence do not. Second, positive attitude of real estate services have positive effects on service Acceptance. Third, involvement moderated the relationship between positive attitude and service Acceptance. Based on the results of the analysis, it provided meaningful implications for practitioners and researchers in related fields.

A Change of Private Security Labor Market and Countermeasures by Population Aging (인구고령화에 따른 민간경비 노동시장 변화와 대응방안)

  • Park, Su Hyeon;Bae, Du Yeol
    • Convergence Security Journal
    • /
    • v.15 no.1
    • /
    • pp.11-18
    • /
    • 2015
  • Our country is a nation accomplished the economic growth and democracy at the same time on the bases of human capitals. However, the laborers as human capitals are aging as well due to the population aging. These aging phenomena are impacting on our country's economy, society, and through the culture. It seems to increase the proportion of the elderly in the labor market of private security caused by continuously increasing the number of elderly employees in long-term trend and their preferences for the security services. These changes of labor market trend may result various problems including relevant laws and systems, the changes of laborers' ability, increase of crimes and so on. To prevent such potential problems, firstly the limits of maximum working hours of elderly private guards have to be set up, and the rest times for them must be secured. Furthermore, the declines of elderly laborers' abilities have to be reduced through the systematic educations relevant to their jobs to cover the rapidly declining elderly laborers' physical abilities. Lastly, the increase of crimes should be reduced through the education contents to be able to arouse their attentions by extending the time of job training and informing of criminal cases.

The Study of the electronic Access Service Model for Supply Chain (공급망을 위한 전자적 접근 서비스 모델 연구)

  • Ahn, Kyeongrim;Lee, Suyoun
    • Convergence Security Journal
    • /
    • v.14 no.4
    • /
    • pp.95-100
    • /
    • 2014
  • The trend of business work that is related to supply chain changed into e-business using the electronic document However, the small and medium enterprise organizations still use huge volume of paper document, especially in private sector. Recently, the need for eco-friendly and low cost logistics becomes increasing. For this, it has expanded to exchange or to use e-document rather than the paper or manual processing in supply chain business. Therefore, this paper proposed the electronic access system for supply chain by business process modeling. If it is using the proposed system, it can be saving the exchanged or the scanned document to system, and user can utilize that document on just accessing system whenever they need the document. We believe it might reduce the burden of each organization because they don't need to save large volume data to their system or place. Furthermore, the benefits will effect across the national as well as global.

Private Security of New York State and the Current Insight (뉴욕주의 민간경비제도와 시사점)

  • Ahn, Hwang Kwon
    • Convergence Security Journal
    • /
    • v.17 no.4
    • /
    • pp.79-87
    • /
    • 2017
  • The U.S. security regulation is under the influence of each state's law; however, they are mostly similar. Among many states which has the longest history of security regulation in the U.S., state of New York has been shown security regulation for a long time. The state of New York has been emphasized the importance of security significantly because it is economically, culturally, and internationally important place at the same time. New York's state law of security business includes: 1. private investigators and bail enforcement agents and watch, guard or patrol agencies license law. 2. Security guard act of 1992~,3. Title 19 New York State's code of rules and regulation (NYCRR). The law of New York City's private security could inspire Korean private security law in many ways. First, administration of professional law and variety of licensure could be an inspiration to the Korean security services. Second, there are intimate partnership between police and private security in the U.S. New York police's private security partnership has been started since 1986 by Area Police/Private Security Liaison (APPL program) and there are about 1,300 of security companies participating. This program provides not only the simple partnership but also giving essential information for promoting public safety.