• Title/Summary/Keyword: 사이버 경제

Search Result 214, Processing Time 0.03 seconds

Establishment of Korea National Counter-terrorism System and Development Plan (국가대테러체제의 구축 및 발전방안)

  • Park, Jun-Seok
    • Korean Security Journal
    • /
    • no.42
    • /
    • pp.229-249
    • /
    • 2015
  • As the post-cold war era and globalization go on, national security problems which were not traditional national security problems such as terrorism, crime, environmental disasters, economic crises, cyber-terrorism, diseases, and energy problems threat humanity and nations and demands changes. Also, with the change, the concept of "big government" has emerged as the role of nation expanded. The modern society sees every country change from small government to big government in order to realize the establishment of welfare state. A comprehensive interpretation of security is needed in order to comprehensive protection of citizens beyond outside invasion such as crime, new disaster, terrorism. In Korea, incidents such as Cheonan-Ham, Yeonpeyong-Do, foot-and-mouth disease, Ddos terrorism, pirates hostages, mad cow disease, AI are happening and the humanitarian support for North Korea and the summit of South and North Korea are at a standstill. Also, National emergency management system, comprehensive emergency management center, countrol tower, national security system, cooperation with citizens, establishment of legal and institutional system are needed. The importance of this research is on the reestablishment of new national security and emergency management system according to the comparison between the national security and counter-terrorism system of Korea and that of the United States which is a leading country in this field. Also, the establishment of national emergency management act is needed as a statute for effective function as currently various laws and administrative organizations are dispersed.

  • PDF

A Study on the Space Configuration according to the Operation of Residential Welfare Facilities for the Aged (노인주거복지시설의 운영에 따른 공간구성에 관한 연구)

  • Choi, Yun-Jin
    • Journal of Industrial Convergence
    • /
    • v.17 no.1
    • /
    • pp.7-16
    • /
    • 2019
  • Korea, which became an aging society in 2000, has made transition to an aged society more quickly than expected since late 2017 after 17 years. Despite this trend, the awareness towards elderly housing facilities has not yet been raised across in society. The primary reason is that use of elderly housing facilities has not been promoted due to lack of understanding about the construction and management of the facilities. The housing of the elderly should be considered in terms of not only residential space but also the issues of medical care and continuous care. Therefore, the trend of elderly housing is pursuing the Continuing Care Retirement Community. Thus, this study analyzed the policies of existing elderly housing facilities and existing elderly housing through comparison with policies and housing of foreign countries. Based on the results, the the government intends to present characteristics and direction of suitable housing design of senior citizens' housing facilities through maintenance of UNIT, securing convergence through changes in the use of facilities, and realising the cost of operation, and studying social welfare measures to cope with the increasing number of elderly residents.

A Study on Geospatial Information Role in Digital Twin (디지털트윈에서 공간정보 역할에 관한 연구)

  • Lee, In-Su
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.22 no.3
    • /
    • pp.268-278
    • /
    • 2021
  • Technologies that are leading the fourth industrial revolution, such as the Internet of Things (IoT), big data, artificial intelligence (AI), and cyber-physical systems (CPS) are developing and generalizing. The demand to improve productivity, economy, safety, etc., is spreading in various industrial fields by applying these technologies. Digital twins are attracting attention as an important technology trend to meet demands and is one of the top 10 tasks of the Korean version of the New Deal. In this study, papers, magazines, reports, and other literature were searched using Google. In order to investigate the contribution or role of geospatial information in the digital twin application, the definition of a digital twin, we investigated technology trends of domestic and foreign companies; the components of digital twins required in manufacturing, plants, and smart cities; and the core techniques for driving a digital twin. In addition, the contributing contents of geospatial information were summarized by searching for a sentence or word linked between geospatial-related keywords (i.e., Geospatial Information, Geospatial data, Location, Map, and Geodata and Digital Twin). As a result of the survey, Geospatial information is not only providing a role as a medium connecting objects, things, people, processes, data, and products, but also providing reliable decision-making support, linkage fusion, location information provision, and frameworks. It was found that it can contribute to maximizing the value of utilization of digital twins.

Adaptation Policy of ISO 27001 ISMS (Information Security Management System) for e-Government (전자정부 정보보호관리체계(G-ISMS) 적용 정책)

  • Han, Keun-Hee
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.19 no.5
    • /
    • pp.119-130
    • /
    • 2009
  • Korea ranked 2nd in the UN Global e-Participation Index and ranked number one as the leader in e-Government for the third consecutive year. However, Korea ranked 51 in the level of information security published by WEF(World Economic Forum), relatively a low level comparing with its great number of users and excellent environments for the Internet service. A series of critical hacking accidents such as the information leak at Auction and GS Caltex emerged consecutively in 2008 year, resulting in the leak of personal & critical information. This led to a strong interest in the necessity and importance of information security and personal information so that demand for IT security is growing fast. In this paper, we survey to benchmark information security in the perspective of service level, system, investment and policy about major foreign countries. Then we research on an effective way to make the most of the benchmark result to Korea e-Government. In addition, the purpose of this paper is to improve national information security index by developing a policy for ISO 27001 ISMS, an international standard for Information Security Management System, and elevate safety and security of the e-Government serviced by central administrative organizations and local authorities.

Detecting gold-farmers' group in MMORPG by analyzing connection pattern (연결패턴 정보 분석을 통한 온라인 게임 내 불량사용자 그룹 탐지에 관한 연구)

  • Seo, Dong-Nam;Woo, Ji-Young;Woo, Kyung-Moon;Kim, Chong-Kwon;Kim, Huy-Kang
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.3
    • /
    • pp.585-600
    • /
    • 2012
  • Security issues in online games are increasing as the online game industry grows. Real money trading (RMT) by online game users has become a security issue in several countries including Korea because RMT is related to criminal activities such as money laundering or tax evasion. RMT-related activities are done by professional work forces, namely gold-farmers, and many of them employ the automated program, bot, to gain cyber asset in a quick and efficient way. Online game companies try to prevent the activities of gold-farmers using game bots detection algorithm and block their accounts or IP addresses. However, game bot detection algorithm can detect a part of gold-farmer's network and IP address blocking also can be detoured easily by using the virtual private server or IP spoofing. In this paper, we propose a method to detect gold-farmer groups by analyzing their connection patterns to the online game servers, particularly information on their routing and source locations. We verified that the proposed method can reveal gold-farmers' group effectively by analyzing real data from the famous MMORPG.

Functional Health Status and Medical Service Utilization Pattern of General and Vulnerable Older People in Community (지역사회 일반 및 취약계층 노인의 건강기능상태와 의료서비스 이용 행태)

  • Oh, Doonam;Jeong, Hyoseon;Hwang, Jeonghae
    • The Journal of the Korea Contents Association
    • /
    • v.21 no.6
    • /
    • pp.404-414
    • /
    • 2021
  • This study was to investigate the differences of functional health status and medical service experience and needs between general and vulnerable older people in community. This study is a cross-sectional descriptive research. The data obtained through direct visit surveys from November to December 2016. The target population of the study was older people over 65 years old, the final study subjects were 444 older people residing in one district of Seoul. The chi-square test was conducted to confirm the difference in their functional health areas and medical service experiences, and the necessity of medical service utilization in accordance to the social class. In the experience of abnormality in functional health, the vulnerable older people had higher experience in cognitive function, nutrition, hydration, pain, and falling than the general older people. The rate of experience of using medical service to solve the cognitive function problem for general older people was 31.9%, higher than that of the vulnerable older people. In contrast, the medical service utilization needs of the vulnerable older people in the pain management category was significantly higher than that of the general older people. In setting policy of public medical service programs for general and vulnerable older people in community may be differentially developed based on this study. In order to improve the medical accessibility of the vulnerable older people, public medical institutions should be actively supported to overcome obstacles to medical use due to economic barriers.

A Convergence Study on the Senior Employment Policy and Senior Job Awareness (노인 일자리 정책과 노인 일자리 인식에 관한 융합 연구)

  • Hwang, Hey-Jeong;Lim, Hyo-Nam;Jo, Gee-yong;Jo, Chan-Ju;Kim, Kwang-Hwan
    • Journal of Digital Convergence
    • /
    • v.20 no.5
    • /
    • pp.695-702
    • /
    • 2022
  • The purpose of this study was conducted with suggesting a clue to improve the perception of jobs for the elderly, and the final study subject was 110 people. As a research methods were student t-test, ⲭ2-test, one-way ANOVA(Scheffe). The result of the study are as follows. The perception and economic status of the young elderly(65-74 years old) were significantly higher. The perception of public jobs was significantly higher when married, religious, and monthly income was more than 4 million won. The perception of social service-type jobs was significantly higher when married and when there was a religion. The perception of private jobs was high when the monthly income was more than 4 million won (p<0.05). The preference for "parking order service" in the public sector, "support for elderly facilities" in the social service sector, and "fast food restaurant employees, kitchen, restaurant assistants, and food delivery service workers" in the private sector was the highest. In conclusion, there is a need for an education program to improve the perception of jobs for the elderly in order to raise the awareness of job policies for the elderly, which decrease with age. It is expected to be used as basic data for job creation and job creation that can be done according to the age of the elderly.

Analysis of Educational Needs by Adult Life Cycle for Well-aging Education Program Development (웰에이징 교육 프로그램 개발을 위한 성인 생애주기별 교육 요구도 분석)

  • Ku, Jin-Hee;Lim, HyoNam;Kim, Doo-Ree;Kang, Kyung-hee;Kim, Seol-Hee;Kim, Yong-Ha;Lee, Chong-Hyung;Ahn, Sang-Yoon;Kim, Kwang-Hwan;Song, Hyeon-Dong;Hwang, Hey-Jeong;Kim, Moon-Joon;Park, A-rma;Jo, Gee-yong;Chang, Kyung-Hee;Cho, Young-Chae
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.22 no.5
    • /
    • pp.257-269
    • /
    • 2021
  • This study aimed to secure basic data for the development and operation of well-aging education programs by analyzing the physical, mental, and socio-economic needs of well-aging education for successful aging. The research tool was developed as a questionnaire to investigate the perception of well aging and the needs of well-aging education in terms of physical, mental, and socio-economic aspects. In February 2021, 1949 adults over the age of 19 were surveyed through an online and mobile survey by Gallup Korea. Descriptive statistics analysis, variance analysis, Borich needs analysis, and IPA analysis were conducted to analyze the needs of well-aging education. The results revealed economic power, exercise, and chronic disease management to be high in terms of the overall priority of the education needs for well-aging, and infectious disease management, independence, and social responsibility were surveyed in the order of low education needs. In terms of economic power, education needs were highest among all age groups except for the middle-age group (35-49 years old), 82.4% of all respondents, and education needs for exercise and chronic disease management were highest in the middle-age group. Therefore, it is necessary to develop well-aging education programs for each life cycle. These results are expected to be used as empirical data in establishing a platform for developing and operating educational programs for well aging.

Design of Comprehensive Security Vulnerability Analysis System through Efficient Inspection Method according to Necessity of Upgrading System Vulnerability (시스템 취약점 개선의 필요성에 따른 효율적인 점검 방법을 통한 종합 보안 취약성 분석 시스템 설계)

  • Min, So-Yeon;Jung, Chan-Suk;Lee, Kwang-Hyong;Cho, Eun-Sook;Yoon, Tae-Bok;You, Seung-Ho
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.18 no.7
    • /
    • pp.1-8
    • /
    • 2017
  • As the IT environment becomes more sophisticated, various threats and their associated serious risks are increasing. Threats such as DDoS attacks, malware, worms, and APT attacks can be a very serious risk to enterprises and must be efficiently managed in a timely manner. Therefore, the government has designated the important system as the main information communication infrastructure in consideration of the impact on the national security and the economic society according to the 'Information and Communication Infrastructure Protection Act', which, in particular, protects the main information communication infrastructure from cyber infringement. In addition, it conducts management supervision such as analysis and evaluation of vulnerability, establishment of protection measures, implementation of protection measures, and distribution of technology guides. Even now, security consulting is proceeding on the basis of 'Guidance for Evaluation of Technical Vulnerability Analysis of Major IT Infrastructure Facilities'. There are neglected inspection items in the applied items, and the vulnerability of APT attack, malicious code, and risk are present issues that are neglected. In order to eliminate the actual security risk, the security manager has arranged the inspection and ordered the special company. In other words, it is difficult to check against current hacking or vulnerability through current system vulnerability checking method. In this paper, we propose an efficient method for extracting diagnostic data regarding the necessity of upgrading system vulnerability check, a check item that does not reflect recent trends, a technical check case for latest intrusion technique, a related study on security threats and requirements. Based on this, we investigate the security vulnerability management system and vulnerability list of domestic and foreign countries, propose effective security vulnerability management system, and propose further study to improve overseas vulnerability diagnosis items so that they can be related to domestic vulnerability items.

Multi-dimensional Security Threats and Holistic Security - Understanding of fusion-phenomenon of national security and criminal justice in post-modern society - (다차원 안보위협과 융합 안보)

  • Yun, Min-Woo;Kim, Eun-Young
    • Korean Security Journal
    • /
    • no.31
    • /
    • pp.157-185
    • /
    • 2012
  • Today, the emergence of cyberspace and advancement of globalization caused not only the transformation of our productive and conventional life but also the revolutionary transition of use of destructive violence such as crime and warfare. This transition of environmental condition connects various security threats which separatedly existed in individual, local, national, and global levels in the past, and transformed the mechanical sum of all levels of security threats into the organic sum of multi-dimensional security threats. This article proposes that the sum of multi-dimensional security threats is caused by the interconnectivity of various different levels of security threats and the integrated interdisciplinary perspective is essential to properly understand the fundamental existence of today's security problem and the reality of fear that we face today. The holistic security, the concept proposed here, is to suggest the mode of networked response to multi-dimensional security threats. The holistic security is suggested to overcome the conventional divisional approach based on the principle of "division of labor" and bureaucratic principles, which means more concretely that national security and criminal justice are divided and intelligence, military, police, prosecution, fire-fighting, private security, and etc. are strictly separated into its own expertise and turf. Also, this article introduces integrated security approaches tried by international organization and major countries overseas with the respect of the holistic security. The author have spent some substantial experience of participant observation, meetings, seminar, conference, and expert interviews regarding the issues discussed in the article in various countries including the United States, Russia, Austria, Germany, Canada, Mexico, Israel, and Uzbekistan for the last ten years. Intelligence and information on various levels of security threats and security approaches introduced in this paper is obtained from such opportunities.

  • PDF