• Title/Summary/Keyword: 정보보호산업

Search Result 1,278, Processing Time 0.028 seconds

Research Trends Analysis of Domestic Carrier Billing Services using Meta-Analysis (메타분석을 활용한 국내 통신과금 서비스 연구동향 분석)

  • Yoo, Soonduck;Kim, Jungihl
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.16 no.2
    • /
    • pp.71-85
    • /
    • 2016
  • The purpose of this research is to study technical and policy improvements of carrier billing services, which are a developing and growing industry, by adopting a meta-analysis method. Implications were derived from studying 15 years-worth of academic research papers (from 2001 to 2015), by analyzing the trends over a total of 109 such research papers on carrier billing services. First, looking at the characteristics of the main studies of the papers from 2008 to 2009, it papers appeared that dealt with preventing fraudulent transactions and preserving consumer protection. Privacy, policy proposals and studies for new systems were researched from 2010-2012. Service, success factors, damage prevention systems research, law, and institutions were discussed in 2013-2015 mainly. Second, the research showed that the number of carrier billing service studies increased due to social issues(telecommunications billing services deregulation, the emergence smartphones, fraud). Third, in sectorial research results, technology was the focus area of 47 papers (43.1%), the service sector was the focus of 39 pieces (35.8%) and law and policy improvement accounted for 23 pieces (21.1%). The study of technology and service areas was the most active and according to changes in the environment, law and policy improvement were second to most active. This study will contribute to improving relevant institutions and research directions about study trends in carrier billing services.

A Study on the infringement of privacy of unmanned aircraft : Focusing on the analysis of legislation and US policy (무인항공기의 사생활 침해에 대한 법적 대응 : 미국 정책.입법안 분석을 중심으로)

  • Kim, Sun-Ihee
    • The Korean Journal of Air & Space Law and Policy
    • /
    • v.29 no.2
    • /
    • pp.135-161
    • /
    • 2014
  • An unmanned aerial vehicle (UAV), commonly known as a drone and also referred to as an unpiloted aerial vehicle and a remotely piloted aircraft (RPA) by the International Civil Aviation Organization (ICAO), is an aircraft without a human pilot aboard. ICAO classify unmanned aircraft into two types under Circular 328 AN/190. Unmanned aircraft, which is the core of the development of the aviation industry. However, there are also elements of the legal dispute. Unmanned aircraft are manufactured in small size, it is possible to shoot a record peripheral routes stored in high-performance cameras and sensors without the consent of the citizens, there is a risk of invasion of privacy. In addition, the occurrence of the people of invasion of privacy is expected to use of civilian unmanned aircraft. If the exposure of private life that people did not want for unmanned aircraft has occurred, may occur liability to the operator of unmanned aircraft, this is a factor to be taken into account for the development of unmanned aircraft industry. In the United States, which is currently led by the unmanned aircraft industry, policy related to unmanned aircraft, invasion of privacy is under development, is preparing an efficient measures making. Unmanned aircraft special law has not been enforced. So there is a need for legal measures based on infringement of privacy by the unmanned aircraft. US was presented Privacy Protection Act of unmanned aircraft (draft). However Korea has many laws have been enacted, to enact a new law, but will be able to harm the legal stability, there is a need for the enactment of laws for public safety of life. Although in force Personal Information Protection Law, unmanned aerospace, when the invasion of privacy occurs, it is difficult to apply the Personal Information Protection Law. So, it was presented a privacy protection bill with infringement of privacy of unmanned aircraft in the reference US legislation and the Personal Information Protection Act.

The Relationship between R&D Policies' Importance Perception and Business Performance (연구개발 정책의 중요도 평가와 기업의 경영성과와의 관계)

  • Kim, Soo-Hyun;Lee, Sang-Kyu
    • The Journal of the Korea Contents Association
    • /
    • v.18 no.10
    • /
    • pp.498-506
    • /
    • 2018
  • Considering that firms' view on R&D activities may differ depending on the economic situation, in this paper, R&D policies that significantly affect the business performance are identified. The analysis is conducted by dividing the analysis time-frame into before and after the economic recession. In addition, we analyze by considering the type of industry, the proportion of R&D investment, and the type of government support policy that the companies participate in. According to the results of the empirical analysis, the provision of global market and technology information is recognized to give a significant impact on business performance for both before and after the economic recession. It is shown that recognizing the importance of 'supporting self-technology development', 'enhancing technical cooperation with foreign countries', and 'enhancing the contract and intellectual property protection system' that had significant effects before the recession did not significantly affect the business performance after the recession. The analysis results could give meaningful implications to the government for deciding which R&D activities should be supported.

The Study on the Diversity of Cooperation Partners and Innovation Performance: Focusing on the Moderating Effect of Absorptive Capacity and Appropriability (기술협력 파트너 다양성과 혁신성과에 대한 연구: 흡수역량 및 전유성의 조절효과를 중심으로)

  • Kim, Hyeon Chang;Bae, Young Im
    • Journal of Technology Innovation
    • /
    • v.25 no.2
    • /
    • pp.57-87
    • /
    • 2017
  • This study analyzes whether cooperating with various types of partners contributes to a company's innovation performance as well as the moderating effect of absorptive capacity and appropriability that may affect learning in such relationship. The hypothesis is that cooperating with diverse partners will have a positive effect on the innovation performance since it acquires their knowledge and information. In addition, an analysis is conducted on the moderating effect of absorptive capacity and appropriability on the relationship between alliance portfolio consisting various partners and innovation since absorptive capacity that encourages learning is likely to positively moderate the relationship between partner diversity and innovation while appropriability, the capacity to protect the proprietary technology, is likely to undermine learning from partners. The result of the empirical analysis on Korea's key industries, machinery and automobile, using the 2010 Korea Innovation Survey(KIS) data on manufacturing shows that cooperating with various types of technology partners has a positive effect on innovation performance and moderating effect on appropriability.

A Study on the countermeasures and drones's threats in Military security (군보안상 드론위협과 대응방안)

  • Kim, Doo-hwan;Lee, Youn-hwan
    • Journal of Digital Convergence
    • /
    • v.16 no.10
    • /
    • pp.223-233
    • /
    • 2018
  • The forces to protect people's life and property against the enemy attack is an organization which is regulated by the constitutional law. In terms of nature, its security is a significant factor to determine success or failure for the war. However, recently the 4th industrial revolution represents the rapid change in the advancement of civilization and technology. It can influence on the environment of military security which can make various changes. Unless taking proper action againsty these changes, it can inflict a vital harm for the organization of forces and its internal security. In this aspect, this study discuss new threats of the military security, above all, the most technical improvements and harms for the drones in terms of security. In addition, the advantages and disadvantages of drones which can influence on the ragions of military command and control, information operations, maneuvers, firepower, operation sustainment supports are analyzed. Moreover, this study set the purpose of developmental security measure for security threats in the aspects of military security.

A Study on Establishing of the Future Development Strategy for National Cyber Terror Response (국가 사이버테러대응 미래 발전전략 수립에 관한 연구)

  • Kim, MinSu;Yang, Jeongmo
    • Convergence Security Journal
    • /
    • v.20 no.1
    • /
    • pp.15-24
    • /
    • 2020
  • Cyber terror and cyberwarfare are no longer virtual, but real, and as an actual security situation, it is necessary to have new understanding through expanding the concept of war to neutralize not only the other country's military command system, but also the country's main functions such as telecommunications, energy, finance, and transport systems, and it also needs to establish the future development strategy of cyber terror response at the national level. Through analysis of cyberwarfare trends in each country and current status of cyberwarfare in Korea, it will systematically explore the demand of new policy based on laws and systems, including the strategies of cyber security technology development, industry promotion, and manpower training and existing information protection policies. through this, it effectively manages a sustainable national crisis, and it suggests to establish a future strategy for the medium and long term cyber security that can effectively and actively respond to cyberwarfare.

A Study on Improvement of Safety Management in Subcontractor through Process Safety Management (공정안전관리를 통한 도급업체 안전관리 강화에 관한 연구)

  • Lee, Joo Yeob;Lee, Keun Won;Kim, Kyu-Jung;Kim, Tae-Ok
    • Journal of the Korean Institute of Gas
    • /
    • v.19 no.4
    • /
    • pp.15-21
    • /
    • 2015
  • Looking at the large and small fire, explosion, or release accidents that occurred recently, we can see that the accident of subcontractor workers has been increased in the contractor workplace while a harmful or dangerous maintenance works. In this study, the actual status of subcontractor's safety management was examined by using the questionnaire to the contractor who submitted the process safety report. In order to improve the safety management of subcontractors, the responsibility and rational role-sharing between the contractors and subcontractors were reviewed. Also, Providing safety and health information and worker protection measures during maintenance were investigated. The results of this study can be used to help strengthen and improvement safety management of the subcontractor at the time of a hazardous or dangerous works. In addition, it will be utilized to reduce industrial accidents and to build mutual cooperation relationship between contractor and subcontractor.

Smart Vehicle Security Vulnerability Analysis and Solution Support (스마트 자동차 네트워크의 보안취약점 분석 및 해결방안 마련)

  • Kim, Jin-Mook;Moon, Jeong-Kyung;Hwang, Deuk-Young
    • Convergence Security Journal
    • /
    • v.18 no.3
    • /
    • pp.69-76
    • /
    • 2018
  • One of the most remarkable technologies in the era of the 4th industrial revolution is the interest in the field of smart cars. In the near future, it will not only be possible to move to a place where you want to ride a smart car, but smart cars, including artificial intelligence elements, can avoid sudden car accidents. However, as the field of smart automobiles develops, the risks are expected to increase. Therefore, based on the understanding of security vulnerabilities that may occur in smart car networks, we can apply safe information security technology using FIDO and attribute-based authorization delegation technique to provide smart car control technology that is safe and secure. I want to. In this paper, we show that the proposed method can solve security vulnerabilities by using secure smart car control technology. We will further study various proposals to solve security vulnerabilities in the field of smart car networks through future research.

  • PDF

A Case Study on the Establishment of Cloud Management System in Data Centers: Focusing onG-Cloud Application Case (데이터센터 클라우드관리시스템 구축 사례 연구 : G-Cloud 적용사례 중심으로)

  • Jang, Hee-Don;Kim, Seung-Cheon
    • Journal of Convergence for Information Technology
    • /
    • v.9 no.9
    • /
    • pp.33-37
    • /
    • 2019
  • According to the enforcement of the Cloud Computing Development and User Protection Act, a new paradigm called as Cloud Computing is coming to the fore among public and private domestic enterprises. Therefore, domestic companies should develop SaaS products specialized for the domestic market and try to preempt the IaaS market ahead of global companies. Now we are facing a necessity to combine all the cloud systems in Korean government to operate seamlessly in a harmony. In this paper, we will look at the prospect of future development of related industry through cloud computing concept and G-cloud's cloud management system (G-CMS). G-CMS can be seen as the first system to comprehensively manage heterogeneous Unix virtualization systems. G-CMS can also save costs by managing heterogeneous virtualization systems in data centers.

Intrinsic and Extrinsic Factors Affecting Use of Sharing Economy Services and the Moderating Effect of Benefits (공유경제 서비스 사용에 영향을 미치는 사용자의 내외적 요인과 이익의 조절효과)

  • Kim, Sanghyun;Park, Hyunsun;Lim, Jeongtaek
    • The Journal of the Korea Contents Association
    • /
    • v.20 no.12
    • /
    • pp.482-491
    • /
    • 2020
  • This study proposed a research model based on self-determination theory and unified theory of acceptance and use of technology to explain the factors influencing intention to use sharing economy services. A total of 392 responses were collected, and structural equation analysis was performed with AMOS 22.0. The results are summarized as follows. First, self-technological aptness and trust had a positive effect on intention to use sharing economy services. Second, access bigger market and environmental friendliness had a positive effect on intention to use sharing economy services. Third, intention to use sharing economy services had a positive effect on actual usage of sharing economy services. Finally, benefits was found to strengthen the relationship between intention to use sharing economy services and actual usage of sharing economy services. The findings of this study would provide a theoretical framework for sharing economy services and important information for understanding individuals using the sharing economy services.