• Title/Summary/Keyword: 첨단 보안

Search Result 147, Processing Time 0.038 seconds

A study on the improvements of law for industrial technology outflow prevention : Focusing on international M&A (해외 M&A시 산업기술 유출 방지를 위한 법 개선 연구)

  • Kim, Seong-Jun;Kim, Woo-Hyun;Yi, Yeong-Seo
    • Korean Security Journal
    • /
    • no.29
    • /
    • pp.7-34
    • /
    • 2011
  • Achieving high-level technology in fields such as IT-related industry, semiconductors, mobile phones, LCD, automobile, shipbuilding, etc., Korea has become an international market leader in those fields. In results, there are the increasing numbers of technology leakage attempts in various manners. Recently, technology leakages are not limited to illegal industrial espionage, but also occur during usual corporate proceedings such as technology transfer, joint research and M&A. In fact, there was a technology leakage issue in the M&A between Ssangyong Motors of Korea and Shanghai Motors of China. Current M&A regulations of Korea are not independent laws, but are spread over various laws, such as commercial law, Capital Markets and the Financial Investment Services Act, Foreign Trade Act, etc. This paper focuses on whether the current Korean regulations regarding M&A are able to effectively restrict the leakage of major information of corporate during M&A and seeks the complements.

  • PDF

Crowd Behavior Detection using Convolutional Neural Network (컨볼루션 뉴럴 네트워크를 이용한 군중 행동 감지)

  • Ullah, Waseem;Ullah, Fath U Min;Baik, Sung Wook;Lee, Mi Young
    • The Journal of Korean Institute of Next Generation Computing
    • /
    • v.15 no.6
    • /
    • pp.7-14
    • /
    • 2019
  • The automatic monitoring and detection of crowd behavior in the surveillance videos has obtained significant attention in the field of computer vision due to its vast applications such as security, safety and protection of assets etc. Also, the field of crowd analysis is growing upwards in the research community. For this purpose, it is very necessary to detect and analyze the crowd behavior. In this paper, we proposed a deep learning-based method which detects abnormal activities in surveillance cameras installed in a smart city. A fine-tuned VGG-16 model is trained on publicly available benchmark crowd dataset and is tested on real-time streaming. The CCTV camera captures the video stream, when abnormal activity is detected, an alert is generated and is sent to the nearest police station to take immediate action before further loss. We experimentally have proven that the proposed method outperforms over the existing state-of-the-art techniques.

A Study on Improving Plan of the Evaluating System for Efficient Defense M&S Accreditation Work (효율적인 국방M&S 인정업무 수행을 위한 평가시스템 발전방안 연구)

  • Han, Seung-Ho
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.22 no.4
    • /
    • pp.42-48
    • /
    • 2021
  • Recently, the defense industry has been improving high technology by developing convergence technology through the 4th industrial revolution. On the other hand, it is very difficult to guarantee the performance of high-tech weapon systems because the test for weapon systems has many risks and cannot perform in an actual operating environment. Therefore, M&S resources are needed to make sound weapon systems, but many people demand reliable M&S resources. Owing to the continuous demand and execution of the VV&A work, related rules have developed significantly, but tools and techniques for performing the work have not been developed. Hence, there are inefficient parts in the performance of work due to the absence of a systematic system. Accordingly, many risks may cause various safety accidents, such as security. This paper suggests a direction for the development of VV&A work procedures by improving efficiency and reducing risk.

Analysis of Public Sector Sharing Rate based on the IoT Device Classification Methodology (사물인터넷(IoT) 기기 분류 체계 기반 공공분야 점유율 분석)

  • Lee, Hyung-Woo
    • Journal of Internet of Things and Convergence
    • /
    • v.8 no.1
    • /
    • pp.65-72
    • /
    • 2022
  • The Internet of Things (IoT) provides data convergence and sharing functions, and IoT technology is the most fundamental core technology in creating new services by convergence of various cutting-edge technologies. However, there are different classification systems for the Internet of Things, and when it is limited to the domestic public sector, it is difficult to properly grasp the current status of which devices are installed and operated with what share, and systematic data or research The results are very difficult to find. Therefore, in this study, the relevance of the classification system for IoT devices was analyzed according to reality based on sales, shipments, and growth rate, and based on this, the actual share of IoT devices among domestic public institutions was analyzed in detail. The derived detailed analysis results are expected to be efficiently utilized in the process of selecting IoT devices for research and analysis to advance information protection technology such as responding to malicious code attacks on IoT devices, analyzing incidents, and strengthening security vulnerabilities.

Deep Learning-based Approach for Visitor Detection and Path Tracking to Enhance Safety in Indoor Cultural Facilities (실내 문화시설 안전을 위한 딥러닝 기반 방문객 검출 및 동선 추적에 관한 연구)

  • Wonseop Shin;Seungmin, Rho
    • Journal of Platform Technology
    • /
    • v.11 no.4
    • /
    • pp.3-12
    • /
    • 2023
  • In the post-COVID era, the importance of quarantine measures is greatly emphasized, and accordingly, research related to the detection of mask wearing conditions and prevention of other infectious diseases using deep learning is being conducted. However, research on the detection and tracking of visitors to cultural facilities to prevent the spread of diseases is equally important, so research on this should be conducted. In this paper, a convolutional neural network-based object detection model is trained through transfer learning using a pre-collected dataset. The weights of the trained detection model are then applied to a multi-object tracking model to monitor visitors. The visitor detection model demonstrates results with a precision of 96.3%, recall of 85.2%, and an F1-score of 90.4%. Quantitative results of the tracking model include a MOTA (Multiple Object Tracking Accuracy) of 65.6%, IDF1 (ID F1 Score) of 68.3%, and HOTA (Higher Order Tracking Accuracy) of 57.2%. Furthermore, a qualitative comparison with other multi-object tracking models showcased superior results for the model proposed in this paper. The research of this paper can be applied to the hygiene systems within cultural facilities in the post-COVID era.

  • PDF

Improving the Efficiency of National Defense Transportation Information System by using ITS (ITS를 활용한 국방수송정보체계 효율성 증진에 관한 연구)

  • O, Byeong-Eun;Kim, Hyeong-Jin;Son, Bong-Su
    • Journal of Korean Society of Transportation
    • /
    • v.24 no.1 s.87
    • /
    • pp.85-94
    • /
    • 2006
  • Currently, when the military performs military operations in wartime and peace time, it is important for him to obtain repeatedly updated traffic information for security of the military supply support. The purpose of this study is to present an acquisition way of the repeatedly updated traffic information which the military is available. To achieve this Purpose, firstly, this paper finded types of traffic information which the military demanded and limitations caused by an connection of traffic information network between the military and associated government agencies. Also. grasped ITS(Intelligent Transportation systems) equipment operation by associated government agencies (Ministry Construction & Transportation, Korea Highway Corporation, Seoul Metropolitan Government, National Police Agency, Korea Institute of Construction Technology) and connection situations of traffic information network among associated government agencies. On the basis of these materials, this study presented the most efficient connection method in the field of the space and the contents of traffic information between the military and associated government agencies and ITS connection system between the military and associated government agencies was contrived. Throughout the upper processes, this paper showed a method which is available for acquiring ITS traffic information of associated government agencies. In addition to the connection method of ITS traffic information network, resolutions for the problems caused by connection of ITS network were come up with. But the more deep study for this matter is needed since resolutions for the problems of the ITS network connection, which this paper presented, were very restricted.

A Study on the Review and Countermeasure for 2010 Amended Convention of the STCW (2010년 STCW 개정협약의 주요 내용과 교육계의 대응)

  • Youn, Myung-Ou;Seong, Yu-Chang
    • Journal of the Korean Society of Marine Environment & Safety
    • /
    • v.16 no.3
    • /
    • pp.295-300
    • /
    • 2010
  • The international convention on standards of training, certification and watch-keeping for seafarers, 1978(1978 STCW convention) has been established as a minimum standard and competence of seafarers, and contributed to reduce marine accidents caused by human errors. The convention has been partly amended several times according to environmental change of ship's operation and there were comprehensive revisions in so called 1995 amended STCW convention. In these years, ships are in tendency of increasing size and speed, and also adopted high technologies. These kinds of changes brought STW sub-committee up for discussions to modify the convention to cope with new environments from the year of 2006. As the result, major amendaments to STCW convention have been adopted at a diplomatic conference in Manila, Philippine in June 2010, thereby new global standards will be in force to train and certify seafarers to operate technologically advanced ships before long. This paper is to introduce major amendaments such as ship's security, ECDIS and leadership etc. in this Manila amendments and to clarify some articles to be adopted in programs for education and training of seafarers in Korea.

The Use of the Movie 'The Island' for Nursing Informatics in Nursing Students (간호정보학 이해를 위한 영화 'The Island' 활용)

  • Oh, Jina;Shin, Hyewon;De Gagne, Jennie C.
    • The Journal of the Korea Contents Association
    • /
    • v.15 no.4
    • /
    • pp.330-341
    • /
    • 2015
  • The purpose of this study was to examine the effect of the film 'The Island' on 2nd year nursing students' nursing informatics (NI) competency. The participants were sixty-eight students in a baccalaureate nursing program of a private university, taking the course, 'Nursing & Informatics' in the 2012 fall semester. Over the 15 weeks, the film was used for five weeks as introduction to NI, peer-to-group discussions, and self-reflection on lessons learned regarding NI. A qualitative content analysis was used to explore the students' experiences and perceptions on their NI competency. As a result, students signified the NI concept as the assessment of biometrics data, promotion of optimal health with the support of various technologies, and integration of patient-centered care into routine practice. They also highlighted the importance of security and safety measures as well as high quality health technology including the ubiquitous health monitoring system. Overall, the lesson outcomes of the course were met. As a supportive, instructional strategy, the use of the movie, 'The Island', was effective for nursing students in achieving NI competencies. Further study is warranted to determine if movies can be used as a means of continuing education to improve informatics competences in healthcare professionals.

A Study of the Future Terrorism : Its Patterns and Perspectives (미래 국제 테러 유형과 전망에 관한 연구)

  • Choi, Jin-Tai
    • Korean Security Journal
    • /
    • no.15
    • /
    • pp.337-358
    • /
    • 2008
  • With the Japanese attacks on Pearl Harbor in 1941, approximately 2,500 people were killed. The terrorist attack on World Trade Center in the United States resulted in the heavy loss of people's lives, 2,749 in all. The 9.11 demonstrated that terrorist attack could be more serious problem than the war in our modern life. In addition, terrorist armed with new and high technologies have become more dangerous elements to the international community. Especially, the fact that the weapons of mass destruction are used by terrorist organizations is a matter of great concern. The strength of terrorist arsenal gives terrorist a decided advantage over us. The chances of success for terrorist have been increased due to the terrorist friendly environments. Terrorism has evolved without stopping from its birth, which is imposing a great burden on the authorities concerned. The counter-terrorism strategy and tactics used in the past have been useless in the fighting against new terrorism. To cope with the fast changing terrorism, comprehensive countermeasures should be developed. The purpose of this study is to know the enemy. To achieve the goal, the current situation on international terrorism as a whole is examined. Based on the result of the research, this paper also tried to give a perspectives on the future terrorism. At the same time, it provides a guidelines of the direction in the fighting against terrorism.

  • PDF

The information process on labor and the protection of information human rights (노동정보처리와 정보인권보호)

  • 하우영
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.13 no.6
    • /
    • pp.17-32
    • /
    • 2003
  • The information drive of the businesses requires new alternatives in that the promotion of business efficiency through information process technologies ends up conflicting with the protection of information human rights on laborers' side. Nevertheless, apathy on information protection has a tendency to be distorted by the efficiency of the businesses. Should the capital and mass media warn economic red lights, political circles with uneasiness would ignore the significance of information protection on the behalf of business efficiency. Therefore, the importance of information protection is considered a smaller interest than that of business efficiency with the infringements of human rights on laborers' side arising. Informatization of the businesses along with the developments of information process technologies has enabled the management to monitor and control the behaviors of laborers. This new problem needs to establish both information protection mechanism and institutional devices to regulate those labor controls. The security of business activity without human rights infringement warrants both basic rights of the public and spirit of the Constitution. The study suggests the establishment and revision of laws suitable to the period of information human rights. On top of that, the establishment of the basic law for information protection of individuals' with the common principle that integrates the related laws and rules on-off line is needed. This will warrant the active participation of labor unions and create specific alternatives for information protection.