• Title/Summary/Keyword: Administrative Security

Search Result 289, Processing Time 0.026 seconds

Development of Regional Balanced Index for Administrative Districts and Dongs in Seoul using Factor Analysis (요인분석을 활용한 서울시 자치구/행정동의 지역균형지수 개발)

  • Kim, Dong-geun;Park, Kwiwon;Ha, Somi;Kim, Dohyun
    • Journal of Korean Society for Quality Management
    • /
    • v.49 no.3
    • /
    • pp.375-392
    • /
    • 2021
  • Purpose: Regional gaps and conflicts between regions due to Korea's economic development and industrialization have become important issues, and the issue of balanced regional development at regional level has been discussed as the size of the region has increased recently. Although evaluation of regional balance was attempted through various regional balanced development indexes, it is inappropriate as a standard for determining regional balance in Seoul. Therefore, this study aims to develop objective evaluation methodologies and evaluation indicators for balanced development of administrative districts in Seoul, not existing city and national units. Methods: We looked at existing regional balanced development indexes, and suggested a new regional balanced index reflecting regional development, backwardness, and spatial characteristics in Seoul using factor analysis. Results: As a result of factor analysis, the regional balanced development index for administrative districts and administrative dongs consists of two factors (regional revitalization, financial power) and three factors (commercial density, social security demand, regional retardness), respectively. Then the regional balanced development index scores for 116 administrative districts and 423 administrative dongs are calculated by multiplying each factor by a weight obtained through experts' survey. Conclusion: The proposed regional balanced development index can be used as an objective and quantitative basis for regional balanced development within a city. Further research may include continuously adding new indicators that reflect the direction and scale of development.

A Study on the Supply Chain Security Program (수출입 공급망 안전 프로그램에 관한 연구)

  • Han, Byoung Wan
    • THE INTERNATIONAL COMMERCE & LAW REVIEW
    • /
    • v.58
    • /
    • pp.287-311
    • /
    • 2013
  • In this study, the scope of previous logistics security were focused only on port and ship. Because of it now extends to the overall (export and import) supply chain areas and in regards with supply security programs in the international level, it reviewed supply chain security programs categorized them into 'ships and port security system', 'container screening system', 'logistics chain authorization system' which are expanded to be adopted in the international level. The major features of those programs are summarized as in building risk management system, providing information ahead, selectivity test and benefits to AEO authorized companies in the customs administration level. The government and companies which are to ensure supply chain security and trade facilitation in order to cope actively with international customs administrative atmosphere need to do the followings : First, they need to build an intra-government integrated supply chain security and make efforts to conclude AEO MRA in order to increase trade competitiveness among major trading countries. Second, they need to build supply chain risk management system in order to enhance management performance through overseas market and company level strategy to obtain and maintain AEO authorization in the company level.

  • PDF

A Study on Development of Evaluation Indicators for the Human Competency and Management In Managed Security Service (MSS) (보안관제 업무의 인적 역량 및 관리에 대한 평가지표 개발 연구)

  • Yang, Sung Ho;Lee, Sang Jin
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.5 no.6
    • /
    • pp.143-152
    • /
    • 2016
  • Currently many central administrative agencies, municipalities and public and private institutions operate Managed security services to cope with cyber security incidents. These entities exert efforts in operating efficiencies rather than introduction of services as they used to. Accordingly, quite a few policies, directions and guidelines have been established for stable operation of Managed security services. Still, Managed security is operated by individuals, whose competencies influence the quality of Managed security services to a great extent. In this respect, the present article examines Managed security technology and methods and describes evaluation methods and examples relevant to human competencies, so as to seek for some potential courses for further development as well as more efficient approaches to human resource management in terms of institutional Managed security services.

Protection of Information Sovereignty as an Important Component of the Political Function of the State

  • Zadorozhnia, Halyna;Mykhtunenko, Viktoriia;Kovalenko, Hanna;Kuryliuk, Yurii;Yurchenko, Liubov;Maslennykova, Tetiana
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.9
    • /
    • pp.151-154
    • /
    • 2021
  • State information policy is an important component of foreign and domestic policy of the country and covers all spheres of society. The rapid development of the information sphere is accompanied by the emergence of fundamentally new threats to the interests of the individual, society, state and its national security. The article considers the components of the state information policy to ensure information security of the country and identifies the main activities of public authorities in this area. Internal and external information threats to the national security of Ukraine and ways to guarantee the information security of the country are analyzed. Information security is seen as a component of national security, as well as a global problem of information protection, information space, information sovereignty of the country and information support of government decisions. Approaches to ensure the process of continuity of the information security system of the state in order to monitor new threats, identify risks and levels of their intensity are proposed.

A Shadowing Mechanism supporting Automatic Extension of Security Scheme (보안스킴의 자동확장성을 지원하는 미행 메커니즘)

  • 장희진;김상욱
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.11 no.4
    • /
    • pp.45-54
    • /
    • 2001
  • It is necessary to control security management consistently and respond to an intrusion automatically in order to use the network securely in the single administrative domain. This paper presents a Shadowing Mechanism supporting a dynamic extension of security scheme and proposes an ARTEMIS(Advanced Realtime Emergency Management and Intruder Identification System), which is designed and implemented based on the suggested technique. It is possible for security management system developed on the basis of the Shadowing Mechanism to make all network components working under the same security scheme. It enhances the accuracy of intrusion tracing and automatic response through dynamic extension of space and time for security management.

A study of SSO design based SAML for public library clustering (공공도서관 클러스터링을 위해 SAML 기반의 사용자통합인증 설계에 관한 연구)

  • Byeon, Hoi Kyun;Ko, Il Ju
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.4 no.3
    • /
    • pp.55-67
    • /
    • 2008
  • The user has to subscribe to the library so that user use the library service. User has to register at that in order to use of the nearby another library. Moreover, service such as the inter-library loan and returning my loan book to other library in which the mutual cooperation between the library is needed necessity. But it services due to the constraint condition because of the administrative or technical problems. In this paper excludes the administrative element. The web service model is forming the cluster based on the mutual cooperation between the technologically adjacent public library and provides the technologically necessary single sign-on (SSO) in order to support the additional service. The single sign-on of the library which is concluded by this model using the security information exchange standard (Security Assertion Markup Language : SAML), it is processed by XML base. In using this model, the loan information is confirmed in the attribution in return service library and the model can utilize for the return of loan book in other library. It designs the single sign-on about it.

New Trends and Strategies For the Integration of Information and Communication Technologies in Educational Activities

  • Vasіutina, Tеtіana;Cherednyk, Lidiia;Klymenko, Oksana;Sokur, Olena;Shevchuk, Anatolii;Zatserkivna, Maryna
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.9
    • /
    • pp.169-172
    • /
    • 2021
  • The article discusses the results of a quantitative analysis of open educational resources in the field of information technology. Study is based on a study of the content of ten platforms that provide access to open resources (OPs). To achieve this goal, we used the following methods: theoretical analysis and generalization of Internet sources to determine the popularity of educational platforms and resources on them; quantitative data analysis to determine the relative proportion of IT courses in various parameters: the relative weight of courses in the IT field in general and on each platform in particular, the language of instruction, the quantitative content by thematic areas. The following platforms providing access to open educational resources were subjected to quantitative analysis: Coursera, Edx, Udemy, MIT OpenCourseWare, OpenLearn, Intuit, Prometheus, UoPeople, Open Learning Initiative, Maidan Open University.

Alternate Dispute Resolution - Free and Speedy Complaints Redressal Framework using Technology: Ombudsmanship at Proverbial Doorsteps in Pakistan

  • Phatak, Sohail Ahmad;Chaudhary, Muhammad Azam Ishaq;Khattak, Muhammad Sajid;Naveed, Anjum
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.3
    • /
    • pp.344-354
    • /
    • 2022
  • Ombudsmanship is the framework to provide the speedy administrative justice to poor man which is originated in Sweden in the 19th Century and the modus operandi with modernized arrangement of public grievance redressal. Pakistan has thirteen different Ombudsman Institutions at both Federal and Provincial level with limited public accessibility. This paper presents a collaboration framework for extending the outreach of Ombudsmanship at proverbial doorstep of complainants. This framework has three main components as collaborative arrangements, Proceedings and Resolution of the complaints that increased the public trust. A pilot project titles Swift Complaint Resolution (SCR) was constructed and executed by Federal Ombudsman Secretariat to materialize the concept of speedy redressal of complaints. The SCR project first affirmed the strength of the components of the framework. The concept of SCR was first presented in the Federal Advisory committee for Administrative Justice, which comprised of highest level of the Parliamentarians, Public Officials, NGOs and Civil Society where presented guidelines to be adopted for the free and speedy redressal of grievances at proverbial doorsteps in tehsils and district headquarters ultimately to the extended to the union councils. In SCR, the complaints were decided within 25 days even though the Law permitted 60 days that is itself a record in any judicial /quasi-judicial forum.

Differentiation of Legal Rules and Individualization of Court Decisions in Criminal, Administrative and Civil Cases: Identification and Assessment Methods

  • Egor, Trofimov;Oleg, Metsker;Georgy, Kopanitsa
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.12
    • /
    • pp.125-131
    • /
    • 2022
  • The diversity and complexity of criminal, administrative and civil cases resolved by the courts makes it difficult to develop universal automated tools for the analysis and evaluation of justice. However, big data generated in the scope of justice gives hope that this problem will be resolved as soon as possible. The big data applying makes it possible to identify typical options for resolving cases, form detailed rules for the individualization of a court decision, and correlate these rules with an abstract provisions of law. This approach allows us to somewhat overcome the contradiction between the abstract and the concrete in law, to automate the analysis of justice and to model e-justice for scientific and practical purposes. The article presents the results of using dimension reduction, SHAP value, and p-value to identify, analyze and evaluate the individualization of justice and the differentiation of legal regulation. Processing and analysis of arrays of court decisions by computational methods make it possible to identify the typical views of courts on questions of fact and questions of law. This knowledge, obtained automatically, is promising for the scientific study of justice issues, the improvement of the prescriptions of the law and the probabilistic prediction of a court decision with a known set of facts.

The Correspondence Competence of Information Accident by Firms Experienced in Confidential Information Leak (기밀정보 유출 경험을 가진 기업들의 정보사고 대응역량 강화에 관한 연구)

  • Jung, Byoungho
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.12 no.2
    • /
    • pp.73-86
    • /
    • 2016
  • The purpose of this study is to examine a security investment for firms experienced in confidential information leak. Information security is an apparatus for protection of secret information. The competence of information security is a competitiveness to avoid information leakage in changing business environment. The type of information security is divided into administrative security, technical security and physical security. It is necessary to improve the incident correspondence competence through information security investment of the three types. Therefore, the investment of information security is to enhance information-asset protection of firms. To reinforce accident response competence, an organization discussed an establishment, security technology development, expand investment and legal system of the security system. I have studied empirically targeting the only information leak of firms. This data is a technical security competence and technology leakage situation of firms happened in 2010. During recovery of the DDos virus damage on countries, company and individual, the collected data signify a reality of information security. The data also identify a security competence of firms worrying information security management. According to the study, the continuous investment of information security has a high competence of accident correspondence. In addition, the most of security accidents showed a copy and stealing of paper and computer files. Firm on appropriate security investment is an accident correspondence competence higher than no security investment regardless of a large, small and medium-sized, and venture firm. Furthermore, the rational security investment should choose the three security type consideration for firm size.