• Title/Summary/Keyword: Comprehensive Security

Search Result 441, Processing Time 0.024 seconds

An Assessment and Policy Implication of Information Technology Convergence Programs in Korean Public Service Area (공공부문 IT신기술 적용사업의 추진현황 평가와 정책적 시사점)

  • Kim, SungHyun
    • Journal of Information Technology Services
    • /
    • v.11 no.sup
    • /
    • pp.1-16
    • /
    • 2012
  • Information technology is a useful strategic weapon that can create competitive advantage and new business opportunity by applying it in the organization' value chain. IT convergence can be understood as an attempt of industrial level IT adoption to facilitate the innovation of the industry and the birth of a new industry. This study provides the comprehensive review of the Korean government' three IT assimilation programs, ubiquitous technology diffusion program of the Ministry of Knowledge Economy, u-service program of the Ministry of Public Administration and Security, and u-Defence cooperation program of the Department of Defense. The analysis is done through the interpretation of the existing literature and the logic model. The result proposes inter-agency cooperation and building of new technology road-map in the planning stage, flexible management in the execution phase, and failure tolerant evaluation system. The proposal for developing competencies and institutional foundations for IT convergence also presented.

Comparative Study of Safety Regulations: Focused on the Applied Frameworks of ensuring product safety in Korea and Japan (안전기준 비교분석연구: 한국과 일본의 제품안전 확보체계를 중심으로)

  • Kim, Jung-Gon;Kim, Tae-Hwan
    • Journal of the Society of Disaster Information
    • /
    • v.10 no.1
    • /
    • pp.116-122
    • /
    • 2014
  • Recently, Korea has enacted the Framework Act on Product Safety to allow comprehensive control of product safety accidents. This is a government policy aiming to ensure product safety and customer protection by strengthening the obligation of producers. However, the framework has not yet been completed in Korea. Therefore, this paper deals with improvement assignments and directions by comparing the frameworks of applied in Korea and Japan for ensuring such production safety.

A Study on the Model between the IRM and the Organizational Performance (정보자원관리(IRM)와 조직성과간의 이론적 연구모형)

  • Kim Jeong-Wook
    • Management & Information Systems Review
    • /
    • v.3
    • /
    • pp.1-14
    • /
    • 1999
  • Recently, information resource management(IRM) has a considerable interest among researchers and practitioners because the information resource have been found critical influence on organizational performance. The IRM construct has been defined a comprehensive approach to planning, organizing, controlling the resources, and activities associated with acquiring and distributing data to meet a business need. This study have several objectives: 1) to operationalize the measurement instrument of IRM, 2) to identify the factors influencing organizational performance, and 3) to suggest the research model between IRM and organizational performance and then 4) to provide reference for managers to assess the IRM implementation in their organization. By reviewing the literature, past experience, others' use, encouragement by others, and anxiety are selected as the factors influencing IRM. The IRM construct has been classified with eight dimensions : chief information officer, planning, security, technology integration, advisory committees, enterprise model, information integration, and data administration. Eight hypotheses concerning the relationship between each of the IRM and organizational performance are suggested in this study.

  • PDF

Adaptive Wireless Sensor Network Technology for Ubiquitous Container Logistics Development

  • Chai, Bee-Lie;Yeoh, Chee-Min;Kwon, Tae-Hong;Lee, Ki-Won;Lim, Hyotaek;Kwark, Gwang-Hoon
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2009.05a
    • /
    • pp.317-320
    • /
    • 2009
  • At the present day, the use of containers crisscrossing seven seas and intercontinental transport has significantly increased and bringing the change on the shape of the world economy which we cannot be neglected. Additionally, with the recent technological advances in wireless sensor network (WSN) technologies, has providing an economically feasible monitoring solution to diverse application that allow us to envision the intelligent containers represent the next evolutionary development step in order to increase the efficiency, productivity, utilities, security and safe of containerized cargo shipping. This paper we present a comprehensive containerized cargo monitoring system which has adaptively embedded WSN technology into cargo logistic technology. We share the basic requirement for an autonomous logistic network that could provide optimum performance and a suite of algorithms for self-organization and bi-directional communication of a scalable large number of sensor node apply on container regardless inland and maritime transportation.

  • PDF

DroidVecDeep: Android Malware Detection Based on Word2Vec and Deep Belief Network

  • Chen, Tieming;Mao, Qingyu;Lv, Mingqi;Cheng, Hongbing;Li, Yinglong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.4
    • /
    • pp.2180-2197
    • /
    • 2019
  • With the proliferation of the Android malicious applications, malware becomes more capable of hiding or confusing its malicious intent through the use of code obfuscation, which has significantly weaken the effectiveness of the conventional defense mechanisms. Therefore, in order to effectively detect unknown malicious applications on the Android platform, we propose DroidVecDeep, an Android malware detection method using deep learning technique. First, we extract various features and rank them using Mean Decrease Impurity. Second, we transform the features into compact vectors based on word2vec. Finally, we train the classifier based on deep learning model. A comprehensive experimental study on a real sample collection was performed to compare various malware detection approaches. Experimental results demonstrate that the proposed method outperforms other Android malware detection techniques.

Rise of Geopolitics and Changing Korea and Japan Trade Politics

  • Choi, Byung-il;Oh, Jennifer S.
    • East Asian Economic Review
    • /
    • v.26 no.1
    • /
    • pp.27-48
    • /
    • 2022
  • In the past decade, Korea and Japan have increasingly exhibited different strategic priorities in trade in face of China's rising global economic prowess and worsening US-China trade conflict. Japan's trade policy decisions have worked to reinforce its economic and security ties with the US as a means to counter China. Japan has used both bilateral and multilateral means to secure its ties with the US against China. In contrast, Korea's trade policy positions have been one of 'strategic ambiguity'. Korea has been more conciliatory towards China, reluctant to take actions that would counter China's interest. Korea has mainly resorted to bilateral channels to maintain favorable relations with both China and the US. Korea's reluctance to clearly ally with the US against China has been observed across different administrations with opposing political orientations. This paper examines Korea and Japan's diverging strategic priorities in trade through the 2017 World Trade Organization Ministerial Conference; the 2017 US imposition of Section 232 on steel; the Comprehensive and Progressive Agreement for Trans-Pacific Partnership, the Korea-US FTA renegotiation and the Korea-China FTA Phase Two Negotiation; and the 2019 Japan-US Trade Agreement.

VULNERABILITY ASSESSMENTS AND RISK MANAGEMENT FOR CRITICAL INFRASTRUCTURES FROM HOMELAND SECURITY VIEWPOINTS

  • Chun Nen Huang;Yao-Chen Kuo
    • International conference on construction engineering and project management
    • /
    • 2009.05a
    • /
    • pp.292-301
    • /
    • 2009
  • The employment of risk management theory in Urban Disaster Management System (UDMS) has become an important trend in recent years. The viewpoint of risk management is mainly a comprehensive risk assessment of various internal and external factors, and a subsequent handling of risks. Through continuous and systematic accumulation and analysis of risk information, disaster prevention and rescue system is established. Taking risk management theory as the foundation, Organization for Economic Cooperation and Development (OECD) has developed a series of UDMS in the mega-cities all over the world. With this system as a common platform, OECD cooperates with different cities to develop disaster prevention and rescue system consisting of vulnerability assessment methods, risk assessment and countermeasures. The paper refers to the urban disaster vulnerability assessment and risk management of OECD and the mega-cities of different advanced and developed countries in the world, and then constructs a preliminarily drafted structure for the vulnerability assessment methods and risk management mechanism in the metropolitan districts of Taiwan.

  • PDF

China's Diplomatic Challenges and Prospect in the Xi Jinping Era (시진핑 시대 중국의 외교적 과제와 전망)

  • Cho, Young Nam
    • Strategy21
    • /
    • s.33
    • /
    • pp.5-36
    • /
    • 2014
  • This article aims to analyze the diplomatic challenges currently facing China as well as the foreign policy the Xi Jinping administration is adopting to address them. With these purposes in mind, it will look into three areas: first, diplomatic tasks confronting the Xi leadership; second, foreign policy that the Xi administration has implemented since the 18th Party Congress in 2012; and third, the prospects for China's foreign policy under the Xi leadership. As the Xi Jinping administration entered into office, it has encountered two major diplomatic challenges. One is the searching for a new foreign policy, and the other the restructuring of the existing foreign affairs and national security systems. The Xi administration, during its first year in office, has responded actively to tackle these issues. To begin with, it has attempted to make some adjustments on foreign policy while maintaining the Deng Xiaoping line of foreign policy. One of these modifications is placing emphasis on national "core interest," as illustrated by changes in guideline for maritime conflicts, pushing for building maritime power, and proclamation of Air Defense Identification Zone in the East China Sea. Second is the decision on the new guideline for peripheral diplomacy. That is, the administration regarded creating peaceful and stable environments to realize "Chinese Dream" as an important goal of foreign policy, and proposed such new guiding ideology as "familiarity, integrity, benefit, and accommodation." In additoin, the Xi administration restructured the existing foreign affairs and national security systems. Establishing the Central State Security Committee and the Internet Leading Small Group (LSG) are cases in point. As comprehensive organizations for policy coordination that encompass party, government, and military, the two LSGs are in charge of enacting related policies and fine-tuning policy implementation, based upon leadership consisting of chiefs of each relevant organs. Moreover, since Xi himself became the chief of these two newly-found organs, the conditions under which these LSGs could demonstrate unified leadership and adjusting role in its implementation of military, diplomatic, and security policies were developed. The future Chinese diplomacy will be characterized with three main trends. First, peripheral diplomacy will be reinforced. The peripheral diplomacy has become far more important since the Work Conference on Peripheral Diplomacy in October 2013. Second, economic diplomacy will be strengthened with an eye on reducing the "China Threat Theory," which still exists in Asia. Third, the policies to isolate the Philippines and Japan will continue in regard to maritime disputes. All in all, Chinese diplomacy in the Xi Jinping era is likely to feature practical diplomacy which combines both hard and soft approaches to best realize Chinese national interest.

Investigation into the Factors Affecting the Voluntary Information Security Compliance Behavior: Compliance Behavioral Belief, Compliance Knowledge, and Compliance Relevance to Job (자발적인 정보보안 컴플라이언스에 영향을 미치는 요인에 관한 연구: 준법에 대한 신념, 준법 관련 지식, 그리고 업무의 준법 연관성을 중심으로)

  • Kim, Sang Soo;Kim, Yong Jin
    • Information Systems Review
    • /
    • v.18 no.2
    • /
    • pp.127-149
    • /
    • 2016
  • Based on a comprehensive literature review on Theory of Planned Behavior and Social Cognitive Theory, this study proposes and empirically examines a structural model consisting of factors affecting voluntary information security compliance behavior. To test the proposed research model, the study analyzes survey results from employees of a major Korean energy company, which employs an enterprise compliance support system. Results indicate three factors: compliance behavioral belief and compliance knowledge affect compliance behavior; compliance knowledge works as a mediator in the relationship between compliance behavioral belief and compliance behavior; and the more relevant the compliance is to an employee's job, the more the employee prioritizes compliance knowledge. This study suggests methods for encouraging employees to embrace voluntary, positive information security compliance standards. By doing so, this article aims to promote a more effective corporate compliance system for information security and enhance sustainable management practices.

The Effect of Airport Security Screeners' New Technology Acceptance to the Innovation and Job Satisfaction of Airport Security (공항보안검색요원의 신기술 수용성이 공항보안업무의 직무만족도와 업무혁신성에 미치는 영향)

  • Jeon, Jong-Duk;Yoon, Han-Young
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.20 no.2
    • /
    • pp.394-403
    • /
    • 2019
  • This research focuses on the perception of security screeners using a full body scanner at airport which had been newly introduced to terminal 2 of Incheon Int'l airport. To accomplish the purpose of research, this paper used UTAUT (Unified Theory of Acceptance and Use of Technology) model. Through an empirical analysis, it was proven the factors consisting of technological acceptance and how those factors affect both organizational innovation at airport and job satisfaction of security screeners. According to an empirical analysis, it was found out all the factors of technological acceptance have a significant effect on both organizational innovation and job satisfaction. However, only the effort expectation was shown to have a significant negative effect on the two dependant variables contrary to the other variables (performance expectation, behavioral intention and self efficacy. It was also proven organizational innovation had a moderating effect between technological acceptance and job satisfaction. Such results suggested organizational innovation at airport security division is necessary to enhance job satisfaction using a newly introduced full body scanner.