• Title/Summary/Keyword: Countermeasures in the 4th Industrial Revolution

Search Result 22, Processing Time 0.028 seconds

Trends in Personal Data Storage Technologies for the Data Economy (데이터 경제를 위한 개인 데이터 저장 기술 동향)

  • Jung, H.Y.;Lee, S.Y.
    • Electronics and Telecommunications Trends
    • /
    • v.37 no.5
    • /
    • pp.54-61
    • /
    • 2022
  • Data are an essential resource for artificial intelligence-based services. It is considered a vital resource in the 4th industrial revolution era based on artificial intelligence. However, it is well-known that only a few giant platforms that provide most of the current online services tend to monopolize personal data. Therefore, some governments have started enforcing personal data protection and mobility regulations to address this problem. Additionally, there are some notable activities from a technical perspective, and Web 3.0 is one of these. Web 3.0 focuses on distributed architecture to protect people's data sovereignty. An important technical challenge of Web 3.0 is how to facilitate the personal data storage technology to provide valuable data for new data-based services while providing data for producers' sovereignty. This study reviews some currently proposed personal data storage technologies. Furthermore, we discuss the domestic countermeasures from MyData perspective, which is a typical project for data-based businesses in Korea.

Necessity of Safety Management System applying Big Data and Block Chain Technology (블록체인 기술과 빅데이터 기술을 적용한 안전 관리 시스템의 필요성)

  • Oh, Weon-Kyun;Kim, Ki-Hyuk;Lee, Donghoon
    • Proceedings of the Korean Institute of Building Construction Conference
    • /
    • 2019.11a
    • /
    • pp.197-198
    • /
    • 2019
  • In this study, the study was conducted to derive the utility of the safety management system applying block chain technology and big data technology to improve the problems of construction sites where concealment and operation of safety accidents occur. If block chain technology and big data technology are applied to construction safety management, transparent data can be collected, and based on the collected data, it is possible to predict accidents that can occur at the construction site and establish countermeasures. It can also be an opportunity to strengthen the safety awareness of construction workers and managers, and can clearly identify the responsibility in the event of a safety accident. This study suggests that the application of the 4th Industrial Revolution technology could be a great opportunity to innovate the construction industry which is less than other industries.

  • PDF

Development of Smart Livestock Disease Control Strategies and Policy Priorities (스마트 가축방역 추진전략 및 정책 우선순위)

  • Lee, Jeongyoung;Ko, Sang Min;Kim, Meenjong;Ji, Yong Gu;Kim, Hoontae
    • The Journal of Society for e-Business Studies
    • /
    • v.23 no.4
    • /
    • pp.109-126
    • /
    • 2018
  • With massive and dense production, the livestock industry is rapidly moving into a large-scale, capital-intensive industry especially in swine, poultry, and ducks. However, livestock epidemics can pose a serious threat to the livestock industry and the lives of the people. The government has established and operates the National Animal Protection and Prevention System (KAHIS) since 2013 in order to control the threat, in accordance with the five stages. The digitalized data and information are excellent in ease of management, but it is also pointed out that it is difficult to take countermeasures through linkage with the data in an emergency situation. Recently, the technology of the fourth industrial revolution such as Internet of Things (IoT), Big Data, Artificial intelligence (AI) has been rapidly implemented to the livestock industry, which makes smart livestock disease control system possible. Therefore, this study investigated the domestic and overseas cases which apply 4th Industrial Revolution technology in the industry, and derived 13 possible candidate tasks in the near future. In order to ascertain the priority of policy formulation, we surveyed the expert groups and examined the priority of each of the five stages of the prevention and the priority of each stage. The results of this study are expected to contribute to the establishment of policies for the advancement of smart livestock disease control research and livestock protection.

A Study on Security Threats and Countermeasures in Smart Farm Environments (스마트 팜 환경에서 보안 위협 및 대응 방안에 관한 연구)

  • Sun-Jib Kim
    • Journal of Internet of Things and Convergence
    • /
    • v.10 no.1
    • /
    • pp.53-58
    • /
    • 2024
  • IoT, Big-data, AI, and Cloud technologies, which are core technologies of the 4th Industrial Revolution, have recently been applied to various fields and are being used as core technologies for new growth engines. Accordingly, these core technologies are applied to the agricultural field without exception, contributing to solving the problem of labor shortage, reducing production costs, and reducing environmental burden through remote and automated production without time and space constraints. However, as these core technologies are utilized, security incidents are occurring in the agricultural field as well. Accordingly, this study divides smart farms into three stages(Basic, Middle, and High) and presents the characteristics and security threats of each stage. In particular, as the number of container-based services and research increases under cloud platforms, we would like to suggest countermeasures focusing on security threats.

A study on improvement of policy of artificial intelligence for national defense considering the US third offset strategy (미국의 제3차 상쇄전략을 고려한 국방 인공지능 정책 발전방안)

  • Se Hoon Lee;Seunghoon Lee
    • Industry Promotion Research
    • /
    • v.8 no.1
    • /
    • pp.35-45
    • /
    • 2023
  • This paper addressed the analysis of the trend and direction of the US defense strategy based on their third offset strategy and presented the practical policy implication of ensuring the security of South Korea appropriately in the future national defense environment. The countermeasures for the development ability of advanced weapon systems and secure core technologies for Korea were presented in consideration of the US third offset strategy for the future national defense environment. First, to carry out the innovation of national defense in Korea based on artificial intelligence(AI), the long-term basis strategy for the operation of the unmanned robot and autonomous weapon system should be suggested. Second, the platform for AI has to be developed to obtain the development of algorithms and computing abilities for securing the collection/storage/management of national defense data. Lastly, advanced components and core technologies are identified, which the Korean government can join to develop with the US on a basis of the Korea-US alliance, and the technical cooperation with the US should be stronger.

A Study on Trend Analysis in Convergence Research Applying Word Cloud in Korea (워드 클라우드 기법을 이용한 국내 융복합 학술연구 트렌드 분석)

  • Kim, Joon-Hwan;Mun, Hyung-Jin;Lee, Hang
    • Journal of Digital Convergence
    • /
    • v.19 no.2
    • /
    • pp.33-38
    • /
    • 2021
  • The convergence trend is the core of the 4th industrial revolution, and due to such expectations and possibilities, various countermeasures are being sought in diverse fields. This study conducted a quantitative analysis to identify the trend of convergence research over the past 10 years. Specifically, major research keywords were extracted, word cloud techniques were applied, and visualized to identify trends in academic research on convergence. To this end, research papers from 2012 to 2020 published in journal of digital convergence were investigated. The analysis period was divided into two periods: the former 4 years(2012-2015) and the latter 4 years(2016-2019) to confirm the difference in research trends. In addition, the research papers of 2020 were analyzed in order to more clearly understand the changes in the research trend of the last year due to the COVID-19. The results of this study are significant in that they can be used as useful basic data for future research and to understand research trends as keywords in the field of convergence.

The Security Risk and Countermeasures of Blockchain based Virtual Currency Trading (블록체인 기반 가상화폐 거래의 보안 위험 및 대응방안)

  • Chung, Young-Seek;Cha, Jae-Sang
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.11 no.1
    • /
    • pp.100-106
    • /
    • 2018
  • Since the concept of virtual currency called Bitcoin was announced in 2008, the blockchain technology, which is the basis of Bitcoin, is attracting attention as an important platform technology in the era of the 4th industrial revolution that can change our society in the future. Although Existing electronic financial transactions store and manage all transaction history at a reliable central organization such as government and bank, blockchain-based electronic financial transactions are composed of a distributed structure in which all participants participating in the transaction store and manage the transaction history, it is possible to secure transaction transparency while reducing system construction and operation costs. Besides the virtual currency that started with bit coins, the technology of these blockchains has been extended in various fields such as smart contracts and document management. The key technology area of this blockchain is security based on proven cryptographic technology to make it difficult to forge and hack, but there are security risks such as security vulnerabilities in the virtual currency trading service, We will discuss security risks in using virtual currency and discuss countermeasures. Especially security accidents of virtual currency exchanges are occurring frequently recently, the damage of users who trade the virtual currency is also increasing, we propose security threats and security countermeasures against virtual currency exchanges.

Research on the Development of Big Data Analysis Tools for Engineering Education (공학교육 빅 데이터 분석 도구 개발 연구)

  • Kim, Younyoung;Kim, Jaehee
    • Journal of Engineering Education Research
    • /
    • v.26 no.4
    • /
    • pp.22-35
    • /
    • 2023
  • As information and communication technology has developed remarkably, it has become possible to analyze various types of large-volume data generated at a speed close to real time, and based on this, reliable value creation has become possible. Such big data analysis is becoming an important means of supporting decision-making based on scientific figures. The purpose of this study is to develop a big data analysis tool that can analyze large amounts of data generated through engineering education. The tasks of this study are as follows. First, a database is designed to store the information of entries in the National Creative Capstone Design Contest. Second, the pre-processing process is checked for analysis with big data analysis tools. Finally, analyze the data using the developed big data analysis tool. In this study, 1,784 works submitted to the National Creative Comprehensive Design Contest from 2014 to 2019 were analyzed. As a result of selecting the top 10 words through topic analysis, 'robot' ranked first from 2014 to 2019, and energy, drones, ultrasound, solar energy, and IoT appeared with high frequency. This result seems to reflect the current core topics and technology trends of the 4th Industrial Revolution. In addition, it seems that due to the nature of the Capstone Design Contest, students majoring in electrical/electronic, computer/information and communication engineering, mechanical engineering, and chemical/new materials engineering who can submit complete products for problem solving were selected. The significance of this study is that the results of this study can be used in the field of engineering education as basic data for the development of educational contents and teaching methods that reflect industry and technology trends. Furthermore, it is expected that the results of big data analysis related to engineering education can be used as a means of preparing preemptive countermeasures in establishing education policies that reflect social changes.

A Study on the countermeasures and drones's threats in Military security (군보안상 드론위협과 대응방안)

  • Kim, Doo-hwan;Lee, Youn-hwan
    • Journal of Digital Convergence
    • /
    • v.16 no.10
    • /
    • pp.223-233
    • /
    • 2018
  • The forces to protect people's life and property against the enemy attack is an organization which is regulated by the constitutional law. In terms of nature, its security is a significant factor to determine success or failure for the war. However, recently the 4th industrial revolution represents the rapid change in the advancement of civilization and technology. It can influence on the environment of military security which can make various changes. Unless taking proper action againsty these changes, it can inflict a vital harm for the organization of forces and its internal security. In this aspect, this study discuss new threats of the military security, above all, the most technical improvements and harms for the drones in terms of security. In addition, the advantages and disadvantages of drones which can influence on the ragions of military command and control, information operations, maneuvers, firepower, operation sustainment supports are analyzed. Moreover, this study set the purpose of developmental security measure for security threats in the aspects of military security.

Security Analysis of Blockchain Systems: Case Study of Cryptocurrencies (블록체인 시스템의 보안성 분석: 암호 화폐에서의 사례 연구)

  • Lee, Sungbum;Lee, Boohyung;Myung, Sein;Lee, Jong-Hyouk
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.1
    • /
    • pp.5-14
    • /
    • 2018
  • With the advance of the 4th industrial revolution, Internet of Things (IoT) technology is actively being studied. In the era of the IoT, a decentralized operation is required to reduce load on servers and enable autonomous IoT data communication rather than focusing on centralized operation of being server client structures. This paper analyzes the security of a blockchain, a new form of distributed database platform that supports integrity and permanence of data. To achieve this, we divide the blockchain's major operations into a consensus process, network communication process, and key management process, and then describe possible attacks and countermeasures in each process. We also describe the attack occurred in typical cryptocurrency platforms such as Bitcoin and Ethereum.