• Title/Summary/Keyword: Environmental Security

Search Result 822, Processing Time 0.026 seconds

Comparative Analysis on Security Needs Satisfaction and Life Satisfaction of Electronic Security System Users by City Size (도시크기에 따른 기계경비시스템 이용자의 안전욕구충족과 생활만족 비교분석)

  • Yoo, Young-Chang;Lee, Jong-Hwan;Kim, Chan-Sun
    • The Journal of the Korea Contents Association
    • /
    • v.10 no.2
    • /
    • pp.330-341
    • /
    • 2010
  • The purpose of this study is to have comparative analysis on the differences between metropolis and provincial city's electronic security system users' security needs satisfaction and life satisfaction. This study sampled total 400 users with using purposeful sampling after selecting specific metropolis and provincial cities as population. It was conducted on 4 realms-bank, jewelry store, convenience store and communication industry- with two times. First one was on June, 2008, it was conducted in Seoul, 5 areas divided based on Hangang, which are Gang-dong, Gang-seo, Gang-nam, Gang-buk, and civic center. We sampled 40 electronic security system users of each area which are 200 in sum. Second one was on January, 2009, with users in Cheonan and Asan, 200 was sampled in the same way with metropolis; 100 users of each city. The reliability of the questionnaire showed Cronbach's ${\alpha}$ value over .812. The results are as follows. First, there showed difference on physical security needs satisfaction of electronic security system users with the size of city. In other word, users in metropolis have higher environmental, psychological, and informational security needs satisfaction than users in provincial city. Second, there is also difference in life satisfaction. Namely, users in metropolis have higher security needs satisfaction than users in provincial city. Third, security needs satisfaction of electronic security system users by city size effects life satisfaction. That is, in case of users in metropolis, the more physical, environmental, and informational security needs satisfaction it shows, the more life satisfaction it showed.

Effects of the Recognition of Business Information Protection Activities in Ranks on Leaks of Industrial Secretes (직위에 따른 기업정보보호활동인식이 산업기밀유출에 미치는 영향)

  • Choi, Panam;Han, Seungwhoon
    • Journal of the Society of Disaster Information
    • /
    • v.11 no.4
    • /
    • pp.475-486
    • /
    • 2015
  • The objective of this study is to analyze control factors in protecting activities of business information that affects the effects of protecting leaks of industrial secretes during business security works in the ranks of staffs. A regression analysis was implemented by 36 items of protecting activities of information and 10 items of preventing industrial secretes for a total of 354 users and managers who use internal information systems in governments, public organizations, and civilian enterprises. In the recognition of protecting activities of business information that affects the prevention of controlling industrial secretes, clerks showed recognitions in physical control, environmental control, and human resource control, and software control and assistant chiefs showed recognitions in hardware control and environmental control. Also, ranks of department managers and higher levels represented recognitions in security control activities. It showed that clerks, assistant chiefs, and above department managers show effects of technical control factors on protecting activities of industrial secretes but section chiefs represent system control factors in preventing industrial secretes.

A Study on ICT Security Change and CPS Security System in the 4th Industry Age (4차 산업 시대의 ICT 보안 변화와 CPS 보안 시스템에 관한 연구)

  • Joo, Heon-Sik
    • Journal of Digital Contents Society
    • /
    • v.19 no.2
    • /
    • pp.293-300
    • /
    • 2018
  • This study explored the security of Industry 4.0 such as security trends and security threats in Industry 4.0, and security system in Industry 4.0. The threat elements in Industry 4.0 are changing from ICT to IoT and to CPS security, so security paradigm and security System should change accordingly. In particular, environmental and administrative security are more important to solve CPS security. The fourth industry-age security should change to customized security for individual systems, suggesting that the security technology that combines hardware and software in product production design should change from the beginning of development. The security system of the fourth industry proposes design and implementation as a CPS security system as a security system that can accommodate various devices and platforms from a security system in a single system such as a network to an individual system.

A Study on National Mining Investment Security Analysis for the Overseas Mineral Resources Investment Business (해외 광물자원 투자 사업을 위한 국가위험도 분석 연구)

  • Ko, Eun-Mi;Choi, Soen-Gyu;Kim, Chang-Seong;Kim, Seong-Yong;Pak, Sang-Joon
    • Economic and Environmental Geology
    • /
    • v.41 no.5
    • /
    • pp.475-484
    • /
    • 2008
  • In this study, we analyzed national mining investment security and country risk, and suggested a new index for exploration and development investment for mining projects in abroad by an analysis of relationship between these grades and mineral resource development investment. For this, potential risks for mining in mineral-rich countries are assessed, and the risk of the exploration and development investment for mining projects is relatively evaluated by OECD country risk. It is noted that countries of the lower ranks in OECD are consistently good agreement with the high grade in Behre Dolbear Group Inc. for favorable mineral exploitation, whereas the higher ranks have shown diverse and high risks for the mining investigation and development. Consequently, it is necessary that assessment of the relationship between mineral resource index and country risk for mining projects to be investigated and developed in future should be applied before business decision of mineral investigation projects in abroad.

Factors for Better Adoption of Information Security on Custom-Made Software at SMEs: A Systematic Review and Framework

  • Fatimah Alghamdi;Moutasm Tamimi;Nermin Hamza
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.2
    • /
    • pp.65-78
    • /
    • 2023
  • Investigations on information security factors re- main elusive at small and medium enterprises (SMEs), es- specially for custom-made software solutions. This article aims to investigate, classify, adopt factors from recent literature addressing information security resources. SMEs al- ready have information security in place, but they are not easy to adopt through the negotiation processes between the in-house software development companies and custom-made software clients at SMEs. This article proposes a strategic framework for implementing the process of adoption of the information security factors at SMEs after conducting a systematic snapshot approach for investigating and classifying the resources. The systematic snapshot was conducted using a search strategy with inclusion and exclusion criteria to retain 128 final reviewed papers from a large number of papers within the period of 2001-2022. These papers were analyzed based on a classification schema including management, organizational, development, and environmental categories in software development lifecycle (SDLC) phases in order to define new security factors. The reviewed articles addressed research gaps, trends, and common covered evidence-based decisions based on the findings of the systematic mapping. Hence, this paper boosts the broader cooperation between in-house software development companies and their clients to elicit, customize, and adopt the factors based on clients' demands.

Security of Upland Irrigation Water through the Effective Storage Management of Irrigation Dams (관개용 댐의 효율적 저수관리를 통한 밭 관개 용수 확보)

  • Lee Joo-Yong;Kim Sun-Joo;Kim Phil-Shik
    • Journal of The Korean Society of Agricultural Engineers
    • /
    • v.48 no.2
    • /
    • pp.13-23
    • /
    • 2006
  • In Korea, upland irrigation generally depends on the ground water or natural rainfall since irrigation water supplied from dams is mainly used for paddy irrigation, and only limited amount of irrigation water is supplied to the upland area. For the stable security of upland irrigation water, storage level of irrigation dams was simulated by the periods. A year was divided into 4 periods considering the irrigation characteristics. Through the periodical management of storage level, water utilization efficiency in irrigation dams could be enhanced and it makes available to secure extra available water from existing dams without new development of water resources. Two study areas, Seongju and Donghwa dam, were selected for this study. Runoff from the watersheds was simulated by the modified tank model and the irrigation water to upland crops was calculated by the Penman-Monteith method. The analyzed results showed that relatively sufficient extra available water could be secured for the main upland crops in Seongju area. In case of Donghwa area, water supply to non-irrigated upland was possible in normal years but extra water was necessary in drought years such as 1998 and 2001.

Influence of Negative Factors of War: Economic, Legal, Regional and Environmental Aspects

  • Kopytko, Marta;Grabar, Nataliia;Storozhuk, Oksana;Borutska, Yuliia;Doroshenko, Tetiana
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.6
    • /
    • pp.13-18
    • /
    • 2022
  • Mankind has been living in the third millennium of a new era for 15 years. Today he realized that he was on a tiny planet with not much space. The 20th century laid bare its global consequences in all its horror.. According to the Stockholm International Peace Research Institute, more than 30 armed conflicts are recorded on the planet every year, leading to the death of more than 1,000 people during the year. Over the past 15 years, the total number of deaths as a result of military actions in such conflicts has also increased: more than 17 thousand people - in 2002 to more than 22.5 thousand - in 2011. 2022, in turn, became the beginning of a new round of military history, bringing changes in the social, environmental, agro-industrial, economic and other spheres not only in Ukraine, but also in all countries of the civilized world. As a result of the study, the most significant impact of the negative factors of the war, namely the economic, legal, regional and environmental aspects, was identified and analyzed.

Design and Load Map of the Next Generation Convergence Security Framework for Advanced Persistent Threat Attacks

  • Lee, Moongoo
    • IEIE Transactions on Smart Processing and Computing
    • /
    • v.3 no.2
    • /
    • pp.65-73
    • /
    • 2014
  • An overall responding security-centered framework is necessary required for infringement accidents, failures, and cyber threats. On the other hand, the correspondence structures of existing administrative, technical, physical security have weakness in a system responding to complex attacks because each step is performed independently. This study will recognize all internal and external users as a potentially threatening element. To perform connectivity analysis regarding an action, an intelligent convergence security framework and road map is suggested. A suggested convergence security framework was constructed to be independent of an automatic framework, such as the conventional single solution for the priority defense system of APT of the latest attack type, which makes continuous reputational attacks to achieve its goals. This study suggested the next generation convergence security framework to have preemptive responses, possibly against an APT attack, consisting of the following five hierarchical layers: domain security, domain connection, action visibility, action control, and convergence correspondence. In the domain, the connection layer suggests a security instruction and direction in the domains of administrative, physical and technical security. The domain security layer has consistency of status information among the security domain. A visibility layer of an intelligent attack action consists of data gathering, comparison and decision cycle. The action control layer is a layer that controls the visibility action. Finally, the convergence corresponding layer suggests a corresponding system of before and after an APT attack. The administrative security domain had a security design based on organization, rule, process, and paper information. The physical security domain is designed to separate into a control layer and facility according to the threats of the control impossible and control possible. Each domain action executes visible and control steps, and is designed to have flexibility regarding security environmental changes. In this study, the framework to address an APT attack and load map will be used as an infrastructure corresponding to the next generation security.

Tools for Improving the Efficiency of the Economic Security of Enterprises in Face of the Competitiveness Intensification

  • Turylo, Anatolii M.;Sharko, Vitalii;Fesun, Iryna;Stadnyk, Viktoriya;Andrusenko, Nadiia
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.3
    • /
    • pp.53-60
    • /
    • 2022
  • The article examines the problems of ensuring the effectiveness of the economic security system in the face of increasing competition. The relevance of the study is determined by the intensification of competition between enterprises and the threats arising from this phenomenon. The methodological basis is the methods used: analysis and synthesis - to identify the main trends in the development of tools for economic security of the enterprise; systematization - to highlight the main characteristics of the economic security of the enterprise in the intensification of competition; generalization - to form the general conclusions of the study. The purpose of scientific research is to substantiate the feasibility of using the tools of the economic security system to increase its efficiency in the face of intensifying competition. The main components of the economic security system of the enterprise, which have the greatest impact on the formation of an effective level of economic security. The defining characteristics of the system of economic security of the enterprise are investigated. Special characteristics of the economic security system of the enterprise are considered. The offered directions of tools of maintenance of system of economic safety of the enterprise in competitive conditions: objective, subjective external, subjective internal. For each area, specific tools for ensuring the system of economic security, which affect its efficiency, have been identified.

Maritime Cyber Security Status and Establishment of Maritime Cyber Security System (해사 사이버보안 동향 분석 및 해사 사이버보안 시스템 구축)

  • Ahn, Jong-Woo;Lim, Jeoung-Kyu;Park, Kae-Myoung
    • Proceedings of the Korean Institute of Navigation and Port Research Conference
    • /
    • 2019.05a
    • /
    • pp.29-32
    • /
    • 2019
  • The development of Information and Communication Technology facilitates exchange of information and communication between system in ships or between ships and land facilities, thereby improving the efficiency of their work. However, these changes in the working environment of companies and ships increased the likelihood of cyber security incidents occurance like unauthorized access to company and ship systems or infection of malicious code, which results in significant safety, environmental and business damage to company and ships. Therefore, a cyber-risk-based approach was required to identify and respond to an increasing cyber threats. In this paper, the analysis of maritime cyber security status and guidelines for establishment of maritime cyber security system are provided.

  • PDF