• Title/Summary/Keyword: Game Security

Search Result 252, Processing Time 0.023 seconds

A Theoretical Analysis of International Civil Aviation Organization (국제민간항공기구의 이론적 고찰)

  • Kim, Kwan-Ok
    • The Korean Journal of Air & Space Law and Policy
    • /
    • v.14
    • /
    • pp.151-174
    • /
    • 2001
  • Theories of international organization have explained the creation, maintenance, and decline of international organization. However, their explanations on changes of international organization have been much more different one another. For example, the theory of hegemonic stability argues that international organization can be created and maintained only by a hegemonic state and will be declined if the hegemonic state decline. On the other hand, the functional approach believes that the positive functions and effects that international organization provides motivate states to create and maintain the organization, while the game-theoretical approach explains international organization based on cost-benefit calculation of rational states. Thus, the empirical evaluation of the arguments of the theories of international organization and defining the major factors that determine international organization are necessary not only for the development of theories of international organization but also for making desirable policies toward international organization. For the purpose, this paper compares and contrasts the three major theories of international organization and applies the approaches to the case of the International Civil Aviation Organization (ICAO) to test their arguments. Since the ICAO has been rarely examined by the theories of international organization, the case study could be desirable case to evaluate theories of international organization. In this sense, this paper attempts to define the major factors that determine the creation, maintenance, and decline of the ICAO. In particular, since the Korean government has changed its policy for air transport security system recently, it will investigate the role of ICAO on the policy change to define the limits and strength of ICAO. In conclusion, this paper will assess the relative explanatory power of each approach based on the analysis of the creation and changes of ICAO

  • PDF

An Empirical Study on the Competition Factor Electronic Logistics Information and International Logistics Management (국제물류관리와 전자적물류정보의 경쟁요인에 관한 실증연구)

  • Kwak, Hyun
    • International Commerce and Information Review
    • /
    • v.9 no.2
    • /
    • pp.257-283
    • /
    • 2007
  • As Global industrial structure is diversified, multinational corporations accomplished fast internationalization to introduction of new management policy by development of an IT technology. Enterprise' business environment is changing transcending border. To overcome raging waves of change accident and to be secured enterprise's future, the logistics is recognized the third profit source joining in curtailment of sale enlargement, production cost. To seek cost saving or reform in logistics class that is last area of pursuit of profits within ancient city life in the fast lane from these viewpoint, importance of study that integrates and manages international logistics bases supply neck walk is emphasized. Specially, to meet on in terms of competitive power security regarding curtailment of logistics cost is available through link between logistics bases, various consumer's request, merchandise and service logistics management that supply fixed quantity as is reliable in right place at good season was embossed by point game plan of business management, and SCM efficiency anger of mortification international logistics activity importance of study that see at that dominate competitive advantage point bring. This study analyzes interrelation and presents model for integration of international logistics bases supply network with supply network habit at factor and supply chain, and supply network activity in integration of supply chain process and production. Also, it establishes following method of study to achieve study purpose for actual proof analysis for integration sequence of international logistics bases supply network. Specially, immersion of network and supply network, very high interrelation appeared by thing which is with international logistics base supply network integration. The integration of international logistics base supply network means that the enterprises which give trust and sincerity deal with market environment change positively and can decide proceeding of various cooperative work. Also, it means the possibility by necessity of cooperative relation and interdependence to continuous immersion and normative immersion, for the maintain of long business relations.

  • PDF

Theoretical Considerations for Formation and Roles of International Organizations : With Special Regard to Experiential Cases of IAEA (국제기구 형성과 역할에 관한 이론적 고찰 : IAEA의 경험적 사례를 중심으로)

  • Kim Tae-Woon
    • The Journal of the Korea Contents Association
    • /
    • v.6 no.7
    • /
    • pp.79-89
    • /
    • 2006
  • This study attempted theoretical considerations for the formation and roles of international organizations. More specifically, the study examined experiential cases of IAEA's formation and roles, based on the points of realist and liberalist paradigms that show different viewpoints on the formation and roles of international organizations. The findings of this study show that many parts cannot be explained only with theoretical assumptions of liberalist paradigm, such as international organizations' functional merits, game rules, interdependent interests and role independence. Especially as seen in the formation and operation cases of IAEA, the formation of international organizations is mainly motivated by the security of vested rights among powers and their roles may be changed, depending on the mutual policy objectives of the countries concerned.. In this respect, international organizations do not seem to be strictly protected in independence or efficiency of their roles. Therefore, the liberalist hegemony stability theory is useful to explain the formation and roles of international organizations.

  • PDF

Virtual Keypads based on Tetris with Resistance for Attack using Location Information (위치정보로 비밀정보를 유추할 수 있는 공격에 내성이 있는 테트리스 형태 기반의 보안 키패드)

  • Mun, Hyung-Jin
    • Journal of the Korea Convergence Society
    • /
    • v.8 no.6
    • /
    • pp.37-44
    • /
    • 2017
  • Mobile devices provide various services through payment and authentication by inputting important information such as passwords on the screen with the virtual keypads. In order to infer the password inputted by the user, the attacker captures the user's touch location information. The attacker is able to infer the password by using the location information or to obtain password information by peeping with Google Glass or Shoulder Surfing Attack. As existing secure keypads place the same letters in a set order except for few keys, considering handy input, they are vulnerable to attacks from Google Glass and Shoulder Surfing Attack. Secure keypads are able to improve security by rearranging various shapes and locations. In this paper, we propose secure keypads that generates 13 different shapes and sizes of Tetris and arranges keypads to be attached one another. Since the keypad arranges different shapes and sizes like the game, Tetris, for the virtual keypad to be different, it is difficult to infer the inputted password because of changes in size even though the attacker knows the touch location information.

Improvement Study abroad School Safety Analysis (국내외 학교안전 실태분석을 통한 개선방안 연구)

  • Kim, Teahwan
    • Journal of the Society of Disaster Information
    • /
    • v.11 no.3
    • /
    • pp.385-392
    • /
    • 2015
  • In hosting outdoor activities and school trips, safety issues are gaining serious attention lately. In addition to Sewol ferry tragedy and an incident at Kyungjoo Mauna Resort, there have been grown problems related to this crucial factor. This research analyzes negligent accidents occurred from domestic and foreign schools and aims to provide effective safety education and policy through comparative analysis between domestic and foreign cases. We mainly relied on documents such as newspapers, internet articles and legal papers to investigate cases and cooperated with relevant government departments for collecting references and setting agenda for safety supervision. The analysis on both domestic and foreign cases revealed that students abroad receive opportunities for first-hand experience regarding safety and systematic education, as safety maintenance is prioritized. Based on this culture, safety education should be habituated domestically, while participatory safety programs that students can actively involve must also be devised. Moreover, through preparation of entertaining contents such as SNS game programs, skits and activities employing multiple facilities and vehicles at school safety education, we must induce students to actively participate in the program with interests.

The IOA-Based Intelligent Information Protection System for Response of Advanced Persistent Threats (IOA 기반의 지능형지속위협 대응 위한 지능형 정보보호시스템)

  • Ryu, Chang-su
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.20 no.11
    • /
    • pp.2067-2072
    • /
    • 2016
  • Recently, due to the development of attack techniques that can circumvent existing information protection systems, continuous threats in a form unrecognized by the user have threatened information assets. Therefore, it is necessary to support the prompt responses to anticipated attempts of APT attacks, bypass access attacks, and encryption packet attacks, which the existing systems have difficulty defending against through a single response, and to continuously monitor information protection systems with a defense strategy based on Indicators of Attack (IOA). In this paper, I suggest a centralized intelligent information protection system to support the intelligent response to a violation by discerning important assets through prevention control in a performance impact assessment about information properties in order to block the attack routes of APT; establishing information control policies through weakness/risk analyses in order to remove the risks in advance; establishing detection control by restricting interior/exterior bypass networks to server access and monitoring encrypted communications; and lastly, performing related corrective control through backup/restoration.

A Subjective Study on Sport Ideologies (스포츠사상에 대한 주관성 연구)

  • Yu, Young-Seol
    • Journal of the Korea Convergence Society
    • /
    • v.10 no.6
    • /
    • pp.259-268
    • /
    • 2019
  • The purpose of this study was to explore physical education majors' subjective perception on sports ideologies using Q-methodology. This study found four types of subjective perception on sports thoughts. Type I is named 'the type of fair victory and defeat.' The subjects of type I emphasize the items of victory and defeat, fair judgement, a drama without a scrip, etc. Type II is named 'the type of sport philosophy.' The subjects of type II emphasize the items of sport philosophy, theory of one of mind & body, great spirit, hwarangdo spirit, sport logic, self-improving, etc. Type III is named 'the type of communication & social activity.' The subjects of type III emphasize the place for communication, social activity, consideration, improvement of the quality of life, etc. Type III is named 'the type of communication & social activity.' The subjects of type IV emphasize welfare, security for the aged, leisure, entertainment(game), healthy, etc.

Kiosk training strategies based on IT educational App for older adults

  • Jee, Sung-Hyun
    • Journal of the Korea Society of Computer and Information
    • /
    • v.26 no.4
    • /
    • pp.239-245
    • /
    • 2021
  • Due to the fourth industrial revolution and the Corona19, the availability of digital devices such as kiosks is a matter directly related to survival for older adults with digital divide. This paper analyzes the problems of existing information service education for older adults and proposes an IT education strategy tailored to aging and life cycle of older adults. The proposed in this study is an educational application-based IT training method that supports repetitive learning regardless of time and place, developing kiosk function as a functional game-type educational application and experimenting with post-training effectiveness. The research method proposed UI usability evaluation frame for older adults, and developed educational applications based on proposed evaluation frame, and conducted kiosk education. As a result of the experiment, the mission success rate after using the IT application was 80.6%, which is a 55.1%P improvement compared to the pre-use(25.5%). This study confirmed that the proposed education for older adults is a way to overcome the limitations of existing IT education in the current situation.

Study on Development of Korean Unmanned Systems through Analysis of U.S. Unmanned Systems Policy (미국의 무인체계 정책 분석을 통한 한국의 무인체계 발전에 관한 연구)

  • Park, Dongseon;Oh, Kyungwon
    • Journal of Aerospace System Engineering
    • /
    • v.15 no.3
    • /
    • pp.65-70
    • /
    • 2021
  • This study presents a method to efficiently advance the Republic of Korea's Unmanned Systems through the analysis of the development of the U.S. Unmanned System Policy. After the occurrence of the September 11 attacks, the U.S. developed Unmanned Systems as a part of RMA and became the leader in this area. The system went through numerous trials and errors during the development and acquisition. From these experiences, the U.S. had embodied Unmanned Systems acquisition methods by establishing Unmanned Systems Development Guidance and DoD Autonomy Community of Interest in 2012. In addition, as diverse unmanned programs started to proceed, it promoted Core Technology development sharing and simplification of functions of the Unmanned Systems to exclude budget-wasting elements such as duplication of programs. The Republic of Korea must politically build a collaborative system between industry/academia/research institute/military and apply evolutionary development strategies from the first step of the development of the Unmanned Systems the future Game Changer. In operations, concepts of the Manned/Unmanned Systems complex operation should be established and intelligent S/W, Open System, and Cyber Security technologies to materialize them developed.

Blockchain and AI-based big data processing techniques for sustainable agricultural environments (지속가능한 농업 환경을 위한 블록체인과 AI 기반 빅 데이터 처리 기법)

  • Yoon-Su Jeong
    • Advanced Industrial SCIence
    • /
    • v.3 no.2
    • /
    • pp.17-22
    • /
    • 2024
  • Recently, as the ICT field has been used in various environments, it has become possible to analyze pests by crops, use robots when harvesting crops, and predict by big data by utilizing ICT technologies in a sustainable agricultural environment. However, in a sustainable agricultural environment, efforts to solve resource depletion, agricultural population decline, poverty increase, and environmental destruction are constantly being demanded. This paper proposes an artificial intelligence-based big data processing analysis method to reduce the production cost and increase the efficiency of crops based on a sustainable agricultural environment. The proposed technique strengthens the security and reliability of data by processing big data of crops combined with AI, and enables better decision-making and business value extraction. It can lead to innovative changes in various industries and fields and promote the development of data-oriented business models. During the experiment, the proposed technique gave an accurate answer to only a small amount of data, and at a farm site where it is difficult to tag the correct answer one by one, the performance similar to that of learning with a large amount of correct answer data (with an error rate within 0.05) was found.