• Title/Summary/Keyword: Human Security

Search Result 1,205, Processing Time 0.045 seconds

Analysis the job-ability demanded in the security and secretary (경호비서에게 요구되는 업무능력 분석)

  • Park, Ok-cheol
    • Journal of the Society of Disaster Information
    • /
    • v.4 no.2
    • /
    • pp.40-50
    • /
    • 2008
  • The purpose of this study is to analyze the job of the security and secretary, to offer useful basic data throughout human resources management by withdrawing the ability required from the security and secretary based on the analyzed results. In this regard, this study intended to look into the job of the security and secretary, the necessary ability for the job of the security and secretary. To achieve the research goals, the study selected the research participants, composed of 5 secretaries for security with more than 5-year careers after graduating from a security and secretarial service department in a college and conducted an in-depth interview with them concerning their jobs. The in-depth interview data from the 5 participants was applied with a classification analysis used by Spradley (1980). In order to enhance the dependability and validity of the research, the study held an expert meeting composed of 2 persons with a doctoral degree in securities service studies and 1 person with a master's degree in secretarial information studies, twice. Also, the study drew results concerning the job of the security and secretary and the necessary ability of the job. Though the above process, the following conclusions were drawn; the job of the security and secretary includes the areas of job safety, a housing residence job, a health care job, an interpersonal relationships job, an assistant' s job, document and office works, general affairs, and an education job. The necessary ability for the job of the security and secretary involves martial arts abilities, risk management ability, the strict keeping of secrets, decision-making ability, information processing ability, foreign language proficiency, understanding other cultures, communications skills and office work ability.

  • PDF

Security Threats to Enterprise Generative AI Systems and Countermeasures (기업 내 생성형 AI 시스템의 보안 위협과 대응 방안)

  • Jong-woan Choi
    • Convergence Security Journal
    • /
    • v.24 no.2
    • /
    • pp.9-17
    • /
    • 2024
  • This paper examines the security threats to enterprise Generative Artificial Intelligence systems and proposes countermeasures. As AI systems handle vast amounts of data to gain a competitive edge, security threats targeting AI systems are rapidly increasing. Since AI security threats have distinct characteristics compared to traditional human-oriented cybersecurity threats, establishing an AI-specific response system is urgent. This study analyzes the importance of AI system security, identifies key threat factors, and suggests technical and managerial countermeasures. Firstly, it proposes strengthening the security of IT infrastructure where AI systems operate and enhancing AI model robustness by utilizing defensive techniques such as adversarial learning and model quantization. Additionally, it presents an AI security system design that detects anomalies in AI query-response processes to identify insider threats. Furthermore, it emphasizes the establishment of change control and audit frameworks to prevent AI model leakage by adopting the cyber kill chain concept. As AI technology evolves rapidly, by focusing on AI model and data security, insider threat detection, and professional workforce development, companies can improve their digital competitiveness through secure and reliable AI utilization.

Comparing Qualifications of Korea and US Information Security Consultants: Focused on Job Ads (한국과 미국의 정보보호 컨설턴트의 자격요건 비교: 구인광고를 중심으로)

  • Lim, Jae-Jung;Kim, Ha-Young;Kim, Tae-Sung
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.27 no.5
    • /
    • pp.1157-1166
    • /
    • 2017
  • Demand for information security consulting is increasing as the number of major information infrastructure facilities in the country is increasing and the subject of ISMS mandatory certification is expanded. The demand for manpower also increases, but the manpower to meet the needs of industry is scarce. In order to cultivate the manpower that meets the demand, the demand of the industry should be grasped first. Therefore, this study collected and analyzed job advertisements in Korea and the United States in order to grasp the needs of industry. This will contribute to the development of policy to cultivate human resources of consultants in accordance with the future demand of the enterprise, and ultimately it will be able to solve the quality disparity of security consulting personnel.

Information Sovereignty as the Basis of Modern State Information Security

  • Zozulia, Oleksandr;Zozulia, Ihor;Brusakova, Oksana;Kholod, Yurii;Berezhna, Yevheniia
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.12
    • /
    • pp.264-268
    • /
    • 2021
  • In the context of globalization of information processes, the prevalence of information wars and terrorism, there are new threats to national interests in the information sphere, which actualizes providing the information sovereignty of modern states. Therefore, the purpose of the article is an in-depth analysis of the features and content of information sovereignty as a component of state sovereignty, its relationship with freedom of information and information security, as well as a characterization of the bases and directions of providing information sovereignty. The information sovereignty of the modern state includes its activities to determine national interests in the information sphere, the formation and implementation of information policy, providing information security, regulation and control of information processes. The realization of information sovereignty should be based on real freedom of information, information privacy and the state obligation to provide them. Ensuring information sovereignty also requires solving the problems of formation of modern information legislation, which would comprehensively establish the bases and directions of providing information sovereignty, exceptional cases of restriction of freedom of information.

A Study on the Improvement of Information Security Model for Precision Medicine Hospital Information System(P-HIS) (정밀의료 병원정보시스템(P-HIS) 정보보호모델 개선 방안에 관한 연구)

  • Dong-Won Kim
    • Convergence Security Journal
    • /
    • v.23 no.1
    • /
    • pp.79-87
    • /
    • 2023
  • Precision Medicine, which utilizes personal health information, genetic information, clinical information, etc., is growing as the next-generation medical industry. In Korea, medical institutions and information communication companies have coll aborated to provide cloud-based Precision Medicine Hospital Information Systems (P-HIS) to about 90 primary medical ins titutions over the past five years, and plan to continue promoting and expanding it to primary and secondary medical insti tutions for the next four years. Precision medicine is directly related to human health and life, making information protecti on and healthcare information protection very important. Therefore, this paper analyzes the preliminary research on inform ation protection models that can be utilized in cloud-based Precision Medicine Hospital Information Systems and ultimately proposes research on ways to improve information protection in P-HIS.

Strengthening Food Security through Food Quality Improvement - Focus on Grain Quality and Self-Sufficiency Rate

  • Meera Kweon
    • Proceedings of the Korean Society of Crop Science Conference
    • /
    • 2022.10a
    • /
    • pp.10-10
    • /
    • 2022
  • The concern about food security is rising as the unstable situation of food supply and demand due to the Covid-19 pandemic, climate change, and turbulent political situation. Korea's global food security index (GFSI), analyzed by the Economist Group, is considered good, but the level continuously decreases in comparing food security levels by country. In particular, Korea is highly dependent on food imports, and food and grain self-sufficiency rates continuously decrease. Therefore, increasing those rates to strengthen food security is urgent. Among the major grains, the self-sufficiency of wheat, com, and soybeans, except rice, is relatively low. Unlike the decrease in the annual rice consumption, the annual wheat consumption has been continuously maintained or increased, which is required public-private efforts to increase the self-sufficiency rate of wheat. Applying the government's policies implemented to increase the self-sufficiency rate of rice in the past will help increase the self-sufficiency rate of wheat. In other words, expanding wheat production and infrastructure, stabilizing supply and demand, and establishing a distribution system can be applied. However, the processing capability of wheat and rice is different, which is necessary to improve wheat quality and processing technology to produce consumer-preferred wheat-based products. The wheat and flour quality can be improved through breeding, cultivation, post-harvest management, and milling. In addition, research on formulation, processes, packaging, and storage to improve the quality of wheat-based products should be done continuously. Overall, food security could be strengthened by expanding wheat production and consumption, improving wheat quality, and increasing wheat self-sufficiency.

  • PDF

A Study on Meayres to Minimize Human Damage in Natural Disaster Vulnerable Areas (자연재해 취약지역 인명피해 최소화 방안에 관한 연구)

  • Seo, Jung Pyo;Cho, Won Cheol
    • Journal of Korean Society of Disaster and Security
    • /
    • v.7 no.1
    • /
    • pp.17-25
    • /
    • 2014
  • Due to the recent climate change impact, natural disasters occur due to sea surface rising, typhoon attacks, flash floods, local heavy rainfalls, landslides, and coastal area erosion, continuing to cause human and property damage. These impacts, coupled with urbanization and industrialization activities, are turning the previously safe areas into disaster-vulnerable areas, increasing human and economic damage. This paper aimed to prepare measures designed to minimize human damage in natural disaster vulnerable parts of South Korea in summer. Toward that end, how vulnerable areas were managed and what the damage was like were studied. Also, cases of human damage and statistics there of were reviewed and analyzed, relevant problems were derived, and thus structural and non-structural measures designed to minimize human damage were presented.

Smart Deaf Emergency Application Based on Human-Computer Interaction Principles

  • Ahmed, Thowiba E;Almadan, Naba Abdulraouf;Elsadek, Alma Nabil;Albishi, Haya Zayed;Al-Qahtani, Norah Eid;Alghamdi, arah Khaled
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.4
    • /
    • pp.284-288
    • /
    • 2021
  • Human-computer interaction is a discipline concerned with the design, evaluation, and implementation of interactive systems for human use. In this paper we suggest designing a smart deaf emergency application based on Human-Computer Interaction (HCI) principles whereas nowadays everything around us is becoming smart, People already have smartphones, smartwatches, smart cars, smart houses, and many other technologies that offer a wide range of useful options. So, a smart mobile application using Text Telephone or TeleTYpe technology (TTY) has been proposed to help people with deafness or impaired hearing to communicate and seek help in emergencies. Deaf people find it difficult to communicate with people, especially in emergency status. It is stipulated that deaf people In all societies must have equal rights to use emergency services as other people. With the proposed application the deafness or impaired hearing can request help with one touch, and the location will be determined, also the user status will be sent to the emergency services through the application, making it easier to reach them and provide them with assistance. The application contains several classifications and emergency status (traffic, police, road safety, ambulance, fire fighting). The expected results from this design are interactive, experiential, efficient, and comprehensive features of human-computer interactive technology which may achieve user satisfaction.

Assessment of performance of machine learning based similarities calculated for different English translations of Holy Quran

  • Al Ghamdi, Norah Mohammad;Khan, Muhammad Badruddin
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.4
    • /
    • pp.111-118
    • /
    • 2022
  • This research article presents the work that is related to the application of different machine learning based similarity techniques on religious text for identifying similarities and differences among its various translations. The dataset includes 10 different English translations of verses (Arabic: Ayah) of two Surahs (chapters) namely, Al-Humazah and An-Nasr. The quantitative similarity values for different translations for the same verse were calculated by using the cosine similarity and semantic similarity. The corpus went through two series of experiments: before pre-processing and after pre-processing. In order to determine the performance of machine learning based similarities, human annotated similarities between translations of two Surahs (chapters) namely Al-Humazah and An-Nasr were recorded to construct the ground truth. The average difference between the human annotated similarity and the cosine similarity for Surah (chapter) Al-Humazah was found to be 1.38 per verse (ayah) per pair of translation. After pre-processing, the average difference increased to 2.24. Moreover, the average difference between human annotated similarity and semantic similarity for Surah (chapter) Al-Humazah was found to be 0.09 per verse (Ayah) per pair of translation. After pre-processing, it increased to 0.78. For the Surah (chapter) An-Nasr, before preprocessing, the average difference between human annotated similarity and cosine similarity was found to be 1.93 per verse (Ayah), per pair of translation. And. After pre-processing, the average difference further increased to 2.47. The average difference between the human annotated similarity and the semantic similarity for Surah An-Nasr before preprocessing was found to be 0.93 and after pre-processing, it was reduced to 0.87 per verse (ayah) per pair of translation. The results showed that as expected, the semantic similarity was proven to be better measurement indicator for calculation of the word meaning.

Impact of Philosophical Anthropology and Axiology on the Current Understanding of the Institution of Human Rights

  • Buglimova, Olga V.;Goncharov, Igor;Malinenko, Elvira;Matveeva, Natalya;Stepanenko, Yuri;Chernichkina, Galina
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.7
    • /
    • pp.327-331
    • /
    • 2022
  • The article aims at studying the institution of human rights in an ever-evolving world in the context of the interdisciplinary approach. The main scientific method was deduction that allowed examining the specific interdisciplinary approach in relation to the institution of human rights on the global scale. To solve the issue set, it is necessary to study legal foundations and features of the interdisciplinary approach to the institution of human rights in the modern world. The article proves there is no theoretical anthropological understanding of the institution of human rights. It has been concluded that the appeal to anthropological jurisprudence requires the identification of the initial theoretical and methodological principles, parameters and axioms of cognition, the integration of a person into the subject field of legal science, linking jurisprudence with the chosen external environment (philosophy, sociology, theology, etc.), predetermining the existence (understanding) of a person, causing qualitative differences and the structure of subject-methodological phenomena. In addition to the identification of such hypotheses, prerequisites and axioms, the basic method (principle) of cognition and its heuristic potential are also being searched (defined). The terminological designation of the formed subject-methodological phenomenon (legal anthropology, anthropology of law, anthropological approach, etc.) reveals its role in the system of interdisciplinary relations of legal science.