• Title/Summary/Keyword: Human security

Search Result 1,181, Processing Time 0.025 seconds

Transfer Learning for Face Emotions Recognition in Different Crowd Density Situations

  • Amirah Alharbi
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.4
    • /
    • pp.26-34
    • /
    • 2024
  • Most human emotions are conveyed through facial expressions, which represent the predominant source of emotional data. This research investigates the impact of crowds on human emotions by analysing facial expressions. It examines how crowd behaviour, face recognition technology, and deep learning algorithms contribute to understanding the emotional change according to different level of crowd. The study identifies common emotions expressed during congestion, differences between crowded and less crowded areas, changes in facial expressions over time. The findings can inform urban planning and crowd event management by providing insights for developing coping mechanisms for affected individuals. However, limitations and challenges in using reliable facial expression analysis are also discussed, including age and context-related differences.

Cyber Security Management of Small and Medium-sized Enterprises with Consideration of Business Management Environment (중소기업의 기업경영 환경을 고려한 사이버 보안 관리)

  • Chun, Yong-Tae
    • Korean Security Journal
    • /
    • no.59
    • /
    • pp.9-35
    • /
    • 2019
  • Until now, a lot of research on cyber security have been tried, but there have been few studies on overall relationships, including internal factors and external factors. Therefore, this study examined cyber security management considering not only internal elements of SMEs but also corporate management environment. The first qualitative analysis and the second quantitative analysis were conducted through mixed method research. Qualitative analysis was conducted through a semi-structured interview method, and three themes were found: insufficient cyber security management system, internal noncooperation for cyber security, and problems derived from decision-making system. In the quantitative analysis, multiple regression analysis was conducted on the data obtained through the questionnaire. The perception of cyber threats and internal support among independent variables positively influenced the cyber security management system or the dependent variable. Through this study, internal variables had a causal impact on the cyber security management system rather than external environment variables. This implies that the variables related to the organizational culture such as employees' perception are important. These results are expected to provide practical significance for enhancing the cyber security management system in SMEs.

A Study on Priorities of the Components of Big Data Information Security Service by AHP (AHP 기법을 활용한 Big Data 보안관리 요소들의 우선순위 분석에 관한 연구)

  • Biswas, Subrata;Yoo, Jin Ho;Jung, Chul Yong
    • The Journal of Society for e-Business Studies
    • /
    • v.18 no.4
    • /
    • pp.301-314
    • /
    • 2013
  • The existing computer environment, numerous mobile environments and the internet environment make human life easier through the development of IT technology. With the emergence of the mobile and internet environment, data is getting bigger rapidly. From this environment, we can take advantage of using those data as economic assets for organizations which make dreams come true for the emerging Big Data environment and Big Data security services. Nowadays, Big Data services are increasing. However, these Big Data services about Big Data security is insufficient at present. In terms of Big Data security the number of security by Big Data studies are increasing which creates value for Security by Big Data not Security for Big Data. Accordingly in this paper our research will show how security for Big Data can vitalize Big Data service for organizations. In details, this paper derives the priorities of the components of Big Data Information Security Service by AHP.

A Study on Developing Professional Training of the Private Security Industry (민간경비 산업의 전문인력 양성 방안)

  • Park, Aok-Cheol
    • Journal of the Society of Disaster Information
    • /
    • v.2 no.1
    • /
    • pp.91-111
    • /
    • 2006
  • Technology development of modern society reduces times, costs and labor costs but demands work forces requiring expert knowledge on technology. Consequently knowledge worker becomes important. Not changing into a specialist acquired expert knowledge, people can't survive in competitive society. Therefore, the purpose of this study is to grasp the actual condition of private security industry and to examine problems. The final goal is to find the way to improve the professionalism of workers in private security industry. First. Now we must make up for the subject for examination actually and be in a triangular position and complement a professional materials for teaching. At the same time it must strengthen the education using advanced instruments seek to Total Security System. Moreover it is demanded 'institutional supplement of security guard instructors' which means job training for security guard instructor Second. On the job training which can deal with a state of emergency through 'security guard training' with a theory and an actual training must be strengthen. Also, most security guards have low understandings and interests because their ages are from 50's to 60's. Accordingly proper education must be offered to security guard. Third. Certification system of the private security guards are needed to fix the problems on an indiscreet issue and an abuse of license through deliberation on the security license. Fourth. Universities must find a new market to minimize the squandering of human resources because of oversupply and reduce the personnel. Also with enhancing the employment rate through specialized education, universities must offer an education which keeps pace with the times for not an entrance strategy but a long-term development. Effort for education of specialist will produce an improvement in business quality and improved services produce a customer satisfaction. A customer satisfaction will produce a fame of a successful company and positive images in market area. Finally the private industry will be developed by productivity improvement.

  • PDF

Analysis the job-ability demanded in the security and secretary (경호비서에게 요구되는 업무능력 분석)

  • Park, Ok-cheol
    • Journal of the Society of Disaster Information
    • /
    • v.4 no.2
    • /
    • pp.40-50
    • /
    • 2008
  • The purpose of this study is to analyze the job of the security and secretary, to offer useful basic data throughout human resources management by withdrawing the ability required from the security and secretary based on the analyzed results. In this regard, this study intended to look into the job of the security and secretary, the necessary ability for the job of the security and secretary. To achieve the research goals, the study selected the research participants, composed of 5 secretaries for security with more than 5-year careers after graduating from a security and secretarial service department in a college and conducted an in-depth interview with them concerning their jobs. The in-depth interview data from the 5 participants was applied with a classification analysis used by Spradley (1980). In order to enhance the dependability and validity of the research, the study held an expert meeting composed of 2 persons with a doctoral degree in securities service studies and 1 person with a master's degree in secretarial information studies, twice. Also, the study drew results concerning the job of the security and secretary and the necessary ability of the job. Though the above process, the following conclusions were drawn; the job of the security and secretary includes the areas of job safety, a housing residence job, a health care job, an interpersonal relationships job, an assistant' s job, document and office works, general affairs, and an education job. The necessary ability for the job of the security and secretary involves martial arts abilities, risk management ability, the strict keeping of secrets, decision-making ability, information processing ability, foreign language proficiency, understanding other cultures, communications skills and office work ability.

  • PDF

Security Threats to Enterprise Generative AI Systems and Countermeasures (기업 내 생성형 AI 시스템의 보안 위협과 대응 방안)

  • Jong-woan Choi
    • Convergence Security Journal
    • /
    • v.24 no.2
    • /
    • pp.9-17
    • /
    • 2024
  • This paper examines the security threats to enterprise Generative Artificial Intelligence systems and proposes countermeasures. As AI systems handle vast amounts of data to gain a competitive edge, security threats targeting AI systems are rapidly increasing. Since AI security threats have distinct characteristics compared to traditional human-oriented cybersecurity threats, establishing an AI-specific response system is urgent. This study analyzes the importance of AI system security, identifies key threat factors, and suggests technical and managerial countermeasures. Firstly, it proposes strengthening the security of IT infrastructure where AI systems operate and enhancing AI model robustness by utilizing defensive techniques such as adversarial learning and model quantization. Additionally, it presents an AI security system design that detects anomalies in AI query-response processes to identify insider threats. Furthermore, it emphasizes the establishment of change control and audit frameworks to prevent AI model leakage by adopting the cyber kill chain concept. As AI technology evolves rapidly, by focusing on AI model and data security, insider threat detection, and professional workforce development, companies can improve their digital competitiveness through secure and reliable AI utilization.

Comparing Qualifications of Korea and US Information Security Consultants: Focused on Job Ads (한국과 미국의 정보보호 컨설턴트의 자격요건 비교: 구인광고를 중심으로)

  • Lim, Jae-Jung;Kim, Ha-Young;Kim, Tae-Sung
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.27 no.5
    • /
    • pp.1157-1166
    • /
    • 2017
  • Demand for information security consulting is increasing as the number of major information infrastructure facilities in the country is increasing and the subject of ISMS mandatory certification is expanded. The demand for manpower also increases, but the manpower to meet the needs of industry is scarce. In order to cultivate the manpower that meets the demand, the demand of the industry should be grasped first. Therefore, this study collected and analyzed job advertisements in Korea and the United States in order to grasp the needs of industry. This will contribute to the development of policy to cultivate human resources of consultants in accordance with the future demand of the enterprise, and ultimately it will be able to solve the quality disparity of security consulting personnel.

Information Sovereignty as the Basis of Modern State Information Security

  • Zozulia, Oleksandr;Zozulia, Ihor;Brusakova, Oksana;Kholod, Yurii;Berezhna, Yevheniia
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.12
    • /
    • pp.264-268
    • /
    • 2021
  • In the context of globalization of information processes, the prevalence of information wars and terrorism, there are new threats to national interests in the information sphere, which actualizes providing the information sovereignty of modern states. Therefore, the purpose of the article is an in-depth analysis of the features and content of information sovereignty as a component of state sovereignty, its relationship with freedom of information and information security, as well as a characterization of the bases and directions of providing information sovereignty. The information sovereignty of the modern state includes its activities to determine national interests in the information sphere, the formation and implementation of information policy, providing information security, regulation and control of information processes. The realization of information sovereignty should be based on real freedom of information, information privacy and the state obligation to provide them. Ensuring information sovereignty also requires solving the problems of formation of modern information legislation, which would comprehensively establish the bases and directions of providing information sovereignty, exceptional cases of restriction of freedom of information.

A Study on the Improvement of Information Security Model for Precision Medicine Hospital Information System(P-HIS) (정밀의료 병원정보시스템(P-HIS) 정보보호모델 개선 방안에 관한 연구)

  • Dong-Won Kim
    • Convergence Security Journal
    • /
    • v.23 no.1
    • /
    • pp.79-87
    • /
    • 2023
  • Precision Medicine, which utilizes personal health information, genetic information, clinical information, etc., is growing as the next-generation medical industry. In Korea, medical institutions and information communication companies have coll aborated to provide cloud-based Precision Medicine Hospital Information Systems (P-HIS) to about 90 primary medical ins titutions over the past five years, and plan to continue promoting and expanding it to primary and secondary medical insti tutions for the next four years. Precision medicine is directly related to human health and life, making information protecti on and healthcare information protection very important. Therefore, this paper analyzes the preliminary research on inform ation protection models that can be utilized in cloud-based Precision Medicine Hospital Information Systems and ultimately proposes research on ways to improve information protection in P-HIS.

Strengthening Food Security through Food Quality Improvement - Focus on Grain Quality and Self-Sufficiency Rate

  • Meera Kweon
    • Proceedings of the Korean Society of Crop Science Conference
    • /
    • 2022.10a
    • /
    • pp.10-10
    • /
    • 2022
  • The concern about food security is rising as the unstable situation of food supply and demand due to the Covid-19 pandemic, climate change, and turbulent political situation. Korea's global food security index (GFSI), analyzed by the Economist Group, is considered good, but the level continuously decreases in comparing food security levels by country. In particular, Korea is highly dependent on food imports, and food and grain self-sufficiency rates continuously decrease. Therefore, increasing those rates to strengthen food security is urgent. Among the major grains, the self-sufficiency of wheat, com, and soybeans, except rice, is relatively low. Unlike the decrease in the annual rice consumption, the annual wheat consumption has been continuously maintained or increased, which is required public-private efforts to increase the self-sufficiency rate of wheat. Applying the government's policies implemented to increase the self-sufficiency rate of rice in the past will help increase the self-sufficiency rate of wheat. In other words, expanding wheat production and infrastructure, stabilizing supply and demand, and establishing a distribution system can be applied. However, the processing capability of wheat and rice is different, which is necessary to improve wheat quality and processing technology to produce consumer-preferred wheat-based products. The wheat and flour quality can be improved through breeding, cultivation, post-harvest management, and milling. In addition, research on formulation, processes, packaging, and storage to improve the quality of wheat-based products should be done continuously. Overall, food security could be strengthened by expanding wheat production and consumption, improving wheat quality, and increasing wheat self-sufficiency.

  • PDF