• 제목/요약/키워드: Human security

Search Result 1,181, Processing Time 0.025 seconds

A Study on Meayres to Minimize Human Damage in Natural Disaster Vulnerable Areas (자연재해 취약지역 인명피해 최소화 방안에 관한 연구)

  • Seo, Jung Pyo;Cho, Won Cheol
    • Journal of Korean Society of Disaster and Security
    • /
    • v.7 no.1
    • /
    • pp.17-25
    • /
    • 2014
  • Due to the recent climate change impact, natural disasters occur due to sea surface rising, typhoon attacks, flash floods, local heavy rainfalls, landslides, and coastal area erosion, continuing to cause human and property damage. These impacts, coupled with urbanization and industrialization activities, are turning the previously safe areas into disaster-vulnerable areas, increasing human and economic damage. This paper aimed to prepare measures designed to minimize human damage in natural disaster vulnerable parts of South Korea in summer. Toward that end, how vulnerable areas were managed and what the damage was like were studied. Also, cases of human damage and statistics there of were reviewed and analyzed, relevant problems were derived, and thus structural and non-structural measures designed to minimize human damage were presented.

Smart Deaf Emergency Application Based on Human-Computer Interaction Principles

  • Ahmed, Thowiba E;Almadan, Naba Abdulraouf;Elsadek, Alma Nabil;Albishi, Haya Zayed;Al-Qahtani, Norah Eid;Alghamdi, arah Khaled
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.4
    • /
    • pp.284-288
    • /
    • 2021
  • Human-computer interaction is a discipline concerned with the design, evaluation, and implementation of interactive systems for human use. In this paper we suggest designing a smart deaf emergency application based on Human-Computer Interaction (HCI) principles whereas nowadays everything around us is becoming smart, People already have smartphones, smartwatches, smart cars, smart houses, and many other technologies that offer a wide range of useful options. So, a smart mobile application using Text Telephone or TeleTYpe technology (TTY) has been proposed to help people with deafness or impaired hearing to communicate and seek help in emergencies. Deaf people find it difficult to communicate with people, especially in emergency status. It is stipulated that deaf people In all societies must have equal rights to use emergency services as other people. With the proposed application the deafness or impaired hearing can request help with one touch, and the location will be determined, also the user status will be sent to the emergency services through the application, making it easier to reach them and provide them with assistance. The application contains several classifications and emergency status (traffic, police, road safety, ambulance, fire fighting). The expected results from this design are interactive, experiential, efficient, and comprehensive features of human-computer interactive technology which may achieve user satisfaction.

Assessment of performance of machine learning based similarities calculated for different English translations of Holy Quran

  • Al Ghamdi, Norah Mohammad;Khan, Muhammad Badruddin
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.4
    • /
    • pp.111-118
    • /
    • 2022
  • This research article presents the work that is related to the application of different machine learning based similarity techniques on religious text for identifying similarities and differences among its various translations. The dataset includes 10 different English translations of verses (Arabic: Ayah) of two Surahs (chapters) namely, Al-Humazah and An-Nasr. The quantitative similarity values for different translations for the same verse were calculated by using the cosine similarity and semantic similarity. The corpus went through two series of experiments: before pre-processing and after pre-processing. In order to determine the performance of machine learning based similarities, human annotated similarities between translations of two Surahs (chapters) namely Al-Humazah and An-Nasr were recorded to construct the ground truth. The average difference between the human annotated similarity and the cosine similarity for Surah (chapter) Al-Humazah was found to be 1.38 per verse (ayah) per pair of translation. After pre-processing, the average difference increased to 2.24. Moreover, the average difference between human annotated similarity and semantic similarity for Surah (chapter) Al-Humazah was found to be 0.09 per verse (Ayah) per pair of translation. After pre-processing, it increased to 0.78. For the Surah (chapter) An-Nasr, before preprocessing, the average difference between human annotated similarity and cosine similarity was found to be 1.93 per verse (Ayah), per pair of translation. And. After pre-processing, the average difference further increased to 2.47. The average difference between the human annotated similarity and the semantic similarity for Surah An-Nasr before preprocessing was found to be 0.93 and after pre-processing, it was reduced to 0.87 per verse (ayah) per pair of translation. The results showed that as expected, the semantic similarity was proven to be better measurement indicator for calculation of the word meaning.

Impact of Philosophical Anthropology and Axiology on the Current Understanding of the Institution of Human Rights

  • Buglimova, Olga V.;Goncharov, Igor;Malinenko, Elvira;Matveeva, Natalya;Stepanenko, Yuri;Chernichkina, Galina
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.7
    • /
    • pp.327-331
    • /
    • 2022
  • The article aims at studying the institution of human rights in an ever-evolving world in the context of the interdisciplinary approach. The main scientific method was deduction that allowed examining the specific interdisciplinary approach in relation to the institution of human rights on the global scale. To solve the issue set, it is necessary to study legal foundations and features of the interdisciplinary approach to the institution of human rights in the modern world. The article proves there is no theoretical anthropological understanding of the institution of human rights. It has been concluded that the appeal to anthropological jurisprudence requires the identification of the initial theoretical and methodological principles, parameters and axioms of cognition, the integration of a person into the subject field of legal science, linking jurisprudence with the chosen external environment (philosophy, sociology, theology, etc.), predetermining the existence (understanding) of a person, causing qualitative differences and the structure of subject-methodological phenomena. In addition to the identification of such hypotheses, prerequisites and axioms, the basic method (principle) of cognition and its heuristic potential are also being searched (defined). The terminological designation of the formed subject-methodological phenomenon (legal anthropology, anthropology of law, anthropological approach, etc.) reveals its role in the system of interdisciplinary relations of legal science.

Human Capital as a Development Factor for Cultural and Creative Industries

  • Horban, Yurii;Dolbenko, Tetiana;Yaroshenko, Tetiana;Sokol, Oleksandr;Miatenko, Nataliia
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.12spc
    • /
    • pp.604-610
    • /
    • 2021
  • Human capital is the defining value of the national economy under market conditions. The manifestation of human capital is realized as an intellectual and creative capital, theoretically grounded and proven. The realization of intellectual capital is realized through the research creativity of scientists and researchers, and creative capital is manifested through artists and thinkers. Accordingly, creativity in market conditions forms a separate source of income and is an essential article in the formation of the GDP of the national economy. This research aims to analyze human capital from the perspective of cultural and creative industries. Research methods: systematization; comparative analysis of individual indicators of advanced countries of the world on the training system; statistical, taking into account macroeconomic indicators to assess the level of national creativity potential; system and logical analysis; method of information synthesis. Research results. The structural and quantitative composition of the factors of intellectual and creative capital formation has been systematized. The article proves that the unique properties of human capital, knowledge, creativity, experience and professional skills are the push factors of creativity development of the national economy and provide the priority development of creative and cultural industry that allows generating the added value on the national scale. The functions of creativity in the sphere of cultural industries are highlighted. It is noted that education and creativity of both intellectual and creative capital are the forming basis. The research of the world's advanced countries on the creativity index has pointed out the Netherlands as the leading country in the quantitative measurement of creativity. The economic development factors of the Netherlands were analyzed from the position of economic creativity, which allowed the formation of a two-factor model providing priority development of creativity in the cultural and creative industries.

Optical Spectroscopic Analysis Techniques to Detect Elemental Profile of Human Teeth Dentine

  • Saifullah Jamali;Muhammad Aslam Khoso;Irfan Ali Sanjrani;Hussain Saleem;Tariq Ali Siyal;Muhammad Ashraf;Mansoor Ahmed Memon;Ghulam Murtaza;Zahid Hussain Arain;Zaheer Ahmed Ujjan;Muhammad Niaz Laghari;Samina Saleem;Nek M. Shaikh;Waseem A. Bhutto;Abdul Majid Soomro;Altaf H. Nizamani
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.3
    • /
    • pp.193-202
    • /
    • 2023
  • Numerous articles under the study and the examination of heavy metals in human teeth have been published in recent years. The heavy metal poisoning is a widespread issue emerged in toxicology area these days. It has been discovered that long-term exposure to heavy metals typically present in traces, in our everyday meals, drinking water, and in the environment as pollution causes heavy metal poisoning in human beings. Industrial effluents, Coal and Oil, as well as a variety of consumer items, such as cosmetics, can all cause this type of exposure. Teeth, which are often thought of as exoskeleton parts, store heavy metals with a high affinity and represent long-term exposure information. In this study, we have chosen and examined the sections of dentine instead, then examined the entire tooth. We have combined the work done on the examination of heavy metals in human teeth using several instrumental approaches e.g. "Optical Spectroscopic Techniques" to detect elemental profile of human teeth in the current study.

Study about the Impact of Information Security Systems on Corporate Performance: Based on IT Relatedness Theory (정보보안체계 수립이 Multibusiness 기업 성과에 미치는 영향에 관한 연구: IT Relatedness 이론 관점에서)

  • Koo, Ja Myon;Park, Joo Seok;Park, Jae Hong
    • Asia pacific journal of information systems
    • /
    • v.23 no.4
    • /
    • pp.129-149
    • /
    • 2013
  • According to the development of new Information Technologies, firms consistently invest a significant amount of money in IT activities, such as establishing internal and external information systems. However, several anti-Information activities-such as hacking, leakage of information and system destruction-are also rapidly increasing, thus many firms are exposed to direct and indirect threats. Therefore, firms try to establish information security systems and manage these systems more effectively via an enterprise perspective. However, stakeholders or some managers have negative opinions about information security systems. Therefore, in this research, we study the relationship between multibusiness firms' performance and information security systems. Information security indicates physical and logical correspondence of information system department against threats and disaster. Studies on information security systems suggested frameworks such as IT Governance Cube and COBIT Framework to identify information security systems. Thus, this study define that information security systems is a controlled system on enterprise IT process and resource on IT Governance perspective rather than independent domain of IT. Thus, Information Security Systems should be understood as a subordinate concept of IT and business processes. In addition, this study incorporates information capability to information security system literature to show the positive relationship between Information Security Systems and Corporate Performance. The concept of information capability suggested that an interaction of human, information, technical and an effect on corporate performance using three types of capability (IT Practice, Information Management Practice, Information Behaviors and Values). Information capability is about firms' capability to manage IT infrastructure and information as well as individual employees who use IT infrastructure and information. Thus, this study uses information capability as a mediating variable for the relationship between information security systems and firms' performance. To investigate the relationship between Information Security Systems and multibusiness firms' performance, this study extends the IT relatedness concept into Information Security Systems. IT relatedness provides understanding of how corporations cope with conflicts between headquarters and business units to create a synergy effect and achieve high performance using IT resources. Based on the previous literature, this study develops the IT Security Relatedness model. IT Security Relatedness is our main independent variable, while Information Capability and Information Security Performance are mediating variables. To control for the common method bias, we collect each multibusiness firm's financial performance and use it as our dependent variable. We find that Information Security Systems influence Information Capability and Information Security Performance positively, and these two variables consequently influence Corporate Performance positively. In addition, this result indirectly shows that corporations under a multibusiness environment can obtain synergy effects using the integrated Information Security Systems. This positive impact of Information Security Systems on multibusiness firms' performance has an important implication to various stakeholders. Therefore, multibusiness firms need to establish Information Security Systems to achieve better financial performance.

The Korean State and Candlelight Democracy: Paradigms and Evolution

  • Bedeski, Robert
    • Journal of Contemporary Eastern Asia
    • /
    • v.16 no.2
    • /
    • pp.82-92
    • /
    • 2017
  • The Korean state evolved as a distinct entity in a region of major power convergence and conflict. All states, as human constructions, seek sovereignty and life security of their subjects/citizens, and are rotted in organic society. In the Republic of Korea, constitutional order has provided a framework for political action and a succession of regimes - authoritarianism, military dictatorship, and constitutional democracy. Since 1960 two paradigms have undergone a cycle of growth and decline, and a third, since the 2016 candlelight demonstrations in Gwanghwamun, may be the beginnning of a third generation paradigm - populist constitutionalism.

Design of User Authentication Protocol based on Human Memorable Password (패스워드 기반 인증 프로토콜)

  • 박익수;오병균
    • Proceedings of the Korea Institutes of Information Security and Cryptology Conference
    • /
    • 2003.12a
    • /
    • pp.198-204
    • /
    • 2003
  • 지금까지 제안된 패스워드를 이용하는 인증 프로토콜은 오프라인 추측 공격이나 패스워드 파일 컴프로마이즈에 대하여 안전하지 않으므로 이에 대한 연구가 요구되고 있다. 본 논문에서는 패스워드를 이용하는 인증 프로토콜인 스키마 PAP(Password based Authentication Protocol)을 적용하여 새로운 인증 프로토콜 PAPRSA를 제안하였다. PAP는 패스워드를 표현하는 많은 값들 중에서 임의로 선택한 한 값을 처리하는 것을 특징으로 한다. PAPRSA는 패스워드를 표현하는 값을 처리하기 위하여 RSA를 이용하는 PAP기반 인중 프로토콜이다. 제안된 PAPRSA는 오프라인 추측 공격과 패스워드 파일 컴프로마이즈를 포함한 공격들로부터 안전하였으며, 패스 수와 계산량을 측정한 결과 효율성 면에서 매우 우수하였다.

  • PDF