• Title/Summary/Keyword: Industrial Security Market

Search Result 130, Processing Time 0.019 seconds

Analysis Research on Preparation of 4th Wave (AI) of the Visegrad Group

  • Kim, Dong Hwa;Seo, Dae-Sung
    • The Journal of Asian Finance, Economics and Business
    • /
    • v.5 no.4
    • /
    • pp.201-211
    • /
    • 2018
  • The paper suggests making a policy and strategies for a way of exporting Korean ICT product effectively in the EU and Eastern area, and an effective preparation of 4th industrial revolution through analysis of preparation status of 4th industrial revolution of the Visegrad group. Analyze policy, status, what they want for 4th preparation in the Visegrad group from comparing characteristics analysis of each country's official data, publication data, portal, paper, and etc. They have been preparing for 4th industrial revolution long time ago as basic research and business before 4th wave word. With these basic results, they are trying to apply such as, AI, S/W, security, ICT, etc. of 4th wave core technology. For the development of new export market in EU, the Korean team should research with university and research center or venture company. Through these cooperation, they should understand their personal characteristic, lifestyle, and what consumers want to purchase in EU. And this results can be used in South Asia and India that give a big effect to all over the world ICT market. The external impact of the 4th wave must have a long-term shift in manpower, and production policy is related to the EU's strategic role, or the preparation of the 4th wave to the V4 country in the short term.

Trend of standardization in the field of Industrial Security through ISO/TC 292 (ISO/TC 292에 의한 산업보안 분야 국제표준화의 동향)

  • Park, Hyeon-Ho
    • Korean Security Journal
    • /
    • no.48
    • /
    • pp.79-111
    • /
    • 2016
  • This study aims at analyzing the global trend of standardization in the field of Industrial Security through ISO/TC 292. It covers broad areas from risk management for industrial property protection and loss prevention through supply chain security, product and document fraud and counterfeiting countermeasures and control and community resilience. It also explores the historical background of the standardization in the security field, how ISO TC 292 came out as a leading group in order to standardize relevant security management systems. TC 292 deals with terminology, general security-related standards and supply chain security management. One of the major findings from this analysis is that security targets and threats are diversified and so organizations like enterprises should have proper flexibility to adapt themselves to new security environment and take appropriate resilience system to cope with the threats and incidents. Also the ISO standardization requires public or private entities to take holistic approaches in security management. Finally, it was found that South Korea has to prepare for this global trend of standardization in this field so that ISO certification market demand and the requirements for transnational trades can be well met.

  • PDF

A Risk Management of Architectural Planning Phase in the Korea Private Infrastructure Project Using Project Financing (프로젝트 파이낸싱을 활용한 국내 SOC 민간투자사업 건축기획 단계에서의 리스크 관리)

  • Lee, Sin-young;Kim, Seon-Gyoo;Lee, Nak-Woon
    • Journal of Industrial Technology
    • /
    • v.27 no.B
    • /
    • pp.177-184
    • /
    • 2007
  • Project Financing(PF) was introduced from the way of banks' conditional financing that take buried oil as security and offer required money to oil explores which have weak loaning ability in the U.S. 1930s. After that PF has developed with financial market and it has been activated in the market of Korea since 'An Institution about Private Financing Invitation Promotion' was established. Started with I-Hwa Ryoung tunnel project, PF has been used in the Metropolitan Area Airport Highway and etc. But because of the risk that occurred by PF's complexity and uncertainty, PF has not been used fully and there are only few practical examples. The purpose of the present study is to investigate how to decrease, identify and extract the risky factors of project that being planned by PF.

  • PDF

A Evaluation of Strategic Informed Trader Model with Broker (브로커가 존재하는 전략적 정보거래모형의 평가)

  • Kim, Sung-Tak
    • Korean Business Review
    • /
    • v.12
    • /
    • pp.103-118
    • /
    • 1999
  • Many security companies in Korea play the same role as the broker who can do dual trading in the American securities market. It seems that the proper model for the Korean market microstructure should contain the existence of broker. But the broker occupied little attention in U.S. until the early 1990. The purpose of this paper is to review and evaluate the strategic trader models of market microstructure theory which contain the broker as player. Three major models, Sarkar(1995), Chakravarty(1994), Chun, Oh, and Weller(1996) were compared and evaluated critically in the context of the Korean security market microstructure. The model of Sarkar(1995) was evaluated to be more appropriate for the Korean securities market context. Finally, limitations of this paper were indicated and some directions for the further research were suggested.

  • PDF

A study on the improvements of law for industrial technology outflow prevention : Focusing on international M&A (해외 M&A시 산업기술 유출 방지를 위한 법 개선 연구)

  • Kim, Seong-Jun;Kim, Woo-Hyun;Yi, Yeong-Seo
    • Korean Security Journal
    • /
    • no.29
    • /
    • pp.7-34
    • /
    • 2011
  • Achieving high-level technology in fields such as IT-related industry, semiconductors, mobile phones, LCD, automobile, shipbuilding, etc., Korea has become an international market leader in those fields. In results, there are the increasing numbers of technology leakage attempts in various manners. Recently, technology leakages are not limited to illegal industrial espionage, but also occur during usual corporate proceedings such as technology transfer, joint research and M&A. In fact, there was a technology leakage issue in the M&A between Ssangyong Motors of Korea and Shanghai Motors of China. Current M&A regulations of Korea are not independent laws, but are spread over various laws, such as commercial law, Capital Markets and the Financial Investment Services Act, Foreign Trade Act, etc. This paper focuses on whether the current Korean regulations regarding M&A are able to effectively restrict the leakage of major information of corporate during M&A and seeks the complements.

  • PDF

A Study on Increasing Security Following Mutual Interaction and Integration of Dualized Security Category between Information Security and Personal Information Protection (정보보안과 개인정보보호 간의 이원화 보안범주의 상호연계 및 통합에 따른 보안성 증대에 대한 연구)

  • Seo, Woo-Seok
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.13 no.3
    • /
    • pp.601-608
    • /
    • 2018
  • While the legislation on the protection of personal information in public institutions was enacted and amended, the guidelines and laws on information security were focused, contracted and realized with focus on specific institutions. Mutual laws and guidelines have been applied and realized for the dual purpose of securing both the asset of macroscopic information and the asset of personally identification information, which are mutually different media information. However, in a bid to present the definition and direction of the fourth industrial revolution in 2017, a variety of products and solutions for security designed to ensure the best safety line of the 21st century, and the third technology with the comprehensive coverage for all these fields, a number of solutions and technologies, including IOT(: Internet of Things), ICT Internet of Things(: ICT), ICT Cloud, and AI (: Artificial Intelligence) are pouring into the security market as if plastic doll toys were manufactured in massive scale into the market. With the rising need for guaranteeing the interrelation for securities with dualistic physical, administrative, logical and psychological differences, that is, information security and personal information security that are classified into two main categories and for the enhanced security for integrated management and technical application, the study aims to acquire the optimal security by analyzing the interrelationship between the two cases and applying it to the study results.

Advanced Resolution on Escort Security Area by Reviewing the System in Private Security Business (민간경비업의 제도적 고찰을 통한 호송경비업의 개선방안)

  • Kim, Sung-Su
    • Korean Security Journal
    • /
    • no.25
    • /
    • pp.63-87
    • /
    • 2010
  • Our society nowadays sees the increase in damage from crime on lives and properties by leaps and bounds in line with the economic take-off, and as a result, the raise of individual income. When considering such a hike in crime, it is desirable that the police framework be enhanced. However, thanks to the failure to correspond to this, it could be safely said that a good portion of accountability was shifted to the private security industry in regard to security for the people. Accordingly, the request for escort security business is on the increase regarding expansion and improvement about this industrial sector. As such, it is necessary to get the related system rearranged for authority on the part of escort guards, who are directly exposed to numerous crimes. On top of this, dispersion is required for the escort security businesses centralized in the metropolitan area. It is also necessary for the security guard system to be strengthened and disintegrated into details so that the escort security services are available to people in more safe and easily manners than ever before. When the qualification regime is operated based on this refreshed system, the efficient escort security work would be realized. The dichotomy into act on Special Security Guard and act on Security Business should be dealt with once again for integration as an issue on the front burner in the academic area, and through which the escort security market could be fit for the globalization as well. This paper would provide the solution that leads to more professional and efficient results from comprehension of progress situations in reality by starting from the concept on private security to the analysis of the conditions in this industrial sector.

  • PDF

Quality Strategy in the Age of the 4th Industrial Revolution by Technological Evolution (기술 발전에 따른 4차 산업혁명 시대의 품질 전략)

  • Chong, Hye Ran;Hong, Sung Hoon;Lee, Min Koo;Kwon, Hyuck Moo
    • Journal of Korean Society for Quality Management
    • /
    • v.46 no.3
    • /
    • pp.483-496
    • /
    • 2018
  • Purpose: This paper proposes a quality strategy based on the evolution of technology in the age of the 4th Industrial Revolution. Methods: We examine the theory of past quality activities and the changes in quality paradigm, and analyze key words for the technologies and key issues of the 4th Industrial Revolution. Based on existing quality management, we find a quality strategy that should be pursued during the 4th Industrial Revolution. Results: Quality has been recognized as an essential component of corporate competitiveness. The paradigm of quality has also changed with the pass of time and industry development. From this viewpoint, the following eight quality strategies are proposed for the development of the technology of the 4th Industrial Revolution period, such as Market-to-customer fusion quality, symbiotic quality, big data quality, technical accuracy and zero-defect quality, facility predictability quality, software quality, process flexibility quality, and information protection stability and security quality. Conclusion: Quality for customer satisfaction is still important nowadays. However, in the 4th Industrial Revolution era, where various business models and methods of manufacturing are expected, the big data utilization, software quality, and the reliability and security of information protection to support it are important.

Directions of the Activation of the Development of a Small Innovative Enterprise

  • Antypenko, Nadiia;Dongcheng, Wang;Lysenko, Zhanna;Krasnonosova, Olena;Grynevych, Liudmyla
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.12spc
    • /
    • pp.495-502
    • /
    • 2021
  • The study is devoted to substantiation of directions of intensification of development of small innovative enterprise, which has a significant impact on the overall innovation activity of the country and promotes innovative development, transition to more advanced technological systems. The outlined role of small business in innovative development in the direction of intensifying innovation in the economy, improving organization and production, as well as in the form of direct participation in the innovation process, production of science-intensive products, stimulating demand for innovation. A group of factors hindering the development of small innovative entrepreneurship was identified, including: financial aspects of the activity, shortcomings of organizational and communicative nature, underdeveloped technology market, information plan problems, internal production problems of small business, market problems. The directions of intensification of the development of small innovative entrepreneurship are substantiated, namely: financial and credit support of small innovative entrepreneurship; introduction of tax incentives; material and technical support; nationwide intensification of innovation activity; information support; development of innovation infrastructure. The involvement of the outlined directions of intensification of small innovative entrepreneurship will help to obtain a synergistic effect of innovative development of both small innovative business structures and the economy as a whole.

Management of Innovation and Investment Activities of Enterprises in the Conditions of Digitalization to Increase Their Competitiveness in the International Market

  • Kravchuk, Nataliia;Rusinova, Olha;Desyatov, Tymofii;Lapshyn, Ihor;Alnuaimi, Ali Juma Ali Sallam
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.3
    • /
    • pp.335-343
    • /
    • 2022
  • The article analyzes the features of innovation and investment activities of enterprises in the context of digitalization to increase their competitiveness in the international market. Ukraine's position on the Global Innovation Index is assessed. The interrelation of management functions in the context of innovation and investment activities of enterprises is substantiated. The structure of sources of financing of innovative activity of industrial enterprises is analyzed. Trends in changes in the volume of foreign direct investment and capital investment in Ukraine are assessed. It is determined that the level of innovative development of enterprises is determined by the level of their investment support, which is determined by the level of their investment attractiveness. The components of the strategy of investment attractiveness of enterprises are outlined. Determining factors in the implementation of innovation and investment policy of enterprises are identified and the main stages that should include the processes of managing innovation and investment activities of enterprises in the context of digitalization.