• Title/Summary/Keyword: Information Infrastructure

Search Result 4,658, Processing Time 0.034 seconds

A strategic Approach for Establishing Korea's Cyber Terrorism Policy : Focusing on the UK's cyber terrorism policy (국내 사이버테러 정책수립을 위한 전략적 접근방안 : 영국의 사이버테러 정책을 중심으로)

  • Kim, Byung-Hwa
    • Korean Security Journal
    • /
    • no.51
    • /
    • pp.173-195
    • /
    • 2017
  • Recently, in South Korea, security management has been strengthened, but there have been an increasing number of cases where the main infrastructure of the country is hacked in the cyber space. South Korea is equipped with sophisticated information and communication technologies, such as Internet, but is threatened by cyber terrorism of North Korea and terrorist organizations. Nevertheless, there is a limit to how to develop a policy and strategic plan for the country, which is related to domestic terrorism and lacks legal and regulatory facilities, and therefore, in this study, proposed suggestions for building adaptive and efficient policy formulation. Based on the theoretical analysis framework of the Strategic Plan for achieving the objectives of the research, we compared the UK 's security strategy with the national security policy of the domestic government. As a result, several problems were derived: First, the domestic security strategy did not take into account the external environment. Secondly, lack of coordination with domestic cyber security goals setting and strategy is causing ambiguity and confusion. Third, the detailed plan of implementation of national security in each province is designed to ensure that there is a possibility that a mixed side effect between ministries and agencies will arise. Fourth, it was found that there was a limit to prepare the evaluation standards for the evaluation and return of domestic security policies in the country. Therefore, in order to establish a policy for the response of domestic cyber terrorism, we set up a vision from long-term perspectives and concrete targets based on the strategic approach of the security policy, It is necessary to present an assignment and formulate an efficient execution plan. It is necessary to maintain and improve the domestic safeguards in order to be able to complement the problems through evaluation and feedback.

  • PDF

A Comprehensive Method to Impute Vehicle Trajectory Data Collected in Wireless Traffic Surveillance Environments (무선통신기반 교통정보수집체계하에서의 차량주행궤적정보 결측치 보정방안)

  • Yeon, Ji-Yun;Kim, Hyeon-Mi;O, Cheol;Kim, Won-Gyu
    • Journal of Korean Society of Transportation
    • /
    • v.27 no.4
    • /
    • pp.175-181
    • /
    • 2009
  • Intelligent Transportation Systems(ITS) enables road users to enhance efficiency of their trips in a variety of traffic conditions. As a significant part of ITS, information communication technology among vehicles and between vehicles and infrastructure has been being developed to upgrade current traffic data collection technology through location-based traffic surveillance systems. A wider and detailed range of traffic data can be acquired with ease by the technology. However, its performance level falls with environmental impediments such as large vehicles, buildings, harsh weather, which often bring about wireless communication failure. For imputation of vehicle trajectory data discontinued by the failure, several potential existing methods were reviewed and a new method to complement them was devised. AIMSUN API(Application Programming Interface) software was utilized to simulate vehicle trajectories data and missing vehicle trajectories data was randomly generated for the verification of the method. The method was proven to yield more accurate and reliable traffic data than the existing ones.

Characteristics of the Han River Basin drought using SPEI and RDI (SPEI와 RDI를 이용한 한강유역 가뭄의 특징 분석)

  • Won, Kwang Jai;Chung, Eun-Sung;Lee, Bo-Ram;Sung, Jang Hyun
    • Journal of Korea Water Resources Association
    • /
    • v.49 no.3
    • /
    • pp.187-196
    • /
    • 2016
  • Standardized Precipitation Evapotranspiration Index (SPEI) considering evapotranspiration and precipitation is generally used to quantify the drought severity. Also, Reconnaissance Drought Index (RDI) has been frequently used in the arid regions which is suffering severe droughts, but drought analysis in association with RDI has been the focus of few studies in South Korea. Therefore, this study compared two meterological drought indices based on precipitation and evapotranspiration using Thornthwaite, Hargreaves, and Blaney-Criddle evaportranspiration calculation methods. Meteorological data of sixteen weather stations which are operated by Korea Meteorological Administration (KMA) were used to quantify drought and to compare characteristics of drought for the Han River Basin from 1992 to 2015. As a result, in case of Han River Basin, severe drought sharply increased in recent years. While the correlation coefficients are relatively high between the SPEIs and RDIs, the drought severity and year of severe drought are partially different. Therefore, it is necessary that RDI will be also measured to quantify severity and occurrence year of drought.

Literature Review of Key Success Factors of Management Innovation Actions in Domestic - Focused on Six Sigma, TQM, Lean Six Sigma, ERP, TPM, BPR, Project Management, System Engineering - (국내 경영혁신 활동의 핵심 성공요인 문헌 연구 - 6시그마, TQM, 린 6시그마, ERP, TPM, BPR, Project Management, System Engineering 중심으로 -)

  • Mun, JeOk;Yoon, SungPil
    • Journal of Korean Society for Quality Management
    • /
    • v.44 no.3
    • /
    • pp.639-648
    • /
    • 2016
  • Purpose: Existing precedent studies include success factors of individual management innovation activities constantly. However, those studies have limitations about the common key success factors of individual management innovation activities. Methods: For this study, we investigate the key success factors using literature research of the most typical management innovation activities adopted and implemented by many companies in Korea, such as 6sigma, TQM, Lean 6sigma, ERP, TPM, BPR, Project Management, System Engineering. Factors emerging repeatedly was combined into common factors and inherent factors that are necessary for the success of individual management innovation activities are designated to essential factors. Results: 'Essential factors for Six Sigma' consist of 5 items. Black belt operating system, personnel management system linkage, the correct management of the data, perform improvement projects associated with financial performance financial result, linked to financial performance improvement project, project progress management. 'Essential factors of TQM' are arranged 4 items. Quality team's independence and role, goal-setting, Quality Information System, corporate's philosophy of quality first. 'Essential factors of Lean Six Sigma' are the selection of value stream which is based on the customer needs and the value creation and identify the project based on the selected value in the company. 'Essential factors of ERP' are investigated 6 items. Ongoing system maintenance and upgrades, the measurement and support of user satisfaction, the operating systems and the policies for the maintenance, IT infrastructure, change adaption condition monitoring, focusing on improving business performance. 'Essential factors for TPM' are arranged 4 items. Motivated and energetic Bottom-Up, CEO's recognition of the importance facility management, long-term perspective of necessity and ongoing patience. 'Essential factors for BPR' are the pursuit of change process and the staff's sense of crisis management. 'Essential factors for Project Management' are the strategy that reduce the risk management skills through risk management and the understanding and organized management for the project participant's needs. 'Essential factors for System Engineering' consist of 2 items. The first is the design for the best balanced system with pre-analysis about the compromise the cost, schedule and the performance. The second is the analysis of large problem into small problems which can solved. We have found the solution considering components of the interface through the systematic perspective. Conclusion: Common factors and essential factors presented in this study will properly help to introduce the individual management innovation activities for the each business sector and implement management innovation. After this study, new literature research that reflect new studies should accomplish steadily.

A Vehicle Reidentification Algorithm using Inductive Vehicle Signatures (루프검지기 자기신호 패턴분석을 통한 차량재인식 알고리즘)

  • Park, Jun-Hyeong;O, Cheol;NamGung, Seong
    • Journal of Korean Society of Transportation
    • /
    • v.27 no.1
    • /
    • pp.179-190
    • /
    • 2009
  • Travel time is one of the most important traffic parameters to evaluate operational performance of freeways. A variety of methods have been proposed to estimate travel times. One feasible solution to estimating travel times is to utilize existing loop detector-based infrastructure since the loops are the most widely deployed detection system in the world. This study proposed a new approach to estimate travel times for freeways. Inductive vehicle signatures extracted from the loop detectors were used to match vehicles from upstream and downstream stations. Ground-truthing was also conducted to systematically evaluate the performance of the proposed algorithm by recognizing individual vehicles captured by video cameras placed at upstream and downstream detection stations. A lexicographic optimization method vehicle reidentification algorithm was developed. Vehicle features representing the characteristics of individual vehicles such as vehicle length and interpolations extracted from the signature were used as inputs of the algorithm. Parameters associated with the signature matching algorithm were calibrated in terms of maximizing correct matching rates. It is expected that the algorithm would be a useful method to estimate freeway link travel times.

A study on the proposed amendment bill of Bioethics and Safety Law (2010): focusing on the meaning of significant contents related to the clinical research ("생명윤리 및 안전에 관한 법률" 전부개정안의 내용과 의의: 임상연구와의 관계를 중심으로)

  • Kim, Eun-Ae
    • The Korean Society of Law and Medicine
    • /
    • v.12 no.1
    • /
    • pp.99-131
    • /
    • 2011
  • To strengthen the protection of human research subjects and human materials, the Korean Ministry of Health and welfare proposed the amendment bill of Bioethics and Safety Law(2010) to the Congress. It includes so many meaningful clauses. According to the bill, the scope that this act shall apply will be expended to the research involving human subjects and human materials. In the bill, there are the principles of this act; the protection of the life, health, and dignity of the human subjects, the obtaining of the adequate informed consent, the protection of the human subject's information confidentiality and the human subject's privacy, the assessment and minimizing of the risks involved and the guarantee of the safety for the human subjects, the preparation of the special protection program for the vulnerable human subjects, and so on. According to the bill, Institutional Bioethics Review Board(the same as Institutional Review Board) will be responsible for the auditing and monitoring on the research that was approved by IBRB, conducting the education program for the researchers, IBRB members and administrative staffs, preparing of the special protection program for the vulnerable human subjects, and forming the guidelines for the researchers as well as the review of the research protocols. And the State and local governments shall take necessary measures to support the expending of the social infrastructure. In addition to, IBRB will have to be assessed and to be gained the accreditation by the Korean Ministry of Health and welfare. So, if Bioethics and Safety Law is amended, it will contribute enormously to enhance the level of the human research subjects protection. Also, if this Law is amended, IBRB will play a major role for the conduct of the ethically, scientifically, and legally proper research. But now, as a matter of fact, the capability of IBRB members and IBRB office members is not enough to charge of this role because some people and some organizations does not know the importance of IBRB exactly. In spite of, IBRB shall be able to this role to protect the human subjects and to develop the level of the research On the international level. Therefore, the State, local governments and the Organization shall back up the administrative and financial terms of the IRB and IRB Office.

  • PDF

A fundamental study on the installation methods of automatic identification buoy on coastal gill net (연안자망 부이에 어구자동식별 장치 설치방안에 관한 기초적 연구)

  • HEO, Nam-Hee;KANG, Kyoung-Bum;KOO, Myeong-Seong;KIM, Keun-Hyong;KIM, Jong-Bum;JWA, Min-Seok;KIM, Jun-Teck;JOUNG, Joo-Myeong;KIM, Byung-Yeob;KIM, Suk-Jong
    • Journal of the Korean Society of Fisheries and Ocean Technology
    • /
    • v.55 no.4
    • /
    • pp.294-302
    • /
    • 2019
  • As a series of fundamental researches on the development of an automatic identification monitoring system for fishing gear. Firstly, the study on the installation method of automated identification buoy for the coastal improvement net fishing net with many loss problems on the west coast was carried out. Secondly, the study was conducted find out how to install an automatic identification buoy for coastal gill net which has the highest loss rate among the fisheries. GPS for fishing was used six times in the coastal waters around Seogwipo city in Jeju Island to determine the developmental status and underwater behavior to conduct a field survey. Next, a questionnaire was administered in parallel on the type of loss and the quantity and location of fishing gear to be developed and the water transmitter. In the field experiment, the data collection was possible from a minimum of 13 hours, ten minutes to a maximum of 20 hours and ten minutes using GPS, identifying the development status and underwater behavior of the coastal gillnet fishing gear. The result of the survey showed that the loss of coastal net fishing gear was in the following order: net (27.3%), full fishing gear (24.2%), buoys, and anchors (18.2%). The causes were active algae (50.0%), fish catches (33.3%) and natural disasters (12.5%). To solve this problem, the installation method is to attach one and two electronic buoys to top of each end of the fishing gear, and one underwater transmitter at both ends of the float line connected to the anchor. By identifying and managing abnormal conditions such as damage or loss of fishing gear due to external factors such as potent algae and cutting of fishing gear, loss of fishing gear can be reduced. If the lost fishing gear is found, it will be efficiently collected.

A Policy-driven RFID Data Management Event Definition Language (정책기반 RFID 데이터 관리 이벤트 정의 언어)

  • Song, Ji-Hye;Kim, Kwang-Hoon
    • Journal of Internet Computing and Services
    • /
    • v.12 no.1
    • /
    • pp.55-70
    • /
    • 2011
  • In this paper, we propose a policy-driven RFID data management event definition language, which is possibly applicable as a partial standard for SSI (Software System Infrastructure) Part 4 (Application Interface, 24791-4) defined by ISO/IEC JTC 1/SC 31/WG 4 (RFID for Item Management). The SSI's RFID application interface part is originally defined for providing a unified interface of the RFID middleware functionality―data management, device management, device interface and security functions. However, the current specifications are too circumstantial to be understood by the application developers who used to lack the professional and technological backgrounds of the RFID middleware functionality. As an impeccable solution, we use the concept of event-constraint policy that is not only representing semantic contents of RFID domains but also providing transparencies with higher level abstractions to RFID applications, and that is able to provide a means of specifying event-constraints for filtering a huge number of raw data caught from the associated RF readers. Conclusively, we try to embody the proposed concept by newly defining an XML-based RFID event policy definition language, which is abbreviated to rXPDL. Additionally, we expect that the specification of rXPDL proposed in the paper becomes a technological basis for the domestic as well as the international standards that are able to be extensively applied to RFID and ubiquitous sensor networks.

Key-pair(Public key, Private key) conflict analysis using OpenSSL (OpenSSL을 이용한 키쌍(공개키·개인키) 충돌율 분석)

  • Lee, Kwang-Hyoung;Park, Jeong-Hyo;Jun, Moon-Seog
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.15 no.8
    • /
    • pp.5294-5302
    • /
    • 2014
  • The development of public-key-based technique that enables a variety of services(E-government, e-banking, e-payment, etc.) evaluated as having complete safety. On the other hand, vulnerabilities(e.g, heartbleed bug, etc.) are constantly being discovered. In this paper, a public key infrastructure to verify the safety and reliability, the collision rate using OpenSSL key pair was analyzed. the experiment was performed using the following procedure. Openssl was used to create five private certification agencies, and each of the private certificate authority certificates to create 2 million, generating a total of 10 million by the certificate of the key pair conflicts analysis. The results revealed 35,000 in 1 million, 0.35% chance of a public key, a private key conflict occurred. This is sufficient in various fields(E-payment, Security Server, etc.). A future public-key-based technique to remove the threat of a random number generator, large minority issues, in-depth study of selection will be needed.

Classification and Profiling of Bus Stops in Gyeong-gi Province on the Basis of Trip Chain Variables (통행연계 변수를 중심으로 한 경기도 버스정류장 유형 구분)

  • Bin, Mi-Young;Jung, Eui-Seok;Lee, Won-Do;Joh, Chang-Hyeon
    • Journal of the Economic Geographical Society of Korea
    • /
    • v.15 no.2
    • /
    • pp.332-342
    • /
    • 2012
  • The current research aims at classifying the bus stops as transfer center in order to establish the rational bus transfer systems. Existing research typically identifies characteristics of demands for bus stops and land use surrounding the bus stops and classifies and profiles the bus stops. A common problem with this type of research is that the results with cross-sectional characteristics of land use and bus stop usage do not capture the details of trip chain, the fundamental characteristics of the trips with transfer. This paper therefore examines bus stop classifications with such variables as transport mode chains, intermediate stop chains and timing chains. The analysis on the data collected on Monday 20 April 2009 for passengers of Gyeong-gi bus results in a clear classification among bus stops in terms of such trip chain variables. The research would provide useful information for the decision support of transfer stops location choice and infrastructure design.

  • PDF