• Title/Summary/Keyword: Information Protect Model

Search Result 312, Processing Time 0.028 seconds

The Evaluation on Applicability of Leakage-prevented Sealing Packer Out of Grouted Rockbolt Hole (록볼트 그라우팅 시 역류방지용 밀봉 패커의 적용성 평가)

  • Yang, Taeseon;Kim, Jichang;Jeong, Jongki;Yoo, Dongho;Choi, HakYun;Baek, Seungcheol
    • Journal of the Korean GEO-environmental Society
    • /
    • v.17 no.11
    • /
    • pp.15-21
    • /
    • 2016
  • Nowadays, some studies have been performed for rockbolt method widely used in Korea. To make large slopes, tunnels or rock structures stable, supporting systems, such as anchor bolt, rock bolt which are developed recently, are commonly used. In this study, laboratory pullout tests were carried out to compare the characteristics of rock bolt that is most widely used with ones of rock bolt by newly developed circular model testers. Re-pullout test for the rock bolt in which loading and unloading cycles are repeated several times showed that the maximum pullout load is almost constant irrespective of the number of loading cycles, which may be due to no failure between rock bolt and filler that is filled with soils and concrete as a substitute. A development of rock bolt fillers as supporters using to protect people in tunnels and slopes is reviewed as a probable man-made hazard after excavation works. The functions of the grouted rock bolts associated with reinforcement effects also should be assessed in this study, which develop the sealing apparatus preventing from overflowing mortar out of a rock bolt hole for securing safety in the tunnel and slopes in order to secure stability named the sealing packer.

Identifying Security Requirement using Reusable State Transition Diagram at Security Threat Location (보안 위협위치에서 재사용 가능한 상태전이도를 이용한 보안요구사항 식별)

  • Seo Seong-Chae;You Jin-Ho;Kim Young-Dae;Kim Byung-Ki
    • The KIPS Transactions:PartD
    • /
    • v.13D no.1 s.104
    • /
    • pp.67-74
    • /
    • 2006
  • The security requirements identification in the software development has received some attention recently. However, previous methods do not provide clear method and process of security requirements identification. We propose a process that software developers can build application specific security requirements from state transition diagrams at the security threat location. The proposed process consists of building model and identifying application specific security requirements. The state transition diagram is constructed through subprocesses i) the identification of security threat locations using security failure data based on the point that attackers exploit software vulnerabilities and attack system assets, ii) the construction of a state transition diagram which is usable to protect, mitigate, and remove vulnerabilities of security threat locations. The identification Process of application specific security requirements consist of i) the analysis of the functional requirements of the software, which are decomposed into a DFD(Data Flow Diagram; the identification of the security threat location; and the appliance of the corresponding state transition diagram into the security threat locations, ii) the construction of the application specific state transition diagram, iii) the construction of security requirements based on the rule of the identification of security requirements. The proposed method is helpful to identify the security requirements easily at an early phase of software development.

Design and Implementation of a Protection and Distribution System for Digital Broadcasting Contents (디지털 방송 콘텐츠 보호 유통 시스템 설계 및 구현)

  • Lee Hyejoo;Choi BumSeok;Hong Jinwoo;Seo Jongwon
    • The KIPS Transactions:PartC
    • /
    • v.11C no.6 s.95
    • /
    • pp.731-738
    • /
    • 2004
  • With the increase of digital content usages, the protection for digital content and intellectual property becomes more important. The DRM(digital rights management) technologies are applicable to protect not only any kind of digital contents but also intellectual property. Besides such techniques are required for recorded digital broadcasting contents due to introduction of digital broadcasting techniques and storage devices such as personal video recorder. The conventional protection scheme for broadcasting content is the CAS(conditional access system) by which the access of viewer is controlled on the specific channels or programs. The CAS prohibits the viewer from delivering the digital broadcasting content to other person, so it results in restriction of superdistribution on the digital broadcasting content. In this paper, for broadcast targeting unspecfic many people, we will design the service model of the protection and distribution of digital broadcasting content using encryption and license by employing the concept of DRM. The results of implementation are also shown to verify some functions of each component. An implemented system of this paper has some advantages that the recording of broadcast content is allowed on set-top-box and superdistribution is available by consumer. Hence it provides content providers and consumers with trustworthy environment for content protection and distribution.

Support for a Campus Tobacco-Free Policy among Non-Smokers: Findings from a Developing Country

  • Yasin, Siti Munira;Isa, Mohamad Rodi;Fadzil, Mohd Ariff;Zamhuri, Mohammad Idris;Selamat, Mohamad Ikhsan;Ruzlin, Aimi Nadira Mat;Ibrahim, Nik Shamsidah Nik;Ismail, Zaliha;Majeed, Abu Bakar Abdul
    • Asian Pacific Journal of Cancer Prevention
    • /
    • v.17 no.1
    • /
    • pp.275-280
    • /
    • 2016
  • Background: A tobacco-free workplace policy is identified as an effective means to reduce tobacco use and protect people from second-hand smoke; however, the number of tobacco-free policies (TFP) remains very low in workplaces in Malaysia. This study explored the factors affecting support for a tobacco-free policy on two healthcare campuses in Malaysia, prior to the implementation of TFP. Materials and Methods: This cross-sectional study was conducted among 286 non-smokers from two healthcare training centres and two nearby colleges in Malaysia from January 2015 to April 2015. A standardized questionnaire was administered via staff and student emails. The questionnaire collected information on sociodemographic characteristics, support for a tobacco-free policy and perceived respiratory and sensory symptoms due to tobacco exposure. Bivariate and multivariate logistic regression analyses were performed to estimate the independent effects of supporting a tobacco-free campus. Results: The percentage of individuals supporting completely tobacco-free facilities was 83.2% (N=238), as opposed to 16.7% (N=48) in support of partially tobacco-free facilities. Compared to the supporters of partially tobacco-free facilities, non-smokers who supported completely tobacco-free health facilities were more likely to be female, have higher education levels, to be very concerned about the effects of other people smoking on their health and to perceive a tobacco-free policy as very important. In addition, they perceived that tobacco smoke bothered them at work by causing headaches and coughs and, in the past 4 weeks, had experienced difficulty breathing. In the multivariate model, after adjusting for sociodemographic characteristics and other factors, only experiencing coughs and headaches increased the odds of supporting a completely tobacco-free campus, up to 2.5- and 1.9-fold, respectively. Conclusions: Coughs and headaches due to other people smoking at work enhances support for a completely tobacco-free campus among non-smokers.

Rethinking OTT regulation based on the global OTT market trends and regulation cases (OTT 서비스의 유형과 주요국의 규제 정책에 대한 고찰)

  • Kim, Suwon;Kim, Daewon
    • Journal of Internet Computing and Services
    • /
    • v.20 no.6
    • /
    • pp.143-156
    • /
    • 2019
  • Discussion on OTT regulation has become fiercer, as OTT services' impacts on the global and domestic media market have been exponentially growing. In South Korea, it is argued that, on the basis of the similarity between television program and OTT's video content, OTT needs to be regulated in order to protect fair competition and to control sociocultural effects. In many of the discussions, developed countries' cases have been used for supporting OTT regulation. In this paper, we first analyzed the global OTT market trends based on our own categorization of OTT services. then we assessed the validity of the application of the foreign cases in the current OTT regulation debates in Korea. We proposed six OTT types (aggregation, mediation, mediation-aggregation, multi-screen, outlet, and outlet-linear) simultaneously considering service operator' origin, business model, content format, and content delivery. These services have been consistently evolving, and the OTT market has been increasingly competitive especially around content differentiation. Regulators must be wary of hastily introducing competition regulation to the dynamically innovating OTT market. The foreign cases, including the US, EU, the UK, and Japan, hardly seem to be appropriate bases for strengthening OTT regulation. Rather, they were focused more on promoting competition in the domestic media market and enriching the content ecosystem. Therefore, we need to consider revision of the outdated media regulation frameworks instead of fitting OTT under them, and to recognize the priority of securing practical jurisdiction on global service providers before capturing local players into the conventional regulation systems.

Draft List and Relative Importance of Principal Processes in the Geosphere to be Considered for the Radiological Safety Assessment of the Domestic Geological Disposal Facility through Analyzing FEPs for KBS-3 Type Disposal Repository of High-level Radioactive Waste(HLW) (KBS-3 방식 고준위방폐물 심층처분장 FEP 분석을 통한 국내 사용후핵연료 심층처분시설 방사선학적 안전성 평가용 지권영역 주요 프로세스 항목 및 상대적 중요도 도출)

  • Sukhoon Kim;Donghyun Lee;Dong-Keuk Park
    • Journal of Radiation Industry
    • /
    • v.17 no.1
    • /
    • pp.33-44
    • /
    • 2023
  • The deep geological repository of high-level radioactive waste shall be designed to meet the safety objective set in the form of radiation dose or corresponding risk to protect human and the environment from radiation exposure. Engineering feasibility and conformity with the safety objective of the facility conceptual design can be demonstrated by comparing the assessment result using the computational model for scenario(s) describing the radionuclide release and transport from repository to biosphere system. In this study, as the preliminary study for developing the high-level radioactive waste disposal facility in Korea, we reviewed and analyzed the entire list of FEPs and how to handle each FEP from a general point of view, which are selected for the geosphere region in the radiological safety assessment performed for the license application of the KBS-3 type deep geological repository in Finland and Sweden. In Finland, five FEPs (i.e., stress redistribution, creep, stress redistribution, erosion and sedimentation in fractures, methane hydrate formation, and salt exclusion) were excluded or ignored in the radionuclide release and transport assessment. And, in Sweden, six FEPs (i.e., creep, surface weathering and erosion, erosion/sedimentation in fractures, methane hydrate formation, radiation effects (rock and grout), and earth current) were not considered for all time frames and earthquake out of a total of 25 FEPs for the geosphere. Based on these results, an FEP list (draft) for the geosphere was derived, and the relative importance of each item was evaluated for conducting the radiological safety assessment of the domestic deep geological disposal facility. Since most of information on the disposal facility in Korea has not been determined as of now, it is judged that all FEP items presented in Table 3 should be considered for the radiological safety assessment, and the relative importance derived from this study can be used in determining whether to apply each item in the future.

An Approach for Enhancing Current Korean e-Grocery Business Focusing on Delivery Service Alternatives (한국의 e-Grocery 배송서비스 대안에 관한 연구)

  • Koo, Jong-Soon;Lee, Jung-Sun;Jeon, Dong-Hwa
    • International Commerce and Information Review
    • /
    • v.13 no.3
    • /
    • pp.169-201
    • /
    • 2011
  • There was a new wave in grocery business with development of information and technology, thus a movement from traditional stores to online stores, In order to expand the scale of traditional supermarket and to satisfy the customers' needs, they provide offline and online services simultaneously. This paper is based on the previous studies which had been researched in developed countries from late 1990s to early 2000s and the purpose of this study is to introduce the idea and operation system of e-Grocery business. Moreover, we suggest the alternatives on delivery service methods in order to satisfy the customers' needs through analyzing the current condition of e-Grocers in Korea. According to the result of this study, Korean e-Grocers offer only attended home delivery services. In our opinion, Korean supermarkets have to take hybrid model which Tesco.com is using. There are some alternatives to increase the profits of Korean e-Grocers and to provide better services to their customers as follows: As an alternatives for delivery services, picking service is the easiest and cheapest way to apply for supermarkets. This is very useful for working women and also it is possible to order by smartphone recently. They can order the goods to the closest local supermarkets from working place, and then they pick them up on the way home from working off. In order to improve the quality of delivery services, to use the reception box will be the way to provide better services to the customers. The reception box is a way to protect the quality of goods such as fresh-cut product, which require the freshness through the temperature adjustment, and also to keep the safety of ordered goods through locking system Through this system, supermarkets are able to use attended or unattended services under the customers' satisfaction. However, using the reception box is expensive, so shared reception box will be an alternative. As an alternative for development of e-Grocery business, the advertisement for e-Grocery business has to be supported in order to attract potential customers in e-Grocery business. Furthermore, the main concerns of e-Grocery business such as the sanitation and safety of goods, and convenience must be guaranteed in order to keep the loyal customers and to attract new customers.

  • PDF

Analysis and Management of Potential Development Area Using Factor of Change from Forest to Build-up (산림의 시가지 변화요인을 통한 잠재개발지 분석 및 관리방안)

  • LEE, Ji-Yeon;LIM, No-Ol;LEE, Sung-Joo;CHO, Hyo-Jin;SUNG, Hyun-Chan;JEON, Seong-Woo
    • Journal of the Korean Association of Geographic Information Studies
    • /
    • v.25 no.2
    • /
    • pp.72-87
    • /
    • 2022
  • For the sustainable development and conservation of the national land, planned development and efficient environmental conservation must be accompanied. To this end, it is possible to induce development and conservation to harmonize by deriving factors affecting development through analysis of previously developed areas and applying appropriate management measures to areas with high development pressure. In this study, the relationship between the area where the land cover changed from forest to urbanization and various social, geographical, and restrictive factors was implemented in a regression formula through logistic regression analysis, and potential development sites were analyzed for Yongin City. The factor that has the greatest impact on the analysis of potential development area is the restrict factors such as Green Belt and protected areas, and the factor with the least impact is the population density. About 148km2(52%) of Yongin-si's forests were analyzed as potential development area. Among the potential development sites, the area with excellent environmental value as a protected area and 1st grade on the Environment Conservation Value Assessment Map was derived as about 13km2. Protected areas with high development potential were riparian buffer zone and special measurement area, and areas with excellent natural scenery and river were preferred as development areas. Protected areas allow certain actions to protect individual property rights. However, there is no clear permit criteria, and the environmental impact of permits is not understood. This is identified as a factor that prevents protected areas from functioning properly. Therefore, it needs to be managed through clear exception permit criteria and environmental impact monitoring.

Public Interest and Ownership Regulations in the Media Industry in the Era of Convergence Focused on Domestic Daily Newspapers' Ownership of Broadcasting Station (융합시대 미디어산업의 공익성과 소유규제 국내 종합일간지와 방송의 교차소유 문제를 중심으로)

  • Jun, Young-Beom
    • Korean journal of communication and information
    • /
    • v.46
    • /
    • pp.511-555
    • /
    • 2009
  • Media-related regulations can be classified into two categories; regulations of individual media contents and regulations regarding the entry to and withdrawal from a certain field. In this dissertation, ownership regulations are regarded as legal and political measures so as to prevent the monopoly and oligopoly of public opinion, and to secure its diversity. Every country has its own regulation model according to its particular media environment. Korea too is obliged to actively respond to its environmental changes, at the same time vitalizing the media industry and protecting consumers' rights and interests. Strong political intentions to protect the public interest is necessary when it comes to media regulation policies, especially in the circumstances that public interest is an industrial priority. As the convergence of broadcasting and telecommunications is leading to a major shift in the media industry, the regulation of cross-media ownership is an issue involving potential conflicts among media-owners, non-governmental organizations and the authorities concerned, depending on their various viewpoints regarding the media industry. In this paper, an attempt was made to search necessity of redefining 'public interest', which is the logic behind the restriction of cross-media ownership, and to reconceptualize issues on the centralization and diversity of media. First, an examination of the actual conditions of newspaper companies was carried out in order to reinvestigate domestic cross-media ownership issues, which is represented by the cross-ownership issue of newspapers and broadcasting stations. Next, the dilemma of policies stimulated by the fusion of media was discussed based on cross-media ownership restrictions, and the need for efficient conflict control was suggested. Finally, proposals on the independency and public confidence of media-related policy-making authorities, the rationalization of regulation models, an itemized discussion on cross-media ownership regulation issues, the elaboration of measures for a balanced development among media were made. It could be found that a number of foreign countries were still facing challenges to prevent monopoly and oligopoly of the public opinion and the industry. A solution to settle disagreements about the dilemma of the media industry, including the cross-media ownership regulation issues, must be arranged on the grounds of 'mutual respect of public interest and industrial interest', In Korea, an ease on the ownership regulations adapting to the change in the media industry may be considered, however the softening of the cross-media ownership regulations must be approached with the utmost care. Paradoxically Relieving cross-media ownership regulations may be considered the foundation of a richer field of journalism, where there is no need for concern over the monopoly and oligopoly of public opinion.

  • PDF

A Study Covering the Comparative Analysis of Educational Systems in Major Countries for Regular Cybersecurity Education (사이버보안 정규교육화를 위한 주요국 교육체계 비교분석 연구)

  • YOO, Jiyeon
    • The Journal of the Convergence on Culture Technology
    • /
    • v.7 no.1
    • /
    • pp.397-405
    • /
    • 2021
  • With the recent phenomenon of the Intelligence Information Society, the cyber security paradigm has begun to change. In particular, the increase of the interconnectedness of the hyperlinked society has extended the scope of damage that can be caused by cyber threats to the real world. In addition to that, it can also be a risk to any given individual who could accompany a crisis that has to do with public safety or national security. Adolescents who are digital natives are more likely to be exposed to cyber threats, which is mainly due to the fact that they are significantly more involved in cyber activities and they also possess insufficient security comprehension and safety awareness. Therefore, it is necessary to strengthen cyber security capabilities of every young individual, so that they can effectively protect themselves against cyber threats and better manage their cyber activities. It examines the changes of the security paradigm and the necessity for cyber security education, which is in direct accordance to the characteristics of a connected society that further suggests directions and a basic system of cyber security education, through a detailed analysis of the current state of Domestic and Overseas Cyber Security Education. The purpose of this study was to define cybersecurity competencies that are necessary within an intelligent information society, and to propose a regular curriculum for strengthening cybersecurity competencies, through the comparison and meticulous analysis of both domestic and overseas educational systems that are pertinent to cybersecurity competencies. Accordingly, a cybersecurity competency system was constructed, by reflecting C3-Matrix, which is a cyber competency system model of digital citizens. The cybersecurity competency system consists of cyber ethics awareness, cyber ethics behavior, cyber security and cyber safety. In addition to this, based on the basic framework of the cybersecurity competency system, the relevant education that is currently being implemented in the United States, Australia, Japan and Korea were all compared and analyzed. From the insight gained through the analysis, the domestic curriculum was finally presented. The main objective of this new unified understanding, was to create a comprehensive and effective cyber security competency curriculum.