• Title/Summary/Keyword: Information Security Budget

Search Result 122, Processing Time 0.038 seconds

A Study on Making Map of Flood Using Digital Elevation Model (DEM) (수치표고모형 (DEM)을 이용한 침수재해 지도작성에 관한 연구)

  • Lim, Hyun Taek;Kim, Jae Hwi;Lee, Hak Beom;Park, Sung Yong;Kim, Yong Seong
    • Journal of The Korean Society of Agricultural Engineers
    • /
    • v.59 no.2
    • /
    • pp.81-90
    • /
    • 2017
  • Recent floodplain data are important for river master plan, storm and flood damage reduction comprehensive plan and pre-disaster impact assessment. Hazard map, base of floodplain data, is being emphasized as important method of non-structural flood prevention and consist of inundation trace map, inundation expected map and hazard information map. Inundation trace map describes distribution of area that damaged from typhoons, heavy rain and tsunamis and includes identified flood level, flood depth and flood time from flooding area. However due to lack of these data by local government, which are foundational and supposed to be well prepared nationwide, having hard time for making inundation trace map or hazard information map. To overcome this problem, time consumption and budget reduction is required through various research. From this study, DEM (Digital Elevation Model) from image material from UAVS (Unmanned Aerial Vehicle System) and numeric geographic map from National Geographic Information Institute are used for calculating flooding damaged area and compared with inundation trace map. As results, inundation trace map DEM based on image material from UAVS had better accuracy than that used DEM based on numeric geographic map. And making hazard map could be easier and more accurate by utilizing image material from UAVS than before.

Research on BYOD (Bring Your Own Device) policy guidelines with the extension of the "SMART Education" in Korea based on the analyses of the U.S. cases (스마트교육 확산에 따른 국내 BYOD 정책방안 연구 - 미국사례 분석을 중심으로 -)

  • Lim, Keol;Jang, Yoonho;Lee, Eunhwan
    • Journal of Digital Convergence
    • /
    • v.12 no.7
    • /
    • pp.21-36
    • /
    • 2014
  • The purposes of the study was to investigate BYOD (Bring Your Own Device) policy since it would be limited to distribute all of the digital devices required for the schools within the budget of the government. First, the concept and characteristics of BYOD were introduced. Then, the pros and cons of BYOD were analyzed according to the case studies of BYOD policies of the U.S. Based on the previous experiences, guidelines of domestic BYOD policies were established. Regarding the institutional aspect, technical issues, usage, damages, digital divide, information security, and resources were discussed. Additionally, conditions of technology, networks, filtering, software were also considered as essential infrastructure. In sum, as an alternative of distributing digital devices in schools, the importance of BYOD should be regarded as top priorities with systematic preparations in launching digital education. It would be expected that this study play a fundamental role in launching domestic BYOD policy by supporting specific strategies.

Challenges and Solutions of Electronic Journal Consortium (전자저널 컨소시엄의 당면과제와 해결방안 모색)

  • Kim, Sang-Jun
    • Journal of Information Management
    • /
    • v.41 no.4
    • /
    • pp.93-118
    • /
    • 2010
  • This study was aimed to establish a workable strategies to operate KESLI consortium reliably. To encourage the research purposes, it was mainly investigated international literature on current challenges for the e-journals consortium in comparison with the domestic implications. Major issues and challenges are divided to six items by scholarly communication changes and e-journals percentage increase, a big deal for a contract -based consortium pricing model in vogue, a consortium of the price hikes and making budget difficulties, use the standard statistics by the results of the use, archiving and archive security uncertainty, and contracts public availability of such external conditions. As a result, the international challenges of E-journals consortium was similar to KESLI, but the depth of information and research on domestic was weaker than the international research. To see more research and a rational perception based on scientific evidence and alternatives that enable KESLI working in the field was needed to be.

The Developmental Program of Emergency Medical System in Correctional Facilities (교정시설 내 응급의료체계 발전방안)

  • Kim, Su-Il
    • Journal of forensic and investigative science
    • /
    • v.3 no.1
    • /
    • pp.60-73
    • /
    • 2008
  • The purpose of Emergency Medical System(EMS) is what a patient returns to society with recovering mental tone in the shortest time as giving prompt and proper medical treatment to patient in emergency situation, and the Correctional Administration(CA) is purposed for the convict to return and settle down to society after release from prison in success as executing schooling, enlightenment activity, vocational training to convict who was quarantined from the society for the term of imprisonment. The EMS and CA will coincide each other which is reverting people to society in safety. This study aims to suggest the developmental program of EMS in correctional facilities through the cause of emergency situation, system, human resources, establishment, medical equipments, state of budget and the point issue for safety of victim who has many chances that is exposed to physical damage and disease because of particularity of lower culture in correctional facilities and the staff who works there. First, in the view of the correctional facility security system, a proper number of the emergency rescuers should be employed. Second, the effective transportation system along with some emergency medical equipment needs to be established. Third, the correctional officers and the prisoners should be learned the first-aid training which is realistic, practical and systematic. Fourth, the cooperative system should be established such as 1339 emergency medical information center in society. Fifth, the Ministry of Health and Welfare must increase EMS budget for correctional facilities.

  • PDF

A Study on Act on Certified Detective and Certified Detective Business (공인탐정 관련 법률(안)의 문제점과 개선방안에 관한 연구)

  • Kim, Bong-Soo;Choo, Bong-Jo
    • Korean Security Journal
    • /
    • no.61
    • /
    • pp.285-305
    • /
    • 2019
  • In the bill of [Act on Certified Detective and Certified Detective Business] (hereinafter referred to as the Certified Detective Act) proposed and represented by the member of National Assembly, Lee Wan-Yong in 2017, the legislative point of view showed that various incidents and accidents, including new crimes, are frequently increasing as society develops and becomes more complex, however, it is not possible to solve all the incidents and accidents with the investigation force of the state alone due to manpower and budget, and therefore, a certified detective or private investigator are required. According to the decision of the Constitutional Court in June 2018, Article 40 (4) of the Act on the Use and Protection of Credit Information is concerned with 'finding the location and contact information of a specific person or investigating privacy other than commerce relations such as financial transactions' are prohibited. It is for the purpose of preventing illegal acts in the process of investigation such as the location, contact information, and the privacy of a specific person and protecting the privacy and tranquility of personal privacy from misuse and abuse of the personal information etc. Such 'privacy investigation business' currently operates in the form of self-employment business, which becomes a social issue as some companies illegally collect and provide such privacy information by using illegal cameras or vehicle location trackers and also comes to be the objects of clampdown of the investigative agency. Considering this reality, because it is difficult to find a resolution to materialize the legislative purpose of the Act on the use and protection of credit information other than prohibiting 'investigation business including privacy etc' and it is possible to run a similar type of business as a detective business in the scope that the laws of credit research business, security service business, the position of the Constitutional Court is that 'the ban on the investigations of privacy etc' does not infringe the claimant's freedom to choose a job. In addition to this decision, the precedent positions of the Constitutional Court have been that, in principle, the legislative regulation of a particular occupation was a matter of legislative policy determined by the legislator's political, economic and social considerations, unless otherwise there were any special circumstances, and. the Constitutional Court also widely recognized the legislative formation rights of legislators in the qualifications system related to the freedom of a job. In this regard, this study examines the problems and improvement plans of the certified detective system, focusing on the certified detective bill recently under discussion, and tries to establish a legal basis for the certified detective and certified detective business, in order to cultivate and institutionalize the certified detective business, and to suggest methodologies to seek for the development of the businesses and protect the rights of the people.

A Case Study on BSC System Implementation of Korea Minting & Security Printing Corporation (한국조폐공사 BSC 시스템 구축 사례)

  • Lee, Choong-Seop
    • Information Systems Review
    • /
    • v.9 no.1
    • /
    • pp.191-214
    • /
    • 2007
  • This study analyzes the process of establishing BSC based strategic performance evaluation system of KOMSCO. This case could be a reference to other public institutes for BSC introduction and efficient BSC usage. Internal control system of KOMSCO has been improved by EVA system in 1999, BSC introduction and Job analysis in 2001 through 2002, and BSC performance evaluation system in 2004. KOMSCO tries to reflect BSC concept by inducing employees to cooperate selection process of CSF and KPI and by considering the organizational characteristics of KOMSCO in constructing it's performance indices. It is suggested that these processes are very important and should be followed by other institutes in their BSC introduction. By applying BSC, KOMSCO provides improvement in employees' understanding of strategy, performance management, and performance evaluation. KOMSCO' information system based on ERP and efficiently connected to EIS, KMS, and BSC seems to play an important role of BSC application. BSC system of KOMSCO is now in the early stage of application and needs to be evaluated by the efficiency of usage in terms of overall performance evaluation system, deduction system of evaluation point for excess accomplishment over target, and connection to budget system.

A Study on the Methods of Building Tools and Equipment for Digital Forensics Laboratory (디지털증거분석실의 도구·장비 구축 방안에 관한 연구)

  • Su-Min Shin;Hyeon-Min Park;Gi-Bum Kim
    • Convergence Security Journal
    • /
    • v.22 no.5
    • /
    • pp.21-35
    • /
    • 2022
  • The use of digital information according to the development of information and communication technology and the 4th industrial revolution is continuously increasing and diversifying, and in proportion to this, crimes using digital information are also increasing. However, there are few cases of establishing an environment for processing and analysis of digital evidence in Korea. The budget allocated for each organization is different and the digital forensics laboratory built without solving the chronic problem of securing space has a problem in that there is no standard that can be referenced from the initial configuration stage. Based on this awareness of the problem, this thesis conducted an exploratory study focusing on tools and equipment necessary for building a digital forensics laboratory. As a research method, focus group interviews were conducted with 15 experts with extensive practical experience in the digital forensic laboratory or digital forensics field and experts' opinions were collected on the following 9 areas: network configuration, analyst computer, personal tools·equipment, imaging devices, dedicated software, open source software, common tools/equipment, accessories, and other considerations. As a result, a list of tools and equipment for digital forensic laboratories was derived.

A Study on the controversial Issues of the Private Investigator System (공인탐정제도 도입에 따른 주요 쟁점 논의)

  • Jaemin Lee
    • Journal of the Society of Disaster Information
    • /
    • v.19 no.2
    • /
    • pp.254-261
    • /
    • 2023
  • Purpose: With the diversification of modern society, it is difficult to predict crime types, and the limitations of the state's functions, such as human limitations and lack of budget, are increasing. Method: However, as the number of private investigation companies that do not use illegal means to solve the request increased, attempts were made to introduce a public detective system that would manage and supervise it and compensate for the gap in public power. Result: However, due to the nature of the Private Investigator system, legislation has not progressed as the National Police Agency and the Ministry of Justice are at odds with existing laws that guarantee existing jobs such as lawyers and credit research. Conclusion: Therefore, this study analyzes the bills related to the authorized detective to the National Assembly, examines major issues such as the scope of work of the authorized detective business, the selection of management and supervisory authorities, and suggests ways to improve the successful settlement of the Private Investigator system.

Efficient Information System Sizing Selection Using Cloud Computing Platform (클라우드 컴퓨팅 플랫폼을 이용한 효율적인 정보시스템 용량 산정 방법에 관한 연구)

  • Seong, Baek-min;Lee, Min-gyu;Sohn, Hyo-jung;Kim, Jong-bae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2014.10a
    • /
    • pp.79-81
    • /
    • 2014
  • Recently, It is built various information systems evolve IT skills. But When you build the information system, Difficult to determine whether the appropriate scale and problems that rely heavily on SI companies and professionals. To solve this problem, Korea Information Security Agency, etc., based on the primary objective was to develop H/W Capacity Equation formally to each system type. But the problems are to present H/W capacity equation by discussion of the expert group of suppliers and relatively long that it is difficult to formally apply in the situation now so it is no longer the limit. In this study, we proposes proper capacity planning techniques, which can guarantee the best performance compared to the budget invested. For this purpose, we derived the proper H/W capacity equation by regression analysis to gather performance metrics and cost of various cases by simulation of a virtual environment in the cloud. Through this study, when capacity planning, It is possible to reduce costs that It is possible to build an information system based on the digitized data and build information system in an environment that does not rely on the SI business or professional.

  • PDF

The study of meanings and follow-up tasks for enactment of Assistive Technology Act in Korea (한국의 보조기기법 제정 의의와 후속과제에 대한 연구)

  • Nam, Se-hyun
    • Journal of Digital Convergence
    • /
    • v.14 no.10
    • /
    • pp.535-542
    • /
    • 2016
  • This study was to explore the meanings and follow-up tasks for enactment of Act on Supply and Utilization Promotion of Assistive Technology Devices for People with Disabilities and Seniors(Assistive Technology Act) in Korea. I conducted analysis about contents and establishment process of the Act. The study found meaningful effects ; it provided the basis for supporting assistive technology devices based on the social model, it led to an Implementation of the national obligations such as UN Convention on the Rights of Persons with Disabilities, it provided terms related to assistive technology. It is suggested to conduct follow-up studies and to put the efforts to strengthen additional laws for backing up the effective policy for extended support of assistive technology devices and for security of budget, for establishing regional service centers, for phasing of professional qualification, for controlling quality, for establishing an information system, and for promoting industries.