• Title/Summary/Keyword: Information Security Measures

Search Result 661, Processing Time 0.026 seconds

Research Trend Analysis Using Bibliographic Information and Citations of Cloud Computing Articles: Application of Social Network Analysis (클라우드 컴퓨팅 관련 논문의 서지정보 및 인용정보를 활용한 연구 동향 분석: 사회 네트워크 분석의 활용)

  • Kim, Dongsung;Kim, Jongwoo
    • Journal of Intelligence and Information Systems
    • /
    • v.20 no.1
    • /
    • pp.195-211
    • /
    • 2014
  • Cloud computing services provide IT resources as services on demand. This is considered a key concept, which will lead a shift from an ownership-based paradigm to a new pay-for-use paradigm, which can reduce the fixed cost for IT resources, and improve flexibility and scalability. As IT services, cloud services have evolved from early similar computing concepts such as network computing, utility computing, server-based computing, and grid computing. So research into cloud computing is highly related to and combined with various relevant computing research areas. To seek promising research issues and topics in cloud computing, it is necessary to understand the research trends in cloud computing more comprehensively. In this study, we collect bibliographic information and citation information for cloud computing related research papers published in major international journals from 1994 to 2012, and analyzes macroscopic trends and network changes to citation relationships among papers and the co-occurrence relationships of key words by utilizing social network analysis measures. Through the analysis, we can identify the relationships and connections among research topics in cloud computing related areas, and highlight new potential research topics. In addition, we visualize dynamic changes of research topics relating to cloud computing using a proposed cloud computing "research trend map." A research trend map visualizes positions of research topics in two-dimensional space. Frequencies of key words (X-axis) and the rates of increase in the degree centrality of key words (Y-axis) are used as the two dimensions of the research trend map. Based on the values of the two dimensions, the two dimensional space of a research map is divided into four areas: maturation, growth, promising, and decline. An area with high keyword frequency, but low rates of increase of degree centrality is defined as a mature technology area; the area where both keyword frequency and the increase rate of degree centrality are high is defined as a growth technology area; the area where the keyword frequency is low, but the rate of increase in the degree centrality is high is defined as a promising technology area; and the area where both keyword frequency and the rate of degree centrality are low is defined as a declining technology area. Based on this method, cloud computing research trend maps make it possible to easily grasp the main research trends in cloud computing, and to explain the evolution of research topics. According to the results of an analysis of citation relationships, research papers on security, distributed processing, and optical networking for cloud computing are on the top based on the page-rank measure. From the analysis of key words in research papers, cloud computing and grid computing showed high centrality in 2009, and key words dealing with main elemental technologies such as data outsourcing, error detection methods, and infrastructure construction showed high centrality in 2010~2011. In 2012, security, virtualization, and resource management showed high centrality. Moreover, it was found that the interest in the technical issues of cloud computing increases gradually. From annual cloud computing research trend maps, it was verified that security is located in the promising area, virtualization has moved from the promising area to the growth area, and grid computing and distributed system has moved to the declining area. The study results indicate that distributed systems and grid computing received a lot of attention as similar computing paradigms in the early stage of cloud computing research. The early stage of cloud computing was a period focused on understanding and investigating cloud computing as an emergent technology, linking to relevant established computing concepts. After the early stage, security and virtualization technologies became main issues in cloud computing, which is reflected in the movement of security and virtualization technologies from the promising area to the growth area in the cloud computing research trend maps. Moreover, this study revealed that current research in cloud computing has rapidly transferred from a focus on technical issues to for a focus on application issues, such as SLAs (Service Level Agreements).

Evaluation of Disaster Resilience Scorecard for the UN International Safety City Certification of Incheon Metropolitan City (인천시 UN 국제안전도시 인증을 위한 재난 복원력 스코어카드 평가)

  • Kim, Yong-Moon;Lee, Tae-Shik
    • Journal of Korean Society of Disaster and Security
    • /
    • v.13 no.1
    • /
    • pp.59-75
    • /
    • 2020
  • This study is a case study that applied 'UNDRR's Urban Disaster Resilience Scorecard', an evaluation tool necessary for Incheon Metropolitan City to be certified as an international safe city. I would like to present an example that the results derived from this scorecard contributed to the Incheon Metropolitan City Disaster Reduction Plan. Of course, the Disaster Resilience Scorecard can't provide a way to improve the resilience of every disaster facing the city. However, it is to find the weakness of the resilience that the city faces, and to propose a solution to reduce the city's disaster risk. This is to help practitioners to recognize the disaster risks that Incheon Metropolitan City faces. In addition, the solution recommended by UNDRR was suggested to provide resilience in areas vulnerable to disasters. It was confirmed that this process can contribute to improving the disaster resilience of Incheon Metropolitan City. UNDRR has been spreading 'Climate Change, Disaster-resistant City Creation Campaign', aka MCR (Making Cities Resilient) Campaign, to cities all over the world since 2010 to reduce global cities' disasters. By applying the disaster relief guidelines adopted by UNDRR, governments, local governments, and neighboring cities are encouraged to collaborate. As a result of this study, Incheon Metropolitan city's UN Urban Resilience Scorecard was evaluated as a strong resilience field by obtaining scores of 4 or more (4.3~5.0) in 5 of 10 essentials; 1. Prepare organization for disaster resilience and prepare for implementation, 4. Strong resilience Urban development and design pursuit, 5. Preservation of natural cushions to enhance the protection provided by natural ecosystems, 9. Ensure effective disaster preparedness and response, 10. Rapid restoration and better reconstruction. On the other hand, in the other five fields, scores of less than 4 (3.20~3.85) were obtained and evaluated as weak resilience field; 2. Analyze, understand and utilize current and future risk scenarios, 3. Strengthen financial capacity for resilience, 6. Strengthen institutional capacity for resilience, 7. Understanding and strengthening social competence for resilience, 8. Strengthen resilience of infrastructure. In addition, through this study, the risk factors faced by Incheon Metropolitan City could be identified by priority, resilience improvement measures to minimize disaster risks, urban safety-based urban development plans, available disaster reduction resources, and integrated disasters. Measures were prepared.

Risk Management-Based Application of Anti-Tampering Methods in Weapon Systems Development (무기 시스템 개발에서 기술보호를 위한 위험관리 기반의 Anti-Tampering 적용 기법)

  • Lee, Min-Woo;Lee, Jae-Chon
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.19 no.12
    • /
    • pp.99-109
    • /
    • 2018
  • Tampering involves illegally removing technologies from a protected system through reverse engineering or developing a system without proper authorization. As tampering of a weapon system is a threat to national security, anti-tampering measures are required. Precedent studies on anti-tampering have discussed the necessity, related trends, application cases, and recent cybersecurity-based or other protection methods. In a domestic situation, the Defense Technology Protection Act focuses on how to prevent technology leakage occurring in related organizations through personnel, facilities and information systems. Anti-tampering design needs to determine which technologies are protected while considering the effects of development cost and schedule. The objective of our study is to develop methods of how to select target technologies and determine counter-measures to protect these technologies. Specifically, an evaluation matrix was derived based on the risk analysis concept to select the protection of target technologies. Also, based on the concept of risk mitigation, the classification of anti-tampering techniques was performed according to its applicability and determination of application levels. Results of the case study revealed that the methods proposed can be systematically applied for anti-tampering in weapon system development.

A Study on the Policy Measures for the Prevention of Industrial Secret Leakage in the Metaverse (메타버스 내 산업기밀 유출 대응을 위한 정책 및 제도에 관한 연구)

  • Jeon, So-Eun;Oh, Ye-Sol;Lee, Il-Gu
    • Journal of Digital Convergence
    • /
    • v.20 no.4
    • /
    • pp.377-388
    • /
    • 2022
  • Metaverse, realistic virtual space technology has become a hot topic. However, due to the lack of an institutional system to the metaverse environment, concerns are rising over the leakage of industrial confidentiality, including digital assets produced, stored, processed, and transferred within the metaverse. Digital forensics, a technology to defend against hacking attacks in cyberspace, cannot be used in metaverse space, and there is no basis for calculating the extent of damage and tracking responsibility, making it difficult to respond to human resources leakage and cyberhacking effectively. In this paper, we define the scope of industrial confidentiality information and leakage scenario and propose policy and institutional measures based on problems in each metaverse scenario. As a result of the study, it was necessary to prepare a standardized law on Extra-territorial search and seizure issues and a system for collecting cryptocurrency evidence to respond to industrial confidentiality leaks in the metaverse. The study expects to contribute to industrial technology development by preparing in advance for problems that may arise in metaverse technology.

A Study on Improvement Measures to Strengthen the Police's Ability to Respond to CBRN Terrorism at the Scene (경찰의 화생방테러 현장대응역량 강화를 위한 개선방안 연구)

  • Lee, Deok-Jae;Song, Chang Geun
    • Journal of Convergence for Information Technology
    • /
    • v.12 no.5
    • /
    • pp.116-125
    • /
    • 2022
  • Recent aspects of terrorism varies in various ways according to means, targets, and regions. In particular, the 9/11 terrorist attacks in the United States in 2001 changed the paradigm of each country's terrorism, and the South Korea also participated in the enactment and enforcement of the Anti-Terrorism Act in 2016. Based on this, CBRN terrorism is included in general terrorism, and the National Police Agency plays the role of a control tower, and a system supported by related organizations such as the Ministry of Environment is being built and operated. However, restrictions were confirmed in the organizational system, manpower composition, and equipment and materials in operation in preparation for CBRN within the police. Based on the identified limitations, we proposed improvement plans to strengthen the capacity for CBRN terrorism: establishing a dedicated CBRN organization; creating research organization; and securing additional dedicated personnel. Based on this, as an improvement plan to strengthen the capability of CBRN, the establishment of an organization dedicated to CBRN and a research organization within the National Police Agency, and expansion of electronic equipment suitable for the characteristics of CBRN were proposed. It is expected that the police's on-site response capability system for CBRN terrorism will be strengthened via the proposed improvement measures to recover the various restrictions on the response to CBRN terrorism.

A Study on the Safety Management Measures Efficient Chemical Substances (화학물질의 효율적 안전관리 방안에 관한 연구)

  • Choi, Min-Ki;Choi, Don-Mook
    • Journal of the Korea Safety Management & Science
    • /
    • v.15 no.3
    • /
    • pp.37-50
    • /
    • 2013
  • It is not an exaggeration to say that modern chemicals take a leading place in our life, and people live with the chemicals, having a huge impact on their daily life. The chemical industry in South Korea, ranked seventh in the world, is one of the key industries that are forming greater part of Korean economy. The actual state of the chemical industries, however, is that over 14 tons of hazardous chemicals are being discharged annually and threaten people's lives with a lack of knowledge of its potential danger. In this way, not only beneficial to us, some of these substances, All chemicals, but also present a threat fundamentally our living environment to hazards to human health and the environment, accidents such chemicals, unlike accidents general understanding the scale of damage and propagation velocity has a complex very difficult risk profile, that can occur during deployment of an accident type is also very diverse. Is the actual situation of public concern against harmful chemicals management's is amplified by the chemical accident in the wake such accidents, government and corporate and reactive system and management system prior to the chemical accident the need for communication to exchange ideas with each other between residents, providing information is important. Therefore, the government departments and corporations, which manage variety of chemicals, ought to contribute toward a development of national security by rigid control over the Hazardous chemicals.

A Study of protective measures of the source program for the development of the Internet of Things (IoT): Protection of the program as well as plagiarism research (사물인터넷(IoT)발전을 위한 소스프로그램 보호방안 연구: 프로그램의 보호와 유사표절 연구)

  • Lee, Jong-Sik
    • Journal of the Korea Convergence Society
    • /
    • v.9 no.4
    • /
    • pp.31-45
    • /
    • 2018
  • Recent dramatical development of computer technology related to internet technology intensifies the dispute over software of computer or smart device. Research on software has been flourished with political issuing of fierce competition among nations for software development. Particularly industrial growth in ethernet based big data and IoT (Internet of Things) has promoted to build and develop open source programs based on java, xcode and C. On these circumstances, issue on software piracy has been confronted despite the basic security policy protecting intellectual property rights of software and thus it is of substantial importance to protect the rights of originality of source program license. However, the other issue on source technology protection of developer is the possibility of hindrance to advancement in industry and culture by developing programs. This study discuss the way of enhancing legal stability of IoT application program development and reinforcing precision in inspection of program plagiarism by analyzing the source programs with newly introducing text mining technique, thus suggests an alternative protective way of infringement of personal information due to duplicating program.

Welfare of Video Production Professionals in Accordance with Enforcement of Artist Welfare Act (예술인 복지법 시행에 따른 영상제작 종사자의 복지)

  • Kim, Jong-Guk
    • The Journal of the Korea Contents Association
    • /
    • v.14 no.2
    • /
    • pp.247-256
    • /
    • 2014
  • "Artist Welfare Act" from the November 18, 2012 is being implemented. However, in the field of traditional culture and art the artists are the subject of a variety of policies by the newly launched Korean Artist Welfare Foundation Artists, but most of video production professionals are not aware of law enforcement and their legal status is ambiguous. This research raised the issue of poor video production workers welfare, and to seek the ways took a look at the key information of "Artist Welfare Act" and social issues. To this end, by in-depth interviews with video workers I analyzed the relationship between the parties, such as comments about the issues. Accordingly, a wide range of video production to reflect the welfare of workers in the "Artist Welfare Act" of the amendment shall be made. Above all, this should be reflected in measures to raise funds for artist welfare.

Perception of Patient Safety Risk Factors and Performance Level of Safety Care Activities among Hospital Nurses (환자안전 위험요인에 대한 병원간호사의 인식수준과 안전간호활동 수행정도)

  • Son, Young Shin;Lee, Young Whee;Kim, Young Shin;Song, Eun Jeong;Lee, Hye Ryun;Lee, Ju Hee
    • The Journal of Korean Academic Society of Nursing Education
    • /
    • v.24 no.2
    • /
    • pp.190-200
    • /
    • 2018
  • Purpose: The purpose of this study was to identify the level of perception of safety risk factors and the degree of performance of safety nursing activities in order to develop an education program to improve the safety of patients. Methods: The subjects were 217 nurses from 3 university hospitals in Incheon. Data were collected with structured questionnaires and analyzed using descriptive analysis, t-test, and ANOVA using SPSS 22.0. Results: The level of perception of patient's safety risk factors and safety care activities was 2.93 and 4.68, respectively. Perception of patient safety risk factors which belonging to the risk type of therapeutic devices, equipment, service and infrastructure all scored below average; also in addition, behavior, performance, and violence risk type and work system, information and communication risk type showed relatively low perception levels. Safety nursing activities showed a low level of performance in accurate communication among medical teams, management of fire and disaster, security management, use of restraints, identification of patients, and correct performance of operations and procedures. Conclusion: Based on these results, it is necessary to improve the safety of patients by taking proper management measures along with education.

Standardized Integration of Different Systems for the Establishment of a Korean Maritime Domain Awareness System (한국형 해양상황인식체계 구축을 위한 시스템간 표준화 연계방안에 관한 연구)

  • Kim, Young-Sup;Song, Chae-Uk
    • Journal of Navigation and Port Research
    • /
    • v.45 no.4
    • /
    • pp.204-211
    • /
    • 2021
  • The Maritime Domain Awareness system is a component that is necessary to enhance the awareness of all situations occurring at sea in relation to security, safety, economy, and the environment. To establish a marine situation recognition system that is currently being introduced in major maritime countries after approval by the International Maritime Organization's Maritime Safety Committee in 2010, operational measures should be established. For the purpose of establishing a technological foundation for the efficient construction of a Korean maritime situation recognition system, this study analyzed the status of each system (RADAR, VHF, and V-PASS, etc.) and proposed the application of data and communication standards.