• Title/Summary/Keyword: Information Security Strategic

Search Result 142, Processing Time 0.025 seconds

[Retracted] A Study on the Export Control System and its Effective Implementation Plan in Korea ([논문 철회] 한국의 전략물자 수출통제제도의 문제점과 효율적 이행방안)

  • Lee, Sang-Ok
    • International Commerce and Information Review
    • /
    • v.13 no.3
    • /
    • pp.353-375
    • /
    • 2011
  • Export control was first triggered by international export control system at US led COCOM in 1949. Numerous international efforts such as NPT in 1969, ZC in 1970, NSG in 1978, AG in 1985, MTCR in 1987, Wassenaar Arrangement(WA) establishment in 1995 with 1990's the fall of the Berlin Wall, have been made since. The concept of export control has been changed from weaponry and parts export control to preventing or blocking weaponry, respective goods and relevant technology from the hand of troubled regions and non-state actors as terrorist groups; and the new concept is described as Nonproliferation Control. Extent of control items is not only limited to conventional weaponry, but also includes weapons of mass destruction(WMD) and even dual use items which can be used for production, development, usage or storage. Control items include all items defined by NSG, MTCR, AG, WA, and CMC-Opec. The 9.11 terror had a strong influence on international society. Effort to prevent WMD proliferation has now become the most important issue for international security. This study aims to suggest improvement points for nonproliferation law and its effective implementation, based on problem and limitation identification along with analysis of nonproliferation law and implementation examples by type. Furthermore for the purpose of national and global security, export control system on strategic items which are considered to be a key issue in South and North Korea relationship needs to be effectively managed. Recently, North Korea's missile and nuclear tests have been criticized globally; and the global society including respective countries as China and South Korea is striving to urge export control in line with the UN resolution.

  • PDF

The Study on the e-Service Quality Factors in m-Shopping Mall App based on the Kano Model (카노 모형을 이용한 모바일 쇼핑몰 앱의 서비스 품질 요인 분석에 관한 연구)

  • Kim, Sang-Oh;Youn, Sun-Hee;Lee, Myung-Jin
    • The Journal of Industrial Distribution & Business
    • /
    • v.9 no.12
    • /
    • pp.63-72
    • /
    • 2018
  • Purpose - In this study, it is classified the service quality dimension of mobile shopping app using Kano model. In addition, it is evaluated quality factors suitable for strategic management from the viewpoint of service provider through mobile application through binary dimension analysis. Research design, data, and methodology - In this study, seven quality dimensions such as information quality, reliability, immediacy, convenience, design, security and customer service were derived through related studies to make binary shopping quality app quality measurement. 37 sub-variables were set by each quality dimensions. Each questionnaire was composed of positive and negative items like Kano's proposed method, and the satisfaction coefficient suggested by Timko(1993) was examined to understand the influence of each factors on customer satisfaction. Results - As a result of research, shopping app users perceived unity quality factor in most items of service quality dimension such as information quality, reliability, immediacy, convenience and customer service. In addition, the satisfaction coefficient showed a good impression, quick response of the result, fast delivery, and the unsatisfactory coefficient showed more interest in personal information such as payment method safety, and transaction security. As a result of research, shopping app users perceived unity quality factor in most items of service quality dimension such as information quality, reliability, immediacy, convenience and customer service. And, in information quality, the information overload was classified as an apathetic quality component, while the related information provision belonged to an attractive quality component. In reliability quality, customized service provision was classified as an attractive quality component. In instant connectivity, the quality of the connection during transport was classified as an attractive quality component. In convenience quality, access to product information was classified as a one-way quality component. All components of designs quality were classified as attractive quality components, and in security quality, all of their components were all classified as one quality component. Lastly, in customer service, they components were all classified as a single quality component. In addition, the satisfaction coefficient showed a good impression, quick response of the result, fast delivery, and the unsatisfactory coefficient showed more interest in personal information such as payment method safety, and transaction security. Conclusion - In the online service environment, which is difficult to differentiate in terms of upward upgrading only by technological implementation and function, the results of this study can be suggested as a differentiating factor for major channels with customers rather than improve the brand image.

Development Plan for the Identity and Future of Security Science (경호학의 정체성과 미래에 대한 발전 방안)

  • Kwon, Hyuck-Bin;Park, Jun-Seok
    • Korean Security Journal
    • /
    • no.50
    • /
    • pp.145-172
    • /
    • 2017
  • In 2015 the Department of Education announced that it will make downsizing efforts by recommending classified downsizing ratio according to the evaluation of universities for active support toward autonomous efforts of universities with the possibilities of reform and qualitative structural reform for customized human resource cultivation according to the social demands. This is the preemtive structural reform preparing against the rapid decrease of the number of students, and the preparation for changing into competitive universities so that customized human resource that is needed in the society can be trained. Security Science Departments of Korea, first established in 1996, need changes in curriculum in order to prepare for the fourth revolution of the future, and are stagnant on the education goal and employment course. Therefore the adoption of related certificates, curriculum, NCS, and professional curriculum is needed. For example, Hansei University, Chung-Ang University, and Far East University have established the Department of Industrial Security, and Kyonggi University and Sungshin Women's University have established the Department of Convergence Security. Also, Konkuk University has established the Graduate School of Security and Disasters, the Graduate School of Information and Policy, the Graduate School of Criminal Justice, Gachon University the Graduate School of National Security, Sungkyunkwan University the Graduate School of Strategic Studies. This shows that the field of Security Science should not settle for itself. This article analyzes current curriculum and subjects of security, police, industrial security, military related academic departments of key universities. It is necessary to prepare for the future by predicting the change from the merge of academic departments and the demands of the times. As technical colleges are adopting NCS, this is the time to seek for systematic collaboration between universities and technical colleges and between industry, government, and academida.

  • PDF

Zigbee-based Local Army Strategy Network Configurations for Multimedia Military Service

  • Je, Seung-Mo
    • Journal of Multimedia Information System
    • /
    • v.6 no.3
    • /
    • pp.131-138
    • /
    • 2019
  • With the rapid evolution of communication technology, it became possible to overcome the spatial and temporal limitations faced by humans to some extent. Furthermore, the quality of personal life was revolutionized with the emergence of the personal communication device commonly known as the smart phone. In terms of defense networks, however, due to restrictions from the military and security perspectives, the use of smart phones has been prohibited and controlled in the army; thus, they are not being used for any defense strategy purposes as yet. Despite the current consideration of smart phones for military communication, due to the difficulties of network configuration and the high cost of the necessary communication devices, the main tools of communication between soldiers are limited to the use of flag, voice or hand signals, which are all very primitive. Although these primitive tools can be very effective in certain cases, they cannot overcome temporal and spatial limitations. Likewise, depending on the level of the communication skills of each individual, communication efficiency can vary significantly. As the term of military service continues to be shortened, however, types of communication of varying efficiency depending on the levels of skills of each individual newly added to the military is not desirable at all. To address this problem, it is essential to prepare an intuitive network configuration that facilitates use by soldiers in a short period of time by easily configuring the strategy network at a low cost while maintaining its security. Therefore, in this article, the author proposes a Zigbee-based local strategic network by using Opnet and performs a simulation accordingly.

A Machine Learning Univariate Time series Model for Forecasting COVID-19 Confirmed Cases: A Pilot Study in Botswana

  • Mphale, Ofaletse;Okike, Ezekiel U;Rafifing, Neo
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.1
    • /
    • pp.225-233
    • /
    • 2022
  • The recent outbreak of corona virus (COVID-19) infectious disease had made its forecasting critical cornerstones in most scientific studies. This study adopts a machine learning based time series model - Auto Regressive Integrated Moving Average (ARIMA) model to forecast COVID-19 confirmed cases in Botswana over 60 days period. Findings of the study show that COVID-19 confirmed cases in Botswana are steadily rising in a steep upward trend with random fluctuations. This trend can also be described effectively using an additive model when scrutinized in Seasonal Trend Decomposition method by Loess. In selecting the best fit ARIMA model, a Grid Search Algorithm was developed with python language and was used to optimize an Akaike Information Criterion (AIC) metric. The best fit ARIMA model was determined at ARIMA (5, 1, 1), which depicted the least AIC score of 3885.091. Results of the study proved that ARIMA model can be useful in generating reliable and volatile forecasts that can used to guide on understanding of the future spread of infectious diseases or pandemics. Most significantly, findings of the study are expected to raise social awareness to disease monitoring institutions and government regulatory bodies where it can be used to support strategic health decisions and initiate policy improvement for better management of the COVID-19 pandemic.

A Study on the Exposures and Threats for Internet of Things(IoT) IP (사물인터넷(IoT) IP의 노출과 위협에 대한 연구)

  • Kim, Yu-Jin;Lee, Nu-Ri;Shin, Seong-Eun;Song, Seung-Yeon;Jung, Da-Young;Chang, Young-Hyun;Moon, Hyung-Nam
    • The Journal of the Convergence on Culture Technology
    • /
    • v.2 no.4
    • /
    • pp.77-82
    • /
    • 2016
  • IoT technology was selected as one of IT 10 strategic technologies by gartner from 2013 to 2015, and implements advanced smart society while enabling interaction between people and things. Because IoT devices are connected to the Internet, they are involved in issues including exposure of private lives, for example, hacking to result in wireless signal interference, data theft, data modification and forgery and service denial, and critical security issues including threat to national confidential information and facilities. This study aims to suggest a method for examining threats to security through IP exposure of IoT devices and examining related problems to minimize threats to security through IP exposure including exposure of private lives or damages to the national infrastructure system.

Forecasting the Diffusion of Technology using Patent Information: Focused on Information Security Technology for Network-Centric Warfare (특허정보를 활용한 기술 확산 예측: NCW 정보보호기술을 중심으로)

  • Kim, Do-Hoe;Park, Sang-Sung;Shin, Young-Geun;Jang, Dong-Sik
    • The Journal of the Korea Contents Association
    • /
    • v.9 no.2
    • /
    • pp.125-132
    • /
    • 2009
  • The paradigm of economy has been transformed into knowledge based economic paradigm in 21th century. Analysis of patent trend is one of the strategic methods for increasing their patent competitive power. However, this method is just presenting statistical data about patent trend or qualitative analysis about some core technology. In this paper, we forecast technology diffusion using patent information for more progressive analysis. We make an experiment with bass model and logistic model and make use of patent data about information-security technology for NCW as input data. We conclude that the logistic model is more efficient for forecasting and this technology is approaching to the age of technology maturity.

A study on security independent behavior in social game using expanded health belief model (건강신념모델을 확장한 소셜게임(Social Game) 보안의지행동에 관한 연구)

  • Ahn, Ho-Jeong;Kim, Sung-Jun;Kwon, Do-Soon
    • Management & Information Systems Review
    • /
    • v.35 no.2
    • /
    • pp.99-118
    • /
    • 2016
  • With the development of Internet and popularization of smartphones over recent years, social network services are experiencing rapid growth. On top of this, smartphone gaming market is showing a rapid growth and the use of mobile social games is on the significant rise. The occurrence of game data manipulation targeting these services and personal information leakage is highlighting the importance of social gaming security. This study is intended to propose development plans effective and efficient in social game services by figuring out factors putting effects on security dependent behavior of social game users in Korea and carrying out a practical study on the casual relationship between factors influencing security dependent behavior through recognized behavioral control and attitudes for privacy infringement of these factors. To do this, proposed was a study model in which the HBM(Health Belief Model) allowing the social game user to influence security dependent behavior was expanded and applied as a major variable. To verify the study model of this study practically, a survey was conducted among university students in Seoul-based K University and S University who had experienced using social game services. According to the study findings, firstly, the perceived seriousness turned out to provide positive influence to trust. But, the perceived seriousness turned out not to put positive effects on self-efficacy. Secondly, the perceived probability turned out not to put positive effects on self-efficacy and trust. Thirdly, the perceived gain turned out to put positive effects on self-efficacy and trust. Fourthly, the perceived disorder turned out not to put positive effects on self-efficacy and trust. Fifthly, self-efficacy turned out to put positive effects on trust. But, self-efficacy turned out not to put positive effects on security dependent behavior. Sixthly, trust turned out not to put positive effects on security dependent behavior. This study is intended to make a strategic proposal so that social game users can raise awareness of their level of security perception and security willingness through this.

  • PDF

Factors Influencing the Introduction of Mobile Security Technology (기업 모바일 보안기술 도입에 영향을 미치는 특성요인)

  • Choi, Woong-Gyu;Lee, Young-Jai
    • The Journal of Society for e-Business Studies
    • /
    • v.18 no.4
    • /
    • pp.215-240
    • /
    • 2013
  • This research has reviewed the major composition concepts and the positive research results in the selected studies which were theoretically based on IDT (Innovation Diffusion Theory), IRM (Model of Innovation Resistance), TAM(Technology Acceptance Model), and IAPA(Information Asset Protection Activity) in order to improve the theoretical explanation of major characterized factors influencing on the introduction of MST (Mobile Security Technology). The characterized factors for the adaptation of MST and 17 hypotheses on the MST study models in order to test the effects on the intention to use are empirically verified by utilizing the analysis method of structure equation model. As a result of a study, First, the most influential characterized factors of IRM are shown as compatibility, complexity, relative advantage, information asset protection in order. Second, the characterized factors affecting intention to use are shown as relative advantage, compatibility, innovation resistance, performance expectancy. The results of this study are relevantly significant to establish the theoretical foundation of the study on the adaptation of MST and The verification of the characterized factors provide strategic implication for the introduction of MST and policy direction which alleviates informational gap between new MST and previous Security Technology to diffusion agency.

Study on High-speed Cyber Penetration Attack Analysis Technology based on Static Feature Base Applicable to Endpoints (Endpoint에 적용 가능한 정적 feature 기반 고속의 사이버 침투공격 분석기술 연구)

  • Hwang, Jun-ho;Hwang, Seon-bin;Kim, Su-jeong;Lee, Tae-jin
    • Journal of Internet Computing and Services
    • /
    • v.19 no.5
    • /
    • pp.21-31
    • /
    • 2018
  • Cyber penetration attacks can not only damage cyber space but can attack entire infrastructure such as electricity, gas, water, and nuclear power, which can cause enormous damage to the lives of the people. Also, cyber space has already been defined as the fifth battlefield, and strategic responses are very important. Most of recent cyber attacks are caused by malicious code, and since the number is more than 1.6 million per day, automated analysis technology to cope with a large amount of malicious code is very important. However, it is difficult to deal with malicious code encryption, obfuscation and packing, and the dynamic analysis technique is not limited to the performance requirements of dynamic analysis but also to the virtual There is a limit in coping with environment avoiding technology. In this paper, we propose a machine learning based malicious code analysis technique which improve the weakness of the detection performance of existing analysis technology while maintaining the light and high-speed analysis performance applicable to commercial endpoints. The results of this study show that 99.13% accuracy, 99.26% precision and 99.09% recall analysis performance of 71,000 normal file and malicious code in commercial environment and analysis time in PC environment can be analyzed more than 5 per second, and it can be operated independently in the endpoint environment and it is considered that it works in complementary form in operation in conjunction with existing antivirus technology and static and dynamic analysis technology. It is also expected to be used as a core element of EDR technology and malware variant analysis.