• Title/Summary/Keyword: Information Security Technology

Search Result 4,700, Processing Time 0.033 seconds

Analysis of Village Safety Index using Accessibility to Public Facilities (공공시설 접근성을 통한 마을단위 안전지수 분석)

  • Jeon, Jeongbae;Kim, Solhee;Suh, Kyo;Yoon, Seongsoo
    • Journal of Korean Society of Rural Planning
    • /
    • v.22 no.2
    • /
    • pp.121-129
    • /
    • 2016
  • A disaster can be defined in many ways based on perspectives, in addition, its types are able to classify differently by various standards. Considering the different perspectives, the disaster can be occurred by natural phenomenon that is like typhoon, earthquake, flood, and drought, and by the accident that is like collapse of facilities, traffic accidents, and environmental pollution, etc. Into the modern society, moreover, the disaster includes the damages by diffusion of epidemic and infectious disease in domestic animals. The disaster was defined by natural and man-made hazards in the past. As societies grew with changes of paradigm, social factors have been included in the concept of the disaster according to new types unexpected by new disease and scientific technology. Change the concept of social disasters, Ministry of Public Safety and Security (MPSS) has provided the regional safety index, which measures the safety level of a local government. However, this regional safety index has some limitation to use because this index provides the information for city unit which is a unit of administrative districts of urban. Since these administrative districts units are on a different level with urban and rural areas, the regional safety index provided by MPSS is not be able to direct apply to the rural areas. The purpose of this study is to determine the regional safety index targeting rural areas. To estimate the safety index, we was used for 3 indicators of the MPSS, a fire, a crime, and an infectious disease which are evaluable the regional safety index using an accessibility analysis. For determining the regional safety index using accessibility from community centers to public facilities, the safety index of fire, crime, and infectious disease used access time to fire station, police office, and medical facility, respectively. An integrated Cheongju, targeting areas in this study, is mixed region with urban and rural areas. The results of regional safety index about urban and rural areas, the safety index in rural area is relatively higher than in the urban. Neverthless the investment would be needed to improve the safety in the rural areas.

Risk Management-Based Application of Anti-Tampering Methods in Weapon Systems Development (무기 시스템 개발에서 기술보호를 위한 위험관리 기반의 Anti-Tampering 적용 기법)

  • Lee, Min-Woo;Lee, Jae-Chon
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.19 no.12
    • /
    • pp.99-109
    • /
    • 2018
  • Tampering involves illegally removing technologies from a protected system through reverse engineering or developing a system without proper authorization. As tampering of a weapon system is a threat to national security, anti-tampering measures are required. Precedent studies on anti-tampering have discussed the necessity, related trends, application cases, and recent cybersecurity-based or other protection methods. In a domestic situation, the Defense Technology Protection Act focuses on how to prevent technology leakage occurring in related organizations through personnel, facilities and information systems. Anti-tampering design needs to determine which technologies are protected while considering the effects of development cost and schedule. The objective of our study is to develop methods of how to select target technologies and determine counter-measures to protect these technologies. Specifically, an evaluation matrix was derived based on the risk analysis concept to select the protection of target technologies. Also, based on the concept of risk mitigation, the classification of anti-tampering techniques was performed according to its applicability and determination of application levels. Results of the case study revealed that the methods proposed can be systematically applied for anti-tampering in weapon system development.

A Study on Analysis and Improvement of Contents of Domestic Disaster & Safety Education (국내 재난안전교육 컨텐츠 분석 및 개선방안 연구)

  • Chung, Hee-Soo;Song, Chang-Geun
    • Journal of Convergence for Information Technology
    • /
    • v.12 no.1
    • /
    • pp.76-82
    • /
    • 2022
  • Recently, natural and social disasters in Korea are increasing, and new disasters such as COVID 19 and sinkholes, and large-scale disasters that combine natural and social disasters are occurring frequently. In order to reduce damage caused by disasters and effectively respond to disasters, the importance of disaster safety education is emerging because it is necessary to understand the awareness of disaster situations and the functional response process. Ministry of Public Interior and Security is providing disaster safety education for emergency managers through 54 specialized disaster safety education institutions. There is also a lack of experience facilities. This has a problem in that it makes it difficult for disaster safety personnel to effectively respond to disasters due to lack of experience in actual disaster sites. Also, unlike other education fields, the connection between disaster safety education contents and new technologies such as AI is still lacking. In this study, focusing on natural disaster, the current status and problems of domestic disaster safety education institutions and their contents are investigated and analyzed, and based on this, this study suggested improvement plans for domestic disaster safety education contents such as establishment of a unified disaster safety standard curriculum, production and distribution of disaster safety education experience contents using virtual reality technology and infotainment technology, and development of mobile AI tutoring service.

A Study on the Maritime Law According to the Occurrence of Marine Accidents of MASS(Maritime Autonomous Surface Ship) (자율운항선박의 해양사고 발생에 따른 해상법적 고찰)

  • Lee, Young-Ju
    • Maritime Security
    • /
    • v.6 no.1
    • /
    • pp.37-56
    • /
    • 2023
  • Recently, with the rapid development of ICT(Information and Communication Technology) and AI(Artificial Intelligence) technology industries, the emergence of MASS(Maritime Autonomous Surface Ship), which were thought only in the distant future, is approaching a reality. Along with the development of these amazing technologies, changes in the private law sector, such as liability, compensation for damages, and maritime insurance, as well as in the public law sector, such as maritime safety, marine environment protection, and maintenance of maritime order, have become necessary in the field of maritime law. In particular, with the advent of a new type of ship called MASS that does not have a crew on board, the kind and type of liability, compensation for damages, and insurance contracts in the event of a marine accident will also change. In this paper, the general theory about concept, classification, effectiveness and future of MASS and the general theory about concept and various obligations and responsibilities under the maritime law for discussion of MASS are reviewed. Next, in addition, regarding the problems that may occur in the event of a marine accident from MASS, the status as a ship, the legal relationship of the chartering contract, obligation to exercise due diligence in making the vessel seaworthiness, subject of responsibility, and liability for damages and immunity are reviewed from the perspective of maritime law. In addition, in the degree four of MASS, the necessities of further research to clarify the attributable subjects and standards of responsibility in the event of a marine accident, as well as the necessities of institutional improvement such as technology development, enactment and amendment of law and funding are presented.

  • PDF

A Case Study on Metadata Extractionfor Records Management Using ChatGPT (챗GPT를 활용한 기록관리 메타데이터 추출 사례연구)

  • Minji Kim;Sunghee Kang;Hae-young Rieh
    • Journal of Korean Society of Archives and Records Management
    • /
    • v.24 no.2
    • /
    • pp.89-112
    • /
    • 2024
  • Metadata is a crucial component of record management, playing a vital role in properly managing and understanding the record. In cases where automatic metadata assignment is not feasible, manual input by records professionals becomes necessary. This study aims to alleviate the challenges associated with manual entry by proposing a method that harnesses ChatGPT technology for extracting records management metadata elements. To employ ChatGPT technology, a Python program utilizing the LangChain library was developed. This program was designed to analyze PDF documents and extract metadata from records through questions, both with a locally installed instance of ChatGPT and the ChatGPT online service. Multiple PDF documents were subjected to this process to test the effectiveness of metadata extraction. The results revealed that while using LangChain with ChatGPT-3.5 turbo provided a secure environment, it exhibited some limitations in accurately retrieving metadata elements. Conversely, the ChatGPT-4 online service yielded relatively accurate results despite being unable to handle sensitive documents for security reasons. This exploration underscores the potential of utilizing ChatGPT technology to extract metadata in records management. With advancements in ChatGPT-related technologies, safer and more accurate results are expected to be achieved. Leveraging these advantages can significantly enhance the efficiency and productivity of tasks associated with managing records and metadata in archives.

Perceptions of Information Technology Competencies among Gifted and Non-gifted High School Students (영재와 평재 고등학생의 IT 역량에 대한 인식)

  • Shin, Min;Ahn, Doehee
    • Journal of Gifted/Talented Education
    • /
    • v.25 no.2
    • /
    • pp.339-358
    • /
    • 2015
  • This study was to examine perceptions of information technology(IT) competencies among gifted and non-gifted students(i.e., information science high school students and technical high school students). Of the 370 high school students surveyed from 3 high schools(i.e., gifted academy, information science high school, and technical high school) in three metropolitan cities, Korea, 351 students completed and returned the questionnaires yielding a total response rate of 94.86%. High school students recognized the IT professional competence as being most important when recruiting IT employees. And they considered that practice-oriented education was the most importantly needed to improve their IT skills. In addition, the most important sub-factors of IT core competencies among gifted academy students and information science high school students were basic software skills. Also Technical high school students responded that the main network and security capabilities were the most importantly needed to do so. Finally, the most appropriate training courses for enhancing IT competencies were recognized differently among gifted and non-gifted students. Gifted academy students responded that the 'algorithm' was the mostly needed for enhancing IT competencies, whereas information science high school students responded that 'data structures' and 'computer architecture' were mostly needed to do. For technical high school students, they responded that a 'programming language' course was the most needed to do so. Results are discussed in relations to IT corporate and school settings.

An Analysis of IT Trends Using Tweet Data (트윗 데이터를 활용한 IT 트렌드 분석)

  • Yi, Jin Baek;Lee, Choong Kwon;Cha, Kyung Jin
    • Journal of Intelligence and Information Systems
    • /
    • v.21 no.1
    • /
    • pp.143-159
    • /
    • 2015
  • Predicting IT trends has been a long and important subject for information systems research. IT trend prediction makes it possible to acknowledge emerging eras of innovation and allocate budgets to prepare against rapidly changing technological trends. Towards the end of each year, various domestic and global organizations predict and announce IT trends for the following year. For example, Gartner Predicts 10 top IT trend during the next year, and these predictions affect IT and industry leaders and organization's basic assumptions about technology and the future of IT, but the accuracy of these reports are difficult to verify. Social media data can be useful tool to verify the accuracy. As social media services have gained in popularity, it is used in a variety of ways, from posting about personal daily life to keeping up to date with news and trends. In the recent years, rates of social media activity in Korea have reached unprecedented levels. Hundreds of millions of users now participate in online social networks and communicate with colleague and friends their opinions and thoughts. In particular, Twitter is currently the major micro blog service, it has an important function named 'tweets' which is to report their current thoughts and actions, comments on news and engage in discussions. For an analysis on IT trends, we chose Tweet data because not only it produces massive unstructured textual data in real time but also it serves as an influential channel for opinion leading on technology. Previous studies found that the tweet data provides useful information and detects the trend of society effectively, these studies also identifies that Twitter can track the issue faster than the other media, newspapers. Therefore, this study investigates how frequently the predicted IT trends for the following year announced by public organizations are mentioned on social network services like Twitter. IT trend predictions for 2013, announced near the end of 2012 from two domestic organizations, the National IT Industry Promotion Agency (NIPA) and the National Information Society Agency (NIA), were used as a basis for this research. The present study analyzes the Twitter data generated from Seoul (Korea) compared with the predictions of the two organizations to analyze the differences. Thus, Twitter data analysis requires various natural language processing techniques, including the removal of stop words, and noun extraction for processing various unrefined forms of unstructured data. To overcome these challenges, we used SAS IRS (Information Retrieval Studio) developed by SAS to capture the trend in real-time processing big stream datasets of Twitter. The system offers a framework for crawling, normalizing, analyzing, indexing and searching tweet data. As a result, we have crawled the entire Twitter sphere in Seoul area and obtained 21,589 tweets in 2013 to review how frequently the IT trend topics announced by the two organizations were mentioned by the people in Seoul. The results shows that most IT trend predicted by NIPA and NIA were all frequently mentioned in Twitter except some topics such as 'new types of security threat', 'green IT', 'next generation semiconductor' since these topics non generalized compound words so they can be mentioned in Twitter with other words. To answer whether the IT trend tweets from Korea is related to the following year's IT trends in real world, we compared Twitter's trending topics with those in Nara Market, Korea's online e-Procurement system which is a nationwide web-based procurement system, dealing with whole procurement process of all public organizations in Korea. The correlation analysis show that Tweet frequencies on IT trending topics predicted by NIPA and NIA are significantly correlated with frequencies on IT topics mentioned in project announcements by Nara market in 2012 and 2013. The main contribution of our research can be found in the following aspects: i) the IT topic predictions announced by NIPA and NIA can provide an effective guideline to IT professionals and researchers in Korea who are looking for verified IT topic trends in the following topic, ii) researchers can use Twitter to get some useful ideas to detect and predict dynamic trends of technological and social issues.

Research on Generative AI for Korean Multi-Modal Montage App (한국형 멀티모달 몽타주 앱을 위한 생성형 AI 연구)

  • Lim, Jeounghyun;Cha, Kyung-Ae;Koh, Jaepil;Hong, Won-Kee
    • Journal of Service Research and Studies
    • /
    • v.14 no.1
    • /
    • pp.13-26
    • /
    • 2024
  • Multi-modal generation is the process of generating results based on a variety of information, such as text, images, and audio. With the rapid development of AI technology, there is a growing number of multi-modal based systems that synthesize different types of data to produce results. In this paper, we present an AI system that uses speech and text recognition to describe a person and generate a montage image. While the existing montage generation technology is based on the appearance of Westerners, the montage generation system developed in this paper learns a model based on Korean facial features. Therefore, it is possible to create more accurate and effective Korean montage images based on multi-modal voice and text specific to Korean. Since the developed montage generation app can be utilized as a draft montage, it can dramatically reduce the manual labor of existing montage production personnel. For this purpose, we utilized persona-based virtual person montage data provided by the AI-Hub of the National Information Society Agency. AI-Hub is an AI integration platform aimed at providing a one-stop service by building artificial intelligence learning data necessary for the development of AI technology and services. The image generation system was implemented using VQGAN, a deep learning model used to generate high-resolution images, and the KoDALLE model, a Korean-based image generation model. It can be confirmed that the learned AI model creates a montage image of a face that is very similar to what was described using voice and text. To verify the practicality of the developed montage generation app, 10 testers used it and more than 70% responded that they were satisfied. The montage generator can be used in various fields, such as criminal detection, to describe and image facial features.

A Study on the Determinants of Blockchain-oriented Supply Chain Management (SCM) Services (블록체인 기반 공급사슬관리 서비스 활용의 결정요인 연구)

  • Kwon, Youngsig;Ahn, Hyunchul
    • Knowledge Management Research
    • /
    • v.22 no.2
    • /
    • pp.119-144
    • /
    • 2021
  • Recently, as competition in the market evolves from the competition among companies to the competition among their supply chains, companies are struggling to enhance their supply chain management (hereinafter SCM). In particular, as blockchain technology with various technical advantages is combined with SCM, a lot of domestic manufacturing and distribution companies are considering the adoption of blockchain-oriented SCM (BOSCM) services today. Thus, it is an important academic topic to examine the factors affecting the use of blockchain-oriented SCM. However, most prior studies on blockchain and SCMs have designed their research models based on Technology Acceptance Model (TAM) or the Unified Theory of Acceptance and Use of Technology (UTAUT), which are suitable for explaining individual's acceptance of information technology rather than companies'. Under this background, this study presents a novel model of blockchain-oriented SCM acceptance model based on the Technology-Organization-Environment (TOE) framework to consider companies as the unit of analysis. In addition, Value-based Adoption Model (VAM) is applied to the research model in order to consider the benefits and the sacrifices caused by a new information system comprehensively. To validate the proposed research model, a survey of 126 companies were collected. Among them, by applying PLS-SEM (Partial Least Squares Structural Equation Modeling) with data of 122 companies, the research model was verified. As a result, 'business innovation', 'tracking and tracing', 'security enhancement' and 'cost' from technology viewpoint are found to significantly affect 'perceived value', which in turn affects 'intention to use blockchain-oriented SCM'. Also, 'organization readiness' is found to affect 'intention to use' with statistical significance. However, it is found that 'complexity' and 'regulation environment' have little impact on 'perceived value' and 'intention to use', respectively. It is expected that the findings of this study contribute to preparing practical and policy alternatives for facilitating blockchain-oriented SCM adoption in Korean firms.

Legal Issues on the Collection and Utilization of Infectious Disease Data in the Infectious Disease Crisis (감염병 위기 상황에서 감염병 데이터의 수집 및 활용에 관한 법적 쟁점 -미국 감염병 데이터 수집 및 활용 절차를 참조 사례로 하여-)

  • Kim, Jae Sun
    • The Korean Society of Law and Medicine
    • /
    • v.23 no.4
    • /
    • pp.29-74
    • /
    • 2022
  • As social disasters occur under the Disaster Management Act, which can damage the people's "life, body, and property" due to the rapid spread and spread of unexpected COVID-19 infectious diseases in 2020, information collected through inspection and reporting of infectious disease pathogens (Article 11), epidemiological investigation (Article 18), epidemiological investigation for vaccination (Article 29), artificial technology, and prevention policy Decision), (3) It was used as an important basis for decision-making in the context of an infectious disease crisis, such as promoting vaccination and understanding the current status of damage. In addition, medical policy decisions using infectious disease data contribute to quarantine policy decisions, information provision, drug development, and research technology development, and interest in the legal scope and limitations of using infectious disease data has increased worldwide. The use of infectious disease data can be classified for the purpose of spreading and blocking infectious diseases, prevention, management, and treatment of infectious diseases, and the use of information will be more widely made in the context of an infectious disease crisis. In particular, as the serious stage of the Disaster Management Act continues, the processing of personal identification information and sensitive information becomes an important issue. Information on "medical records, vaccination drugs, vaccination, underlying diseases, health rankings, long-term care recognition grades, pregnancy, etc." needs to be interpreted. In the case of "prevention, management, and treatment of infectious diseases", it is difficult to clearly define the concept of medical practicesThe types of actions are judged based on "legislative purposes, academic principles, expertise, and social norms," but the balance of legal interests should be based on the need for data use in quarantine policies and urgent judgment in public health crises. Specifically, the speed and degree of transmission of infectious diseases in a crisis, whether the purpose can be achieved without processing sensitive information, whether it unfairly violates the interests of third parties or information subjects, and the effectiveness of introducing quarantine policies through processing sensitive information can be used as major evaluation factors. On the other hand, the collection, provision, and use of infectious disease data for research purposes will be used through pseudonym processing under the Personal Information Protection Act, consent under the Bioethics Act and deliberation by the Institutional Bioethics Committee, and data provision deliberation committee. Therefore, the use of research purposes is recognized as long as procedural validity is secured as it is reviewed by the pseudonym processing and data review committee, the consent of the information subject, and the institutional bioethics review committee. However, the burden on research managers should be reduced by clarifying the pseudonymization or anonymization procedures, the introduction or consent procedures of the comprehensive consent system and the opt-out system should be clearly prepared, and the procedure for re-identifying or securing security that may arise from technological development should be clearly defined.