• Title/Summary/Keyword: Information security

Search Result 17,416, Processing Time 0.045 seconds

The Relationship with Electronic Trust, Web Site Commitment and Service Transaction Intention in Public Shipping B2B e-marketplace (해운 B2B e-marketplace의 전자적 신뢰, 사이트몰입 및 서비스 거래의도와의 관계성)

  • Kim, Yong-Man;Kim, Seog-Yong;Lee, Jong-Hwan;Shim, Gyu-Yeol
    • Journal of Global Scholars of Marketing Science
    • /
    • v.17 no.4
    • /
    • pp.113-139
    • /
    • 2007
  • This study aims to, looking from a standpoint of network, has investigated the shipping industry's B2B e-marketplace, the characteristics that can earn electronic trust from the users, and characteristics of the web-site. It has examined the mechanism whereby electronic trust be earned and how it affects web-site involvement and service transaction intention. Ultimately, The study attempts to make proposals whereby such trust can lead for a cooperative trading community in the shipping industry's B2B e-marketplace The Covalence structural equation modeling was designed and empirically tested for the shipping industry's B2B e-marketplace. The shipping industry employees were given questionnaires and data were analyzed. Except for perceived security of the three characteristic factors on the web-site, the perceived site quality and characteristics factors in operation only affected co-variables. Transaction Fairness was determined to be the most important factor among exogenous factors increasing electronic trust. With regards to transaction rules, if a transaction is beneficial only to one side, then no long term transaction will not take place. If the concerned parties properly recognize that transaction fairness is crucial to electronic transaction, then it will enormously contribute to successful operations of shipping e-marketplace. Also, Perceived efficiency in transaction also affects electronic trust. This reduces transaction costs and speeds up and simplifies the transaction process. It has reduced greater time and costs than existing off-line transaction, and would positively affect electronic trust. By making an open forum for participants to obtain information for transaction, they can gather useful information, and at the same time, the web-site operator can provide information, which, in turn, will increase electronic trust in electronic transaction. Furthermore, such formation of trust in electronic transaction influences shipping companies in such a way that they will want to continuously participate in the transaction, raising web-site involvement. The result of increased trust is that shipping companies in the future will do business with each other and form a foundation for continuous transactions amongst themselves. Consequently, the formation of trust in electronic transaction greatly influences web-site involvement and service transaction intention. The results of the study have again proved that in order to maintain continuous business relationship with the current clients, electronic trust in virtual space, which operates the shipping industry's B2B e-marketplace, is important for the interested parties.

  • PDF

A Research in Applying Big Data and Artificial Intelligence on Defense Metadata using Multi Repository Meta-Data Management (MRMM) (국방 빅데이터/인공지능 활성화를 위한 다중메타데이터 저장소 관리시스템(MRMM) 기술 연구)

  • Shin, Philip Wootaek;Lee, Jinhee;Kim, Jeongwoo;Shin, Dongsun;Lee, Youngsang;Hwang, Seung Ho
    • Journal of Internet Computing and Services
    • /
    • v.21 no.1
    • /
    • pp.169-178
    • /
    • 2020
  • The reductions of troops/human resources, and improvement in combat power have made Korean Department of Defense actively adapt 4th Industrial Revolution technology (Artificial Intelligence, Big Data). The defense information system has been developed in various ways according to the task and the uniqueness of each military. In order to take full advantage of the 4th Industrial Revolution technology, it is necessary to improve the closed defense datamanagement system.However, the establishment and usage of data standards in all information systems for the utilization of defense big data and artificial intelligence has limitations due to security issues, business characteristics of each military, anddifficulty in standardizing large-scale systems. Based on the interworking requirements of each system, data sharing is limited through direct linkage through interoperability agreement between systems. In order to implement smart defense using the 4th Industrial Revolution technology, it is urgent to prepare a system that can share defense data and make good use of it. To technically support the defense, it is critical to develop Multi Repository Meta-Data Management (MRMM) that supports systematic standard management of defense data that manages enterprise standard and standard mapping for each system and promotes data interoperability through linkage between standards which obeys the Defense Interoperability Management Development Guidelines. We introduced MRMM, and implemented by using vocabulary similarity using machine learning and statistical approach. Based on MRMM, We expect to simplify the standardization integration of all military databases using artificial intelligence and bigdata. This will lead to huge reduction of defense budget while increasing combat power for implementing smart defense.

Data Mining Approaches for DDoS Attack Detection (분산 서비스거부 공격 탐지를 위한 데이터 마이닝 기법)

  • Kim, Mi-Hui;Na, Hyun-Jung;Chae, Ki-Joon;Bang, Hyo-Chan;Na, Jung-Chan
    • Journal of KIISE:Information Networking
    • /
    • v.32 no.3
    • /
    • pp.279-290
    • /
    • 2005
  • Recently, as the serious damage caused by DDoS attacks increases, the rapid detection and the proper response mechanisms are urgent. However, existing security mechanisms do not effectively defend against these attacks, or the defense capability of some mechanisms is only limited to specific DDoS attacks. In this paper, we propose a detection architecture against DDoS attack using data mining technology that can classify the latest types of DDoS attack, and can detect the modification of existing attacks as well as the novel attacks. This architecture consists of a Misuse Detection Module modeling to classify the existing attacks, and an Anomaly Detection Module modeling to detect the novel attacks. And it utilizes the off-line generated models in order to detect the DDoS attack using the real-time traffic. We gathered the NetFlow data generated at an access router of our network in order to model the real network traffic and test it. The NetFlow provides the useful flow-based statistical information without tremendous preprocessing. Also, we mounted the well-known DDoS attack tools to gather the attack traffic. And then, our experimental results show that our approach can provide the outstanding performance against existing attacks, and provide the possibility of detection against the novel attack.

Design of a Bit-Serial Divider in GF(2$^{m}$ ) for Elliptic Curve Cryptosystem (타원곡선 암호시스템을 위한 GF(2$^{m}$ )상의 비트-시리얼 나눗셈기 설계)

  • 김창훈;홍춘표;김남식;권순학
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.27 no.12C
    • /
    • pp.1288-1298
    • /
    • 2002
  • To implement elliptic curve cryptosystem in GF(2$\^$m/) at high speed, a fast divider is required. Although bit-parallel architecture is well suited for high speed division operations, elliptic curve cryptosystem requires large m(at least 163) to support a sufficient security. In other words, since the bit-parallel architecture has an area complexity of 0(m$\^$m/), it is not suited for this application. In this paper, we propose a new serial-in serial-out systolic array for computing division operations in GF(2$\^$m/) using the standard basis representation. Based on a modified version of tile binary extended greatest common divisor algorithm, we obtain a new data dependence graph and design an efficient bit-serial systolic divider. The proposed divider has 0(m) time complexity and 0(m) area complexity. If input data come in continuously, the proposed divider can produce division results at a rate of one per m clock cycles, after an initial delay of 5m-2 cycles. Analysis shows that the proposed divider provides a significant reduction in both chip area and computational delay time compared to previously proposed systolic dividers with the same I/O format. Since the proposed divider can perform division operations at high speed with the reduced chip area, it is well suited for division circuit of elliptic curve cryptosystem. Furthermore, since the proposed architecture does not restrict the choice of irreducible polynomial, and has a unidirectional data flow and regularity, it provides a high flexibility and scalability with respect to the field size m.

A Study on Improvement of the police disaster crisis management system (경찰의 재난위기관리 개선에 관한 연구)

  • Chun, Yongtae;Kim, Moonkwi
    • Journal of the Society of Disaster Information
    • /
    • v.11 no.4
    • /
    • pp.556-569
    • /
    • 2015
  • With about 75% of the population of Korea criticizing the government's disaster policy and a failure to respond to large-scale emergency like the Sewol ferry sinking means that there is a deep distrust in the government. In order to prevent dreadful disasters such as the Sewol ferry sinking, it is important to secure a prime time with respect to disaster safety. Improving crisis management skills and managerial role of police officers who are in close proximity to the people is necessary for the success of disaster management. With disaster management as one of the most essential missions of the police, as a part of a national crisis management, a step by step strengthening of the disaster safety management system of the police is necessary, as below. First, at the prevention phase, law enforcement officers were not injected into for profit large-scale assemblies or events, but in the future the involvement, injection should be based on the level of potential risk, rather than profitability. In the past and now, the priortiy was the priority was on traffic flow, traffic communication, however, the paradigm of traffic policy should be changed to a safety-centered policy. To prevent large-scale accidents, police investigators should root out improper routines and illegal construction subcontracting. The police (intelligence) should strengthen efforts to collect intelligence under the subject of "safety". Second, with respect to the preparatory phase, on a survey of police officers, the result showed that 72% of police officers responded that safety management was not related to the job descriptions of the police. This, along with other results, shows that the awareness of disaster safety must be adopted by, or rather changed in the police urgently. The training in disaster safety education should be strengthened. A network of experts (private, administrative, and police) in safety management should be established to take advantage of private resources with regard to crisis situtions. Third, with respect to the response phase, for rapid first responses to occur, a unified communication network should be established, and a real-time video information network should be adopted by the police and installed in the police situation room. Fourth, during the recovery phase, recovery teams should be injected, added and operated to minimize secondary damage.

Research on Generative AI for Korean Multi-Modal Montage App (한국형 멀티모달 몽타주 앱을 위한 생성형 AI 연구)

  • Lim, Jeounghyun;Cha, Kyung-Ae;Koh, Jaepil;Hong, Won-Kee
    • Journal of Service Research and Studies
    • /
    • v.14 no.1
    • /
    • pp.13-26
    • /
    • 2024
  • Multi-modal generation is the process of generating results based on a variety of information, such as text, images, and audio. With the rapid development of AI technology, there is a growing number of multi-modal based systems that synthesize different types of data to produce results. In this paper, we present an AI system that uses speech and text recognition to describe a person and generate a montage image. While the existing montage generation technology is based on the appearance of Westerners, the montage generation system developed in this paper learns a model based on Korean facial features. Therefore, it is possible to create more accurate and effective Korean montage images based on multi-modal voice and text specific to Korean. Since the developed montage generation app can be utilized as a draft montage, it can dramatically reduce the manual labor of existing montage production personnel. For this purpose, we utilized persona-based virtual person montage data provided by the AI-Hub of the National Information Society Agency. AI-Hub is an AI integration platform aimed at providing a one-stop service by building artificial intelligence learning data necessary for the development of AI technology and services. The image generation system was implemented using VQGAN, a deep learning model used to generate high-resolution images, and the KoDALLE model, a Korean-based image generation model. It can be confirmed that the learned AI model creates a montage image of a face that is very similar to what was described using voice and text. To verify the practicality of the developed montage generation app, 10 testers used it and more than 70% responded that they were satisfied. The montage generator can be used in various fields, such as criminal detection, to describe and image facial features.

A Study on the Perception of Research Data Managers to Establish a Korea Research Data Commons System (국가연구데이터커먼즈 체계 수립을 위한 연구데이터 관리자들의 인식에 관한 연구)

  • Seong-Eun Park;Mikyoung Lee;Minhee Cho;Sa-Kwang Song;Dasol Kim;Hyung-Jun Yim
    • Journal of the Korean Society for information Management
    • /
    • v.41 no.1
    • /
    • pp.465-486
    • /
    • 2024
  • The purpose of this study is to identify the current status of infrastructure and services for analyzing research data for research data managers at government-funded research institutions under the National Research Council for Science and Technology (NST) who will actually use the Korea Research Data Commons (KRDC), which is being developed by the Korea Institute of Science and Technology Information (KISTI) and to investigate the perceptions of research data managers related to the establishment of KRDC system. For the study, we conducted a survey targeting 24 government-funded research institutes, excluding KISTI, and interviewed research data managers from 9 of the 15 institutions surveyed who agreed to follow-up interviews. As a result of the survey, most institutions were providing related services, and their willingness to introduce an integrated analysis framework for the use of research data and provide a system for using externally released analysis software was also high. Meanwhile, when we investigated the external disclosure status of each institution's analysis services through follow-up interviews, only a minimal number of institutions were disclosing them to the outside world. The findings reveal that there is a demand to utilize analysis infrastructure and services when provided through the framework. However, it is difficult to disclose and share the analysis resources held by each organization. In order to establish the KRDC system, it is essential to share research sites' analysis infrastructure and services, and in addition, changes in the perception of research sites and institutional changes are necessary. Furthermore, there is a need to establish policies that consider the system's convenience, security, and compensation system raised in the follow-up interviews.

The Status of North Korean Airspace after Reunification (북한 공역의 통일 후 지위)

  • Kwon, Chang-Young
    • The Korean Journal of Air & Space Law and Policy
    • /
    • v.32 no.1
    • /
    • pp.287-325
    • /
    • 2017
  • Considering the development of aerospace, military science and technology since the 20th century, the sky is very important for the nation's existence and prosperity. The proverb "Whosoever commands the space commands the world itself!" emphasizes the need for the command of the air. This essay is the first study on the status of airspace after reunification. First, the territorial airspace is over the territory and territorial sea, and its horizontal extent is determined by the territorial boundary lines. Acceptance of the present order is most reasonable, rather than attempting to reconfigure through historical truths about border issues, and it could be supported by neighboring countries in the reunification period. For peace in Northeast Asia, the reunified Korea needs to respect the existing border agreement between North Korea and China or Russia. However, the North Korean straight baselines established in the East Sea and the Yellow Sea should be discarded because they are not available under United Nations Convention on the Law of the Sea. It is desirable for the reunified Korea to redefine the straight baselines that comply with international law and determine the territorial waters up to and including the 12-nautical mile outside it. Second, the Flight Information Region (hereinafter "FIR") is a region defined by the International Civil Aviation Organization (hereinafter "ICAO") in order to provide information necessary for the safe and efficient flight of aircraft and the search and rescue of aircraft. At present, Korea is divided into Incheon FIR which is under the jurisdiction of South Korea and Pyongyang FIR which is under the jurisdiction of North Korea. If North Korea can not temporarily exercise control of Pyongyang FIR due to a sudden change of circumstances, it is desirable for South Korea to exercise control of Pyongyang FIR, and if it is unavoidable, ICAO should temporarily exercise it. In reunified Korea, it is desirable to abolish Pyongyang FIR and integrate it into Incheon FIR with the approval of ICAO, considering systematic management and control of FIR, establishment of route, and efficiency of management. Third, the Air Defense Identification Zone (hereinafter "ADIZ") is a zone that requires easy identification, positioning, and control of aircraft for national security purposes, and is set up unilaterally by the country concerned. The US unilaterally established the Korea Air Defense Identification Area (KADIZ) by the Declaration of Commitment on March 22, 1951. The Ministry of Defense proclaimed a new KADIZ which extended to the area including IEODO on December 13, 2013. At present, North Korea's military warning zone is set only at maritime boundaries such as the East Sea and the Yellow Sea. But in view of its lack of function as ADIZ in relations with China and Russia, the reunified Korea has no obligation to succeed it. Since the depth of the Korean peninsula is short, it is necessary to set ADIZ boundary on the outskirts of the territorial airspace to achieve the original purpose of ADIZ. Therefore, KADIZ of the reunified Korea should be newly established by the boundary line that coincides with the Incheon FIR of the reunified Korea. However, if there is no buffer zone overlapping with or adjacent to the ADIZs of neighboring countries, military tensions may rise. Therefore, through bilateral negotiations for peace in Northeast Asia, a buffer zone is established between adjacent ADIZs.

  • PDF

A Study on People Counting in Public Metro Service using Hybrid CNN-LSTM Algorithm (Hybrid CNN-LSTM 알고리즘을 활용한 도시철도 내 피플 카운팅 연구)

  • Choi, Ji-Hye;Kim, Min-Seung;Lee, Chan-Ho;Choi, Jung-Hwan;Lee, Jeong-Hee;Sung, Tae-Eung
    • Journal of Intelligence and Information Systems
    • /
    • v.26 no.2
    • /
    • pp.131-145
    • /
    • 2020
  • In line with the trend of industrial innovation, IoT technology utilized in a variety of fields is emerging as a key element in creation of new business models and the provision of user-friendly services through the combination of big data. The accumulated data from devices with the Internet-of-Things (IoT) is being used in many ways to build a convenience-based smart system as it can provide customized intelligent systems through user environment and pattern analysis. Recently, it has been applied to innovation in the public domain and has been using it for smart city and smart transportation, such as solving traffic and crime problems using CCTV. In particular, it is necessary to comprehensively consider the easiness of securing real-time service data and the stability of security when planning underground services or establishing movement amount control information system to enhance citizens' or commuters' convenience in circumstances with the congestion of public transportation such as subways, urban railways, etc. However, previous studies that utilize image data have limitations in reducing the performance of object detection under private issue and abnormal conditions. The IoT device-based sensor data used in this study is free from private issue because it does not require identification for individuals, and can be effectively utilized to build intelligent public services for unspecified people. Especially, sensor data stored by the IoT device need not be identified to an individual, and can be effectively utilized for constructing intelligent public services for many and unspecified people as data free form private issue. We utilize the IoT-based infrared sensor devices for an intelligent pedestrian tracking system in metro service which many people use on a daily basis and temperature data measured by sensors are therein transmitted in real time. The experimental environment for collecting data detected in real time from sensors was established for the equally-spaced midpoints of 4×4 upper parts in the ceiling of subway entrances where the actual movement amount of passengers is high, and it measured the temperature change for objects entering and leaving the detection spots. The measured data have gone through a preprocessing in which the reference values for 16 different areas are set and the difference values between the temperatures in 16 distinct areas and their reference values per unit of time are calculated. This corresponds to the methodology that maximizes movement within the detection area. In addition, the size of the data was increased by 10 times in order to more sensitively reflect the difference in temperature by area. For example, if the temperature data collected from the sensor at a given time were 28.5℃, the data analysis was conducted by changing the value to 285. As above, the data collected from sensors have the characteristics of time series data and image data with 4×4 resolution. Reflecting the characteristics of the measured, preprocessed data, we finally propose a hybrid algorithm that combines CNN in superior performance for image classification and LSTM, especially suitable for analyzing time series data, as referred to CNN-LSTM (Convolutional Neural Network-Long Short Term Memory). In the study, the CNN-LSTM algorithm is used to predict the number of passing persons in one of 4×4 detection areas. We verified the validation of the proposed model by taking performance comparison with other artificial intelligence algorithms such as Multi-Layer Perceptron (MLP), Long Short Term Memory (LSTM) and RNN-LSTM (Recurrent Neural Network-Long Short Term Memory). As a result of the experiment, proposed CNN-LSTM hybrid model compared to MLP, LSTM and RNN-LSTM has the best predictive performance. By utilizing the proposed devices and models, it is expected various metro services will be provided with no illegal issue about the personal information such as real-time monitoring of public transport facilities and emergency situation response services on the basis of congestion. However, the data have been collected by selecting one side of the entrances as the subject of analysis, and the data collected for a short period of time have been applied to the prediction. There exists the limitation that the verification of application in other environments needs to be carried out. In the future, it is expected that more reliability will be provided for the proposed model if experimental data is sufficiently collected in various environments or if learning data is further configured by measuring data in other sensors.

The Reserch on Actual Condition of Crime of Arson Which Occurs in Korea and Its Countermeasures (방화범죄의 실태와 그 대책 - 관심도와 동기의 다양화에 대한 대응 -)

  • Choi, Jong-Tae
    • Korean Security Journal
    • /
    • no.1
    • /
    • pp.371-408
    • /
    • 1997
  • This article is the reserch on actual condition of crime of arson which occurs in Korea and its countermeasures. The the presented problem in this article are that (1) we have generally very low rate concern about the crime of arson contrary to realistic problems of rapid increase of crime of arson (2) as such criminal motives became so diverse as to the economic or criminal purpose unlike characteristic and mental deficiency of old days, and to countermeasure these problems effectively it presentation the necessity of systemantic research. Based on analysis of reality of arson, the tendency of this arson in Korea in the ratio of increase is said to be higher than those in violence crime or general fire rate. and further its rate is far more greater than those of the U.S.A. and Japan. Arson is considered to be a method of using fire as crime and in case of presently residence to be the abject, it is a public offense crime which aqccompany fatality in human life. This is the well It now fact to all of us. And further in order to presentation to the crime of arson, strictness of criminal law (criminal law No, 164 and 169, and fire protection law No. 110 and 111) and classification of arsonist as felony are institutionary reinforced to punish with certainty of possibility, Therefore, as tendency of arson has been increased compared to other nations, it is necessary to supplement strategical policy to bring out overall concerns of the seriousness of risk and damage of arson, which have been resulted from the lack of understanding. In characteristics analysis of crime of arson, (1) It is now reveald that, in the past such crime rate appeared far more within the boundary of town or city areas in the past, presently increased rate of arsons in rural areas are far more than in the town or small city areas, thereby showing characteristics of crime of arson extending nation wide. (2) general timetable of arson shows that night more than day time rate, and reveald that is trait behavior in secrecy.(3) arsonists are usually arrested at site or by victim or report of third person(82,9%).Investigation activities or self surrenders rate only 11.2%. The time span of arrest is normally the same day of arson and at times it takes more than one year to arrest. This reveals its necessity to prepare for long period of time for arrest, (4) age rate of arson is in their thirties mostly as compared to homicide, robbery and adultery, and considerable numbers of arsons are in old age of over fifties. It reveals age rate is increased (5) Over half of the arsonists are below the junior high school (6) the rate of convicts by thier records is based on first offenders primarily and secondly more than 4 time convicts. This apparently shows necessity of effective correctional education policy for their social assimilation together with re-investigation of human education at the primary and secondary education system in thier life. The examples of motivation for arosnits, such as personal animosity, fury, monetary swindle, luscious purpose and other aims of destroying of proof, and other social resistance, violence including ways of threatening, beside the motives of individual defects, are diverse and arsonic suicide and specifically suicidal accompany together keenly manifested. When we take this fact with the criminal theory, it really reveals arsons of crime are increasing and its casualities are serious and a point as a way of suicide is the anomie theory of Durkheim and comensurate with the theory of that of Merton, Specifically in the arson of industrial complex, it is revealed that one with revolutionary motive or revolting motive would do the arsonic act. For the policy of prevention of arsons, professional research work in organizational cooperation for preventive activities is conducted in municipal or city wise functions in the name of Parson Taskforces and beside a variety of research institutes in federal government have been operating effectively to countermeasure in many fields of research. Franch and Sweden beside the U.S. set up a overall operation of fire prevention research funtions and have obtained very successful result. Japan also put their research likewise for countermeasure. In this research as a way of preventive fire policy, first, it is necessary to accomodate the legal preventitive activities for fire prevention in judicial side and as an administrative side, (1) precise statistic management of crime of arson (2) establishment of professional research functions or a corporate (3) improvement of system for cooperative structural team for investigation of fires and menpower organization of professional members. Secondly, social mentality in individual prospect, recognition of fires by arson and youth education of such effect, educational program for development and practical promotion. Thirdly, in view of environmental side, the ways of actual performance by programming with the establishment of cooperative advancement in local social function elements with administrative office, habitants, school facilities and newspapers measures (2) establishment of personal protection where weak menpowers are displayed in special fire prevention measures. These measures are presented for prevention of crime of arson. The control of crime and prevention shall be prepared as a means of self defence by the principle of self responsibility Specifically arsonists usually aims at the comparatively weak control of fire prevention is prevalent and it is therefore necessary to prepare individual facilities with their spontaneous management of fire prevention instead of public municipal funtures of local geverment. As Clifford L. Karchmer asserted instead of concerns about who would commit arson, what portion of area would be the target of the arson. It is effective to minister spontaveously the fire prevention measure in his facility with the consideration of characteristics of arson. On the other hand, it is necessary for the concerned personnel of local goverment and groups to distribute to the local society in timely manner for new information about the fire prevention, thus contribute to effective result of fire prevention result. In consideration of these factors, it is inevitable to never let coincide with the phemonemon of arsons in similar or mimic features as recognized that these could prevail just an epedemic as a strong imitational attitude. In processing of policy to encounter these problems, it is necessary to place priority of city policy to enhancement of overall concerns toward the definitive essense of crime of arson.

  • PDF