• Title/Summary/Keyword: Managed Security

Search Result 278, Processing Time 0.027 seconds

A Study on the Application and Assessment of Urban River Restoration in the Anyang River (안양천 도시하천 복원의 실행과 평가에 관한 연구)

  • Lee, Sam-Hee;Choi, Jung-Kwon
    • Journal of the Korean Society of Environmental Restoration Technology
    • /
    • v.10 no.1
    • /
    • pp.1-8
    • /
    • 2007
  • The Anyang River which located in an urban area near Seoul had been managed focusing on supplying home and industrial water and preventing floods, coping with rapid industrialization and urbanization. Consequently, it was changed into a deadly river during 25 years. Its channel was straightened by concrete and water quality deteriorated to BOD 190mg/l. In addition, water quantity has been rapidly decreased and has been drying up. Also, as the river ecosystem, landscape, water-friendly function, and so forth were seriously deteriorated, people turn away from the urban river. From 2001, the master plan under the 10-year has been actively carried out centering on the preceding items, which are healthy river in which fishes inhabit, safe river free from floods and droughts, and pleasant river where citizens visit. As a result, its water quality was remarkably improved by BOD 5mg/l in 2005 and some upper zones were improved enough to allow people to swim. Moreover, various animals including fish and birds gather around the river. Now, the 'Anyang River Restoration Project' is recognized as the first comprehensive and systematic nature-friendly urban river improvement in Korea.

Development of the Conceptual Model of Constructing and Operating the Integrated Computing Environment (통합전산환경 구축$\cdot$운영을 위한 개념적 모형 개발)

  • Jung, Hae-Yong;Kim, Sang-Hoon
    • Journal of Information Technology Applications and Management
    • /
    • v.12 no.4
    • /
    • pp.173-195
    • /
    • 2005
  • As the amount of informatization investment is rapidly increasing in many organizations, it becomes more inevitable to manage computing resources (information systems, computing facilities and manpower etc.) effectively. Specially, in public sector It is thought to be very important to achieve the economy of scale by integrating computing resources which are managed individually in many agencies. Also, our government have been recently making much efforts to raise the effectiveness of operating the information systems by promoting joint information use among many public agencies, enhancing the operating systems and the expertise of IS staff and applying the optimal information security systems. This study focuses on presenting the framework to effectively integrate omputing resources and proposing the ways of constructing and operating the integrated computing environment for the institutions and the affiliated groups under the Ministry of Culture & Tourism which are in charge of implementing cultural informatization. The main implications of this study are 1) building the ideal model of the integrated computing environment architecture suitable to cultural informatization area, 2) showing the criteria of deciding whether the organizations use the Integrated computing environment or not and how extensively they commit their computing resources to it, and 3) suggesting the ways of the phased integration and the change management to minimize confusion in the process of adopting the integrated computing environment and behavioral problems such as conflict and resistance of IS-related Personnel Influenced by Implementing the integrated computing environment.

  • PDF

An Analysis of Management Factors for Environmentally-Friendly Rice's Production Farms (수도작 친환경농법 수용농가의 경영실태 및 요인분석)

  • Kim, Dong-Wan;Chang, Chi-Jin;Choi, Dong-Chil;Yu, Chan-Ju
    • Korean Journal of Organic Agriculture
    • /
    • v.14 no.3
    • /
    • pp.251-266
    • /
    • 2006
  • This study was surveyed and analyzed in 2005 year for environmentally-friendly rice's production 78 farmers in korea. The major results was as follows: The average age of farmers were 54 years old, the experiences of environmentally-friendly rice's production farms was 7.4 years, the cultivated scales of environmentally-friendly rice's production was 3.4ha. The 74%'s Farmers of all unified rice's breeds for rice's production of high-grade in quality, the ranking of rice's breeds selection were the high-grade rice's breeds of government>japan rice's breeds. The control of damage by blight and insects were needed environmentally-friendly control, the endured study of this control were very important. To cut down cost of the environmentally-friendly rice for income security of farmers and sustenance of farming will. To receive reasonable price of environmentally-friendly rice, the brand image were raised to consumers, the variety and miniaturization of rice packaging unit were needed in view of consumers. In addition to must be campaigns of publicity through the press and event to consumers, were managed the exchange of rice goods and exchanged e-mail together consumers for the maintenance of confidence. To drive direct marketing between environmentally-friendly rice farmers and consumers through experiential marketing, to diversify the marketing channel. To strengthen public relations at regional level and relationship at the consumers.

  • PDF

An Access Log Management System by User Directed Managing in Ubiquitous Environment (유비쿼터유비쿼터스 환경에서 프라이버시 보호를 위한 사용자 직접 관리 방식의 접근 기록 관리 시스템)

  • Lee, J.;Kim, S.
    • 한국HCI학회:학술대회논문집
    • /
    • 2008.02a
    • /
    • pp.269-273
    • /
    • 2008
  • In ubiquitous environments, clients move between domains freely and its activities in the other domains are growth. Like this environment, the service provider makes access or activity records what they are provided to clients. This record can make a privacy problem to recognize a person or trace some works. So this record must be kept and managed by user instead of the service provider. In this paper, we propose a system that can gather those records from the service provider to home domain server which client's managing by themselves. In addition, if remote domain manager requests that record by the legal process, system can transfer only a range of information which allowed by client to keep personal privacy.

  • PDF

A Study on the Design Characteristic and Improvement of the Studio Type Urban Lifestyle Housing in Seoul (서울시 도시형 생활주택 원룸형 주거의 계획특성 및 개선방안 연구)

  • Cho, Min-Jung
    • Korean Institute of Interior Design Journal
    • /
    • v.20 no.2
    • /
    • pp.156-166
    • /
    • 2011
  • A studio type urban lifestyle housing was recently introduced as a new urban multi-housing typology. It was particularly created to meet the increasing housing demand of one-person households due to the population change and the shortage of housing supply. However, some concerns have been raised, because the government's policy has been focused on expanding housing supply by easing certain legal regulations in construction. Poorly planned and managed urban lifestyle housings might degrade living conditions for one-person households and ultimately harm urban environments. As such, this research is conducted to investigate the design characteristics of the studio type urban lifestyle housing from selected construction precedents in Seoul. Critical evaluations are made for the facilities and uses in site plans, unit plans, and shared public spaces. As a result, problem areas are found in the lack of design varieties, privacy protection in units, control of natural environment conditions, and the absence of community spaces. Improvement strategies can be suggested by comparing with some overseas' housing precedents: Design variations can be extended through flexible structure, facility, and furniture systems. Privacy and natural environment can be controled through the integration of interior space configurations and exterior envelope systems. The housing policy needs to be reconsidered to improve a variety in design, residents' social interaction, security, and management. Thereby, the studio type urban lifestyle housing should be holistically approached in terms of design and policy to enrich urban living experiences by residents and communities.

A Critical Review of Current Crisis Simulation Methodology

  • Kim, Hak-Kyong;Lee, Ju-Lak
    • International Journal of Contents
    • /
    • v.7 no.1
    • /
    • pp.58-64
    • /
    • 2011
  • This paper is concerned with simulation exercises used to train key response agencies for crisis situations. While 'multi-agency' simulations are increasingly acknowledged as a necessary and significant training tool for emergency response organisations, many current crisis simulations are still focused on the revision of existing response plans only. However, a crisis requires a rapid reaction, yet in contrast to an 'emergency', the risks for critical decision makers in crisis situations are difficult to measure, owing to their ill-structure. In other words, a crisis situation is likely to create great uncertainty, unfamiliarity and complexity, and consequently should be managed by adaptive or second order expertise and techniques, rather than routine or structured responses. In this context, the paper attempts to prove that the current practices of simulation exercises might not be good enough for uncertain, unfamiliar, and complex 'crisis' situations, in particular, by conducting case studies of two different underground fire crises in Korea (Daegu Subway Fire 2003) and the UK (King's Cross Fire 1987). Finally, it is suggested that the three abilities: 'flexibility', 'improvisation' and 'creativity' are critical in responding to a crisis situation.

Implementation of Role Based Access Control Model for U-healthcare (유비쿼터스 헬스케어를 위한 역할 기반 접근제어 모델의 구현)

  • Lee, You-Ri;Park, Dong-Gue
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.10 no.6
    • /
    • pp.1256-1264
    • /
    • 2009
  • When unapproved users access to healthcare system and use medical information for other malicious purposes, it could severely threaten important information related to patients' life, because in ubiquitous environment healthcare service makes patient's various examination results, medical records or most information of a patient into data. Therefore, to solve these problems, we design RBAC(Role Based Access Control) for U-healthcare that can access control with location, time and context-awareness information like status information of user and protect patient's privacy. With implementation of the proposed model, we verify effectiveness of the access control model for healthcare in ubiquitous environment.

A Study on Ways of Improvement to Effectively Control the Flight Information Region focusing on air space of IEODO (비행정보구역(Flight Information Region)의 효율적 관리를 위한 개선방안 연구 : 이어도(IEODO) 상공을 중심으로)

  • Kim, Choon-San;Bang, Jang-Kyu
    • Journal of the Korean Society for Aviation and Aeronautics
    • /
    • v.19 no.3
    • /
    • pp.43-53
    • /
    • 2011
  • It is well known some Foreign aircraft used to fly INCHEON FIR(Flight Information Region), especially the island of IEODO without a flight plan, even though foreign aircraft is subject to submitting a flight plan to Flight Information Center(FIC) before its flight. IEODO is a sunken rock 4.6m beneath the sea level, 149km away from Marado. Facing the Yangtze river's sea entrance horizontally and military zones of Korea and China vertically, IEODO is a very important place for national security of North East Asia because it is located at the boundary between China East Sea and Yellow Sea of South Korea. Moreover, JDZ(the 7th mine lot) is just 77NM from IEODO, which possesses natural gas eight times bigger than the gulf region and oil 4.5 times bigger than that of the U.S. In addition, INCHEON FIR, managed by MLTM(Air Traffic Control Center) and Japanese Self-Defense Force's JADIZ(Japanese Air Defense Identification Zone) are overlapping on IEODO whose air space is very complex. This paper focuses on air space, FIR, ADIZ(Air Defense Identification Zone) and related airspace system and suggests strategic implications of how to prevent foreign aircraft from invading INCHEON FIR without permission and of how to utilize the airspace efficiently.

Secure Electronic Ticketing System based on Consortium Blockchain

  • Li, Xuelian;Niu, Jie;Gao, Juntao;Han, Yue
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.10
    • /
    • pp.5219-5243
    • /
    • 2019
  • In electronic ticketing system, the malicious behavior of scalpers damages the customer's interest and disturbs the normal order of market. In order to solve the problem of scalpers, we took two steps. Firstly, we established the electronic ticketing system based on the consortium blockchain (CB-ETS). By establishing CB-ETS, we can make the ticketing market develop better in a controlled environment and be managed by the members in the consortium blockchain. Secondly, we put forward a kind of taxation mechanism for suppressing scalpers based on CB-ETS. Together with the regulatory mechanism, our scheme can effectively reduce the scalpers' profits and further inhibit scalpers. Through the above two steps, the scheme can effectively resist the malicious behavior of scalpers. Among them, in the process of transferring tickets, we optimized the transfer mechanism to achieve a win-win situation. Finally, we analyzed the security and efficiency of our scheme. Our scheme realizes the anonymity through the mixed currency protocol based on ring signature and guarantees the unforgeability of tickets by multi-signature in the process of modifying the invalidity of tickets. It also could resist to Dos attacks and Double-Spending attacks. The efficiency analysis shows that our scheme is significantly superior to relevant works.

Designed and Implementation of Layered Configuration Management for the Efficient Management of Intranet (효율적인 인트라넷 관리를 위한 계층적 구성 관리 시스템 설계 및 구현)

  • 라연경;김호철;서승호;문해은;김영탁
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.27 no.12C
    • /
    • pp.1228-1237
    • /
    • 2002
  • Network management is composed of five major functional areas, fault, configuration, account, performance and security management in the ITU standards. Configuration management identifies, exercises control over, collects data from network element node system and provides data to the management systems. The proposed architecture is designed based on the Distributed Processing Environment of CORBA(Common Object Request Broker Architecture) Spec v2.3. In this paper, configuration management system has been designed and implemented with layered managed object. It provides that integrated management of various data link layer technology. We suggest MIB(Management Information Base)/MIT(Management Information Tree) to support integrated management and distributed environment.