• Title/Summary/Keyword: Managing Security

Search Result 342, Processing Time 0.029 seconds

Leased Line Traffic Prediction Using a Recurrent Deep Neural Network Model (순환 심층 신경망 모델을 이용한 전용회선 트래픽 예측)

  • Lee, In-Gyu;Song, Mi-Hwa
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.10 no.10
    • /
    • pp.391-398
    • /
    • 2021
  • Since the leased line is a structure that exclusively uses two connected areas for data transmission, a stable quality level and security are ensured, and despite the rapid increase in the number of switched lines, it is a line method that is continuously used a lot in companies. However, because the cost is relatively high, one of the important roles of the network operator in the enterprise is to maintain the optimal state by properly arranging and utilizing the resources of the network leased line. In other words, in order to properly support business service requirements, it is essential to properly manage bandwidth resources of leased lines from the viewpoint of data transmission, and properly predicting and managing leased line usage becomes a key factor. Therefore, in this study, various prediction models were applied and performance was evaluated based on the actual usage rate data of leased lines used in corporate networks. In general, the performance of each prediction was measured and compared by applying the smoothing model and ARIMA model, which are widely used as statistical methods, and the representative models of deep learning based on artificial neural networks, which are being studied a lot these days. In addition, based on the experimental results, we proposed the items to be considered in order for each model to achieve good performance for prediction from the viewpoint of effective operation of leased line resources.

Effects of Social Support and Chronic Medical Conditions on Depressive Symptoms in Elderly People Living Alone in a Rural Community (농촌지역 독거노인의 사회적 지지 및 만성 의학적 질환이 우울증상에 미치는 영향)

  • Chae, Cholho;Lee, Sangsoo;Park, Chul-Soo;Kim, Bong-Jo;Lee, Cheol-Soon;Lee, So-Jin;Lee, Dongyun;Seo, Ji-Yeong;Ahn, In-Young;Choi, Jae-Won;Cha, Boseok
    • Journal of the Korean society of biological therapies in psychiatry
    • /
    • v.24 no.3
    • /
    • pp.184-193
    • /
    • 2018
  • Objectives : This study investigated the effects of social support and chronic medical conditions on depressive symptoms in elderly people living alone in a rural community. Methods : Sociodemographic information on 173 subjects aged 65 years or older who lived alone in a rural community and were recipients of National Basic Livelihood Security was collected and analyzed. All participants completed the Korean Form of the Geriatric Depression Scale and the Lubben Social Network Scale. Additionally, the current prevalence of chronic medical conditions that interfere with the activities of daily living was examined. Multiple logistic regression analysis was conducted to analyze the associations of social support and chronic medical conditions with depressive symptoms. Results : Social support(odds ratio: OR, 0.96; 95% confidence interval: 95% CI, 0.92-0.99) and chronic medical conditions(OR, 1.59; 95% CI, 1.23-2.05) were significantly associated with depressive symptoms in all subjects. When analyzed by gender, social support served as a protective factor against depressive symptoms in elderly men only(OR, 0.91; 95% CI, 0.83-0.99), and chronic medical conditions increased the risk of depressive symptoms in elderly women only(OR, 1.74; 95% CI, 1.26-2.40). Furthermore, osteoarthritis and lumbar pain were risk factors for depressive symptoms in all subjects(OR, 2.24; 95% CI, 1.10-4.56 and OR, 2.10; 95% CI, 1.08-4.12) and in elderly women(OR, 4.07; 95% CI, 1.68-9.84 and OR, 3.34; 95% CI, 1.47-7.57), respectively. Conclusion : This study indicates that improving the social support and managing the chronic medical conditions of elderly people living alone are important for the prevention of depression in this population. Additionally, the present results suggest that it is necessary to establish different depression-prevention strategies for elderly men and women living alone.

Interregional Variant Factor Analysis of Hypertension Treatment Rate in COVID-19 (코로나19에서 고혈압 치료율의 지역 간 변이요인 분석)

  • Park, Jong-Ho;Kim, Ji-Hye
    • Journal of Digital Convergence
    • /
    • v.20 no.4
    • /
    • pp.469-482
    • /
    • 2022
  • The purpose of this study is to analyze regional variation factors of hypertension treatment rate in COVID-19 based on the analysis results based on ecological methodology. To this end, data suitable for ecological analysis were collected from the Korea Centers for Disease Control and Prevention's regional health statistics, local government COVID-19 confirmed cases, National Health Insurance Corporation, Health Insurance Review and Assessment Service's welfare statistics, and Korea Transport Institute's traffic access index. Descriptive statistics and correlation analysis were conducted using SPSS Statistics 23 for regional variation and related factors in hypertension treatment rate, and geographical weighted regression analysis was conducted using Arc GIS for regional variation factors. As a result of the study, the overall explanatory power of the calculated geo-weighted regression model was 27.6%, distributed from 23.1% to 33.4% by region. As factors affecting the treatment rate of hypertension, the higher the rate of basic living security medical benefits, diabetes treatment rate, and health institutions per 100,000 population, the higher the rate of hypertension treatment, the lower the number of COVID-19 confirmed patients, the lower the rate of physical activity, and the alcohol consumption. Percentage of alcohol consumption decreased due to COVID-19 pandemic. It was analyzed that the lower the ratio, the higher the treatment rate for hypertension. Based on these results, the analysis of regional variables in the treatment rate of hypertension in COVID-19 can be expected to be effective in managing the treatment rate of hypertension, and furthermore, it is expected to be used to establish community-centered health promotion policies.

A Study on Unauthorized Anchoring of Foreign-flag Vessels in Internal Waters and Territorial Sea (외국선박의 내수 및 영해 무단정박에 관한 연구)

  • Lim, Chae-Hyun;Lee, Chang-Hee;Jeong, Dae-Deuk
    • Journal of the Korean Society of Marine Environment & Safety
    • /
    • v.28 no.2
    • /
    • pp.280-289
    • /
    • 2022
  • Internal Waters refer to the waters located at the landward side of a baseline and is completely under the sovereignty of a coastal state. However, the right of innocent passage of foreign-flag vessels is recognized in internal waters that are newly incorporated by establishing a straight baseline. Korea has a massive Internal Waters on its south-western coast where the straight baseline is adopted and has a wide Internal Waters that allows innocent passage. A foreign-flag vessel navigating the internal waters must be properly managed according to the interest of the coastal states such as the fishing·safety·security·environment around the Korean coast. Additionally, Territorial Sea comes under the sovereignty of a coastal state and it is a very important sea area for managing the interests of the coastal states. However, several collision accidents involving illegally anchored or drifted foreign-flag vessels have been occurring recently in the Korean Internal Waters and Territorial Sea, and such accidents are a threat to its interests. Thus, this paper analyzes the cases of collision of foreign-flag vessels that anchored or drifted without authorization, and examines domestic·international laws on the passage of foreign-flag vessel through Internal Waters and Territorial Waters. Finally, this paper suggests that unauthorized anchoring of foreign-flag vessels in Korean Internal Waters and Territorial Water violates the requirements for innocent passage and this violation is punishable according to related Acts; a desirable improvement plan for the legal system of passage through Internal Waters and Territorial Waters.

A Study on the Improvement of Collection, Management and Sharing of Maritime Traffic Information (해상교통정보의 수집, 관리 및 공유 개선방안에 관한 연구)

  • Shin, Gil-Ho;Song, Chae-Uk
    • Journal of the Korean Society of Marine Environment & Safety
    • /
    • v.28 no.4
    • /
    • pp.515-524
    • /
    • 2022
  • To effectively collect, manage, and share the maritime traffic information, it is necessary to identify the technology trends concerning this particular information and analyze its current status and problems. Therefore, this study observes the domestic and foreign technology trends involving maritime traffic information while analyzing and summarizing the current status and problems in collecting, managing, and sharing it. According to the data analysis, the problems in the collecting stage are difficulties in collecting visual information from long-distance radars, CCTVs, and cameras in areas outside the LTE network coverage. Notably, this explains the challenges in detecting smuggling ships entering the territorial waters through the exclusive economic zone (EEZ) in the early stage. The problems in the management stage include difficult reductions and expansions of maritime traffic information caused by the lack of flexibility in storage spaces mostly constructed by the maritime transportation system. Additionally, it is challenging to deal with system failure with system redundancy and backup as a countermeasure. Furthermore, the problems in the sharing stage show that it is difficult to share information with external operating organizations since the internal network is mainly used to share maritime transportation information. If at all through the government cloud via platforms such as LRIT and SASS, it often fails to effectively provide various S/W applications that help use maritime big data. Therefore, it is suggested that collecting equipment such as unmanned aerial vehicles and satellites should be constructed to expand collecting areas in the collecting stage. In the management and sharing stages, the introduction and construction of private clouds are suggested, considering the operational administration and information disclosure of each maritime transportation system. Through these efforts, an enhancement of the expertise and security of clouds is expected.

A Study to Improve the Trustworthiness of Data Repositories by Obtaining CoreTrustSeal Certification (CoreTrustSeal 인증 획득을 통한 데이터 리포지토리의 신뢰성 향상을 위한 연구)

  • Hea Lim Rhee;Jung-Ho Um;Youngho Shin;Hyung-jun Yim;Na-eun Han
    • Journal of the Korean Society for information Management
    • /
    • v.41 no.2
    • /
    • pp.245-268
    • /
    • 2024
  • As the recognition of data's value increases, the role of data repositories in managing, preserving, and utilizing data is becoming increasingly important. This study investigates ways to enhance the trustworthiness of data repositories through obtaining CoreTrustSeal (CTS) certification. Trust in data repositories is critical not only for data protection but also for building and maintaining trust between the repository and stakeholders, which in turn affects researchers' decisions on depositing and utilizing data. The study examines the CoreTrustSeal, an international certification for trustworthy data repositories, analyzing its impact on the trustworthiness and efficiency of repositories. Using the example of DataON, Korea's first CTS-certified repository operated by the Korea Institute of Science and Technology Information (KISTI), the study compares and analyzes four repositories that have obtained CTS certification. These include DataON, the Physical Oceanography Distributed Active Archive Center (PO.DAAC) from NASA, Yareta from the University of Geneva, and the DARIAH-DE repository from Germany. The research assesses how these repositories meet the mandatory requirements set by CTS and proposes strategies for improving the trustworthiness of data repositories. Key findings indicate that obtaining CTS certification involves rigorous evaluation of organizational infrastructure, digital object management, and technological aspects. The study highlights the importance of transparent data processes, robust data quality assurance, enhanced accessibility and usability, sustainability, security measures, and compliance with legal and ethical standards. By implementing these strategies, data repositories can enhance their reliability and efficiency, ultimately promoting wider data sharing and utilization in the scientific community.

Cost-benefit Analysis of Installing Crime Preventive CCTV: Focused on Theft and Assault (범죄예방용 CCTV설치의 비용편익분석: 절도와 폭력범죄를 중심으로)

  • Yun, Woo-Suk;Lee, Chang-Hun;Shim, Hee-Sub
    • Korean Security Journal
    • /
    • no.50
    • /
    • pp.209-237
    • /
    • 2017
  • Theories on 'opportunity for crime' have utilized CCTV in crime prevention approach, and empirical studies showing crime prevention effects of CCTV have supported expansion of CCTV installation. Particularly, in Korea, the number of CCTV installation had tripled from 2011 to 2015, and governmental policies regarding CCTV have become one of the mainstream social control strategies. Although a couple of empirical studies showed decrease in crime rate due to CCTV installation, there is no study investigating B/C analysis(Benefit vs. cost analysis) of CCTV installation. B/C analysis results will be beneficial for official decision-making of criminal justice policy, and this study is purported to produce such fundamental evidence for policy making procedure. To fulfill this goal, this study collected data on financial information, crime data between 2011 and 2015 across the nation from 232 governmental district offices and the Korean National Police. This study then conducted two different B/C analyses(simple B/C analysis, regression-based B/C analysis). The simple B/C analysis results showed that 1) total costs for CCTV installation in 2014 was 68,626,000,000 won(approximately, US$57,188,333.00, money exchange rate 1200won=US$1), 2) benefits of crime reduction was 90,888,000,000 won(appx. US$75,740,000), and 3) B/C rate was 1.32. The regression-based B/C analysis results showed that 1) B/C rate was 1.52 when only reduced costs of criminal justice processes for crime employed, and 2) B/C rate was 3.62 when overall social costs including reduced costs of criminal justice processes and social benefits, e.g., reduction in costs for managing fear of crime, due to the crime reduction. Based on the results, this study provided policy implications.

  • PDF

A Study on the Reality and Improvement of Autonomous Police System in Jeju Special Self-Government Province (제주자치경찰 시스템의 실태와 발전모델에 관한 연구)

  • Cho, Chul-Ok
    • Korean Security Journal
    • /
    • no.14
    • /
    • pp.485-516
    • /
    • 2007
  • Jeju Special Self-Government Province adopted an autonomous police system for the first time since 60 years in Korean police. The purpose of autonomous police system is to offer a police service to be suitable in regional conditions. But Jeju autonomous police system for nearly one year after adoption is criticized to be established on the ground of political reason but not local decentralization. Actually Jeju autonomous police has not a clear cut jurisdiction and operation scope because of the jurisdiction duplication between national and autonomous police. The original task is confined on environment and sightseeing so on given to administration police for local self-government. So criminal investigation authority on general crimes is not to Jeuju autonomous police on account of special judicial police. First, it is the structural rationalization of Jeju autonomous police system. It speaks that Jeju provincial police bureau and police station have to be as national police institution, on the other hand, patrol district station and police box have to be as autonomous police institution. Of course, functional division has to be followed. National police performs managing all the assembly and demonstration by the management law on assembly and demonstration including the suppression against any large scale demonstration and disturbance, also the investigation on serious crimes just as international crimes and broaden area crimes including all the felony. Together national police performs the duty concerned to all the foreign affairs and national securities in along with the investigation on traffic accidents. On the other hand, autonomous police performs the function for citizen's life safety as crime prevention and the enforcement on the violation against police operation law, together the traffic management and the regulation on traffic violations. and the investigation on minor crime as simple violence or petty larceny including the management on local big events. Second, the budgetary of autonomous police is rationalized by the share of budgeting between Korean government and Jeju special self-government province. Third, urgent arrest authority on general crime and the rights of claims for the summary trial on minor crimes are given to autonomous police. Of course, this problem is resolved naturally in case of giving the investigation rights to autonomous police on minor crimes.

  • PDF

Chinese Communist Party's Management of Records & Archives during the Chinese Revolution Period (혁명시기 중국공산당의 문서당안관리)

  • Lee, Won-Kyu
    • The Korean Journal of Archival Studies
    • /
    • no.22
    • /
    • pp.157-199
    • /
    • 2009
  • The organization for managing records and archives did not emerge together with the founding of the Chinese Communist Party. Such management became active with the establishment of the Department of Documents (文書科) and its affiliated offices overseeing reading and safekeeping of official papers, after the formation of the Central Secretariat(中央秘書處) in 1926. Improving the work of the Secretariat's organization became the focus of critical discussions in the early 1930s. The main criticism was that the Secretariat had failed to be cognizant of its political role and degenerated into a mere "functional organization." The solution to this was the "politicization of the Secretariat's work." Moreover, influenced by the "Rectification Movement" in the 1940s, the party emphasized the responsibility of the Resources Department (材料科) that extended beyond managing documents to collecting, organizing and providing various kinds of important information data. In the mean time, maintaining security with regard to composing documents continued to be emphasized through such methods as using different names for figures and organizations or employing special inks for document production. In addition, communications between the central political organs and regional offices were emphasized through regular reports on work activities and situations of the local areas. The General Secretary not only composed the drafts of the major official documents but also handled the reading and examination of all documents, and thus played a central role in record processing. The records, called archives after undergoing document processing, were placed in safekeeping. This function was handled by the "Document Safekeeping Office(文件保管處)" of the Central Secretariat's Department of Documents. Although the Document Safekeeping Office, also called the "Central Repository(中央文庫)", could no longer accept, beginning in the early 1930s, additional archive transfers, the Resources Department continued to strengthen throughout the 1940s its role of safekeeping and providing documents and publication materials. In particular, collections of materials for research and study were carried out, and with the recovery of regions which had been under the Japanese rule, massive amounts of archive and document materials were collected. After being stipulated by rules in 1931, the archive classification and cataloguing methods became actively systematized, especially in the 1940s. Basically, "subject" classification methods and fundamental cataloguing techniques were adopted. The principle of assuming "importance" and "confidentiality" as the criteria of management emerged from a relatively early period, but the concept or process of evaluation that differentiated preservation and discarding of documents was not clear. While implementing a system of secure management and restricted access for confidential information, the critical view on providing use of archive materials was very strong, as can be seen in the slogan, "the unification of preservation and use." Even during the revolutionary movement and wars, the Chinese Communist Party continued their efforts to strengthen management and preservation of records & archives. The results were not always desirable nor were there any reasons for such experiences to lead to stable development. The historical conditions in which the Chinese Communist Party found itself probably made it inevitable. The most pronounced characteristics of this process can be found in the fact that they not only pursued efficiency of records & archives management at the functional level but, while strengthening their self-awareness of the political significance impacting the Chinese Communist Party's revolution movement, they also paid attention to the value possessed by archive materials as actual evidence for revolutionary policy research and as historical evidence of the Chinese Communist Party.

Behavioural Analysis of Password Authentication and Countermeasure to Phishing Attacks - from User Experience and HCI Perspectives (사용자의 패스워드 인증 행위 분석 및 피싱 공격시 대응방안 - 사용자 경험 및 HCI의 관점에서)

  • Ryu, Hong Ryeol;Hong, Moses;Kwon, Taekyoung
    • Journal of Internet Computing and Services
    • /
    • v.15 no.3
    • /
    • pp.79-90
    • /
    • 2014
  • User authentication based on ID and PW has been widely used. As the Internet has become a growing part of people' lives, input times of ID/PW have been increased for a variety of services. People have already learned enough to perform the authentication procedure and have entered ID/PW while ones are unconscious. This is referred to as the adaptive unconscious, a set of mental processes incoming information and producing judgements and behaviors without our conscious awareness and within a second. Most people have joined up for various websites with a small number of IDs/PWs, because they relied on their memory for managing IDs/PWs. Human memory decays with the passing of time and knowledges in human memory tend to interfere with each other. For that reason, there is the potential for people to enter an invalid ID/PW. Therefore, these characteristics above mentioned regarding of user authentication with ID/PW can lead to human vulnerabilities: people use a few PWs for various websites, manage IDs/PWs depending on their memory, and enter ID/PW unconsciously. Based on the vulnerability of human factors, a variety of information leakage attacks such as phishing and pharming attacks have been increasing exponentially. In the past, information leakage attacks exploited vulnerabilities of hardware, operating system, software and so on. However, most of current attacks tend to exploit the vulnerabilities of the human factors. These attacks based on the vulnerability of the human factor are called social-engineering attacks. Recently, malicious social-engineering technique such as phishing and pharming attacks is one of the biggest security problems. Phishing is an attack of attempting to obtain valuable information such as ID/PW and pharming is an attack intended to steal personal data by redirecting a website's traffic to a fraudulent copy of a legitimate website. Screens of fraudulent copies used for both phishing and pharming attacks are almost identical to those of legitimate websites, and even the pharming can include the deceptive URL address. Therefore, without the supports of prevention and detection techniques such as vaccines and reputation system, it is difficult for users to determine intuitively whether the site is the phishing and pharming sites or legitimate site. The previous researches in terms of phishing and pharming attacks have mainly studied on technical solutions. In this paper, we focus on human behaviour when users are confronted by phishing and pharming attacks without knowing them. We conducted an attack experiment in order to find out how many IDs/PWs are leaked from pharming and phishing attack. We firstly configured the experimental settings in the same condition of phishing and pharming attacks and build a phishing site for the experiment. We then recruited 64 voluntary participants and asked them to log in our experimental site. For each participant, we conducted a questionnaire survey with regard to the experiment. Through the attack experiment and survey, we observed whether their password are leaked out when logging in the experimental phishing site, and how many different passwords are leaked among the total number of passwords of each participant. Consequently, we found out that most participants unconsciously logged in the site and the ID/PW management dependent on human memory caused the leakage of multiple passwords. The user should actively utilize repudiation systems and the service provider with online site should support prevention techniques that the user can intuitively determined whether the site is phishing.