• 제목/요약/키워드: PROTECTION AND MANAGEMENT

Search Result 3,027, Processing Time 0.031 seconds

A Study on the Application of Cybersecurity by Design of Critical Infrastructure (주요기반시설의 사전예방적보안(Cybersecurity by Design) 적용 방안에 관한 연구)

  • YOO, Jiyeon
    • The Journal of the Convergence on Culture Technology
    • /
    • v.7 no.1
    • /
    • pp.674-681
    • /
    • 2021
  • Cyber attacks targeting critical infrastructure are on the rise. Critical infrastructure is defined as core infrastructures within a country with a high degree of interdependence between the different structures; therefore, it is difficult to sufficiently protect it using outdated cybersecurity techniques. In particular, the distinction between the physical and logical risks of critical infrastructure is becoming ambiguous; therefore, risk management from a comprehensive perspective must be implemented. Accordingly, as a means of further actively protecting critical infrastructure, major countries have begun to apply their security and cybersecurity systems by design, as a more expanded concept is now being considered. This proactive security approach (CSbD, Cybersecurity by Design) includes not only securing the stability of software (SW) safety design and management, but also physical politics and device (HW) safety, precautionary and blocking measures, and overall resilience. It involves a comprehensive security system. Therefore, this study compares and analyzes security by design measures towards critical infrastructure that are leading the way in the US, Europe, and Singapore. It reflects the results of an analysis of optimal cybersecurity solutions for critical infrastructure. I would like to present a plan for applying by Design.

Topic Modeling-Based Domestic and Foreign Public Data Research Trends Comparative Analysis (토픽 모델링 기반의 국내외 공공데이터 연구 동향 비교 분석)

  • Park, Dae-Yeong;Kim, Deok-Hyeon;Kim, Keun-Wook
    • Journal of Digital Convergence
    • /
    • v.19 no.2
    • /
    • pp.1-12
    • /
    • 2021
  • With the recent 4th Industrial Revolution, the growth and value of big data are continuously increasing, and the government is also actively making efforts to open and utilize public data. However, the situation still does not reach the level of demand for public data use by citizens, At this point, it is necessary to identify research trends in the public data field and seek directions for development. In this study, in order to understand the research trends related to public data, the analysis was performed using topic modeling, which is mainly used in text mining techniques. To this end, we collected papers containing keywords of 'Public data' among domestic and foreign research papers (1,437 domestically, 9,607 overseas) and performed topic modeling based on the LDA algorithm, and compared domestic and foreign public data research trends. After analysis, policy implications were presented. Looking at the time series by topic, research in the fields of 'personal information protection', 'public data management', and 'urban environment' has increased in Korea. Overseas, it was confirmed that research in the fields of 'urban policy', 'cell biology', 'deep learning', and 'cloud·security' is active.

Extending the OMA DRM Framework for Supporting an Active Content (능동형 콘텐츠 지원을 위한 OMA DRM 프레임워크의 확장)

  • Kim, Hoo-Jong;Jung, Eun-Su;Lim, Jae-Bong
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.16 no.5
    • /
    • pp.93-106
    • /
    • 2006
  • With the rapid growth of the wireless Internet communication, a new generation of mobile devices have made possible the broad distribution of mobile digital contents, such as image, music, video, games and applications over the wireless Internet. Mobile devices are rapidly becoming the major means to extend communication channels without copy Protection, usage rule controlling and authentication. As a result, mobile digital contents may be illegally altered, copied and distributed among unauthorized mobile devices. In this paper, we take a look at Open Mobile Alliance (OMA) DRM v2.0 in general, its purpose and function. The OMA is uniquely the focal point for development of an open standard for mobile DRM. Next we introduces features for an active content and illustrates the difference between an active content and an inactive content. Enabling fast rendering of an active content, we propose an OMA-based DRM framework. This framework include the following: 1) Extending DCF Header for supporting an selective encryption, 2) Content encryption key management, 3) Rendering API for an active content. Experimental results show that the proposed framework is able to render an active content fast enough to satisfy Quality of Experience. %is framework has been proposed for a mobile device environment, but it is also applicable to other devices, such as portable media players, set-top boxes, or personal computer.

A study on the degree of aging recognition of firefighters and countermeasures(focus on firefighters in Jeollanam-do) (소방공무원의 고령화 인식정도와 대응방안에 관한 연구(전라남도 소방공무원을 중심으로))

  • Ha, Kang Hun;Kim, Jae Ho;Choi, Jae Wook
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.22 no.3
    • /
    • pp.398-407
    • /
    • 2021
  • Firefighters (who are responsible for people's safety) have one of the jobs that are expected to have problems due to aging in the workforce. An increase in the average age of firefighters can lead to serious social problems. The aim of this study is to survey firefighters in Jeollanam-do about their awareness of aging in firefighters, and to propose a plan to prepare them for aging through investigation and analysis of work problems that may occur due to an aging workforce. The survey shows that the higher the age group, the higher the awareness of aging firefighters, and the higher the total work experience and internal/external work experience, the higher the awareness of aging. As a plan to solve various problems that may arise from aging in firefighters, regular operation of physical fitness promotion programs, field work, job rotation, and managerial measures (such as a change of position to an administrative department) are prepared, and drone or robot technology is used. These solutions include the introduction of applied high-tech technologies to firefighting activities, establishment of retirement management policies, and preparation of plans to revitalize the connection to private employment. In order to maximize the applicability of the field, government institutional plans and preparations are essential.

Appropriate App Services and Acceptance for Contact Tracing: Survey Focusing on High-Risk Areas of COVID-19 in South Korea (코로나 19 동선 관리를 위한 적정 앱 서비스와 도입: 고위험 지역 설문 연구)

  • Rho, Mi Jung
    • Korea Journal of Hospital Management
    • /
    • v.27 no.2
    • /
    • pp.16-33
    • /
    • 2022
  • Purposes: Prompt evaluation of routes and contact tracing are very important for epidemiological investigations of coronavirus disease 2019 (COVID-19). To ensure better adoption of contact tracing apps, it is necessary to understand users' expectations, preferences, and concerns. This study aimed to identify main reasons why people use the apps, appropriate services, and basis for voluntary app services that can improve app participation rates and data sharing. Methodology/Approach: This study conducted an online survey from November 11 to December 6, 2020, and received a total of 1,048 survey responses. This study analyzed the questionnaire survey findings of 883 respondents in areas with many confirmed cases of COVID-19. This study used a multiple regression analysis. Findings: Respondents who had experience of using related apps showed a high intention to use contact-tracing apps. Participants wished for the contact tracking apps to be provided by the government or public health centers (74%) and preferred free apps (93.88%). The factors affecting the participants' intention to use these apps were their preventive value, performance expectancy, perceived risk, facilitative ability, and effort expectancy. The results highlighted the need to ensure voluntary participation to address participants' concerns regarding privacy protection and personal information exposure. Practical Implications: The results can be used to accurately identify user needs and appropriate services and thereby improve the development of contact tracking apps. The findings provide the basis for voluntary app that can enhance app participation rates and data sharing. The results will also serve as the basis for developing trusted apps that can facilitate epidemiological investigations.

Aromatic Agriculture: Volatile Compound-Based Plant Disease Diagnosis and Crop Protection (향기농업: 휘발성 물질을 이용한 식물병 진단과 방제)

  • Riu, Myoungjoo;Son, Jin-Soo;Oh, Sang-Keun;Ryu, Choong-Min
    • Research in Plant Disease
    • /
    • v.28 no.1
    • /
    • pp.1-18
    • /
    • 2022
  • Volatiles exist ubiquitously in nature. Volatile compounds produced by plants and microorganisms confer inter-kingdom and intra-kingdom communications. Autoinducer signaling molecules from contact-based chemical communication, such as bacterial quorum sensing, are relayed through short distances. By contrast, biogenic volatiles derived from plant-microbe interactions generate long-distance (>20 cm) alarm signals for sensing harmful microorganisms. In this review, we discuss prior work on volatile compound-mediated diagnosis of plant diseases, and the use of volatile packaging and dispensing approaches for the biological control of fungi, bacteria, and viruses. In this regard, recent developments on technologies to analyze and detect microbial volatile compounds are introduced. Furthermore, we survey the chemical encapsulation, slow-release, and bio-nano techniques for volatile formulation and delivery that are expected to overcome limitations in the application of biogenic volatiles to modern agriculture. Collectively, technological advances in volatile compound detection, packaging, and delivery provide great potential for the implementation of ecologically-sound plant disease management strategies. We hope that this review will help farmers and young scientists understand the nature of microbial volatile compounds, and shift paradigms on disease diagnosis and management to aromatic (volatile-based) agriculture.

A Study on the Gender Rights Protection System in Arts and Cultural Industry (문화예술계 성 인권 보호를 위한 제도 연구)

  • Byun, Young geon;Lee, Sung yeop
    • Korean Association of Arts Management
    • /
    • no.54
    • /
    • pp.155-184
    • /
    • 2020
  • This study aims to examine the system for gender rights in arts and cultural industry triggered by #Metoo movement and to suggest action plans to improve gender equality. Up until now, Korean government launched 'Pan-governmental Counter Plan', 'Recommendation of the Special Center for Investigating Sexual Harassment and Sexual Violence in Arts and Cultural Industries' 'the Primary and Secondary Supplemental Measures to Eradicate Sexual Harassment and Sexual Violence in the Arts and Cultural Sector by the Ministry of Culture, Sports and Tourism in Korea', and '2030 Cultural Vision'. Korean government has designed the system to protect gender rights using these proposals. Implemented policies can be grouped into 4 different categories; protecting victims, punishing abusers, implementing preventive measures, and reforming legal system. However, despite Korean government's multilateral efforts, continuous criticism aroused as policies failed to witness actual impacts in the industry. Given the fact that 2 years have passed since the launch of gender equality policy in cultural sector, this is the right time to discuss the current status and ways to improve it. For above reasons, research was conducted on documents including, but not limited to, government publications and an analysis of interviews with 9 major stakeholders of policy planning and implementation. During the study, interviews were analyzed using the qualitative research program MAXQDA. As a result, 5~10 problems were revealed in each category of the system. Furthermore, meaningful correlation has been found in improvement areas suggested by the interviewees. This connection implies that the policy for gender rights in arts and cultural industry shall be developed organically in order for the system to work.

Application of LID to Reduce Storm Runoff according to the RCP Climate Change Scenarios (RCP 기후변화 시나리오에 따른 우수 유출량 저감을 위한 저영향개발 시설의 적용 방안)

  • Kim, Min ji;Kim, Ji Eun;Park, Kyung Woon;Kim, Tae-Woong
    • KSCE Journal of Civil and Environmental Engineering Research
    • /
    • v.42 no.3
    • /
    • pp.333-342
    • /
    • 2022
  • Due to climate change, increased heavy rainfalls result in flood damage every year. To investigate the storm-runoff reduction effects of Low Impact Development (LID), this study performed runoff analyses using the U.S. Environmental Protection Agency (EPA) Storm Water Management Model (SWMM) for past and future representative storm events of the Yongdu Rainwater Pumping Station basin. As a result, the infiltration loss for representative future rainfalls increased by 3.17 %, and the surface runoff and peak runoff rate increased significantly by 32.50 %, and 128.77 %, respectively. To reduce the increased surface runoff and peak runoff rates, this study investigated the applicability of LID approaches, including a permeable pavement, green roof, and rain garden, by adjusting the LID parameters and the ratio of installation area. We identified the ranges of LID parameters that decreased peak runoff rate and surface runoff, and increased infiltration. In addition, when the application ratio of permeable pavement, green roof, and rain garden was 2:1:3, best performance was attained, leading to a reduction of peak runoff of 26.85 %, infiltration loss 12.01 %, surface runoff 15.11 %, and storage 509.47 %. Based on analyzing the effect of storm runoff reductions for various return periods, it was found that as the return period increased, the proportion of peak runoff and surface runoff increased and the proportion of infiltration loss and storage decreased.

Improvement of ISMS Certification Components for Virtual Asset Services: Focusing on CCSS Certification Comparison (안전한 가상자산 서비스를 위한 ISMS 인증항목 개선에 관한 연구: CCSS 인증제도 비교를 중심으로)

  • Kim, Eun Ji;Koo, Ja Hwan;Kim, Ung Mo
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.11 no.8
    • /
    • pp.249-258
    • /
    • 2022
  • Since the advent of Bitcoin, various virtual assets have been actively traded through virtual asset services of virtual asset exchanges. Recently, security accidents have frequently occurred in virtual asset exchanges, so the government is obligated to obtain information security management system (ISMS) certification to strengthen information protection of virtual asset exchanges, and 56 additional specialized items have been established. In this paper, we compared the domain importance of ISMS and CryptoCurrency Security Standard (CCSS) which is a set of requirements for all information systems that make use of cryptocurrencies, and analyzed the results after mapping them to gain insight into the characteristics of each certification system. Improvements for 4 items of High Level were derived by classifying the priorities for improvement items into 3 stages: High, Medium, and Low. These results can provide priority for virtual asset and information system security, support method and systematic decision-making on improvement of certified items, and contribute to vitalization of virtual asset transactions by enhancing the reliability and safety of virtual asset services.

Factors Influencing Individual's Intention to Provide MyData: Focusing on the Moderating Effects of Individual Capabilities and Institutional Type (개인의 마이데이터 제공의도에 영향을 미치는 요인: 개인역량과 기관유형의 조절효과를 중심으로)

  • Dong Keun Park;Sung-Byung Yang;Sang-Hyeak Yoon
    • Knowledge Management Research
    • /
    • v.24 no.1
    • /
    • pp.73-97
    • /
    • 2023
  • Recently, the MyData market has been growing as the importance of data and issues related to personal information protection have drawn much attention together. MyData refers to the concept of guaranteeing an individual's right to personal information and providing and utilizing one's data according to individual consent. MyData service providers can combine and analyze customer information to provide personalized services. In the early days, the MyData business was activated mainly by private companies and the financial industry, but recently, public institutions are also actively taking advantage of MyData. Meanwhile, the importance of an individual's intention to provide MyData for the success of MyData businesses continues to increase, but research related to this is lacking. Moreover, existing studies have been mainly conducted on individual benefits of MyData; there are not enough studies in which both public benefit and perceived risk factors are considered at the same time. In this regard, this study intends to derive factors affecting the intention to provide MyData based on the privacy calculus model, examine their influencing mechanism, and further verify the moderating effects of individual capabilities and institutional type. This study can find academic significance in that it expanded and demonstrated the privacy calculus model in the context of MyData providing intention. In addition, the results of this study are expected to offer practical guidelines for developing and managing new services in MyData businesses.