• Title/Summary/Keyword: Private sector's development

Search Result 157, Processing Time 0.028 seconds

Study on Market Prospects, Financing Challenges and Alternative Solutions in New Nuclear Power Projects (신규 원전의 시장전망 및 금융조달의 과제와 대안)

  • Lee, Jang-pyo
    • KEPCO Journal on Electric Power and Energy
    • /
    • v.2 no.1
    • /
    • pp.133-141
    • /
    • 2016
  • Although construction of any new nuclear power projects had not been launched since mid-1970s until recently in the USA, many new nuclear power plants have been constructed in many countries with the support of their governments mainly as part of their national energy security and electric source diversification policies. For many reasons, the nuclear power industry seemed to reclaim their renaissance from the beginning of this century and the investment in the nuclear power projects draw positive concern from the private financial sector. But the global financial crisis in 2008 and subsequent economic slow-down together with tighter bank credit regulations caused commercial banks, the main source of financing, to lose appetite for investing in new nuclear power projects. But the nuclear power economics shows that the nuclear power is viable in terms of the environmental benefit and long-term average cost compared to other power generation sources. Also doubt about nuclear power safety was much mitigated due to technology development and reinforced safety-related tests and monitoring. Therefore, the prospect for nuclear power market expansion remains positive although there are comparatively big differences among different scenarios. After Korea Electric Power Corp. won the UAE nuclear power project in December of 2009, the competition in nuclear power markets is undergoing huge changes. Competitors backed by the support of their own governments are now entering the market with many aggressive and innovative financing packages to win bids of new nuclear power projects. This report analyzed the nuclear power market prospects, competitive edges of nuclear power, risk management measures, and financing challenges and recommends alternative solutions to promote competitive edges in winning bids of new nuclear power projects.

CIA-Level Driven Secure SDLC Framework for Integrating Security into SDLC Process (CIA-Level 기반 보안내재화 개발 프레임워크)

  • Kang, Sooyoung;Kim, Seungjoo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.5
    • /
    • pp.909-928
    • /
    • 2020
  • From the early 1970s, the US government began to recognize that penetration testing could not assure the security quality of products. Results of penetration testing such as identified vulnerabilities and faults can be varied depending on the capabilities of the team. In other words none of penetration team can assure that "vulnerabilities are not found" is not equal to "product does not have any vulnerabilities". So the U.S. government realized that in order to improve the security quality of products, the development process itself should be managed systematically and strictly. Therefore, the US government began to publish various standards related to the development methodology and evaluation procurement system embedding "security-by-design" concept from the 1980s. Security-by-design means reducing product's complexity by considering security from the initial phase of development lifecycle such as the product requirements analysis and design phase to achieve trustworthiness of product ultimately. Since then, the security-by-design concept has been spread to the private sector since 2002 in the name of Secure SDLC by Microsoft and IBM, and is currently being used in various fields such as automotive and advanced weapon systems. However, the problem is that it is not easy to implement in the actual field because the standard or guidelines related to Secure SDLC contain only abstract and declarative contents. Therefore, in this paper, we present the new framework in order to specify the level of Secure SDLC desired by enterprises. Our proposed CIA (functional Correctness, safety Integrity, security Assurance)-level-based security-by-design framework combines the evidence-based security approach with the existing Secure SDLC. Using our methodology, first we can quantitatively show gap of Secure SDLC process level between competitor and the company. Second, it is very useful when you want to build Secure SDLC in the actual field because you can easily derive detailed activities and documents to build the desired level of Secure SDLC.

A Study on the Institutional Improvement Directions of Industrial Security Programs: Focused upon Policies and Practices in the U.S. (산업보안의 제도적 발전방안 연구: 미국 사례를 중심으로)

  • Choi, Justin Jin-Hyuk
    • Korean Security Journal
    • /
    • no.22
    • /
    • pp.197-230
    • /
    • 2010
  • This study examined the institutional improvement directions of industrial security programs, particularly focusing upon policies and practices in the U.S., to enhance the effectiveness of industrial security programs in Korea. This study also aimed to investigate the significance of institutional and/or policy implementations in preventing economic espionage attempt. Data leakage and/or loss of trade secrets in corporations has been a scary proposition and a serious headache to both the CEOs and the CSOs(Chief Security Officers). Security professionals or practitioners have always had to deal with data leakage issues that arise from e-mail, instant messaging(IM), and other Internet communication channels. In addition, with the proliferation of wireless and mobile technology, it's now much easier than ever for loss by data breaches to occur, whether accidentally or maliciously or even by an economic espionage attempt. The researcher in this study used both a case study and a comparative research to analyze the different strategies and approaches between the U.S. and Korea in regard of implementing policies to mitigate damages by economic espionage attempts and prevent them from occurring. The researcher first examined the current policies and practices in the U.S. in terms of federal government's and agencies' approach and strategies on industrial security programs and their partnerships with private-commercial-sectors. The purpose of this paper is to explain and suggest selected findings, and a discussion of actions to be taken on implementing a proactive and tactical approach to enhance the effectiveness of industrial security programs to fight against information loss or data leaks. This study used case reviews, literatures, newspapers, articles, and Internet resources relating to the subject of this study for triangulation of data. The findings during this research are as follows. This research suggests that both the private and the governmental sector should closely cooperate in the filed of industrial security to strengthen its traditional prevention strategies and reduce opportunities of economic espionage as well. This study finally recognizes both the very importance of institutional development led by the Government in preventing economic espionage attempts and its effectiveness when properly united with effective industrial security programs.

  • PDF

A Modified EGEAS Model with Avoided Cost and the Optimization of Generation Expansion Plan (회피비용을 고려한 EGEAS 모형 개발과 전원개발계획의 최적화)

  • 이재관;홍성의
    • Journal of the Korean Operations Research and Management Science Society
    • /
    • v.17 no.1
    • /
    • pp.117-117
    • /
    • 1992
  • Pubilc utility industries including the electric utility industry are facing a new stream of privatization com-petition with the private sector and deregulation. The necewssity to solve now and in the future power supply and demand problems has been increasing through the sophisticated generation expansion plan(GEP) approach con-sidering not only KEPCo's supply-side resources but also outside resources such as non-utility generation(NUG) demand-side management (DSM). Under the environmental situation in the current electric utility industry a new approach is needed to acquire multiple resources competitively. This study presents the development of a modified electric generation expansion analysis system(EGEAS) model with avoided cost based on the existing EGEAS model which is a dynamic program to develope an optimal generation expansion plan for the electric utility. We are trying to find optimal GEP in Korea's case using our modified model and observe the difference for the level of reliabilities such as the reserve margin(RM) loss of load probability(LOLP) and expected unserved energy percent(EUEP) between the existing EGEAS model and our model. In addition we are trying to calculate avoided cost for NUG resources which is a criterion to evaluate herem and test possibility of connection calculation of avoided cost with GEP implementation using our modified model. The results of our case study are as follows. First we were able to find that the generation expansion plan and reliability measures were largely influenced by capacity size and loading status of NUG resources, Second we were able to find that avoided cost which are criteria to evaluate NUG resources could be calculated by using our modified EGEAS model with avoided cost. We also note that avoided costs were calculated by our model in connection with generation expansion plans.

Australian Case Study in Regulatory Techniques to the Security Industry Reform and Policy Implications (호주 민간경비산업 고품질 규제수단 검토 및 시사점)

  • Kim, Dae-Woon
    • Korean Security Journal
    • /
    • no.47
    • /
    • pp.7-36
    • /
    • 2016
  • The security providers industry, often referred to as an industry with unconfined growth ceiling, has entered a remarkable mass-growth phase since the 1980. In the modern era, private-sector security increasingly cover functions relating to general security awareness (including counter-terrorism) in partnership with State bodies, and the scale of operations continue to accelerate, relative to the expanding roles. In the era of pluralisation of policing, there has been widening efforts pursued to develop a range of regulatory strategies internationally in order to manage such growth and development. To date, in South Korea, a diverse set of industry review studies have been conducted. However, the analyses have been conventionally confined to North America, Britain, Germany and Japan, while developments in other world regions remain unassessed. This article is intended to inform the drivers and determinants of regulatory reforms in Australia, and examine the effectiveness of the main pillars of licensing innovations. Over the past decades, the Australian regime has undergone a wave of reforms in response to emerging issues, and in recognition of the industry as a 'public good' due to underpopulation density and the resulting security challenges. The focus of review in this study was on providing a detailed review of the regulatory approach taken by Australia that has expanded police-private security co-operation since the 1980s. The emphasis was on examining the core pillars of risk management strategies and oversight practices progressed to date and evaluating areas of possible improvement in regulation relative to South Korea. Overall, this study has identified three key features of Australian regime: (1) close checks on questionable close associates (including fingerprinting), (2) power of inspection and seizure without search warrant, (3) the 'three strikes' scheme. The rise of the private security presence in day-to-day policing operations means that industry warrant some intervening government-sponsored initiative. The overall lessons learnt from the Australian case was taken into account in determining the following checks and balances that would provide the ideal setting for the best-practice arrangement: (1) regulatory measure should be evaluated against a set of well-defined indicators, such as the merits of different enforcement tools for each given risk, (2) information about regulatory impacts should be analysed by a specialist research institute, (3) regulators should be innovative in applying a range of strategies available to them by employing a mixture of compliance promotional strategies, and adjust the mix as required.

  • PDF

Trends of Disaster Management Research (행정학에서 재난관리분야의 학문적 연구경향)

  • Ahn, Hye-Won;Ryu, Sang-Il
    • The Journal of the Korea Contents Association
    • /
    • v.7 no.10
    • /
    • pp.183-190
    • /
    • 2007
  • This study aim is to investigate disaster management actual in field of public administration and establish object of disaster management study by surveying the trends of disaster management for development of disaster management. This study has examined the trends in researches on disaster management that have been done so far First, their changes have been investigated by years and it was found out that the studies on disaster management accounted for 81.8% after the year of 2000. Second case studies accounted for 47.7%, with respect to the method for research which means researchers lay emphasis on case studies. Third, the studies that aim to suggest policy alternatives were found the highest with 79.5%, in regard of research objectives, an the studies on verification theories with 13.6%, which means that more efforts need to be made on theorization and verification continuously to lay the groundwork for studying disaster management. Fourth the studies have been examined by type of disaster and it was found out that since 2001 the studies on social disasters and comprehensive studies on social, man-made and natural disasters have increased by 27.3% and 50% respectively. Fifth, studies have been examined by administrative units and it was found out that the studies on central government local government, private sector and NGO's disaster management accounted for the highest percentage with 50%. Lastly, the studies on preliminary strategies(mitigation & prepaedness) and post-strategies (response & recovery) accounted for the highest percentage, 56.8%, with respect to disaster management steps, and it was shown that studies are being made preponderantly on post-strategies.

Policy for Establishment of Green Infrastructure (녹색 인프라 구축을 위한 정책)

  • Park, Jae-Chul;Yang, Hong-Mo;Jang, Byoung-Kwan
    • Journal of the Korean Institute of Landscape Architecture
    • /
    • v.40 no.5
    • /
    • pp.43-50
    • /
    • 2012
  • The Green Infrastructure Framework refers to an interconnected network formed by greenways that links gardens, parks, green spaces, streams, wetlands, agricultural lands, and green belts. Green infrastructure supports diverse functions to environment, provides various benefits to people, and helps in the community's health and viability. It can store stormwater runoff and abate its non-point source pollutants. Due to its advantages and profits, advanced countries in environment policies have adopted green infrastructure in planning and implementing urban and regional development. The Korean government and municipalities have focused upon grey infrastructure investment in the past, which causes occurrence of natural disasters such as draught, flood, and landslides, degradation of water and air quality, decline of biodiversity, and even inhibition of economic activities. In order to alleviate these problems, it is requested to formulate and implement policies for green infrastructure at the national government level. USA and Korean situation of green infrastructure were investigated; forty components of green infrastructure were drawn. Nine policies utilized in the USA cases were identified, which are applicable to Korea. Among them, five policies can be implemented in public sector and four in private one. The green infrastructure law needed in Korea was suggested. The amendments of laws regarding green infrastructure and alternatives expending it were proposed.

Lightweight Authentication Scheme for Secure Data Transmission in Terrestrial CNPC Links (지상 CNPC 링크에서 안전한 데이터 전송을 위한 경량화된 인증기법)

  • Kim, Man Sik;Jun, Moon-Seog;Kang, Jung Ho
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.6 no.9
    • /
    • pp.429-436
    • /
    • 2017
  • Unmanned Aerial Vehicles (UAV) that are piloted without human pilots can be commanded remotely via frequencies or perform pre-inputted missions. UAVs have been mainly used for military purposes, but due to the development of ICT technology, they are now widely used in the private sector. Teal Group's 2014 World UAV Forecast predicts that the UAV market will grow by 10% annually over the next decade, reaching $ 12.5 billion by 2023. However, because UAVs are primarily remotely controlled, if a malicious user accesses a remotely controlled UAV, it could seriously infringe privacy and cause financial loss or even loss of life. To solve this problem, a secure channel must be established through mutual authentication between the UAV and the control center. However, existing security techniques require a lot of computing resources and power, and because communication distances, infrastructure, and data flow are different from UAV networks, it is unsuitable for application in UAV environments. To resolve this problem, the study presents a lightweight UAV authentication method based on Physical Unclonable Functions (PUFs) that requires less computing resources in the ground Control and Non-Payload Communication (CNPC) environment, where recently, technology standardization is actively under progress.

Analysis and Proposal of Startup Policy: Focusing on step-by-step Implications such as Startup, Growth, and Recovery (스타트업관련 정책의 현황분석과 정책제안: 창업, 성장, 회수 등 단계별 시사점을 중심으로)

  • Joe, Byoung-Moon;Shin, Hyun-Han
    • Asia-Pacific Journal of Business Venturing and Entrepreneurship
    • /
    • v.15 no.2
    • /
    • pp.97-110
    • /
    • 2020
  • This paper is on the policy proposal for venture ecosystem. First, one of the three secrets of the US venture ecosystem is the law of 50:50. Angel capital investment is as important as venture capital investment. Although professional angel investors and accelerators account for as much as VC in the venture ecosystem, they are ignored from policy considerations. We argue that the revision of related law is urgent. Second, large US firms invest more in M&As than in internal R&D. Therefore, accelerators and professional angel investors could make effective investment recovery after investing in a startup company. In other words, angel capital does not come in without secondary market development. Angel capital and secondary markets are the two pillars of the venture ecosystem. The government alone is difficult to develop a secondary market. This is why the private sector should come in and introduce corporate venture capital (CVC). Third, we believe the policy direction for national economic growth should be extended from the startup to scale-up. This is because the startup's sales and job creation will start in five years. While the previous study focused on funding (venture financing), this paper aims to balance all three stages of a venture: startup, growth, and recovery, which are the life cycle of a venture company or venture investment. In particular, we propose specific policies in each chapter to improve practical application.

A Study on the impact of the changes in international emissions trade market on non-CO2 CDM projects (국제 배출권 거래 시장의 제도변화가 국내 비(非)CO2 CDM 사업에 미치는 영향 분석)

  • Lee, Eungkyoon;Hwang, Minsup;Lee, Myung-Kyoon
    • Environmental and Resource Economics Review
    • /
    • v.23 no.2
    • /
    • pp.157-185
    • /
    • 2014
  • The Kyoto Protocol has extended its life until 2020 by the decision at COP18 in Doha, Qatar in 2012. So has the Kyoto Mechanism of CDM, JI, and ETS. Nonetheless, the sustainability of CDM projects is jeopardized by the recent rule changes in the international emissions trade market such as EU ETS and the price decrease in emission credits. In particular, the domestic CDM projects reducing non-$CO_2$ GHG emissions are being directly affected. This study examines the trend of carbon credit price change in the international market. It also examines how the rule changes in the international emissions trade market have affected domestic non-$CO_2$ CDM projects through which mechanisms. The policy implications drawn from this study is two-fold: it suggests how the government can assist the project developers in utilizing GHG emission reduction technologies and the market in promoting investment environment before the domestic ETS enters into effect in 2015; apart from possible measures within ETS, an additional measures such as bilateral carbon offset system is suggested to help the private sector reduce uncertainty in investment and increase options to choose.