• Title/Summary/Keyword: Protection and Management System

Search Result 1,292, Processing Time 0.03 seconds

A Study on Strengthening Personal Information Protection in Smart City (스마트시티 속 개인정보보호 강화 방안 연구)

  • Cheong, Hwan-suk;Lee, Sang-joon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.4
    • /
    • pp.705-717
    • /
    • 2020
  • Cities in the world are rushing to develop smart cities to create a sustainable and happy city by solving many problems in cities using information and communication technologies such as big data and IoT. However, in Korea's smart cities and smart city certification systems, the focus is on platform-oriented hardware infrastructure, and the information security aspect is first considered to build and authenticate. It is a situation in which a response system for the risk of leakage of big data containing personal information is needed through policy research on the aspect of personal information protection for smart city operation. This paper analyzes the types of personal information in smart cities, problems associated with the construction and operation of smart cities, and the limitations of the current smart city law and personal information protection management system. As a solution, I would like to present a model of a personal information protection management system in the smart city field and propose a plan to strengthen personal information protection through this. Since the management system model of this paper is applied and operated in the national smart city pilot cities, demonstration cities, and CCTV integrated control centers, it is expected that citizens' personal information can be safely managed.

A Review of Solid Waste Management using System Dynamics Modeling

  • Popli, Kanchan;Sudibya, Gamal Luckman;Kim, Seungdo
    • Journal of Environmental Science International
    • /
    • v.26 no.10
    • /
    • pp.1185-1200
    • /
    • 2017
  • Solid waste management is currently a topic of concern, particularly in the protection of humans and the environment from toxic pollutants and hazardous materials. The importance of solid waste management is recognized at international, national, and community levels. Different agendas have been prioritized and assigned to improve quality of life, productivity, and health, and reduce the burden of pollution. Suitable management of solid waste requires appropriate technology that is affordable, socially accepted, and environmentally friendly. The use of a smart management system involving system dynamics can save energy, money, and labor. System dynamics is a computer-based approach that aids in predicting the behavioral patterns of variables, and correlating dependent and independent variables. The inclusion of system dynamics-based models in solid waste management has recently become more common. In this review, we used system dynamics to determine methods to disentangle solid waste management systems and analyzed different studies on solid waste management using system dynamics in different countries in detail. We also discussed the various software packages that are available for system dynamics and their usefulness for waste management. This review may help in understanding current solid waste management practices using system dynamics.

The ISO the research also the ISMS security maturity of 27001 regarding a measurement modeling (ISO 27004 information security management measurement and metric system) (ISO 27001의 ISMS 보안성숙도 측정 모델링에 관한 연구 (ISO 27004 정보보호관리 측정 및 척도 체계))

  • Kim, Tai-Dal
    • Journal of the Korea Society of Computer and Information
    • /
    • v.12 no.6
    • /
    • pp.153-160
    • /
    • 2007
  • Recently, the demand against the system risk analysis and security management from the enterprises or the agencies which operate a information system is increasing even from domestic. The international against the standardization trend of information protection management system it investigates from the dissertation which it sees. It analyzed and against information property information protection management system integrated it will be able to manage a danger modeling it did it proposed. Having analyzed as well as compared the matureness of security-measurement models in regard to the global standard of proposal system, the administrative presentation for various IT technology resources. which have been managed singly so far, is now well applied under the united control of the company itself, and enabled the automated management of authentication support and renewal for ISO 27001, ISO 9000, ISO 14000, resulting in much advanced operation for both material and human resources.

  • PDF

Development of a New Islanding Detection Method for Distributed Resources (분산 전원의 고립 운전 검출 기법의 개발)

  • Jang, Seong-Il;Kim, Gwang-Ho
    • The Transactions of the Korean Institute of Electrical Engineers A
    • /
    • v.50 no.11
    • /
    • pp.506-513
    • /
    • 2001
  • The islanding detection for distributed resources (DR) becomes an important and emerging issue in power system protection since the distributed generator installations are rapidly increasing and most of the installed systems are interconnected with distribution network. In order to avoid the negative impacts from islanding operations of DR on protection, operation and management of distribution system, it is necessary to effectively detect the islanding operations of DR and rapidly disconnect it from distribution network. Generally, it is difficult to detect islanding operation by monitoring only one system parameter This paper presents a new logic based islanding detection method for distributed resources(DR) which are interconnected with distribution network. The proposed method detects the islanding operation by monitoring four system parameter: voltage variation, phase displacement, frequency variation, and the variation of total harmonic distortion(THD) of current; therefore, it effectively detects island operation of DR unit operating in parallel with the distribution network. We also verified the efficiency of the proposed algorithm using the radial distribution network of IEEE 34 bus model.

  • PDF

A Development of Power Transmission System Protection Database for Korea Electric Power Company (한국전력 송전계통 보호 데어터베이스 구축)

  • An, Yeong-Tae;Lee, Seung-Jae;Choi, Myeon-Song;Kang, Sang-Hee;Kim, Ho-Pyo;Lee, Woon-Hee;Choi, Hong-Suk
    • The Transactions of the Korean Institute of Electrical Engineers A
    • /
    • v.48 no.7
    • /
    • pp.847-854
    • /
    • 1999
  • The setting of protective relays, which is critical to the power system security and reliability, requires a huge volume of data processing and repetitive calculation. Since it has been performed by relay engineers manually, it is vulnerable to human errors, its computerization has been pursued, in which the efficient management of the data is the key to the success. The database for power system protection must accommodate not only the power system network data but also a variety of protective devices. Also its information should be able to be viewed and updated with easy by operators and by computer programs. This paper describes several existing database designs for power system protection, their advantages and disadvantages. Also this paper has identified the required function and designed the database for the KEPCO power system data structure for the benefit of the relay setting process, etc..

  • PDF

A Study on The Managing Practices in SLM for Multimedia System (멀티미디어 시스템 정보보호수준관리를 위한 관리형 프랙티스에 관한 연구)

  • Kim, Tai-Hoon;Cho, Sung-Eon
    • Journal of Advanced Navigation Technology
    • /
    • v.12 no.6
    • /
    • pp.673-680
    • /
    • 2008
  • Multimedia system security can be categorized into groups such as protection of multimedia asset itself and protection of multimedia systems which can process multimedia asset. Divided consideration for these two factors will not hurt the importance of security management. In this paper, managing practices for keeping security level of multimedia systems are induced and categorized.

  • PDF

Digital Content Protection and Computer Forensics Evidence Management Mechanism using MPEG-21 in Network Service Environment (네트워크 서비스 환경에서 MPEG-21을 활용한 디지털 콘텐츠 보호 및 컴퓨터 포렌식스 증거 관리 메커니즘)

  • Jang, Eun Gyeom;Lee, Bum Suk
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.6 no.2
    • /
    • pp.129-141
    • /
    • 2010
  • In network service environment, cultures from diversified fields are easily accessible thanks to the convenient digital content services. Unfortunately, unauthorized access and indiscreet misuse behaviors have deprived content owners of their copyrights. This study suggests an integrity-ensured model applicable for forensic evidence of digital content infringement in network service environment. The suggested model is based on MPEG-21 core components for digital content protection and the system is designed in connection with the components of digital content forensics. Also, the present study suggests an efficient technology to protect and manage computer forensic evidence and digital content by authorizing digital content use and catching infringing logs of authorized users without lag in network environment for the benefit of network security and reliability.

A Study of the Classification and Identification of the Disaster Protection Resources (방재 자원의 효과적 분류 및 식별에 관한 연구)

  • Lee, Changyeol;Kim, Taehwan;Park, Giljoo
    • Journal of the Society of Disaster Information
    • /
    • v.9 no.1
    • /
    • pp.65-77
    • /
    • 2013
  • There are many institutes which manage the disaster protection resources in their system. The system of the institutes is not mutually compatible, because there is no standard framework of the classification and identification for the disaster management resources. NIMS of FEMA defines the classification and identification framework for the incident resources. All incidents management system of USA including IRIS and webEOC follows the standard resources framework. The aim of the classification and identification of the resources provides the resources list for the disaster and supports to find the resources information efficiently. In this study, we defined the classification and identification of the resources considering the compatibility with the international standard and the field requirements.

Analysis of Changes in Contents of Home Management Part in Home Economics Textbooks for Middle School (교육과정 시기에 따른 중학교 가정교과서 가정관리분야 단원의 내용 변천)

  • Lee Yon-Suk
    • Journal of Family Resource Management and Policy Review
    • /
    • v.10 no.2
    • /
    • pp.19-42
    • /
    • 2006
  • The purpose of this study is to analyze the changes in contents of home management part in the home economics textbooks fur middle school from the 1st to the 7th curriculum period. The contents in the all of home economics textbooks published in every curriculum period are analyzed. The major findings of this study are as follows: 1. The part of home management is divided into seven specific areas including 'definition and process of home management', 'utilization of family resource and environment management', 'time management', 'household labor/work nanagement', 'family financial management', 'purchasing', and 'consumer protection'. 2. From the 6th curriculum period, the area of 'definition and process of home management' begun to be explained using system's approach and the area of 'household labor/work management' changed its' focus from household to self management. 3. The areas emphasized in the beginning of curriculum period were 'family financial management' and 'household labor/work management'. The 'consumer protection' ' and 'utilization of family resource and environment management' were the areas emphasized in the later curriculum period. 4. The contents of 'family financial management' area have changed very little, however, the contents of 'purchasing' area have changed a lot during the all curriculum periods. 5. The contents of illustrations, tables, pictures, and activities have changed according to changes of the contents of the textbooks.

  • PDF

A Study on the City Wall Ruins Preservation and Management of China (중국 성곽유적의 보존 및 관리)

  • Kang, Tai-Ho;Li, Ao-Fei
    • Journal of architectural history
    • /
    • v.26 no.5
    • /
    • pp.27-38
    • /
    • 2017
  • The main objective of this study is to analyze the preservation and management for the city wall ruins of China, and to find out the implications. Firstly, Chinese walls have experienced a process from demolition to protection. The walls of the historical value of the site are gradually being certified, and many walls ruins were designated as a conservation unit. Secondly, China's institutional system is based on the central government issued Cultural Relics P rotection Law and combined with the actual situation of local governments to establish a special law. Management System is Cultural Relics Bureau, the planning department, the garden department and the tourism sector joint implementation. Thirdly, through the study of Nanjing, Xian, Pingyao, Suzhou city wall ruins finding that perfect legislation and unified management system to help protect city wall ruins.