• Title/Summary/Keyword: Protection and Management System

Search Result 1,284, Processing Time 0.036 seconds

Study on the integrated information system of Sapporo subway (삿포로 지하철 종합정보시스템에 관한 고찰)

  • Cho, B.K.
    • Proceedings of the KIEE Conference
    • /
    • 2004.10a
    • /
    • pp.237-239
    • /
    • 2004
  • Sapporo subway sets up the integrated information system to be aim at the effective and automatic work from the first time. They are expanding integrated system by introducing IT into Serve system positively which developed for recent several years. To keep up with the big size and high speed of information according to integrated system,. the integrated transmission line system which is basic of the integrated system is changed into the system which apply the newest technology. Also, they are aimed at the next generation traffic system through the cooperation of the local administration, for example, test of the multipurpose card using non-contact IC card. This study reviewed the present state of Sapporo subway, the upgrade of information transmission system, and the function of each serve system those are the order of equipment, management of the running, management of the disaster presentation, signal protection, passenger management etc.

  • PDF

A Study on the Records Management System through the Public Records Management Act in the United States: Focused on the Federal and State (미국 공공기록관리법(PRA)을 통한 기록관리 제도에 관한 연구: 연방과 주를 중심으로)

  • Jo, Aeran;Kim, Minkyung;Youn, Eunha
    • Journal of Korean Society of Archives and Records Management
    • /
    • v.19 no.2
    • /
    • pp.213-241
    • /
    • 2019
  • This study looked at the US records management system through the US Records Management Act and derived the characteristics of US records management. The federal and state of the United States were compared to identify the characteristics within the US administrative system. Also, the composition and content of the US Records Management Act were analyzed according to the records management process. As a result, US records management has characteristics of recognizing federal and state independence, yet maintaining cooperative relations between agencies for the protection of permanent values.

The Study on the Actual Examination of the Bidirectional Protection Device in the 22.9[kV] Distribution Power System Interconnected with the DG (분산전원이 연결된 22.9[kV] 배전계통의 양방향 보호기기 실증시험 연구)

  • Lee, Heung-Jae;Choi, Myeong-Ho
    • Journal of the Korean Institute of Illuminating and Electrical Installation Engineers
    • /
    • v.25 no.10
    • /
    • pp.102-108
    • /
    • 2011
  • The existing power flow has a single direction to the line end but the bidirectional power flow will possibly occur depending on the output capacity in the 22.9[kV] distribution power system connected with the dispersed generation(DG). So these characteristics would influence the power system management. The DG have many advantages such as assistance source, Load share etc. So the utility must apply the bidirectional protection system so as to maximize an advantage of DG. This paper describes the field test case of bidirectional protective device in order to investigate the device performance when applied to bidirectional power system. We have tested in the power system test site of KEPCO and these tests provide the basis for performance verification test of bidirectional protective device in the power system.

The Industrial Security along with the International Transfer of Technology (국제기술이전계약에서의 산업보안에 관한 연구)

  • SEO, Jung-Doo
    • THE INTERNATIONAL COMMERCE & LAW REVIEW
    • /
    • v.76
    • /
    • pp.1-20
    • /
    • 2017
  • The industrial technology (including trade secrets), which is commonly understood as systematic and applied technical knowledge, can be transferred to third parties by contracting for the transfer of technology or by granting of a licence. The activity of industrial espionage, due to the gradual increase of the economic interests of intellectual property, is displaying intensively in order to gain advanced technology information. With our outstanding high technology, but compared to the level of the advanced countries, the technical protection systems, the legal protection measures and the systematic management thereof may still be insufficient. Our industrial technology outflow abroad, due to the vulnerability to the security control system in our country, has been increasing since the 2000. Computer software and SNS, such as smart devices, appear as a rapid change in the technical information environment. In order to minimize the dead zone of a new industrial security, the country's organic activity is being conducted. In 2006, Industrial Technology Outflow Prevention and Protection Law was enacted, which emphasized the responsibilities of the country. In this paper for the economic entity's efforts to prevent technology leakage oversea, I have looked to how the industrial technology can be protected in terms of national security and economic benefits of our enterprises. To solve the above-mentioned problems hereof, Korean government should willingly establish a reliable legal system for supporting to enterprise's operations, and Korean companies should autonomously introduce a synthetic technology protection system and incorporate the confidentiality clauses in an international transfer of technology agreement with third parties.

  • PDF

A Study on Construction of Disaster Management System at a Large-scale Concert (대형공연 시 재난관리시스템의 구축에 관한 연구)

  • Min, Se Hong
    • Journal of the Korea Safety Management & Science
    • /
    • v.15 no.4
    • /
    • pp.17-24
    • /
    • 2013
  • On this study, we extracted pending problem and controversial point from management of disaster such as terror for domestic massive performance and then, investigated countermeasure plan against disaster for massive performance through comparison and analysis between anti-disaster strategy of Korea and U.S. U.S are conducting security system actively for passenger of major facilities such as public institution. Nonetheless, In U.S that has the world's best security system, serious affair such as 911 terror and Boston marathon terror are continued to happen. When considering domestic situation that North Korea and South Korea are antagonistic to each other, it is judged when it is high time to prepare for threat of terrorism. Accordingly, On this study, through analyzing of latest terror attacks in U.S and disaster risk in the nation, we analyzed in detail countermeasure plan classified as legislation, operation of security system, instilling a sense. As the result of this analyzing, using by flow-chart, we suggested domestic optimized disaster management system for massive performance. Consequently, we propose to establish systematized disaster management system such as preliminary survey of disaster influence for massive performance.

An Evaluation Study on the Copyright Protection Environment for Digital Libraries (디지털도서관의 저작권보호 환경 평가 연구)

  • 이종문
    • Journal of the Korean Society for information Management
    • /
    • v.19 no.3
    • /
    • pp.211-326
    • /
    • 2002
  • This study is to analyze and evaluate copyright protection environment in digital reproduction and transmission, find out problems involved. and suggest recommendations for improvement. Data was collected 50 libraries to which digital reproduction and transmission is permitted under the Copyright Act were surveyed to examine the present states of digitalization and the systems employed. Also, library users, sampled from 5 libraries carrying out all the 6 technical measures obliged by the Copyright Act, were surveyed to examine their use of digital materials and perception on the copyright. After reviewing descriptive statistics, frequency and cross-tabulation analysis were made. The results of the analysis are most of the libraries. except for the industry university libraries, have implemented digital library systems, but the introduction rate of both digital reproduction system and transmission system are high (68.0% and 84.0%. respectively), while that of copyright protection system was low (26.0%). 84.0% of the libraries surveyed digitalize the full text, but the Libraries have digital collection less than 5,000 items, and only 33.3% of them digitalize materials with securing the copyrights. Regulations on copyright protections are not obliged properly. and it appeared that not only users' perception and perception of copyright as well as their use of electronic books are relatively low.

A Design and Implementation of Interoperable DRM System Based on DMP (DMP 기반의 상호운용 가능한 DRM 시스템 설계 및 구현)

  • Cho, Tae-Beom;Lee, Sang-Jo;Jung, Hoe-Kyung
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.11 no.5
    • /
    • pp.860-867
    • /
    • 2007
  • Digital Contents are increasing the modification of the contents by individual user and the modified or copied contents are simply distributed though the ultrahigh speed internet and the negative pervasive effect on the contents market is increasing. The solutions for copyright protection from illegally distributing contents are developing by various standardization groups and contents manufacturers and its commercia use is partly practiced. The MPEG was developing the IPMP technique to apply existed MPEG standards as a way of digital contents protection. However, as these IPMP techniques did not provide a satisfactory function for contents protection, the DMP standard was suggested as an alternative plan. In this paper, the system is designed and materialized to apply the TooIPack concept of DMP which ensure the interoperability of DRM system. With this paper, it is expected that the practical use and the possibility of the DMP standard in the DRM market would be verified and DMP standard may presents as a reference model for more systematic standardization operations.

Quality Evaluation Model for Intrusion Detection System based on Security and Performance (보안성과 성능에 따른 침입탐지시스템의 품질평가 모델)

  • Lee, Ha-Young;Yang, Hae-Sool
    • Journal of Digital Convergence
    • /
    • v.12 no.6
    • /
    • pp.289-295
    • /
    • 2014
  • Intrusion detection system is a means of security that detects abnormal use and illegal intension in advance in real time and reenforce the security of enterprises. Performance of intrusion detection system is judged by information collection, intrusion analysis, intrusion response, review and protection of intrusion detection result, reaction, loss protection that belong to the area of intrusion detection. In this paper, we developed a evaluation model based on the requirements of intrusion detection system and ISO international standard about software product evaluation.

The Medical Information Protection and major Issues (의료정보 유출의 문제점과 의료정보보호)

  • Jeun, Young-Ju
    • Journal of the Korea Society of Computer and Information
    • /
    • v.17 no.12
    • /
    • pp.251-258
    • /
    • 2012
  • The protection of medical information by major Issues on medical information to protect the individuals' privacy on medical information. Especially, Issues of medical service information, medical record, insurance, employment, Genetic technology including genetic test and screening, gene therapy and genetic enhancement is developing rapidly. Defensibility of medical information documentation is tested in the courts. medical information can be illicitly accessed from anywhere and transmitted across the quickly and with risk of detection. Once data is distributed on the internet, it may become available to anyone who wishes to purchase it, and it cannot be expunge. Patient privacy protection of medical information is controlled mostly by patient consent laws that define how and when a patient must consent before a physician may disclose the patient's medical information to anyone else. enterprise that offers consumers commodities or services is checking problem about customer information of management system is checking problem about customer information of management system essentially. Therefore, in this paper will find a way out to Protection of medical information by major Issues on medical information.