• Title/Summary/Keyword: Public Financial Security

Search Result 151, Processing Time 0.026 seconds

Spatial and temporal trends in food security during the COVID-19 pandemic in Asia Pacific countries: India, Indonesia, Myanmar, and Vietnam

  • Yunhee Kang;Indira Prihartono;Sanghyo Kim;Subin Kim;Soomin Lee;Randall Spadoni;John McCormack;Erica Wetzler
    • Nutrition Research and Practice
    • /
    • v.18 no.1
    • /
    • pp.149-164
    • /
    • 2024
  • BACKGROUND/OBJECTIVES: The economic recession caused by the coronavirus disease 2019 pandemic disproportionately affected poor and vulnerable populations globally. Better uunderstanding of vulnerability to shocks in food supply and demand in the Asia Pacific region is needed. SUBJECTS/METHODS: Using secondary data from rapid assessment surveys during the pandemic response (n = 10,420 in mid-2020; n = 6,004 in mid-2021) in India, Indonesia, Myanmar, and Vietnam, this study examined the risk factors for reported income reduction or job loss in mid-2021 and the temporal trend in food security status (household food availability, and market availability and affordability of essential items) from mid-2020 to mid-2021. RESULTS: The proportion of job loss/reduced household income was highest in India (60.4%) and lowest in Indonesia (39.0%). Urban residence (odds ratio [OR] range, 2.20-4.11; countries with significant results only), female respondents (OR range, 1.40-1.69), engagement in daily waged labor (OR range, 1.54-1.68), and running a small trade/business (OR range, 1.66-2.71) were significantly associated with income reduction or job loss in three out of 4 countries (all P < 0.05). Food stock availability increased significantly in 2021 compared to 2020 in all four countries (OR range, 1.91-4.45) (all P < 0.05). Availability of all essential items at markets increased in India (OR range, 1.45-3.99) but decreased for basic foods, hygiene items, and medicine in Vietnam (OR range, 0.81-0.86) in 2021 compared to 2020 (all P < 0.05). In 2021, the affordability of all essential items significantly improved in India (OR range, 1.18-3.49) while the affordability of rent, health care, and loans deteriorated in Indonesia (OR range, 0.23-0.71) when compared to 2020 (all P < 0.05). CONCLUSIONS: Long-term social protection programs need to be carefully designed and implemented to address food insecurity among vulnerable groups, considering each country's market conditions, consumer food purchasing behaviors, and financial support capacity.

A Study on Countermeasures against North Korea's Cyber Attack (북한 사이버공격에 대한 대응방안에 관한 연구)

  • Jung, Yeong Do;Jeong, Gi Seog
    • Convergence Security Journal
    • /
    • v.16 no.6_1
    • /
    • pp.43-50
    • /
    • 2016
  • As North Korea has a sufficient ability to attack our society's vulnerable computer network, various large-scale cyber attacks are expected to be tried. North Korea's cyber military strength is known a world-class level. The number of its cyber agents is increasing consistently. Recently North Korea's cyber attack has been made regardless of trick and target. But up to now North Korea's cyber attack is more of an exploration than a real attack. Its purpose was to check how fast Korea found a problem and recovered from it. In future, cyber attack that damages substantially is highly probable. In case of an attack against national infrastructure like traffic, financial and energy services, the extent of the damage will be great beyond imagination. In this paper, characteristics of recent North Korea's cyber attack is addressed in depth and countermeasures such as the enactment of cyber terror prevention law, simulation training enforcement, private and public cooperation system construction, cyber security infrastructure expansion, etc. are proposed.

Review on improving measurement of cyber terror management system

  • Park, Jong-Ryeol;Noe, Sang-Ouk
    • Journal of the Korea Society of Computer and Information
    • /
    • v.21 no.6
    • /
    • pp.89-96
    • /
    • 2016
  • Damage and attack size of cyber terror is growing to the national size. Not only targeting at a certain companies or individuals but number of cyber terror targeting government bodies or unspecific people is increasing. This is because compared to traditional weapon, input cost is very cheap but ripple effect and shock are much stronger, affecting not only certain groups but also each individuals. 'Anti-terror measurement for protection of nation and public safety' passed last month is one of the renowned measurement passed regardless of objection from opposition party. The opposition party went against this through filibuster for 192 hours but this finally passed National Congress due to lack of oppositions. Korean government is taking post actions after passage of anti-terror measurement. Legislation of enforcement ordinance and regulations is due by 6th of next month. This regulation will be executed from June 4th after legislation. Whenever there is any security issues such as hacking of Korea Hydro and Nuclear Power and National Intelligence Service happens, lot of attention is made to those hackers. However, social recognition or management of those hackers need lot more improvement. Especially, as market of internet of things is increasing, there is an increased anxiety on information security. But as we only rely on security solutions, this problems are keep happening. Therefore, active investment on nurturing hackers who play the role of 'spear and shield' shall be made. Government should put more efforts to allow white hackers to show their abilities. We should have a policy for supporting high-quality programs such as BoB. To make information protection industry into future growth engine, it is necessary to nurture professionals for information protection and white hackers through special programs. Politicians should make related regulations as soon as possible to remove factors that prevent swift management of cyber attack due to lack of legislation. Government should pay lot more financial investment to nurturing professional manpower than now. Protecting life and asset of nation is responsibility and duty of our government. We all should recognize that controlling cyber attack is a part of national defense.

Website Falsification Detection System Based on Image and Code Analysis for Enhanced Security Monitoring and Response (이미지 및 코드분석을 활용한 보안관제 지향적 웹사이트 위·변조 탐지 시스템)

  • Kim, Kyu-Il;Choi, Sang-Soo;Park, Hark-Soo;Ko, Sang-Jun;Song, Jung-Suk
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.24 no.5
    • /
    • pp.871-883
    • /
    • 2014
  • New types of attacks that mainly compromise the public, portal and financial websites for the purpose of economic profit or national confusion are being emerged and evolved. In addition, in case of 'drive by download' attack, if a host just visits the compromised websites, then the host is infected by a malware. Website falsification detection system is one of the most powerful solutions to cope with such cyber threats that try to attack the websites. Many domestic CERTs including NCSC (National Cyber Security Center) that carry out security monitoring and response service deploy it into the target organizations. However, the existing techniques for the website falsification detection system have practical problems in that their time complexity is high and the detection accuracy is not high. In this paper, we propose website falsification detection system based on image and code analysis for improving the performance of the security monitoring and response service in CERTs. The proposed system focuses on improvement of the accuracy as well as the rapidity in detecting falsification of the target websites.

The relationship between precarious work and unmet dental care needs in South Korea: focus on job and income insecurity (한국 노동시장 불안정성과 미충족 치과의료의 관련성: 고용과 소득 불안정성을 중심으로)

  • Che, Xianhua;Park, Hee-Jung
    • Journal of Korean Academy of Oral Health
    • /
    • v.42 no.4
    • /
    • pp.167-174
    • /
    • 2018
  • Objectives: The aim of this study was to analyze the accessibility of dental care services among individuals with precarious employment in South Korea. Methods: We used the $9^{th}$ wave of the Korean Health Panel data (2015) and included 7,736 wage and non-wage earners in our study. We determined precariousness in the labor market as a combination of employment relationship and job income, and categorized individuals based on this into the following four groups: Group A comprising those who report job and income security, Group B comprising those who experience job insecurity alone, Group C comprising those who report a stable job but low income, and Group D comprising those who experience both job and income insecurity. Accessibility to dental care services was determined by experience of unmet dental care needs and unmet dental care needs caused primarily by financial burden. Logistic regression analyses were used to assess the effect of precarious work on access to dental care services. Results: Individuals with job insecurity (Group B; OR=1.445; 95% CI=1.22-1.70) and both job and income insecurity (Group D; OR=1.899; 95% CI=1.61-2.24) were more likely to have unmet needs than the comparison group. Both groups B and D were also 2.048 (95% CI=1.57-2.66) times and 4.435 (95% CI =3.46-5.68) times more likely, respectively, to have unmet dental care needs caused by financial burden. Education status, health insurance, and health status were all also effective factors influencing unmet dental care needs. Conclusions: Unstable employment and low income resulted in diminished access to dental care services. Therefore, governments should consider health policy solutions to reduce barriers preventing individuals with employment and income instability from accessing adequate dental care.

Population Aging and Consumption Inequality in Korea (인구구조의 고령화와 소비격차)

  • Seok, Sanghun
    • 한국노년학
    • /
    • v.30 no.4
    • /
    • pp.1225-1237
    • /
    • 2010
  • This study aims to analyze the factors affecting consumption inequality in the 10 years following the financial crisis, applying the cohort method on the data for the first to the eleventh wave of the Korean Labor and Income Study produced by the Korean Labor Institute. The study found that consumption inequality increased rapidly immediately following the financial crisis, and then decreased gradually until increasing again from 2005 onward. Analyzed in terms of age-time-cohort effects, there was a significant change in consumption inequality around the age of mid-forties, and the decrease in consumption inequality was smaller in the younger generations than in the older ones. This suggests that as the current younger generations age over time, consumption inequality may become greater. Also, when the factors in population-cohort-age effects from 1998 onward are analyzed, the age effect in consumption inequality becomes smaller, whereas the role of the rising average age due to demographic shifts seems to be increasing. This means that consumption inequality may become a serious problem in the rapidly aging society. Therefore, there is a need to consider ways to bolster social security and to provide further public assistance in the low-income retiree.

A Study on the Fraud Detection for Electronic Prepayment using Machine Learning (머신러닝을 이용한 선불전자지급수단의 이상금융거래 탐지 연구)

  • Choi, Byung-Ho;Cho, Nam-Wook
    • The Journal of Society for e-Business Studies
    • /
    • v.27 no.2
    • /
    • pp.65-77
    • /
    • 2022
  • Due to the recent development in electronic financial services, transactions of electronic prepayment are rapidly growing, leading to growing fraud attempts. This paper proposes a methodology that can effectively detect fraud transactions in electronic prepayment by machine learning algorithms, including support vector machines, decision trees, and artificial neural networks. Actual transaction data of electronic prepayment services were collected and preprocessed to extract the most relevant variables from raw data. Two different approaches were explored in the paper. One is a transaction-based approach, and the other is a user ID-based approach. For the transaction-based approach, the first model is primarily based on raw data features, while the second model uses extra features in addition to the first model. The user ID-based approach also used feature engineering to extract and transform the most relevant features. Overall, the user ID-based approach showed a better performance than the transaction-based approach, where the artificial neural networks showed the best performance. The proposed method could be used to reduce the damage caused by financial accidents by detecting and blocking fraud attempts.

A Study on Establishment and Management of Training Curriculum Integrated Information Network (훈련과정종합정보망 구축 및 운영 방안에 관한 연구)

  • Rha, Hyeon-Mi
    • Journal of Engineering Education Research
    • /
    • v.13 no.1
    • /
    • pp.78-86
    • /
    • 2010
  • Training Curriculum Integrated Information Network is allowed to searching the all curriculums and courses related with training but also is a one stop handling integrated learning system to cover a course registration, learning and analysis of learning performance. Through developing and managing the Training Curriculum Integrated Information Network, it is available to get the various curriculum thus it is for trainers able to enforce the self oriented course choice and then high quality of training could be proposed by the diverse training curriculums and competitions. To manage Training Curriculum Integrated Information Network more effectively, active public relations marketing activities, high reliable correct information service and rich contents are required. It is essential to manage the learner and learning contents supplier, stable financial resources, personal security issue and protecting a copyright of training curriculum to be a successful network system.

  • PDF

The Design of Electronic Payment Protocol Using Dual Signature based on Cardholder's Secret Number (카드사용자의 비밀번호 기반 이중서명을 이용한 전자 지불 프로토콜의 설계)

  • 김성열;이옥빈;배용근
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.3 no.2
    • /
    • pp.411-420
    • /
    • 1999
  • The topic of electronic commerce is a hot issue in computer technology. There are many kinds of risks associated with electronic commerce which performs financial transactions by exchanging electronic information over public networks. Therefore, security factors such as confidentiality, integrity, authentication and non-repudiation should be required to construct secure electronic commerce systems. In this paper, the credit card-based payment protocol applying dual signature is presented. It provides payment information to the bank a cardholder pays to, but conceals ordering information. It also offers ordering information to a merchant, but hides payment information including the card number. Thus, cardholder's private information can be protected. In order to accomplish this, dual signature is performed employing both symmetric method utilizing cardholder's secret number as an encryption key and asymmetric method.

  • PDF

Does Earnings Quality Affect Companies' Performance? New Evidence from the Jordanian Market

  • SALEH, Isam;ABU AFIFA, Malik;ALSUFY, Fares
    • The Journal of Asian Finance, Economics and Business
    • /
    • v.7 no.11
    • /
    • pp.33-43
    • /
    • 2020
  • This study aims to investigate the importance of earnings quality as a determinant of companies' performance. It provides some empirical evidences from an emerging market, specifically from the Jordanian market. This study developed an econometric model for the effect of earnings quality on the companies' performance using empirical evidence. The study employs a panel data analysis method by using a sample of all Jordanian industrial public shareholding companies listed on Amman Stock Exchange (ASE) during 2010-2018. The results reveal that Return on Assets (ROA), Return on Equity (ROE), and Earnings Per Share (EPS) as proxies of company's performance are affected by the earnings quality. This provides the importance of positive earnings quality that eventually influences the companies' performance. The results of this study suggest that the higher control level on the managers' behavior and its outcome will have an effect on earnings quality, and thus the company's performance increases. As well as, high relevance of accounting information will improve earnings quality, and thus earnings quality with the interaction factors of the company's environment work on improving performance. As a conclusion, this study can work as a reference to assist standard setters, security analysts, regulators and other accounting-information users in appraising relation between the earnings quality and companies' performance.