• 제목/요약/키워드: Research Information Systems

Search Result 12,228, Processing Time 0.04 seconds

Development of the Risk Assessment Systems for Management of Sunken Ships (침몰선박의 관리를 위한 위해도 평가시스템 개발)

  • Choi, H.J.;Lew, J.M.;Kim, H.;Lee, S.H.;Kang, C.G.
    • Journal of the Korean Society for Marine Environment & Energy
    • /
    • v.8 no.4
    • /
    • pp.193-202
    • /
    • 2005
  • Marine risk assessment considers events such as collision/grounding, sinking/capsize, fire/explosion and flooding, developing relationships between their causes and effects. In addition, risk assessment of previously sunken ships are also necessary since they continuously have possibility for further oil spill or can cause other marine accidents. The objective of this paper is to develop the risk assessment systems for sunken ships to prevent oil spill and further marine causalities in order to preserve safe and clean oceans around Korea peninsula. The risk assessment systems for sunken ships comprise of database management sub-system for sunken ships, qualitative risk assessment sub-system, quantitative risk assessment sub-system, and cost-benefit analysis subsystem.

  • PDF

Nonlinear primary resonance of multilayer FG shallow shell with an FG porous core reinforced by oblique stiffeners

  • Kamran Foroutan;Liming Dai
    • Structural Engineering and Mechanics
    • /
    • v.91 no.5
    • /
    • pp.503-516
    • /
    • 2024
  • The present research examines the primary resonance (PR) behaviors of oblique stiffened multilayer functionally graded (OSMFG) shallow shells featuring an FG porous (FGP) core under an external excitation. The research considers two distinct types of FGP cores: one characterized by uniform porosity distribution (UPD) and the other by non-uniform porosity distribution (NPD) along the thickness direction. Furthermore, the study explores two types of shallow shells: one with external oblique stiffeners and one with internal oblique stiffeners, which might have angles that are similar or different from each other. Using the stress function alongside the first-order shear deformation theory (FSDT), the research establishes a nonlinear model for OSMFG shallow shells. The strain-displacement relationships are obtained utilizing FSDT and von-Kármán's geometric assumptions. The Galerkin approach is utilized to discretize the nonlinear governing equations, allowing for the analysis of stiffeners at varied angles. To validate the obtained results, a comparison is made not only with the findings of previous research but also with the response of PR obtained theoretically with the method of multiple scales, using the P-T method. Renowned for its superior accuracy and reliability, the P-T method is deemed an apt selection within this framework. Additionally, the study investigates how differences in material characteristics and stiffener angles affect the system's PR behaviors. The results of this study can be used as standards by engineers and researchers working in this area, and they can offer important information for the design and evaluation of the shell systems under consideration.

Simulation of Urban Environments for Disaster Risk Management: Comprehensive Review of Techniques and Future Directions

  • Kieun LEE;Taeyong KIM;Sungkon MOON
    • International conference on construction engineering and project management
    • /
    • 2024.07a
    • /
    • pp.783-790
    • /
    • 2024
  • As cities continue to evolve and expand, the importance of accurately modeling and simulating urban environments to predict and assess various risk scenarios has become increasingly recognized. Since city simulation can capture the intricate dynamics of urban life, the versatility of city simulation has been demonstrated in numerous case studies across diverse applications. Owing to this capacity, city simulation plays a critical role in the disaster risk management field, especially in accounting for the uncertainties in natural/man-made disasters. For example, in the event of an earthquake, having detailed information about an urban area is instrumental for evaluating stakeholder decisions and their impact on urban recovery strategies. Although numerous research efforts have been made to introduce city simulation techniques in disaster risk reduction, there is no clear guideline or comprehensive summary of their characteristics and features. Therefore, this study aims to provide a high-level overview of the latest research and advancements in urban simulation under different hazards. The study begins by examining the simulation techniques used in urban simulation, with a focus on their applicability in disaster scenarios. Subsequently, by analyzing various case studies, this research categorizes them based on their unique characteristics and key findings. The knowledge gained from this literature review will serve as a foundation for subsequent research on simulating the impacts of urban areas under various hazards.

Efforts against Cybersecurity Attack of Space Systems

  • Jin-Keun Hong
    • Journal of Positioning, Navigation, and Timing
    • /
    • v.12 no.4
    • /
    • pp.437-445
    • /
    • 2023
  • A space system refers to a network of sensors, ground systems, and space-craft operating in space. The security of space systems relies on information systems and networks that support the design, launch, and operation of space missions. Characteristics of space operations, including command and control (C2) between space-craft (including satellites) and ground communication, also depend on wireless frequency and communication channels. Attackers can potentially engage in malicious activities such as destruction, disruption, and degradation of systems, networks, communication channels, and space operations. These malicious cyber activities include sensor spoofing, system damage, denial of service attacks, jamming of unauthorized commands, and injection of malicious code. Such activities ultimately lead to a decrease in the lifespan and functionality of space systems, and may result in damage to space-craft and, lead to loss of control. The Cybersecurity Adversarial Tactics, Techniques, and Common Knowledge (ATT&CK) matrix, proposed by Massachusetts Institute of Technology Research and Engineering (MITRE), consists of the following stages: Reconnaissance, Resource Development, Initial Access, Execution, Persistence, Privilege Escalation, Defense Evasion, Credential Access, Discovery, Lateral Movement, Collection, Command & Control, Exfiltration, and Impact. This paper identifies cybersecurity activities in space systems and satellite navigation systems through the National Institute of Standards and Technology (NIST)'s standard documents, former U.S. President Trump's executive orders, and presents risk management activities. This paper also explores cybersecurity's tactics attack techniques within the context of space systems (space-craft) by referencing the Sparta ATT&CK Matrix. In this paper, security threats in space systems analyzed, focusing on the cybersecurity attack tactics, techniques, and countermeasures of space-craft presented by Space Attack Research and Tactic Analysis (SPARTA). Through this study, cybersecurity attack tactics, techniques, and countermeasures existing in space-craft are identified, and an understanding of the direction of application in the design and implementation of safe small satellites is provided.

The Impact of CPO Characteristics on Organizational Privacy Performance (개인정보보호책임자의 특성이 개인정보보호 성과에 미치는 영향)

  • Wee, Jiyoung;Jang, Jaeyoung;Kim, Beomsoo
    • Asia pacific journal of information systems
    • /
    • v.24 no.1
    • /
    • pp.93-112
    • /
    • 2014
  • As personal data breach reared up as a problem domestically and globally, organizations appointing chief privacy officers (CPOs) are increasing. Related Korean laws, 'Personal Data Protection Act' and 'the Act on Promotion of Information and Communication Network Utilization and Information Protection, etc.' require personal data processing organizations to appoint CPOs. Research on the characteristics and role of CPO is called for because of the importance of CPO being emphasized. There are many researches on top management's role and their impact on organizational performance using the Upper Echelon theory. This study investigates what influence the characteristics of CPO gives on the organizational privacy performance. CPO's definition varies depending on industry, organization size, required responsibility and power. This study defines CPO as 'a person who takes responsibility for all the duties on handling the organization's privacy,' This research assumes that CPO characteristics such as role, personality and background knowledge have an influence on the organizational privacy performance. This study applies the part relevant to the upper echelon's characteristics and performance of the executives (CEOs, CIOs etc.) for CPO. First, following Mintzberg and other managerial role classification, information, strategic, and diplomacy roles are defined as the role of CPO. Second, the "Big Five" taxonomy on individual's personality was suggested in 1990. Among these five personalities, extraversion and conscientiousness are drawn as the personality characteristics of CPO. Third, advance study suggests complex knowledge of technology, law and business is necessary for CPO. Technical, legal, and business background knowledge are drawn as the background knowledge of CPO. To test this model empirically, 120 samples of data collected from CPOs of domestic organizations are used. Factor analysis is carried out and convergent validity and discriminant validity were verified using SPSS and Smart PLS, and the causal relationships between the CPO's role, personality, background knowledge and the organizational privacy performance are analyzed as well. The result of the analysis shows that CPO's diplomacy role and strategic role have significant impacts on organizational privacy performance. This reveals that CPO's active communication with other organizations is needed. Differentiated privacy policy or strategy of organizations is also important. Legal background knowledge and technical background knowledge were also found to be significant determinants to organizational privacy performance. In addition, CPOs conscientiousness has a positive impact on organizational privacy performance. The practical implication of this study is as follows: First, the research can be a yardstick for judgment when companies select CPOs and vest authority in them. Second, not only companies but also CPOs can judge what ability they should concentrate on for development of their career relevant to their job through results of this research. Cultural social value, citizen's consensus on the right to privacy, expected CPO's role will change in process of time. In future study, long-term time-series analysis based research can reveal these changes and can also offer practical implications for government and private organization's policy making on information privacy.

User Perception of Personal Information Security: An Analytic Hierarch Process (AHP) Approach and Cross-Industry Analysis (기업의 개인정보 보호에 대한 사용자 인식 연구: 다차원 접근법(Analytic Hierarch Process)을 활용한 정보보안 속성 평가 및 업종별 비교)

  • Jonghwa Park;Seoungmin Han;Yoonhyuk Jung
    • Information Systems Review
    • /
    • v.25 no.4
    • /
    • pp.233-248
    • /
    • 2023
  • The increasing integration of intelligent information technologies within organizational systems has amplified the risk to personal information security. This escalation, in turn, has fueled growing apprehension about an organization's capabilities in safeguarding user data. While Internet users adopt a multifaceted approach in assessing a company's information security, existing research on the multiple dimensions of information security is decidedly sparse. Moreover, there is a conspicuous gap in investigations exploring whether users' evaluations of organizational information security differ across industry types. With an aim to bridge these gaps, our study strives to identify which information security attributes users perceive as most critical and to delve deeper into potential variations in these attributes across different industry sectors. To this end, we conducted a structured survey involving 498 users and utilized the analytic hierarchy process (AHP) to determine the relative significance of various information security attributes. Our results indicate that users place the greatest importance on the technological dimension of information security, followed closely by transparency. In the technological arena, banks and domestic portal providers earned high ratings, while for transparency, banks and governmental agencies stood out. Contrarily, social media providers received the lowest evaluations in both domains. By introducing a multidimensional model of information security attributes and highlighting the relative importance of each in the realm of information security research, this study provides a significant theoretical contribution. Moreover, the practical implications are noteworthy: our findings serve as a foundational resource for Internet service companies to discern the security attributes that demand their attention, thereby facilitating an enhancement of their information security measures.

The Determinants Towards the Use of University Smartphone Application's System: Focused on Mobile Environments (대학행정 어플리케이션 이용에 미치는 결정요인: 모바일 환경을 중심으로)

  • Son, Dal-Ho;Park, Jun Woo
    • The Journal of Information Systems
    • /
    • v.22 no.1
    • /
    • pp.1-27
    • /
    • 2013
  • The advancement of information and communication technology have brought the increase and the diversification of the digitalized information, which can be shared at any time from any place. Especially, with the recent spread of smartphone usage, the amount and the diversity of information have increased to amounts that are difficult to quantify. Within such an era of accelerated accumulation and diversification of digitalized information, the informatization of universities is becoming a critical factor for institutional advancement. Thus, universities are developing smartphone applications to provide easily accessible administration services, and support the information needs of each administration process by keeping a relationship with students from admission to post-graduation. This research systematically defines a university smartphone application, distinguishes its system quality factors, and studies the effects they have on satisfaction, intention of reuse, and intention of electronic word-of-mouth. The results showed that the security factor of system quality did not have a significant effect on satisfaction. The responsiveness and the empathy factors of service quality did not show a significant effect on satisfaction. Moreover, it was found that a higher user satisfaction for smartphone applications has a significant influence on intention of reuse and on the intention of electronic word-of-mouth.

A Plug-in Development for Interworking between SysML Model and Plant Information (SysML모델과 플랜트정보 간 상호연동을 위한 플러그인 개발)

  • Kim, Joon Young;Lee, Tae Kyong;Cha, Jae Min
    • Journal of the Korean Society of Systems Engineering
    • /
    • v.15 no.2
    • /
    • pp.17-30
    • /
    • 2019
  • Due to difficulties in tracking design information of existing document-based configuration management, the research on the development of plant SysML model was started to apply the model-based system engineering methodology to comprehensively manage various design information. However, until now, in order to create the SysML model, the engineers are checking the design information and inputting it to the SysML model. This process requires a lot of time and manpower, it is required to minimize it. Therefore, this study has recognized the problem, a plug-in that extracts the plant design information in the design document and automatically converts the SysML plant model from it. Specifically, the development was performed in the following order. First, the extraction file was selected as the most commonly used Excel file as the plant design document. Next, the design information in the document was analyzed, and extracted information including tag number, name, and the capacity were selected. Finally, the plant SysML model conversion module was implemented. The developed plug-in is confirmed that the task load of the engineers by the SysML model conversion can be minimized and the model can be generated more quickly and accurately.

Analysis of Computational Science and Engineering SW Data Format for Multi-physics and Visualization

  • Ryu, Gimyeong;Kim, Jaesung;Lee, Jongsuk Ruth
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.2
    • /
    • pp.889-906
    • /
    • 2020
  • Analysis of multi-physics systems and the visualization of simulation data are crucial and difficult in computational science and engineering. In Korea, Korea Institute of Science and Technology Information KISTI developed EDISON, a web-based computational science simulation platform, and it is now the ninth year since the service started. Hitherto, the EDISON platform has focused on providing a robust simulation environment and various computational science analysis tools. However, owing to the increasing issues in collaborative research, data format standardization has become more important. In addition, as the visualization of simulation data becomes more important for users to understand, the necessity of analyzing input / output data information for each software is increased. Therefore, it is necessary to organize the data format and metadata for the representative software provided by EDISON. In this paper, we analyzed computational fluid dynamics (CFD) and computational structural dynamics (CSD) simulation software in the field of mechanical engineering where several physical phenomena (fluids, solids, etc.) are complex. Additionally, in order to visualize various simulation result data, we used existing web visualization tools developed by third parties. In conclusion, based on the analysis of these data formats, it is possible to provide a foundation of multi-physics and a web-based visualization environment, which will enable users to focus on simulation more conveniently.

UN-Substituted Video Steganography

  • Maria, Khulood Abu;Alia, Mohammad A.;Alsarayreh, Maher A.;Maria, Eman Abu
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.1
    • /
    • pp.382-403
    • /
    • 2020
  • Steganography is the art of concealing the existence of a secret data in a non-secret digital carrier called cover media. While the image of steganography methods is extensively researched, studies on other cover files remain limited. Videos are promising research items for steganography primitives. This study presents an improved approach to video steganography. The improvement is achieved by allowing senders and receivers exchanging secret data without embedding the hidden data in the cover file as in traditional steganography methods. The method is based mainly on searching for exact matches between the secret text and the video frames RGB channel pixel values. Accordingly, a random key-dependent data is generated, and Elliptic Curve Public Key Cryptography is used. The proposed method has an unlimited embedding capacity. The results show that the improved method is secure against traditional steganography attacks since the cover file has no embedded data. Compared to other existing Steganography video systems, the proposed system shows that the method proposed is unlimited in its embedding capacity, system invisibility, and robustness. The system achieves high precision for data recovery in the receiver. The performance of the proposed method is found to be acceptable across different sizes of video files.