• Title/Summary/Keyword: Research Security

Search Result 6,380, Processing Time 0.057 seconds

An Analysis on Climate Change and Military Response Strategies (기후변화와 군 대응전략에 관한 연구)

  • Park Chan-Young;Kim Chang-Jun
    • The Journal of the Convergence on Culture Technology
    • /
    • v.9 no.2
    • /
    • pp.171-179
    • /
    • 2023
  • Due to man-made climate change, global abnormal weather phenomena have occurred, increasing disasters. Major developed countries(military) are preparing for disasters caused by extreme weather appearances. However, currently, disaster prevention plans and facilities have been implemented based on the frequency and intensity method based on statistical data, it is not enough to prepare for disasters caused by frequent extreme weather based on probability basis. The U.S. and British forces have been the fastest to take research and policy approaches related to climate change and the threat of disaster change, and are considering both climate change mitigation and adaptation. The South Korean military regards the perception of disasters to be storm and flood damage, and there is a lack of discussion on extreme weather and disasters due to climate change. In this study, the process of establishing disaster management systems in developed countries(the United States and the United Kingdom) was examined, and the response policies of each country(military) were analyzed using literature analysis techniques. In order to maintain tight security, our military should establish a response policy focusing on sustainability and resilience, and the following three policy approaches are needed. First, it is necessary to analyze the future operational environment of the Korean Peninsula in preparation for the environment that will change due to climate change. Second, it is necessary to discuss climate change 'adaptation policy' for sustainability. Third, it is necessary to prepare for future disasters that may occur due to climate change.

Considerations for Implementing Online Art-Based Peer Supervision (온라인 미술기반 동료 슈퍼비전 실행에 대한 고려사항)

  • Yoon, Ra-Mi;Kim, Soo-In;Jung, HeeJae
    • The Journal of the Korea Contents Association
    • /
    • v.22 no.5
    • /
    • pp.404-415
    • /
    • 2022
  • The purpose of this study is to propose considerations to help actual application based on the characteristics of the online art-based peer supervision execution process. Colleagues in the clinical art therapy doctoral program, including the researcher, attempted to repeatedly identify problems and apply improvements in the implementation process as research participants, and qualitatively analyzed the various data collected in the process. Looking at the characteristics of the analysis results, extensibility of materials and space was confirmed in terms of 'art-based' and initiative, convenience, and speed in terms of 'online'. The considerations identified through this are as follows. First, 'pre-structuring' should be based on clear boundaries and setting, prior consultation of the group, and self-directed preparation and attitude. Second, for the 'structural aspect of art', space and media to help immersion through creation, and stable implementation structure should be established. Third, in the 'technical aspect', it is necessary to apply a method that can deliver a work of art and a method that can communicate the creator's clear intention. Lastly, for the 'ethical aspect', it is necessary to use online software in accordance with the minimum security standards and to make efforts to repeatedly maintain confidentiality. This study is meaningful in that it suggested a practical method for maintaining the professional competence of art therapists and expanding networks among art therapists in various situations including pandemics.

The Characteristics of Firefighter Burn Injuries in a Burn Center: A Retrospective Epidemiological Study (소방관 화상 환자의 화상수상특징에 대한 1개 화상전문병원에서의 예비조사)

  • Kim, Hyeongtae;Kang, Gu Hyun;Jang, Yong Soo;Kim, Wonhee;Choi, Hyun Young;Kim, Jae Guk;Kim, Minji;You, Ki Cheol;Kim, Dohern;Yim, Haejun;Bang, Sung Hwan;Lee, Chang Sub
    • Journal of the Korean Burn Society
    • /
    • v.19 no.1
    • /
    • pp.12-15
    • /
    • 2016
  • Purpose: Firefighters are vulnerable to burn injury during firefighting. In extensive fires, conducted heat and radiant heat can cause burn injury even though firefighters are not directly exposed to fire. There has been increasing interest in the health problems of firefighters considerably since Hongje-dong fire of 2001, which claimed the lives of six fireman. However, there have been no studies done on the characteristics of firefighter burn injuries in South Korea. Therefore, we investigated the characteristics of firefighter burn injuries in a burn center. Methods: A retrospective, single-center research was performed between Jan 2006 to Dec 2015. 24 firefighters came to the burn center. The electronic medical records of patients were reviewed. Results: Flame burns (87.5%) were the major cause of burn in firefighter. All the patients suffered second-degree or third-degree burns. Mean burn size was 6.1±6.7%. 22 of 24 patients were hospitalized and 2 of 22 hospitalized patients admitted to intensive care unit. Mean length of hospitalization was 29.1±23.7 days and mean length of intensive care unit hospitalization was 6.0±1.4 days. The face was the site most commonly burned, representing 25.8% of injuries. The hand/wrist, upper extremity, and neck were the next largest groups, with 19.4, 12.9, 11.3% of the injuries, respectively. Conclusion: Firefighter burn injuries occur to predictable anatomic sites with common injury patterns. The burn size was small but, admitted patients need about 30 days of hospitalization.

A Study on the Housing Environment in Farms for Practical Field Training of Young Farmers Focusing on the Farms for Practical Field Training of Korea National College of Agriculture and Fisheries (청년농업인의 현장실습장 주거환경에 관한 연구 -한국농수산대학 장기현장실습장을 중심으로-)

  • Joo, J.S.;Hwang, I.U.;Kim, J.S.;Kim, S.D.;Song, C.Y.
    • Journal of Practical Agriculture & Fisheries Research
    • /
    • v.20 no.1
    • /
    • pp.125-143
    • /
    • 2018
  • The study consisted of a survey of the residential satisfaction level of the 3rd grade students and a survey of accessibility from farms for practical field training to public facilities. According to the geographical location of the farms on the map, the average distance to facilities related to convenience or safety and health that students complained was about 12km. And that to social and public facilities was about 4.4km. Students pointed out the convenience of using transportation, commercial and convenient facilities, and the safety of anti-crime security facilities as complaints during the practice session. Residential satisfaction levels in five realms, such as facility and structure, convenience, safety, comfort and sociality, were not all reached at the satisfaction level. In particular, the satisfaction level of female students was sub-normal in the safety and convenience realms. The average satisfaction levels reviewed by department were sub-normal for horse industry and floriculture departments. By residential patterns, satisfaction with sharing with the farmers was higher than with other patterns. And satisfaction level by housing structure was much lower in the assembly and container structures Since residential satisfaction level is determined by the inside and outside environment of the dwelling, college should provide students with accurate and vivid data using information communication technologies.

A Study on the Derivation of Port Safety Risk Factors Using by Topic Modeling (토픽모델링을 활용한 항만안전 위험요인 도출에 관한 연구)

  • Lee Jeong-Min;Kim Yul-Seong
    • Journal of Korea Port Economic Association
    • /
    • v.39 no.2
    • /
    • pp.59-76
    • /
    • 2023
  • In this study, we tried to find out port safety from various perspectives through news data that can be easily accessed by the general public and domestic academic journal data that reflects the insights of port researchers. Non-negative Matrix Factorization(NMF) based topic modeling was conducted using Python to derive the main topics for each data, and then semantic analysis was conducted for each topic. The news data mainly derived natural and environmental factors among port safety risk factors, and the academic journal data derived security factors, mechanical factors, human factors, environmental factors, and natural factors. Through this, the need for strategies to strengthen the safety of domestic ports, such as strengthening the resilience of port safety, improve safety awareness to broaden the public's view of port safety, and conduct research to develop the port industry environment into a safe and specialized mature port. As a result, this study identified the main factors to be improved and provided basic data to develop into a mature port with a port safety culture.

Detecting Adversarial Examples Using Edge-based Classification

  • Jaesung Shim;Kyuri Jo
    • Journal of the Korea Society of Computer and Information
    • /
    • v.28 no.10
    • /
    • pp.67-76
    • /
    • 2023
  • Although deep learning models are making innovative achievements in the field of computer vision, the problem of vulnerability to adversarial examples continues to be raised. Adversarial examples are attack methods that inject fine noise into images to induce misclassification, which can pose a serious threat to the application of deep learning models in the real world. In this paper, we propose a model that detects adversarial examples using differences in predictive values between edge-learned classification models and underlying classification models. The simple process of extracting the edges of the objects and reflecting them in learning can increase the robustness of the classification model, and economical and efficient detection is possible by detecting adversarial examples through differences in predictions between models. In our experiments, the general model showed accuracy of {49.9%, 29.84%, 18.46%, 4.95%, 3.36%} for adversarial examples (eps={0.02, 0.05, 0.1, 0.2, 0.3}), whereas the Canny edge model showed accuracy of {82.58%, 65.96%, 46.71%, 24.94%, 13.41%} and other edge models showed a similar level of accuracy also, indicating that the edge model was more robust against adversarial examples. In addition, adversarial example detection using differences in predictions between models revealed detection rates of {85.47%, 84.64%, 91.44%, 95.47%, and 87.61%} for each epsilon-specific adversarial example. It is expected that this study will contribute to improving the reliability of deep learning models in related research and application industries such as medical, autonomous driving, security, and national defense.

AutoML Machine Learning-Based for Detecting Qshing Attacks Malicious URL Classification Technology Research and Service Implementation (큐싱 공격 탐지를 위한 AutoML 머신러닝 기반 악성 URL 분류 기술 연구 및 서비스 구현)

  • Dong-Young Kim;Gi-Seong Hwang
    • Smart Media Journal
    • /
    • v.13 no.6
    • /
    • pp.9-15
    • /
    • 2024
  • In recent trends, there has been an increase in 'Qshing' attacks, a hybrid form of phishing that exploits fake QR (Quick Response) codes impersonating government agencies to steal personal and financial information. Particularly, this attack method is characterized by its stealthiness, as victims can be redirected to phishing pages or led to download malicious software simply by scanning a QR code, making it difficult for them to realize they have been targeted. In this paper, we have developed a classification technique utilizing machine learning algorithms to identify the maliciousness of URLs embedded in QR codes, and we have explored ways to integrate this with existing QR code readers. To this end, we constructed a dataset from 128,587 malicious URLs and 428,102 benign URLs, extracting 35 different features such as protocol and parameters, and used AutoML to identify the optimal algorithm and hyperparameters, achieving an accuracy of approximately 87.37%. Following this, we designed the integration of the trained classification model with existing QR code readers to implement a service capable of countering Qshing attacks. In conclusion, our findings confirm that deriving an optimized algorithm for classifying malicious URLs in QR codes and integrating it with existing QR code readers presents a viable solution to combat Qshing attacks.

The impact of stress coping on life satisfaction in very old adults: Focusing on the mediating effects of social support (초고령 노인의 스트레스 대처방안이 삶의 만족도에 미치는 영향: 사회적 지지의 매개효과를 중심으로)

  • Hyun-Ah Jung;Hyun-Seung Park
    • Industry Promotion Research
    • /
    • v.9 no.1
    • /
    • pp.123-132
    • /
    • 2024
  • The purpose of this study was to improve the understanding of stress coping in the very old and elderly and to improve life satisfaction through stress reduction as the population ages. To this end, this study aimed to test the mediating effect of social support on the relationship between stress coping and life satisfaction among very old people. In particular, we paid attention to the differences in stress coping from the existing elderly population and took the view that they should be studied as an independent group. To confirm this, we analysed 275 men and women aged 85 years and older who responded to the fifth supplementary survey of the National Elderly Security Panel (KReIS) conducted by the National Pension Service. IBM SPSS 26 was used to test the mediating effect of social support on the effect of stress coping measures on life satisfaction in the very old elderly. The results of the significance test of the independent variables on the mediating variable showed that stress coping was positively significant, i.e., the higher the level of stress coping, the higher the life satisfaction. In addition, the results of the significance test of the effects of the independent variables and mediators on the dependent variable showed that coping with stress had a significant effect, and the mediator, social support, also had a significant effect on life satisfaction. Therefore, this study suggests the need for social support to improve the level of life satisfaction through coping with stress in the very old elderly.

Risks and Network Effect upon Cloud ERP Investments: Real Options Approach (위험 및 네트워크 효과가 클라우드 ERP 투자에 미치는 효과에 대한 연구)

  • Seunghyeon Nam;Taeha Kim
    • Information Systems Review
    • /
    • v.20 no.4
    • /
    • pp.43-57
    • /
    • 2018
  • We propose network effects upon the investment decision of cloud-based ERP. Using the survey data collected from 82 companies in 2015, we examine whether IT managers have an intention to adopt real options in order to manage the risk of cloud-based ERP investments and how the network effects influence upon the intention to adopt real options. Based on prior literature, we propose a research model with 4 hypotheses. We find partial support of the hypotheses from the empirical analysis: technological risks has a positive impact upon the adoption of real options such as defer, contract, and abandon. In contrast, we find no significant impact of security risks upon real options. We validate positive network effects upon the adoption of real options such as defer, contract, and abandon. This work empirically find that IT managers in Korean middle and small sized firms have an intention to adopt real options when the managers realize economic, technological, and relationship risks and when they expect network effects.

A Study to Improve the Trustworthiness of Data Repositories by Obtaining CoreTrustSeal Certification (CoreTrustSeal 인증 획득을 통한 데이터 리포지토리의 신뢰성 향상을 위한 연구)

  • Hea Lim Rhee;Jung-Ho Um;Youngho Shin;Hyung-jun Yim;Na-eun Han
    • Journal of the Korean Society for information Management
    • /
    • v.41 no.2
    • /
    • pp.245-268
    • /
    • 2024
  • As the recognition of data's value increases, the role of data repositories in managing, preserving, and utilizing data is becoming increasingly important. This study investigates ways to enhance the trustworthiness of data repositories through obtaining CoreTrustSeal (CTS) certification. Trust in data repositories is critical not only for data protection but also for building and maintaining trust between the repository and stakeholders, which in turn affects researchers' decisions on depositing and utilizing data. The study examines the CoreTrustSeal, an international certification for trustworthy data repositories, analyzing its impact on the trustworthiness and efficiency of repositories. Using the example of DataON, Korea's first CTS-certified repository operated by the Korea Institute of Science and Technology Information (KISTI), the study compares and analyzes four repositories that have obtained CTS certification. These include DataON, the Physical Oceanography Distributed Active Archive Center (PO.DAAC) from NASA, Yareta from the University of Geneva, and the DARIAH-DE repository from Germany. The research assesses how these repositories meet the mandatory requirements set by CTS and proposes strategies for improving the trustworthiness of data repositories. Key findings indicate that obtaining CTS certification involves rigorous evaluation of organizational infrastructure, digital object management, and technological aspects. The study highlights the importance of transparent data processes, robust data quality assurance, enhanced accessibility and usability, sustainability, security measures, and compliance with legal and ethical standards. By implementing these strategies, data repositories can enhance their reliability and efficiency, ultimately promoting wider data sharing and utilization in the scientific community.