• Title/Summary/Keyword: School security

Search Result 3,325, Processing Time 0.03 seconds

The Development of Air Escort Tactics for High-Value Airborne Assets Using Manned-Unmanned Teaming and the Study on Effective Force Disposition Using M&S (유무인 협업을 활용한 고가치 공중 자산의 호위 전술 개발과 M&S를 활용한 효과적인 전력배치 방안 연구)

  • Park, Myunghwan;Yoo, Seunghoon;Oh, Jihyon;Seol, Hyeonju
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.25 no.4
    • /
    • pp.401-411
    • /
    • 2022
  • As the role of high-value air assets(e.g., AWACS, JSTARS, Rivet Joint, E-2) becomes more critical in modern warfare, the air escort for these assets blocking attacks from any potential enemy fighter also becomes vital. Without the escort, the operations of the assets become restricted. However, such an escort is not always possible due to the limited flight time of the escort fighters. In this paper, we introduce an escort tactics for high-value air assets performed by the manned-unmanned teaming composed of a transport aircraft and UAVs(unmanned aerial vehicles). In this tactics, the transport aircraft plays the role of an aircraft carrier, which carries, launches, and retrieves the UAVs. The missions of UAVs in this tactics are to detect and engage enemy fighters. We also introduce the simulation result of this tactics to identify the UAVs' required capabilities and optimal maneuvering.

The Europeanization of Bulgarian Nationalism: The Impact of Bulgaria's European Union Accession on Bulgarian-Macedonian Relations

  • Benedict E., DeDominicis
    • International Journal of Advanced Culture Technology
    • /
    • v.10 no.4
    • /
    • pp.39-66
    • /
    • 2022
  • Modern Bulgarian nationalists aspired towards incorporating the self-identified Bulgarian lands into the Bulgarian state. The Treaty of San Stefano ending the Russo-Turkish War of 1877-78 tantalizingly achieved these so-called national ideals. Great Power diplomacy quickly diminished Bulgaria's borders and international legal status with the 1878 Treaty of Berlin, exacerbating nationalist grievances. Bulgaria would expand vast resources to restore the San Stefano borders until Balkan Communist authoritarian regimes eventually suppressed the Macedonian issue as a foreign policy subject. Sofia's policy towards its neighbor has been overdetermined by the efforts of successive Bulgarian governments to institutionalize post-communist Bulgaria's own national identity. Bulgaria's integration into so-called Euro-Atlantic structures, i.e., NATO and the EU, had been the primary strategic objective of the Bulgarian authorities since the end of the Zhivkov regime. North Atlantic community security policy aims in response to the earliest post-Cold War foreign policy crises in the Western Balkans framed the parameters of Bulgarian diplomacy. The stabilization of FYROM in 2001, followed by Bulgaria's 2007 EU accession, led to Bulgarian nationalist values become more salient in Bulgarian politics and foreign policy. Sofia-Skopje relations are a test case for the effects of Europeanization on interdependent Balkan ethno-sectarian nationalisms and state territorial institutional development.

Countermeasure against MITM attack Integrity Violation in a BLE Network (BLE 네트워크에서 무결성 침해 중간자 공격에 대한 대응기법)

  • Han, Hyegyeon;Lee, Byung Mun
    • Journal of Korea Multimedia Society
    • /
    • v.25 no.2
    • /
    • pp.221-236
    • /
    • 2022
  • BLE protocol prevents MITM attacks with user interaction through some input/output devices such as keyboard or display. Therefore, If it use a device which has no input/output facility, it can be vulnerable to MITM attack. If messages to be sent to a control device is forged by MITM attack, the device can be abnormally operated by malicious attack from attacker. Therefore, we describes a scenario which has the vulnerabilities of the BLE network in this paper and propose countermeasure method against MITM attacks integrity violations. Its mechanism provides data confidentiality and integrity with MD5 and security key distribution of Diffie Helman's method. In order to verify the effectiveness of the countermeasure method proposed in this paper, we have conducted the experiments. ​As experiments, the message was sent 200 times and all of them successfully detected whether there was MITM attack or not. In addition, it took at most about 4.2ms delay time with proposed countermeasure method between devices even attacking was going on. It is expected that more secure data transmission can be achieved between IoT devices on a BLE network through the method proposed.

A Pre-processing Process Using TadGAN-based Time-series Anomaly Detection (TadGAN 기반 시계열 이상 탐지를 활용한 전처리 프로세스 연구)

  • Lee, Seung Hoon;Kim, Yong Soo
    • Journal of Korean Society for Quality Management
    • /
    • v.50 no.3
    • /
    • pp.459-471
    • /
    • 2022
  • Purpose: The purpose of this study was to increase prediction accuracy for an anomaly interval identified using an artificial intelligence-based time series anomaly detection technique by establishing a pre-processing process. Methods: Significant variables were extracted by applying feature selection techniques, and anomalies were derived using the TadGAN time series anomaly detection algorithm. After applying machine learning and deep learning methodologies using normal section data (excluding anomaly sections), the explanatory power of the anomaly sections was demonstrated through performance comparison. Results: The results of the machine learning methodology, the performance was the best when SHAP and TadGAN were applied, and the results in the deep learning, the performance was excellent when Chi-square Test and TadGAN were applied. Comparing each performance with the papers applied with a Conventional methodology using the same data, it can be seen that the performance of the MLR was significantly improved to 15%, Random Forest to 24%, XGBoost to 30%, Lasso Regression to 73%, LSTM to 17% and GRU to 19%. Conclusion: Based on the proposed process, when detecting unsupervised learning anomalies of data that are not actually labeled in various fields such as cyber security, financial sector, behavior pattern field, SNS. It is expected to prove the accuracy and explanation of the anomaly detection section and improve the performance of the model.

A Study on the Users' Response to Privacy Issues in Customized Services

  • Park, Sunwoo;Baek, Jeongyun;Yoo, Yeajoo;Kim, Dongwhan
    • Journal of Multimedia Information System
    • /
    • v.9 no.3
    • /
    • pp.201-208
    • /
    • 2022
  • Customized service is a vital and mandatory element for apps in improving their technical performance and app customer analysis. While apps require users' consent for their data extraction and usage, many of the terms and agreement forms are written intricately, making it harder for users to fully understand the whole concept of users' data collection for customized services. Ever since the Facebook-Cambridge Analytica scandal, personal data privacy has been re-examined, forcing many app companies to reinforce a reliable solution to data privacy issues. However, there has not been a secured solution, which worries many people about the future advanced issues when metaverse platforms are actively used in daily apps. The research aims to collect the reactions and behaviors of everyday app users who utilize apps with customized services to understand the nature of privacy data issues and the users' opinions about the future implementation of metaverse platforms. The method of the research was an online questionnaire that targeted university students. The study revealed many fearful and anxious reactions about personal data and further metaverse issues where most app users were uneducated about how current apps collect and utilize users' private data.

Economic Effect of The Regional Fishery Product Supply Shortage - Focusing on Fisheries Risk Factors - (지역별 수산물 공급지장의 경제적 파급효과 분석 - 수산업 리스크 요인을 중심으로 -)

  • Um, Kwon-O;Lee, Mu-Hui
    • The Journal of Fisheries Business Administration
    • /
    • v.53 no.3
    • /
    • pp.65-83
    • /
    • 2022
  • In addition to simply providing quality food to the people, the fishery industry must be maintained and developed because it has various functions such as national food security, preservation of natural scenery, protection of national territory, and revitalization of the local economy. However, risk factors such as climate changes and environmental destruction have raised concerns about the sustainable development of the industry. Since these risk factors are becoming larger and more complex over time, it is time to conduct research related to the risk of the fishery industry. Therefore, the purpose of this study is to explore the risk factors facing the fisheries at this point, to analyze the economic ripple effect of regional fishery product supply shortage, and to draw implications. As a result of this study, the economic ripple effect of fishery product shortage per won was highest in Busan, followed by Gangwon, Gyeongnam, and Gyeongbuk. Considering the size of the local fishery industry, Busan had the highest supply shortage per 1% of local fisheries production. It is also necessary to prepare special risk management and countermeasures for these regions since the effect of supply shortage in regions such as Jeonnam, Gyeongnam, and Jeju is large compared to other regions.

Legal Issues in the Introduction of Compelled Decryption According to Device Unlock Limits

  • Chohee Bae;Sojung Oh;Sohyun Joo;Jiyeon Joo;KyungLyul Lee
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.17 no.2
    • /
    • pp.591-608
    • /
    • 2023
  • With the emergence of advanced encryption technologies such as Quantum Cryptography and Full Disk Encryption, an era of strengthening information security has begun. Users respond positively to the advancement of privacy-enhancing technology, on the other hand, investigative agencies have difficulty unveiling the actual truth as they fail to decrypt devices. In particular, unlike past ciphers, encryption methods using biometric information such as fingerprints, iris, and faces have become common and have faced technical limitations in collecting digital evidence. Accordingly, normative solutions have emerged as a major issue. The United States enacted the CLOUD Act with the legal mechanism of 'Contempt of court' and in 2016, the United Kingdom substantiated the Compelled Decryption through the Investigatory Powers Act (IPA). However, it is difficult to enforce Compelled Decryption on individuals in Korea because Korean is highly sensitive to personal information. Therefore, in this paper, we sought a method of introducing a Compelled Decryption that does not contradict the people's legal sentiment through a perception survey of 95 people on the Compelled Decryption. We tried to compare and review the Budapest Convention with major overseas laws such as the United States and the United Kingdom, and to suggest a direction of legislation acceptable to the people in ways to minimize infringement of privacy. We hope that this study will be an effective legal response plan for law enforcement agencies that can normatively overcome the technical limitations of decoding.

A Study on the Performance Level of Industrial Robot Cell Safety Function Control System (산업용 로봇 셀 안전기능 제어시스템 성능수준 연구)

  • Jung-nam Lee;Dong-ho Rie
    • Journal of the Korean Society of Safety
    • /
    • v.38 no.3
    • /
    • pp.1-9
    • /
    • 2023
  • Most existing industrial robots have fences installed around them to ensure safety. However, industrial sites are recently being transformed into workspaces shared by both robots and humans working cooperatively, wherein the robots are without security fencing owing to the development of sensor technology. However, in the last five years (2017-2021), 16 deaths have occurred due to robots at industrial sites, with the main cause of the accidents being workers approaching an industrial robot in operation and getting entangled with or colliding into the robot and its peripherals. To prevent such accidents, multilateral research is needed. To this end, this study analyzes the nonconforming contents of safety inspections for industrial robots and demonstrates the safety performance of the safety function control system implemented in an industrial robot cell. In addition, to ensure the fundamental safety of industrial robots, this study proposes the introduction of a safety certification system so that safety functions can be implemented in the design, manufacturing, and installation stages of the robots.

Why Consumers Use Mobile Commerce? - International Comparative Study of M-Commerce Model

  • Han, Sang-Lin;Nguyen, T.P. Thao;Nguyen, V. Anh
    • Asia Marketing Journal
    • /
    • v.18 no.3
    • /
    • pp.65-88
    • /
    • 2016
  • Development of information and communication technology is changing commerce environment and consumer purchasing behavior has also been changed. Globalization is becoming increasingly prevalent in the world today and many factors such as culture, politics, and economics may influence the applicability of management theories. Concurrently, corporate managers are faced with the challenge of offering usable and useful applications to the local users. Besides, many scholars strongly support that the criteria for M-Commerce adoption in developing countries are different from that of developed countries, due to cultural, security, social, political, economic, and technological aspects. This research tried to investigate the differences on the adoption of mobile commerce between developed and developing countries. In this study, the motivation for studying advanced mobile phone services adoption in the South Korea and Viet Nam is presented. Second, M-Commerce adoption model is introduced as a starting point for the research model. We then integrate price, personal innovativeness, quality dimension and perceived of playfulness into our model. Next, we describe our method and report the results of our analysis. The paper concludes with a discussion of the results from both the South Korea and Viet Nam with implications.

The Influence of E-commerce Logistics Service Quality on Customer Engagement Behavior

  • Dongxu ZHANG;Zhuoqi TENG;Mufeng LI;Renhong WU
    • The Journal of Economics, Marketing and Management
    • /
    • v.11 no.2
    • /
    • pp.1-11
    • /
    • 2023
  • Purpose: With the rapid development of e-commerce, logistics services, as an important part of e-commerce shopping, have gradually attracted people's attention. Customer engagement behavior is a new topic in marketing, and its connotation is still being explored. The purpose of this paper is to study the relationship between logistics service quality and customer engagement behavior. Research design, data and methodology: This study employed the method of online questionnaire survey, with Chinese e-commerce platform users as the survey objects, 248 valid survey sample data were collected, and the method of factor analysis and structural equation model analysis was used to verify the research hypothesis model constructed in this paper. Results: The four dimensions of e-commerce logistics service quality have different influences on customer satisfaction, and the influence of availability on customer satisfaction is not significant. Convenience, assurance, and security have a significant positive impact on customer satisfaction; Customer satisfaction has a significant positive impact on the three dimensions of customer engagement behavior: customer repeat purchase behavior, online word-of-mouth, and customer referrals. Conclusion: The results of this study will provide useful reference for the managers of e-commerce companies to improve customer engagement behavior by improving the logistics service quality.