• Title/Summary/Keyword: Security

Search Result 25,883, Processing Time 0.049 seconds

Analysis of Priority of Technical Factors for Enabling Cloud Computing Services (클라우드 컴퓨팅 서비스 활성화를 위한 기술적 측면 특성요인의 중요도 우선순위 분석)

  • Kang, Da-Yeon;Hwang, Jong-Ho
    • Journal of Digital Convergence
    • /
    • v.17 no.8
    • /
    • pp.123-130
    • /
    • 2019
  • The advent of the full-fledged Internet of Things era will bring together various types of information through Internet of Things devices, and the vast amount of information collected will be generated as new information by the analysis process. To effectively store this generated information, a flexible and scalable cloud computing system is advantageous. Therefore, the main determinants for effective client system acceptance are viewed as motivator factor (economics, efficiency, etc.) and hindrance factor (transitional costs, security issues, etc.) and the purpose of this study is to determine which detailed factors play a major role in making new system acceptance decisions around harm. The factors required to determine the major priorities are defined as the system acceptance determinants from the technical point of view obtained through the literature review, and the questionnaire is prepared based on the factors derived, and the survey is conducted on the experts concerned. In addition, the AHP analysis aims to achieve a final priority by performing a bifurcation between components for measuring a decision unit. Furthermore, the results of this study will serve as an important basis for making decisions based on acceptance (enabling) of technology.

Evaluation of Access Control Function of the Standard Records Management System (표준기록관리시스템 기능 평가 접근관리 기능을 중심으로)

  • Park, Min-Yung
    • The Korean Journal of Archival Studies
    • /
    • no.38
    • /
    • pp.3-35
    • /
    • 2013
  • The physical access or control of records with material entities is relatively easy. However, in the case of electronic records, due to its heightened applicative aspect that allows anyone with the authority to have access over the data, it requires an appropriate standard and stability to ensure the authenticity and integrity of electronic records. This study performed functional evaluation by extracting the minimum critical items from the national functional requirements documents and standards to explore the access control function that play an important role for the standard records management system to maintain quality requirements of electronic records. Based on this checklist, it evaluates whether the standard records management system properly carries out the access control function and investigates the current condition of application to practical records management work. Records managers generally do not use access control function, which may be because they do not feel the necessity, since the application of records management system is not yet actively promoted. In order for the standard records management system to be developed to become a more active system, it requires system improvement as well as considerations for below factors: First, although the necessity of establishing access control conditions is already recognized, it requires a clear stipulation of the regulation. Second, measures must be taken to implement access control in the records management system through document security solution. Third, it requires self-reflection of records manager, who utilizes the records management system. Instead of placing all responsibility on the National Archives, which established the system, professionals must further develop the system through continuous evaluation and improvement. Finally, a general discussion is required to publicize the issue of functional improvement of records management system. Although there is a bulletin board already created for this purpose, its users are extremely limited and it only deals with current problems. A space in online as well as in offline is required to solve the fundamental problems and exchange opinions.

Evaluation of Prevention System of Falls and Committing Suicide with Application Technology of Rollinder System (추락 및 투신자살 방지시스템의 조사 및 Rollinder System 적용기술)

  • Park, Sea-Man;Baek, Chung-Hyun;Choi, Byong-Jeong
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.20 no.5
    • /
    • pp.591-598
    • /
    • 2019
  • The statistics of committing suicide in S. Korea is ranked in top with serious attempts of falling among OECD countries since 2003. The rates is slightly dropped by 5 percent point, nevertheless the falling is still high for the age of over 10 years old and this matter must be solved. Most of the case of suicides are the falling based on a trend view of falling which is serious matter and cannot be solved easily for both domestic and foreign countries. For example, the steel net of falling prevent was installed in the Golden Gate Bridge costed by 200 million-dollar. In New Zealand, the steel net of falling prevention had been removed and re-installed beccause of the high suicide rates. Canada and Australia also surrounded the bridge with steel fences to prevent suicide without consideration of the beauty of bridge. Therefore, this paper suggested a comparison study on both falling prevention systems in all countries and patent technologies. Also, it covers the blocking skills of approach in both security and limited area. This paper suggested the technical Rollinder system equipped with the mechanical apprentice to prevent effectively the falling sucides and wall passing. Before the installation of Rollinder System by 2016, there were 33 person who tried to fall in the river in Machang Bridge. However, the number of the committing suicides were dramatically reduced to zero after the installation of the system.

Derivation of Anti-Tamper System Requirements Based on CMVP Standard for Technology Protection of Weapon Systems (무기 시스템의 기술 보호를 위한 CMVP 표준 기반의 Anti-Tamper 시스템 요구사항 도출)

  • Lee, Min-Woo;Lee, Jae-Chon
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.20 no.4
    • /
    • pp.470-478
    • /
    • 2019
  • As the growth of the domestic defense industry is remarkable regarding technology level and export size, technology protection is necessary. Particularly, there is a need to apply anti-tamper measures to prevent critical technologies from illegally being taken out of weapon systems. However, there is no security protection strategy and system built yet in ROK. Precedent studies discussed the trend analysis and technical research for specific protective techniques, and the application of anti-tamper using limited procedures was provided. Recently, methods of how to select the technology for protection were studied based on risk management. Nonetheless, these studies cannot be associated with the acquisition process for the whole life-cycle, having difficulty with actual development and evaluation of the weapon systems. The objective of our study is to derive the system requirements of the weapon system for which anti-tamper measures have been determined to apply. Specifically, requirements items suitable for the development of anti-tamper weapon systems were derived based on ISO/IEC 19790, the CMVP standard for the development and verification of cryptographic modules. Also, its utilization in technical reviews and test & evaluations was presented. The usefulness of the research results was confirmed through inductive inference and comparative evaluation. The result can be expected to play a role in initiating extensive activities needed for technology protection of the weapon systems.

A Study on a Plan to Make Public of the Closed Minutes and the Non-published Minutes at the National Assembly of R.O.K (국회 비공개회의록 및 불게제 부분의 공표 방안 연구)

  • Kim, Jang-hwan
    • The Korean Journal of Archival Studies
    • /
    • no.35
    • /
    • pp.93-132
    • /
    • 2013
  • It is principle that the National Assembly Minutes are open to the general public based on the Constitution of the Republic of Korea. However, it will not be released to the public when the minutes are produced at a meeting held privately -the closed minutes- and the parts of the minutes are not published because of 'the demands on keeping confidential of the Chairman of the National Assembly or needs for the National Security' based on the National Assembly Act article 118 clause 1. These two minutes infringe the democratic rights, the public's rights to know seriously by reason that there are no procedures to disclose to the public. Especially the non-published parts of the minutes are highly likely in breach of the constitution. This paper will deal with the regulations and guidelines related to the disclosure of the closed minutes focusing on the United States and the United Kingdom where developing countries on the parliamentary democracy. Then, it is suggested placing an emphasis on the legal aspects that the plans to make public of the closed minutes and non published parts of the minutes based on the reviewed results of the committee of the National Assembly Archives and the initiative proposed by the member of the National Assembly, Jung Chang-rae in the last 2004.

A Study on Knowledge Management Vision and Implications of Ministry of Culture, Sports and Tourism (문화체육관광부의 지식관리 비전과 시사점에 대한 연구)

  • Lee, Hyangsoo;Lee, Seong-Hoon
    • Journal of Digital Convergence
    • /
    • v.17 no.1
    • /
    • pp.29-36
    • /
    • 2019
  • In this study, we analyzed knowledge management cases of the Ministry of Culture, Sports and Tourism and examined knowledge management vision, promotion organization and knowledge management activity system. This study aims to clarify implications for successful knowledge management in government sector. In the case of the Ministry of Culture, Sports and Tourism, which was the subject of the study, it was evaluated as having performed well in the management activities of the government department in the evaluation of "Knowledge Target for 2018" jointly hosted by Maeil Economic Daily and the Ministry of Public Administration and Security. In this study, we conducted an in - depth interview with the knowledge management staff of the Ministry of Culture and Tourism and analyzed the success factors of knowledge management in the government sector. First, the vision of knowledge management and the role of dedicated organization were very important. In addition, knowledge management system was used to effectively acquire, share, and accumulate knowledge and utilize it. In addition, appropriate compensation systems for knowledge management activities are also important success factors. Therefore, in order to encourage knowledge management activities, it is necessary for public institutions to establish an incentive system such as an economic compensation system for personnel sharing activities and HR personnel.

A Study on the Analysis of Disaster Prevention Characteristics According to the Surrounding Environments of State-designated Cultural Properties in Gyeongsangnam-do and Gyeongsangbuk-do Provinces (경상남·북도 국가지정 중요목조문화재 주변 환경에 따른 방재특성 분석 연구)

  • Koo, Wonhoi;Baek, Minho
    • Journal of the Society of Disaster Information
    • /
    • v.15 no.1
    • /
    • pp.1-11
    • /
    • 2019
  • Purpose: This study intends to determine how disaster prevention characteristics of important state-designated wooden cultural properties in Gyeongsangnam-do vary according to the surrounding environments and to examine disaster prevention measures for wooden cultural properties that fit their surrounding environments accordingly. Method: The designation status and characteristics of cultural properties in Gyeongsangnam-do and Gyeongsangbuk-do were identified, and the damage status of cultural properties in Gyeongsangnam-do and Gyeongsangbuk-do was reviewed based on the history of disasters. Also, the disaster prevention environments for 58 state-designated wooden cultural properties in Gyeongsangnam-do and Gyeongsangbuk-do were analyzed separately into mountainous area, rural area and urban area, topographic characteristics were drawn. Results: For cultural properties located in urban areas, it was found that security guards were arranged properly and disaster prevention training was carried out well. In addition, access condition to the cultural properties was adequate; prompt access to such properties was possible. In rural areas, flame retardant works have been undertaken properly and many cultural properties were found to be located on a flat ground. Mountainous areas had highly inadequate access condition to cultural properties and disasters occurred most frequently in these areas in the past. Conclution: First, for wooden cultural properties located in urban areas, it is necessary to secure the self-defense fire service manpower for an initial response and reinforce the disaster prevention education. Second, for wooden cultural properties located in rural areas, prevention projects such as insect control project and disaster prevention insurance should be carried out in order to protect the cultural properties. Third, as for wooden cultural properties located in mountainous areas, it is necessary to prepare establish to reinforce self-response capability.

Risk Management-Based Application of Anti-Tampering Methods in Weapon Systems Development (무기 시스템 개발에서 기술보호를 위한 위험관리 기반의 Anti-Tampering 적용 기법)

  • Lee, Min-Woo;Lee, Jae-Chon
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.19 no.12
    • /
    • pp.99-109
    • /
    • 2018
  • Tampering involves illegally removing technologies from a protected system through reverse engineering or developing a system without proper authorization. As tampering of a weapon system is a threat to national security, anti-tampering measures are required. Precedent studies on anti-tampering have discussed the necessity, related trends, application cases, and recent cybersecurity-based or other protection methods. In a domestic situation, the Defense Technology Protection Act focuses on how to prevent technology leakage occurring in related organizations through personnel, facilities and information systems. Anti-tampering design needs to determine which technologies are protected while considering the effects of development cost and schedule. The objective of our study is to develop methods of how to select target technologies and determine counter-measures to protect these technologies. Specifically, an evaluation matrix was derived based on the risk analysis concept to select the protection of target technologies. Also, based on the concept of risk mitigation, the classification of anti-tampering techniques was performed according to its applicability and determination of application levels. Results of the case study revealed that the methods proposed can be systematically applied for anti-tampering in weapon system development.

Effects of Social Support and Chronic Medical Conditions on Depressive Symptoms in Elderly People Living Alone in a Rural Community (농촌지역 독거노인의 사회적 지지 및 만성 의학적 질환이 우울증상에 미치는 영향)

  • Chae, Cholho;Lee, Sangsoo;Park, Chul-Soo;Kim, Bong-Jo;Lee, Cheol-Soon;Lee, So-Jin;Lee, Dongyun;Seo, Ji-Yeong;Ahn, In-Young;Choi, Jae-Won;Cha, Boseok
    • Journal of the Korean society of biological therapies in psychiatry
    • /
    • v.24 no.3
    • /
    • pp.184-193
    • /
    • 2018
  • Objectives : This study investigated the effects of social support and chronic medical conditions on depressive symptoms in elderly people living alone in a rural community. Methods : Sociodemographic information on 173 subjects aged 65 years or older who lived alone in a rural community and were recipients of National Basic Livelihood Security was collected and analyzed. All participants completed the Korean Form of the Geriatric Depression Scale and the Lubben Social Network Scale. Additionally, the current prevalence of chronic medical conditions that interfere with the activities of daily living was examined. Multiple logistic regression analysis was conducted to analyze the associations of social support and chronic medical conditions with depressive symptoms. Results : Social support(odds ratio: OR, 0.96; 95% confidence interval: 95% CI, 0.92-0.99) and chronic medical conditions(OR, 1.59; 95% CI, 1.23-2.05) were significantly associated with depressive symptoms in all subjects. When analyzed by gender, social support served as a protective factor against depressive symptoms in elderly men only(OR, 0.91; 95% CI, 0.83-0.99), and chronic medical conditions increased the risk of depressive symptoms in elderly women only(OR, 1.74; 95% CI, 1.26-2.40). Furthermore, osteoarthritis and lumbar pain were risk factors for depressive symptoms in all subjects(OR, 2.24; 95% CI, 1.10-4.56 and OR, 2.10; 95% CI, 1.08-4.12) and in elderly women(OR, 4.07; 95% CI, 1.68-9.84 and OR, 3.34; 95% CI, 1.47-7.57), respectively. Conclusion : This study indicates that improving the social support and managing the chronic medical conditions of elderly people living alone are important for the prevention of depression in this population. Additionally, the present results suggest that it is necessary to establish different depression-prevention strategies for elderly men and women living alone.

Political Instability and Inward Foreign Direct Investment: The Perspective of Government Corruption from an Emerging Economy (정치적 불안정과 외국인 직접 투자: 신흥국 정부부패의 관점)

  • Bokhari, Syed Asad Abbas;Aftab, Muhammad;Shahid, Manzoor
    • Industry Promotion Research
    • /
    • v.6 no.4
    • /
    • pp.69-81
    • /
    • 2021
  • Pakistan is a South Asian auspicious developing country. Based on the corruption perception index report 2020 by transparency international, Pakistan has ranked 124 with total scores of 31 globally and 188 ranks with a score of -2.25 in terms of political stability ranging from 0 (lowest) to 100 (highest). More crucially, the inflow of foreign direct investment toward Pakistan has declined between 2008 and 2019. Though political instability and government corruption have both positive and negative linear relationships with foreign direct investment, we tested the moderating impact of government corruption between political instability and inward foreign direct investment over time. We also tested the relationship between political instability and inward foreign direct investment in different phases of political regimes in the same country. Our results suggested that authoritarian regimes attracted more inward foreign direct investment than that during democratic periods of government. Furthermore, we found that there was low inward foreign direct investment when government corruption was high in the country. However, government corruption weakened the positive relationship between political instability and inward foreign direct investment (FDI).