• 제목/요약/키워드: Security Activity

검색결과 591건 처리시간 0.035초

Abnormal Crowd Behavior Detection Using Heuristic Search and Motion Awareness

  • Usman, Imran;Albesher, Abdulaziz A.
    • International Journal of Computer Science & Network Security
    • /
    • 제21권4호
    • /
    • pp.131-139
    • /
    • 2021
  • In current time, anomaly detection is the primary concern of the administrative authorities. Suspicious activity identification is shifting from a human operator to a machine-assisted monitoring in order to assist the human operator and react to an unexpected incident quickly. These automatic surveillance systems face many challenges due to the intrinsic complex characteristics of video sequences and foreground human motion patterns. In this paper, we propose a novel approach to detect anomalous human activity using a hybrid approach of statistical model and Genetic Programming. The feature-set of local motion patterns is generated by a statistical model from the video data in an unsupervised way. This features set is inserted to an enhanced Genetic Programming based classifier to classify normal and abnormal patterns. The experiments are performed using publicly available benchmark datasets under different real-life scenarios. Results show that the proposed methodology is capable to detect and locate the anomalous activity in the real time. The accuracy of the proposed scheme exceeds those of the existing state of the art in term of anomalous activity detection.

기업의 정보보호 활동과 정보침해 사고 간의 관계: 정보보호 인식의 매개효과를 중심으로 (Relationship between Information Security Activities of Enterprise and Its Infringement : Mainly on the Effects of Information Security Awareness)

  • 문건웅;김승주
    • 정보보호학회논문지
    • /
    • 제27권4호
    • /
    • pp.897-912
    • /
    • 2017
  • 본 논문은 정보보호 인식을 매개로 기업이 정보보호 활동을 수행했을 때 정보보호 침해 사고 예방에 어떤 효과가 있는지에 초점을 맞춘다. 본 연구 모델로 정보보호 활동과 정보보호 인식이 정보보호 침해 사고를 감소시킨다는 가설을 설정하였다. 분석 대상의 일반적 특성은 빈도 분석을 실시하였으며, 측정 도구의 신뢰도는 Cronbach's ${\alph}$ 계수를 활용하였으며 분석 결과, 정보보호 활동과 정보보호 인식 그리고 정보보호 침해 사고의 관계에 대한 가설이 입증되었다.

금융회사의 정보보호활동이 정보보호의식 및 정보보호자신감에 미치는 영향 : 정보보호의식의 매개효과를 중심으로 (Influence of Information Security Activities of Financial Companies on Information Security Awareness and Information Security Self Confidence : Focusing on the Mediating Effect of Information Security Awareness)

  • 소현철;김종근
    • 한국산업정보학회논문지
    • /
    • 제22권4호
    • /
    • pp.45-64
    • /
    • 2017
  • 본 연구의 목적은 금융회사의 정보보호활동이 정보보호담당자들의 보안업무에 대한 자신감에 미치는 영향을 파악하고 미흡한 점을 보완하기 위한 학문적, 실무적 시사점을 찾기 위한 연구이다. 연구결과, 금융회사가 정보보호교육, 침해사고 대응 및 입/출입 보안에 중점을 두고 정보보호활동을 하면 정보보호담당자의 회사에 대한 정보보호자신감 및 직원들의 정보보호의식 수준이 높아진다는 것을 확인할 수 있었다.

국제기술이전계약에서의 산업보안에 관한 연구 (The Industrial Security along with the International Transfer of Technology)

  • 서정두
    • 무역상무연구
    • /
    • 제76권
    • /
    • pp.1-20
    • /
    • 2017
  • The industrial technology (including trade secrets), which is commonly understood as systematic and applied technical knowledge, can be transferred to third parties by contracting for the transfer of technology or by granting of a licence. The activity of industrial espionage, due to the gradual increase of the economic interests of intellectual property, is displaying intensively in order to gain advanced technology information. With our outstanding high technology, but compared to the level of the advanced countries, the technical protection systems, the legal protection measures and the systematic management thereof may still be insufficient. Our industrial technology outflow abroad, due to the vulnerability to the security control system in our country, has been increasing since the 2000. Computer software and SNS, such as smart devices, appear as a rapid change in the technical information environment. In order to minimize the dead zone of a new industrial security, the country's organic activity is being conducted. In 2006, Industrial Technology Outflow Prevention and Protection Law was enacted, which emphasized the responsibilities of the country. In this paper for the economic entity's efforts to prevent technology leakage oversea, I have looked to how the industrial technology can be protected in terms of national security and economic benefits of our enterprises. To solve the above-mentioned problems hereof, Korean government should willingly establish a reliable legal system for supporting to enterprise's operations, and Korean companies should autonomously introduce a synthetic technology protection system and incorporate the confidentiality clauses in an international transfer of technology agreement with third parties.

  • PDF

환경설계를 통한 범죄예방과 민간경비의 역할 (Crime-Prevention in the Community and the Security Activity)

  • 장예진
    • 시큐리티연구
    • /
    • 제17호
    • /
    • pp.301-316
    • /
    • 2008
  • 우리들 대부분은 어렸을 적 없었던 동화 가운데 “아기돼지 삼형제”이야기를 기억하고 있을 것이다. 늑대의 공격으로부터 아기돼지 삼형제를 구한 것은 막내 돼지의 벽돌집이었다는 것을 알 수 있다. 이 이야기가 경호 경비 관련자에게 시사하는 바는 "잘 설계된 물리적 환경이 범죄의 예방에 얼마나 중요한가"라는 것이다. 범죄 방지를 위한 지역 경찰의 능력은 치안수요에 비해 턱없이 부족하여 국민이 범죄에 대한 두려움을 해소시키지 못하였으며, 급기야는 공권력의 불신으로 이어져 심각한 사회위기 요인으로 작용하게 되었다. 사회에서 보는 것처럼 범죄대응체계와 방범체계를 비웃기라도 하듯이 순식간에 범행을 마치고 경찰이 출동하여 현장에 도착하기 전에 도주하는 경향이 보여 정부의 치안력 한계를 느끼게 하는 한다. 환경설계를 통한 범죄예방(CPTED: Crime Prevention Through Environmental Design)기법의 도입을 통해 범죄예방의 효율성의 기하는 한편 체계적인 범죄예방 프로그램과 가장 적합한 모델을 선정하여 활용하는데 과제를 안고 있으며, 지역 사회 범죄활동에 대해 경호활동의 중요성을 인식하고, 다양한 지역사회의 치안활동을 분석하여 이에 대한 전략으로 경호활동의 참여를 통한 접근에 초점을 맞추며, 현재까지 빈번하게 발생하고 있는 크고 작은 지역사회 범죄예방책으로 CPTED기법을 경찰과 민간경호경비업체에 적용하여 유효적절한 모델을 설정하고 지능화되고 흉포화 하는 범죄에 대응하고 예방하는 지표를 삼고자 하는 데에 이 연구의 궁극적인 목적이 있다.

  • PDF

Beyond the clinical walls: registered dietitian nutritionists providing medical nutrition therapy in the home setting

  • Hicks-Roof, Kristen;Xu, Jing;Fults, Amanda K.;Latortue, Krista Yoder
    • Nutrition Research and Practice
    • /
    • 제15권6호
    • /
    • pp.789-797
    • /
    • 2021
  • BACKGROUD/OBJECTIVES: Registered dietitian nutritionists (RDN) are providers of medical nutrition therapy (MNT) to address health and chronic disease. Traditionally, RDNs have provided care in healthcare facilities including hospitals and private care facilities. The purpose of this study was to determine how RDN individualized MNT in the home impacted nutrition, physical activity, and food security. SUBJECTS/METHODS: This is a secondary data analysis. The mean age of the participants (n = 1,007) was 51.6 years old with a mean body mass index (BMI) of 34.1 kg/m2. Individualized MNT visits were delivered by an RDN in the home setting from January to December 2019. Participants were referred by healthcare professionals or self-referred. Participants had MNT benefits covered by their health insurance plan (43.3% Medicaid; 39.8% private insurance; 7.9% Medicare, 9% other). Health outcomes related to nutrition care were measured. Outcomes included self-reported consumption of nutrition factors and physical activity. Our secondary outcome focused on food security. The changes in weight, BMI, physical activity, and nutrition factors were analyzed by a linear regression model or linear mixed model, adjusting for age, sex, baseline value, and number of appointments. Food security was summarized in a 2 by 2 contingency table. RESULTS: Baseline values had significantly negative impacts for all changes and number of appointments was significant in the changes for weight and BMI. Increases in physical activity were significant for both female and male participants, 10.4 and 12.6 minutes per day, respectively, while the changes in weight and BMI were not. Regarding dietary factors, the consumption total servings per day of vegetables (0.13) and water (3.35) significantly increased, while the consumption of total servings of whole grain (-0.27), fruit (-0.32), dairy (-0.80) and fish (-0.81) significantly decreased. About 24% (of overall population) and 45% (of Medicaid population) reported improvements in food security. CONCLUSIONS: This study found that home visits were a useful setting for MNT delivered by RDNs. There is a strong need for individualized counseling to meet the participants' needs and personal goals.

융합보안 서비스 사이언스를 위한 기상정보 활용모델 연구 (A Study about Practical Model of Meteorological Information for Convergence Security Service Science)

  • 최경호;이동휘;김민수;김종민;김귀남
    • 융합보안논문지
    • /
    • 제13권3호
    • /
    • pp.79-84
    • /
    • 2013
  • 본 연구에서는 보안서비스 제공과정을 비즈니스 프로세스로 살펴보고, 여기서 나타나는 문제점을 해결하기 위한 융합보안기술의 적용 및 이의 프로세스화를 통한 개선된 서비스 혁신모델을 제시해 보고자 한다. 이를 위해 대표적으로 시설관리, 무인경비 등을 제공하는 물리보안 분야를 살펴보고, 여기서 나타나는 한계점을 해결하기 위해 적용 가능한 융합보안기술로 기상정보를 활용하는 방법을 서비스 사이언스 관점에서 제안한다. 본 연구의 기여도는 첫째, 서비스 혁신 관리를 통해 융합보안기술을 기반으로 위험관리 방법을 개선했다는 것이며, 둘째, 서비스의 효과를 계량화하여 위험관리 활동을 정량적 수치로 평가할 수 있다는 것이며, 마지막으로, 기상정보를 활용한 물리보안 서비스 제공 방법론을 체계적으로 프레임워크화 했다는 것이다.

생산적인 아버지노릇과 유아의 애착안정성 (Generative Fathering and Toddler Attachment Security)

  • 이영환
    • 대한가정학회지
    • /
    • 제37권12호
    • /
    • pp.91-102
    • /
    • 1999
  • The purpose of this study was to investigate the father-child relationship. The final sample for the data analyses included 83 three-year old children and their lathers. The instrument of study was the 'generative fathering'(by Yee et al, 1999). This measurement consisted two areas, first is the father's involvement in child rearing, and second is the responsibility on child rearing. And the child attachment security was observed through Attachment Q-Set(Waters, 1987) in the child's home. The results were following: 1. The mean of the child's attachment security was .33 and the range of attachment security was from -.07 to .79. 2. Father had higher responsibility on rearing, more involved in the child care. 3. The child's attachment security was predicted by the father's involvement in rearing. The father's responsibility didn't show the relationship with the child's attachment security. Especially among the subcategories of involvement, the activity with child had a significant relation to attachment security. So the father's interaction with child was meaningful for the child to develop the internal working model.

  • PDF

Information Security Activity of Analysis Phase in Information Security Model in Accordance with SDLC

  • Shin, Seong-Yoon;Lee, Tae-Wuk
    • 한국컴퓨터정보학회논문지
    • /
    • 제21권11호
    • /
    • pp.79-83
    • /
    • 2016
  • In this paper, we define four levels of analysis, design, implementation, and testing of the configuration of the development phase by S/W development life cycle. In particular, it dealt with the stage of the analysis phase to prepare an information system developed intensively. Details of the derivation of the information security requirements, it can be seen that comes from the perspective of confidentiality, integrity, availability and accountability, etc. It dealt with from the first manifestations of the projects planning to final planning to establish information security in activities of the Information Security requirements. As an example exhibited by assessing the information security analysis phase activities of S corporations, it can be seen that the improved sales rise in information security activities.

Features of the Implementation of Public Authority in the Context of Modern International Security Challenges: Information Component

  • Borysenko, Olha;Kitsak, Taras;Pasichnyi, Roman;Akimova, Liudmyla;Karpa, Marta;Akimov, Oleksandr
    • International Journal of Computer Science & Network Security
    • /
    • 제22권8호
    • /
    • pp.123-128
    • /
    • 2022
  • The main purpose of the study is to determine the features of the implementation of public authority in the context of modern international security challenges. The fact that public authority is a necessary regulator of the life of society ensures its development, unity, and manageability, which is an important factor in the organization and orderliness of society adds to the actualization of the research topic. The research methodology includes a set of theoretical methods of analysis. Based on the results of the study, key aspects of the implementation of public authority in the context of modern international security challenges were identified. The study has limitations, and they relate to the practical aspect of the implementation of public authority in the context of modern international security challenges.