• Title/Summary/Keyword: Security Benefit

Search Result 264, Processing Time 0.026 seconds

Encouraging Labor Intellectualization as a Tool for Intellectual Capital Development

  • Palagusyntes, Rostyslav;Shumytska, Halyna;Novosad, Kristina;Katsora, Oleksandr;Dzhuhan, Olha;Danko, Dana
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.11
    • /
    • pp.101-108
    • /
    • 2022
  • The article reviews the means of stimulating and motivating to labor intellectualization in diplomatic service employees. The means considered encourage them to raise the effectiveness in achieving goals. Leveling up of intellectual labor of diplomatic services employees, as well as means of motivation of employees are covered in the Law of Ukraine "On Civil Service". The law defines and regulates the conditions for the performance of intellectual labor entrusted to the staff of diplomatic services, namely: defines the direct rights and responsibilities of employees of diplomatic services, protects the interests and assists citizens of Ukraine abroad, meets the needs of all pressing issues and problems for their benefit.

Data Visualization and Visual Data Analytics in ITSM

  • Donia Y. Badawood
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.6
    • /
    • pp.68-76
    • /
    • 2023
  • Nowadays, the power of data analytics in general and visual data analytics, in particular, have been proven to be an important area that would help development in any domain. Many well-known IT services best practices have touched on the importance of data analytics and visualization and what it can offer to information technology service management. Yet, little research exists that summarises what is already there and what can be done to utilise further the power of data analytics and visualization in this domain. This paper is divided into two main parts. First, a number of IT service management tools have been summarised with a focus on the data analytics and visualization features in each of them. Second, interviews with five senior IT managers have been conducted to further understand the usage of these features in their organisations and the barriers to fully benefit from them. It was found that the main barriers include a lack of good understanding of some visualization design principles, poor data quality, and limited application of the technology and shortage in data analytics and visualization expertise.

Sentiment Analysis to Evaluate Different Deep Learning Approaches

  • Sheikh Muhammad Saqib ;Tariq Naeem
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.11
    • /
    • pp.83-92
    • /
    • 2023
  • The majority of product users rely on the reviews that are posted on the appropriate website. Both users and the product's manufacturer could benefit from these reviews. Daily, thousands of reviews are submitted; how is it possible to read them all? Sentiment analysis has become a critical field of research as posting reviews become more and more common. Machine learning techniques that are supervised, unsupervised, and semi-supervised have worked very hard to harvest this data. The complicated and technological area of feature engineering falls within machine learning. Using deep learning, this tedious process may be completed automatically. Numerous studies have been conducted on deep learning models like LSTM, CNN, RNN, and GRU. Each model has employed a certain type of data, such as CNN for pictures and LSTM for language translation, etc. According to experimental results utilizing a publicly accessible dataset with reviews for all of the models, both positive and negative, and CNN, the best model for the dataset was identified in comparison to the other models, with an accuracy rate of 81%.

External vs. Internal: An Essay on Machine Learning Agents for Autonomous Database Management Systems

  • Fatima Khalil Aljwari
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.10
    • /
    • pp.164-168
    • /
    • 2023
  • There are many possible ways to configure database management systems (DBMSs) have challenging to manage and set.The problem increased in large-scale deployments with thousands or millions of individual DBMS that each have their setting requirements. Recent research has explored using machine learning-based (ML) agents to overcome this problem's automated tuning of DBMSs. These agents extract performance metrics and behavioral information from the DBMS and then train models with this data to select tuning actions that they predict will have the most benefit. This paper discusses two engineering approaches for integrating ML agents in a DBMS. The first is to build an external tuning controller that treats the DBMS as a black box. The second is to incorporate the ML agents natively in the DBMS's architecture.

Moderating Effect of Security Ability on the Relation between Privacy Concern and Internet Activities

  • Hong, Jae-Won
    • Journal of the Korea Society of Computer and Information
    • /
    • v.25 no.1
    • /
    • pp.151-157
    • /
    • 2020
  • This study explored the moderating effects of security ability on the influence of privacy concerns on internet activity using Korea media panel survey data. To this end, we applied between-subjects factorial design between 2 (privacy concern high / low) × 2 (security ability high / low) groups and compared five types of internet activity among four groups by variance analysis. As a result, privacy concerns have a main effect on internet activity, and security ability have a moderating role in this relationship. Despite the privacy concerns, people do their internet activities in order to enjoy the benefit from the internet. This study have academic implication in that it focus on the issue of privacy paradox in terms of the type of internet activity. In addition, practical implications are that, in order to activate online activities of individuals in an internet-connected society, efforts for enhancing their security abilities are necessary.

Legal Interpretation on Management Power of Article 7 Section 1 of Security Business Act (경비업법 제7조 제1항 "관리권 범위"에 대한 법적 해석)

  • Lee, Jong-Hwan;Lee, Min-Hyung
    • Korean Security Journal
    • /
    • no.26
    • /
    • pp.59-87
    • /
    • 2011
  • Security Business Act of Korea is leaning toward the aspect of regulation, while it provides few provisions about vesting the authority, which causes problems such as legal loopholes to be raised in regard to the rules about authorizing the private security personnel to perform security affairs properly and defining the limit of power. So, it should be done to interpret the law in order to draw the legal basis of empowering as well as to set limits of the authority of security main agent, and Article 7, Section 1, of Security Business Act is the very provision that involves the legal basis. In the scope of 'Management Power', the statutory authority in the first clause of Article 7 of Security Business Act, the security personnel can use force for self-defense, defense of others and property, and prevention of crimes. In addition, the powers of interrogation, access control, and eviction notice are involved in its scope. The private security personnel as the occupation assistant can take precautions and if the infringement on the benefit and protection of the law is imminent or done, he or she can use force within the limits of the passive resistance and the means of defiance on the basis of 'Management Power'. The private security personnel, however, can exercise the force only if the necessary conditions of legal defense, emergency evacuation, and legitimate act of criminal law are fulfilled.

  • PDF

A Study on the Social Security for Seafarers of Maritime Labour Convention, 2006 (2006년 해사노동협약상 선원 사회보장에 관한 연구)

  • Ji, Sang-Won
    • Proceedings of the Korean Institute of Navigation and Port Research Conference
    • /
    • 2007.12a
    • /
    • pp.43-45
    • /
    • 2007
  • The International Labour Organization adopted the Maritime Labour Convention, 2006 on 23 February 2006. This convention contains the regulation about social security for seafarers in the Tittle 4. For the purpose of ratifying this Convention in our country, it is necessary to examine the domestic law and regulation concerned whether it fulfills or not the required conditions of the Convention Therefore, this paper aims to find the difference between the domestic law and the convention, also suggest the way to solve the problems.

  • PDF

Empirical Validation of Personal Information Violation Risks with Use Intention : Focusing on Domestic Smart Banking Services (개인정보 침해위험이 이용의도에 미치는 영향에 대한 연구 - 국내은행의 스마트뱅킹 서비스 중심으로)

  • Kim, Jeongwook;Jeon, Youngchan
    • Journal of Korean Society for Quality Management
    • /
    • v.45 no.3
    • /
    • pp.583-594
    • /
    • 2017
  • Purpose: The purpose of this study is how personal information protection risks affect the intention to use domestic smart banking services. VAM(Value based Adoption Model) model is validated as a theoretical background, selecting ease of use, usefulness and perceived security as a benefit factor, and considers perceived cost, technical complexity, and risk of personal information leakage as a sacrifice factor. Methods: The method of this study used questionnaire survey to collect 365 data on suer's perception on smart banking services, and also performed a structural equation modeling method using by AMOS 23. Results: The result of this paper shows that all hypothesis are accepted statistically significant except 1 hypothesis. Conclusion: This research is concluded that perceived value is affected on statistically positive impact on ease of use, usefulness and perceived security, and negative impact on perceived cost and risk of personal information violation, not statistically technical complexity.

Feasibility Study on Introduction of Decentralized Water Supply System for Improving Water Security and Sustainability (물안보 및 지속가능성 제고를 위한 분산형 용수공급시스템의 도입 타당성에 관한 연구)

  • Kim, Kwan-Yeop;Kim, Seong-Su;Park, No-Suk
    • Journal of Korean Society of Water and Wastewater
    • /
    • v.28 no.1
    • /
    • pp.111-124
    • /
    • 2014
  • Decentralized water supply systems, treating the water in users'vicinity, cutting down the distribution system, utilizing the alternative water resources(rainwater harvesting, water reclamation and reuse and so on.) and saving energy and other resources, could be categorized into POU(Point-Of-Use), POE(Point-Of-Entry) and community small scale system. From the literature review, we could thought that decentralized water supply system and hybrid system(integrating centralized and decentralized water supply system within urban water management) might have strengthening comparative advantages to centralized system with respect to: (1) water security, (2) sustainability, (3) economical affordability. Even though it is difficult to derive and quantify direct benefit advantages from decentralized and hybrid system in comparison with centralized system, (1) operational cost reduction, (2) assurance for safe and stability water supply and (3) greenhouse gas reduction can be expected from successful establishment of the former.

Machine-to-Machine (M2M) Communications in Vehicular Networks

  • Booysen, M.J.;Gilmore, J.S.;Zeadally, S.;Rooyen, G.J. Van
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.6 no.2
    • /
    • pp.529-546
    • /
    • 2012
  • To address the need for autonomous control of remote and distributed mobile systems, Machine-to-Machine (M2M) communications are rapidly gaining attention from both academia and industry. M2M communications have recently been deployed in smart grid, home networking, health care, and vehicular networking environments. This paper focuses on M2M communications in the vehicular networking context and investigates areas where M2M principles can improve vehicular networking. Since connected vehicles are essentially a network of machines that are communicating, preferably autonomously, vehicular networks can benefit a lot from M2M communications support. The M2M paradigm enhances vehicular networking by supporting large-scale deployment of devices, cross-platform networking, autonomous monitoring and control, visualization of the system and measurements, and security. We also present some of the challenges that still need to be addressed to fully enable M2M support in the vehicular networking environment. Of these, component standardization and data security management are considered to be the most significant challenges.