• Title/Summary/Keyword: Security Business Act

Search Result 94, Processing Time 0.033 seconds

Pool proof safety through the old apartments redesigned to ensure safety study (노후아파트 안전관리를 통한 풀 푸르프 재설계로 안전성 확보에 관한 연구)

  • Baek, Dong Seung;Lee, Jong Hyun;Park, Sung Bong
    • Journal of the Society of Disaster Information
    • /
    • v.14 no.3
    • /
    • pp.280-287
    • /
    • 2018
  • Purpose: The study is based on comparative review of the actual inspection of apartments and aims at proposing easy accessible and useful safety control which is enhanced from pre-existing safety apparatus. Method: On the basis of preceding research data of apartment buildings, the study presents reported problems and real condition of apartment buildings based on Housing Related Legislation and Housing Act. Results: Safety management plans and safety inspection for buildings are needed. When conducting a safety check, traceability management system for internal/exterior facilities should be available. Most important of all, 24 hour a day of self-management system for elevators, fire protection, and security cameras is necessary. Conclusion: Through the study, there should be a process of confirming problems of building security management; such as checking the management condition through apartments' resident representatives, and seeking improvement measures.

Virtual Go to School (VG2S): University Support Course System with Physical Time and Space Restrictions in a Distance Learning Environment

  • Fujita, Koji
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.12
    • /
    • pp.137-142
    • /
    • 2021
  • Distance learning universities provide online course content. The main methods of providing class contents are on-demand and live-streaming. This means that students are not restricted by time or space. The advantage is that students can take the course anytime and anywhere. Therefore, unlike commuting students, there is no commuting time to the campus, and there is no natural process required to take classes. However, despite this convenient situation, the attendance rate and graduation rate of distance learning universities tend to be lower than that of commuting universities. Although the course environment is not the only factor, students cannot obtain a bachelor's degree unless they fulfill the graduation requirements. In both commuter and distance learning universities, taking classes is an important factor in earning credits. There are fewer time and space constraints for distance learning students than for commuting students. It is also easy for distance learning students to take classes at their own timing. There should be more ease of learning than for students who commute to school with restrictions. However, it is easier to take a course at a commuter university that conducts face-to-face classes. I thought that the reason for this was that commuting to school was a part of the process of taking classes for commuting students. Commuting to school was thought to increase the willingness and motivation to take classes. Therefore, I thought that the inconvenient constraints might encourage students to take the course. In this research, I focused on the act of commuting to school by students. These situations are also applied to the distance learning environment. The students have physical time constraints. To achieve this goal, I will implement a course restriction method that aims to promote the willingness and attitude of students. Therefore, in this paper, I have implemented a virtual school system called "virtual go to school (VG2S)" that reflects the actual route to school.

Combination Key Generation Scheme Robust to Updates of Personal Information (결합키 생성항목의 갱신에 강건한 결합키 생성 기법)

  • Jang, Hobin;Noh, Geontae;Jeong, Ik Rae;Chun, Ji Young
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.32 no.5
    • /
    • pp.915-932
    • /
    • 2022
  • According to the Personal Information Protection Act and Pseudonymization Guidelines, the mapping is processed to the hash value of the combination key generation items including Salt value when different combination applicants wish to combine. Example of combination key generation items may include personal information like name, phone number, date of birth, address, and so on. Also, due to the properties of the hash functions, when different applicants store their items in exactly the same form, the combination can proceed without any problems. However, this method is vulnerable to combination in scenarios such as address changing and renaming, which occur due to different database update times of combination applicants. Therefore, we propose a privacy preserving combination key generation scheme robust to updates of items used to generate combination key even in scenarios such as address changing and renaming, based on the thresholds through probabilistic record linkage, and it can contribute to the development of domestic Big Data and Artificial Intelligence business.

Design of Ubiquitous Payment Process for Enhancing Seamlessness and Privacy (연결완전성 제고와 프라이버시 보호를 위한 유비쿼터스 지불 프로세스의 설계)

  • Lee, Kyoung Jun;Jeong, Mu Jeong
    • Journal of Intelligence and Information Systems
    • /
    • v.12 no.3
    • /
    • pp.1-13
    • /
    • 2006
  • Ubiquitous computing is a study area explained in a myriad of contexts and technological terms. Payment, however, refers in nature to an act of money transfer from one entity to another, and it is obvious that a payment method will be valued as long as the transaction can be completed with safety no matter what technology was used. The key to U-payment is convenience and security in the transfer of financial information. The purpose of this paper is to find a desirable U-payment scheme by looking at the characteristics of seamlessness under the ubiquitous environments, strong personal device, and peer-based information transactions. We also propose U-SDT Protocol integrating technologies such as Radio Frequency Identification (RFID), Bluetooth, Personal Payment Device, Account Managing Application and Transaction ID as a way to make transactions between users seamless and secure better privacy protection.

  • PDF

A Study on the Demand of the Promotion Policy for the Oil and Gas Overseas Transportation Projects by AHP (AHP 분석을 이용한 원유 및 가스 해외 수송사업 진흥 정책 연구)

  • Jae-Woong Yoon
    • Korea Trade Review
    • /
    • v.47 no.5
    • /
    • pp.289-304
    • /
    • 2022
  • Korea's LNG and crude oil are the most important energy and export raw materials, but 100% import resources by overseas. However, tanker shipping companies, which play the most crucial role in energy cargo security, are very small in number and size, which can be a factor in the supply chain crisis. Therefore, this paper studied the policy of expanding tanker transportation necessary for the transport of crude oil and LNG in Korea. In the existing literature, there was no policy study necessary for tanker ships, but referring only to the importance of overseas energy development and transportation, so we tried to derive various demands necessary for expanding the tanker fleet through expert interviews and AHP which was conducted on 89 related energy institutions to derive policies and their priorities. The results of the study are as follows. As for the policy, the financial support policy was the highest priority, followed by the business and the mutual cooperation policy of related agencies. Tax support (22.6%) and ship financing (19.4%) were the highest priorities, followed by the Energy Intermediate Promotion Act (11.9%), Tanker Guarantee Insurance (10.6%), Energy Budget Independence (9.3%), and Korea Trader Development (8.2%). Energy governance (6.3%), information center establishment (6.2%), and energy procurement committee (5.5%) ranked seventh, eighth, and ninth. The research results show that it is necessary to supply sufficient ships to the market through the expansion of ship finance for tankers and to follow business support policies such as guarantee insurance. In addition, it was also possible to derive that the financial resources need to be determined by law and independent budgets for consistency and continuity.

A Proposal of Personal Information DB Encryption Assurance Framework (개인정보 DB 암호화 검증 프레임웍 제안)

  • Ko, Youngdai;Lee, Sang-Jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.24 no.2
    • /
    • pp.397-409
    • /
    • 2014
  • According to the Personal Information Protection Act(PIPA) which is legislated in March 2011, the individual or company that handles personal information, called Personal information processor, should encrypt some kinds of personal information kept in his Database. For convenience sake we call it DB Encryption in this paper. Law enforcement and the implementation agency accordingly are being strengthen the supervision that the status of DB Encryption is being properly applied and implemented as the PIPA. However, the process of DB Encryption is very complicate and difficult as well as there are many factors to consider in reality. For example, there are so many considerations and requirements in the process of DB Encryption like pre-analysis and design, real application and test, etc.. And also there are surely points to be considered in related system components, business process and time and costs. Like this, although there are plenty of factors significantly associated with DB Encryption, yet more concrete and realistic validation entry seems somewhat lacking. In this paper, we propose a realistic DB Encryption Assurance Framework that it is acceptable and resonable in the performance of the PIPA duty (the aspect of the individual or company) and standard direction of inspection and verification of DB Encryption (the aspect of law enforcement).

A Study on the Korea Future Internet Promotion Plan for Cyber Security Enhancement (사이버 보안 강화를 위한 한국형 미래 인터넷 추진 방안에 관한 연구)

  • Lim, Gyoo-Gun;Jin, Hai-Yan;Ahn, Jae-Ik
    • Informatization Policy
    • /
    • v.29 no.1
    • /
    • pp.24-37
    • /
    • 2022
  • Amid rapid changes in the ICT environment attributed to the 4th Industrial Revolution, the development of information & communication technology, and COVID-19, the existing internet developed without considering security, mobility, manageability, QoS, etc. As a result, the structure of the internet has become complicated, and problems such as security, stability, and reliability vulnerabilities continue to occur. In addition, there is a demand for a new concept of the internet that can provide stability and reliability resulting from digital transformation-geared advanced technologies such as artificial intelligence and IoT. Therefore, in order to suggest a way of implementing the Korean future internet that can strengthen cybersecurity, this study suggests the direction and strategy for promoting the future internet that is suitable for the Korean cyber environment through analyzing important key factors in the implementation of the future internet and evaluating the trend and suitability of domestic & foreign research related to future internet. The importance of key factors in the implementation of the future internet proceeds in the order of security, integrity, availability, stability, and confidentiality. Currently, future internet projects are being studied in various ways around the world. Among numerous projects, Bright Internet most adequately satisfies the key elements of future internet implementation and was evaluated as the most suitable technology for Korea's cyber environment. Technical issues as well as strategic and legal issues must be considered in order to promote the Bright Internet as the frontrunner Korean future internet. As for technical issues, it is necessary to adopt SAVA IPv6-NID in selecting the Bright Internet as the standard of Korean future internet and integrated data management at the data center level, and then establish a cooperative system between different countries. As for strategic issues, a secure management system and establishment of institution are needed. Lastly, in the case of legal issues, the requirement of GDPR, which includes compliance with domestic laws such as Korea's revised Data 3 Act, must be fulfilled.

The appropriate amount of Defense budget for stabilizing National security in Northeast Asia (동북아지역의 안보균형을 위한 적정수준 국방비 분석에 관한 연구)

  • Lee, Wol-Hyeong;Kim, Hyung Jae
    • International Area Studies Review
    • /
    • v.20 no.1
    • /
    • pp.277-295
    • /
    • 2016
  • It is undoubtedly true that national security in Korean peninsula is on the road to destabilization. The main factors are known to be North Korea's development and experiment on nuclear arms, especially the forth nuclear experiment on January 6th, ICBM launch February 7th, and encroachment upon the territory the NLL on the 8th along with the shutdown on Gaeseong Industrial Complex. Also, China's trouble with other nations over sovereignty over islands in the South China Sea and the fact that Japan's government is veering to the right side and having territorial dispute are making the case worse. Nations in Northeast Asia are striving to obtain the interest for the sake of their own country. In order to do so, they're walking the path to achieve national security. Until then, they are not so willing to participate foreign matters or economical race. Even in our perspective, these issues are many of the main problems which our country is currently facing. However, it is important for them to avoid making policies which may take away the citizen's happiness. The number one priority for the nation or any form of a group is to act in the best interest for the national security and the citizen's happiness. They are the main factors why a nation could exist. They are the symbols of a nation's sovereign authority. Countries outside are proving it by increasing their national defense budget even in this unprecedented economical crisis. If we are willing to stay the same as ever, the disparity in the military force will not be the same in the future. In conclusion, the study examines the problem which changes in Northeast Asia's defense environment could bring and the appropriate amount of national defense budget in order to support the nation's integration of its abilities to move toward South and North Korea's unification.

A Study on the Management Capabilities Enhancement of Consignor's Personal Information Protection (위탁자의 개인정보보호 관리역량 제고에 관한 연구)

  • Cheong, Hwan-Suk;Park, Euk-Nam;Lee, Sang-Joon
    • Journal of Internet Computing and Services
    • /
    • v.17 no.4
    • /
    • pp.95-113
    • /
    • 2016
  • Personal information processing works, including resident registration number is common to be consigned by IT specialized company due to high level expertise and tremendous cost. The accident related to personal information is increasing and most of accidents are caused by the consignee's leaking information. According to the Inspection of personal information protection and the management level diagnosis of personal information protection, public Institutions need to build the consignee's accident prevention and personal information management system as soon as possible. In this paper, the efficient enhancement ways for the personal information protection is studied. We analyze the law of business consignment and select basic management items related with personal information protection, and propose a analysis scheme for management level of personal information protection and a enhancement scheme for management system of personal information protection. This paper suggests consignee's management system of personal information protection for the enhancement way and the three Strengthening ways in law. To compose the a enhancement scheme for management system of personal information protection, we conduct questionnaire survey to 30 consignees(IT maintenance, notice printing, call center, welfare center) related to typical tasks of public organizations, present reference for this scheme, and execute verification of this scheme by focus group interview of consignor and consignee.

A Study on the Problem of Application of Seismic Performance Reinforcement Method for Urban Railways Case of Fiber and Rigid Reinforcement (섬유 및 강성 보강재료 기반 도시철도 내진성능 보강공법적용의 문제점 연구)

  • Ha, Kyoung Hwa;Park, Jae Yil;Kang, Hwi Jin
    • Journal of Korean Society of Disaster and Security
    • /
    • v.13 no.1
    • /
    • pp.13-23
    • /
    • 2020
  • In 2005, Urban railway seismic design was introduced in Rep. Of Korea, and many studies on seismic performance evaluation and reinforcement methods were conducted. In accordance with the Enforcement Decree of the Earthquake Disaster Countermeasures Act issued in March 2009, during April 2010 to October 2013, some of local governments established detailed evaluation and reinforcement measures for seismic performance of the urban railway underground structure. Afterwards, the seismic performance reinforcement of the existing urban railway structures was conducted for the sections that a long period of used until the end of 2018, and the reinforcement works are carried out by various methods using the previously studied methods. However, various reinforcing materials and construction methods using have been studied, but the classification research on the construction methods currently applied to reinforcement construction of urban railways is insufficient. The purpose of study is to analysis the cases currently applied to seismic reinforcement construction and to show the characteristics of each construction method, the reasons for its application and problems.