• Title/Summary/Keyword: Security Concepts

Search Result 262, Processing Time 0.022 seconds

Basic Concepts and Detailed Dimensions of Food Security and Related Indicators for Policy Development and Evaluation (식품보장 기준선 마련을 위한 기본 개념과 세부 영역 설정 및 관련 지표 탐색)

  • Park, Sohyun;Hwang, Ji-Yun;Shim, Jae Eun;Kim, Kirang
    • Korean Journal of Community Nutrition
    • /
    • v.26 no.6
    • /
    • pp.429-440
    • /
    • 2021
  • Objectives: Standardized guidelines and reference points for a food security policy are necessary to guarantee that basic social safety nets work properly. Therefore, this study aimed to explore the basic concepts and detailed dimensions of food security, including the potential relevant indicators, and sought to establish standardized well-being baselines. Methods: A literature review and 14 expert roundtable discussions were carried out to analyze and extract the key concepts of food security. After determining these concepts and detailed dimensions of food security, a conceptual framework was modeled. Then, indicators for each local government that could be monitored and evaluated for each sub-area were suggested. Results: The concept of food security was defined as follows: Individuals should be provided with sufficient, safe, and quality food, which should be accessible to the community and available for use to achieve health and well-being. In addition, food security should be ensured sustainably in a changing environment. Four dimensions were suggested while conceptualizing food security. First, sufficient food, which means sufficient food supply in quantity, quality, and safety. Second, equitable food which includes creating environments in which high-quality and safe food can be purchased at an appropriate price and can be provided regardless of the socioeconomic gap. Third, healthy food which should be provided to promote people's health and happiness through the eco-friendly consumption of food. Fourth, sustainable food, which can be supplied in a sustainable manner and as part of an eco-friendly food system that considers the conservation of natural environments. Conclusions: The basic concepts and detailed areas of food security including the potential indicators proposed in this study, may be useful for developing and implementing various policies and programs to support food and nutrition security in the future.

The Design Research on ICT Security Concepts and Domains (ICT기반 보안개념 정의와 범위에 관한 설계연구)

  • Minseo Jeon;Hangbae Chang
    • Information Systems Review
    • /
    • v.21 no.3
    • /
    • pp.49-61
    • /
    • 2019
  • As the number of security incidents and damages increase steadily, interest in the security of society is growing, and the amount of academic interest and research is steadily increasing. However, despite these concerns and the quantitative increase in research, the terms 'security' and 'safety' have been mixed and studies have been conducted without the conceptual definition of various security terms being clearly defined. As a result, various forms of security concepts based on ICT environments have been misused. Therefore, we tried to derive the consensus of experts among the various security terms which are mixed in this study, and to summarize the concepts based on the analysis of domestic and foreign documents based on the concept of the terms. Through this research, we intend to contribute to the establishment of the academic identity of security by preventing related mistakes caused by the mixed use of terminology.

Micro-Learning Concepts and Principles

  • Almalki, Mohammad Eidah Messfer
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.5
    • /
    • pp.327-329
    • /
    • 2022
  • Education is affected by technical and scientific developments. Progress in one of these areas leads give way to new educational methods and strategies. One of these advanced learning modes is what has been conventionally termed as Micro-learning (ML). It has emerged in educational technology as a result of advances in information technology as well as advances in research in memory, brain, and social-cognitive processes.In this paper, the researcher discusses micro-learning in terms of its concepts, tools, and associated concepts, advantages and disadvantages.

A Study on the Difference between Security Monitoring and Wiretap (보안 모니터링과 감청의 차이점에 관한 연구)

  • Hong, Chang-Hwa;Choi, Min-Kyu;Kim, Tai-Hoon
    • Journal of Advanced Navigation Technology
    • /
    • v.13 no.1
    • /
    • pp.104-112
    • /
    • 2009
  • Even though security monitoring and wiretap seem to be same things from the current legal point of view, these two concepts are different. But because the researches related to the differences between wiretap and security monitoring, there are some confusions about these concepts, so there are some side effects. In this paper, we try to explain the differences between wiretap and security monitoring in the aspects of object, scope, target and application method.

  • PDF

A Study on a Security Engineering Methodology for Information Security Systems Considering Quality and Cost (품질과 비용을 고려한 프로세스 기반의 보안공학방법론에 관한 연구)

  • Choi, Myeong-Gil
    • Journal of Information Technology Applications and Management
    • /
    • v.16 no.2
    • /
    • pp.23-43
    • /
    • 2009
  • For reliability and confidentiality of information security systems, the security engineering methodologies are accepted in many organizations. To improve the effectiveness of security engineering, this paper suggests a security methodology ISEM, which considers both product assurance and production processes, takes advantages in terms of quality and cost. To verify the effectiveness of ISEM, this paper introduces the concepts of quality loss, and compares the development costs and quality losses between ISEM and CC through the development of VPN system.

  • PDF

The Effect of Using the Interactive Electronic Models in Teaching Mathematical Concepts on Students Achievement in the University Level

  • Alzahrani, Yahya Mizher
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.5
    • /
    • pp.149-153
    • /
    • 2022
  • This study examines the effect of using interactive electronic models to teach mathematical concepts on students' achievement in the linear algebra course at university. The field sample consisted of 200 students divided into two equal groups, an experimental group of 100 students and a control group of 100 students. The researcher used an achievement test in some mathematical concepts related to linear algebra. The results of the study showed that there were statistically significant differences (0.05) between the average achievement scores of the experimental and control groups in the post application of the achievement test, in favor of the experimental group. The size of the influence of the independent factor on the results of the study, which is "interactive electronic forms", on the dependent factor, which is the students' academic achievement in the prepared test, had a very large effect. Also, the results of the study showed that there were statistically significant differences (0.05) between the mean scores of the experimental group in the pre and post applications of the achievement test, in favor of the post application. The researcher recommended the use of interactive electronic models in teaching mathematical concepts at the university level and diversifying the strategies of teaching mathematics, using technology to attract learners and raise their academic achievement.

Animated Game-Based Learning of Data Structures In Professional Education

  • Waseemullah, Waseemullah;Kazi, Abdul Karim;Hyder, Muhammad Faraz;Basit, Faraz Abdul
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.9
    • /
    • pp.1-6
    • /
    • 2022
  • Teaching and learning are one of the major issues during this pandemic (COVID-19). Since the pandemic started, there are many changes in teaching and learning styles as everything related to studies started online. Game-Based Learning has got remarkable importance in the educational system and pedagogy as an effective way of increasing student inspiration and engagement. In this field, most of the work has been carried out in digital games. This research uses an Animated Game-Based Learning design in enhancing student engagement and perception of learning. In teaching Computer Science (CS) concepts in higher education, to enhance the pedagogy activities in CS concepts, more specifically the concepts of "Data Structures (DS)" i.e., Array, Stack, and Queue concepts are focused. This study aims to observe the difference in students' learning with the use of different learning methods i.e., the traditional learning (TL) method and the Animated Game-Based Learning (AGBL) Method. The experimental results show that learning DS concepts has been improved by the AGBL method as compared to the TL method.

Priority Order of Decisional Factors and Conceptual Construct of Security Martial Arts' Spirit (경호무도 정신특성 요인의 상대적 중요도 평가)

  • Kim, Dong-Hyun
    • Korean Security Journal
    • /
    • no.32
    • /
    • pp.7-32
    • /
    • 2012
  • This study aimed to evaluate the relative status using Analytic Hierarchy Process(AHP) on the spiritual factors of the security martial arts for the guards to perform the best security service. There were 540 participants who were students majored in security martial arts, workers for security and specialists of practical and theoretical security martial arts for this study. The exploratory and confirmatory factor analysis were carried out using the selecting data through literature reviews in the level of the factor-extraction about the spiritual characteristics. The specialists' survey was conducted on the relative status among factors using the spiritual concept structure based on the studied above. Selected data was calculated with SPSS 18.0 for windows, AMOS 5.0, and Expert Choice 2000 software. The conclusion can be made through those process above. First, 4 general factors and 20 detailed factors were found as the result of the factor exploration related to the spiritual characteristics of the security martial arts. The result which was verified on Construction validity of searched factors had stable figures on every standard. In other words, the participants for survey on this study "Spiritual characteristic concepts of the security martial arts" can be evaluated it is valid. The general factors of security martial arts' spirit were conceptualized with Psychological spirit, ethical spirit, martial art spirit, practical spirit through the naming process on the general factors of the security martial arts' spiritual characteristic concepts. The detailed factors of security martial arts' spirit were concentration, self-confidence, self-management, immersion, self-esteem in psychological spirit and sacrifice, justice, royalty, peace, sense of duty in ethical spirit and courtesy, toughness, defense, balance of mind and body, bravery in martial arts and responsibility, cooperation, modesty, determination, professionalism in practical spirit of security martial arts. That is, the conceptualization of security martial arts' spirit was verified that it had validity. Second, the hierarchical model of the security martial arts was composed with 4 superordinate concepts and 20 subordinate concepts. As the result of evaluating relative status based on Spiritual characteristics-hierarchy model, the impotance was proven in order of ethical spirit(.482), martial art spirit(.248), practical spirit(.188), psychological spirit(.083). Also the importance related to spiritual characteristics of security martial arts on subordinate concepts was proven in order of sacrifice(.252), courtesy(.110), sense of duty(.108), responsibility(. 073), royalty(.053), toughness(.052), justice(.049), defense(.038), professionalism(.038), determination(.035), cooperation(.029), self-confidence (.026), bravery(.025), self-esteem(.024), balance of mind and body(.023), peace(.019), concentration(.014), modesty(.013), self-management(.011), flow (.007). To sum up, the spiritual factor related to ethics such as sacrifice, justice, royalty, peace, sense of duty was the most important for the security martial arts.

  • PDF

The Role of Augmented Reality in Solving Abstract Concepts Teaching Problems: A review article

  • Sayed Shaaban Abd-ul Aliem Younes
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.2
    • /
    • pp.79-88
    • /
    • 2023
  • To find research that concentrated on the use of augmented reality to address issues with teaching abstract concepts, several international databases were examined. Thirty research, published between the years (2013-2022), were analyzed to determine the many functions of augmented reality in resolving issues with abstract notions. These studies discovered numerous roles, which are listed below. The use of augmented reality in the following areas: the simplification of abstract ideas, the embodiment of abstract ideas, the enrichment of examples of abstract ideas, the resolution of conceptual misunderstandings, the stimulation of interest in learning abstract ideas, and more, and the research ended with the presentation of the conclusions.

Detection and Recovery of Policy Conflicts in Policy-based Network Management Systems (정책기반 네트워크 관리 시스템의 정책 충돌 탐지 및 복구)

  • Lee, Kyu-Woong
    • Journal of Information Technology Services
    • /
    • v.6 no.2
    • /
    • pp.177-188
    • /
    • 2007
  • Policy-based Network Management (PBNM) has been presented as a paradigm for efficient and customizable management systems. The approach chosen is based on PBNM systems, which are a promising and novel approach to network management. These systems have the potential to improve the automation of network management processes. The Internet Engineering Task Force (IETF) has also used policy concepts and provided a framework to describe the concept as the Policy Core Information Model (PCIM) and its extensions. There are policy conflicts among the policies that are defined as the policy information model and they are not easily and effectively detected and resolved. In this paper, we present the brief description of PBNM and illustrate the concepts of policy core information model and its policy implementation for a network security. Especially we describe our framework for detecting and resolving the policy conflicts for network security.