• 제목/요약/키워드: Security Concepts

검색결과 262건 처리시간 0.021초

식품보장 기준선 마련을 위한 기본 개념과 세부 영역 설정 및 관련 지표 탐색 (Basic Concepts and Detailed Dimensions of Food Security and Related Indicators for Policy Development and Evaluation)

  • 박소현;황지윤;심재은;김기랑
    • 대한지역사회영양학회지
    • /
    • 제26권6호
    • /
    • pp.429-440
    • /
    • 2021
  • Objectives: Standardized guidelines and reference points for a food security policy are necessary to guarantee that basic social safety nets work properly. Therefore, this study aimed to explore the basic concepts and detailed dimensions of food security, including the potential relevant indicators, and sought to establish standardized well-being baselines. Methods: A literature review and 14 expert roundtable discussions were carried out to analyze and extract the key concepts of food security. After determining these concepts and detailed dimensions of food security, a conceptual framework was modeled. Then, indicators for each local government that could be monitored and evaluated for each sub-area were suggested. Results: The concept of food security was defined as follows: Individuals should be provided with sufficient, safe, and quality food, which should be accessible to the community and available for use to achieve health and well-being. In addition, food security should be ensured sustainably in a changing environment. Four dimensions were suggested while conceptualizing food security. First, sufficient food, which means sufficient food supply in quantity, quality, and safety. Second, equitable food which includes creating environments in which high-quality and safe food can be purchased at an appropriate price and can be provided regardless of the socioeconomic gap. Third, healthy food which should be provided to promote people's health and happiness through the eco-friendly consumption of food. Fourth, sustainable food, which can be supplied in a sustainable manner and as part of an eco-friendly food system that considers the conservation of natural environments. Conclusions: The basic concepts and detailed areas of food security including the potential indicators proposed in this study, may be useful for developing and implementing various policies and programs to support food and nutrition security in the future.

ICT기반 보안개념 정의와 범위에 관한 설계연구 (The Design Research on ICT Security Concepts and Domains)

  • 전민서;장항배
    • 경영정보학연구
    • /
    • 제21권3호
    • /
    • pp.49-61
    • /
    • 2019
  • 끊임없이 다양한 형태로 발생하는 보안사고와 이에 따른 피해의 규모가 증가함에 따라, 사회의 보안에 대한 관심과 함께 학문적 관심과 연구의 양도 지속적으로 증가하고 있다. 하지만 이러한 관심과 연구의 양적 증가에도 불구하고 보안과 안전에 대한 구분 없이 용어가 혼용되고 있으며, 다양한 보안개념용어들의 정의와 범위가 상호 공통성과 차별성을 보유하지 않은 채 연구가 진행되어 왔다. 실제로 현재 일반인을 대상으로 하는 뉴스 기사, 업무 문서 등에서 다양한 보안개념용어들이 오.남용되고 있는 관계로 보안의식과 이해수준을 낮추고 있으며, 궁극적으로는 보안학문이 고유영역을 확보하면서 지속적인 확장을 진행하는데 걸림돌이 되고 있다. 따라서 본 연구에서는 현재 학회 또는 산업현장 등에서 다양한 시각을 가지고 혼용되고 있는 보안개념용어들(정보보안, 사이버보안, 연구보안, 기업보안, 산업보안, 융합보안 등)에 대한 정의와 범위를 설계하고자, 학술중심의 문헌적 연구조사내용에 산업현장중심의 경험적 지식을 반영하는 과정(델파이 전문가 조사)을 통해 적정수준의 합의과정을 이끌어 내었다.

Micro-Learning Concepts and Principles

  • Almalki, Mohammad Eidah Messfer
    • International Journal of Computer Science & Network Security
    • /
    • 제22권5호
    • /
    • pp.327-329
    • /
    • 2022
  • Education is affected by technical and scientific developments. Progress in one of these areas leads give way to new educational methods and strategies. One of these advanced learning modes is what has been conventionally termed as Micro-learning (ML). It has emerged in educational technology as a result of advances in information technology as well as advances in research in memory, brain, and social-cognitive processes.In this paper, the researcher discusses micro-learning in terms of its concepts, tools, and associated concepts, advantages and disadvantages.

보안 모니터링과 감청의 차이점에 관한 연구 (A Study on the Difference between Security Monitoring and Wiretap)

  • 홍창화;최민규;김태훈
    • 한국항행학회논문지
    • /
    • 제13권1호
    • /
    • pp.104-112
    • /
    • 2009
  • 통신비밀보호법상의 감청과 보안모니터링은 유사한 것으로 간주될 수 있으나, 실제로는 전혀 다른 개념이라고 할 수 있다. 하지만 감청과 보안모니터링의 개념상 차이점에 대한 연구가 부족한 현 시점에서 두 용어가 혼용되고 있으며, 이로 인해 다양한 부작용이 나타나고 있다. 본 연구에서는 목적, 범위, 대상, 정보활용방법 등의 분야에서 통신감청과 보안모니터링을 비교함으로써 이 두 가지 개념의 차이점을 비교, 설명하였다.

  • PDF

품질과 비용을 고려한 프로세스 기반의 보안공학방법론에 관한 연구 (A Study on a Security Engineering Methodology for Information Security Systems Considering Quality and Cost)

  • 최명길
    • Journal of Information Technology Applications and Management
    • /
    • 제16권2호
    • /
    • pp.23-43
    • /
    • 2009
  • For reliability and confidentiality of information security systems, the security engineering methodologies are accepted in many organizations. To improve the effectiveness of security engineering, this paper suggests a security methodology ISEM, which considers both product assurance and production processes, takes advantages in terms of quality and cost. To verify the effectiveness of ISEM, this paper introduces the concepts of quality loss, and compares the development costs and quality losses between ISEM and CC through the development of VPN system.

  • PDF

The Effect of Using the Interactive Electronic Models in Teaching Mathematical Concepts on Students Achievement in the University Level

  • Alzahrani, Yahya Mizher
    • International Journal of Computer Science & Network Security
    • /
    • 제22권5호
    • /
    • pp.149-153
    • /
    • 2022
  • This study examines the effect of using interactive electronic models to teach mathematical concepts on students' achievement in the linear algebra course at university. The field sample consisted of 200 students divided into two equal groups, an experimental group of 100 students and a control group of 100 students. The researcher used an achievement test in some mathematical concepts related to linear algebra. The results of the study showed that there were statistically significant differences (0.05) between the average achievement scores of the experimental and control groups in the post application of the achievement test, in favor of the experimental group. The size of the influence of the independent factor on the results of the study, which is "interactive electronic forms", on the dependent factor, which is the students' academic achievement in the prepared test, had a very large effect. Also, the results of the study showed that there were statistically significant differences (0.05) between the mean scores of the experimental group in the pre and post applications of the achievement test, in favor of the post application. The researcher recommended the use of interactive electronic models in teaching mathematical concepts at the university level and diversifying the strategies of teaching mathematics, using technology to attract learners and raise their academic achievement.

Animated Game-Based Learning of Data Structures In Professional Education

  • Waseemullah, Waseemullah;Kazi, Abdul Karim;Hyder, Muhammad Faraz;Basit, Faraz Abdul
    • International Journal of Computer Science & Network Security
    • /
    • 제22권9호
    • /
    • pp.1-6
    • /
    • 2022
  • Teaching and learning are one of the major issues during this pandemic (COVID-19). Since the pandemic started, there are many changes in teaching and learning styles as everything related to studies started online. Game-Based Learning has got remarkable importance in the educational system and pedagogy as an effective way of increasing student inspiration and engagement. In this field, most of the work has been carried out in digital games. This research uses an Animated Game-Based Learning design in enhancing student engagement and perception of learning. In teaching Computer Science (CS) concepts in higher education, to enhance the pedagogy activities in CS concepts, more specifically the concepts of "Data Structures (DS)" i.e., Array, Stack, and Queue concepts are focused. This study aims to observe the difference in students' learning with the use of different learning methods i.e., the traditional learning (TL) method and the Animated Game-Based Learning (AGBL) Method. The experimental results show that learning DS concepts has been improved by the AGBL method as compared to the TL method.

경호무도 정신특성 요인의 상대적 중요도 평가 (Priority Order of Decisional Factors and Conceptual Construct of Security Martial Arts' Spirit)

  • 김동현
    • 시큐리티연구
    • /
    • 제32호
    • /
    • pp.7-32
    • /
    • 2012
  • 이 연구는 최상의 경호수행을 위해서 경호원이 갖추어야 할 경호무도의 정신요인에 대하여 분석적 계층화과정(AHP) 기법을 활용한 상대적 중요도를 평가하는 것에 목적이 있다. 연구 참여자는 경호학 전공자와 경호 관련 종사자, 그리고 경호이론 및 실기전문가 540명을 선정하였다. 정신특성에 대한 요인추출 단계에서는 문헌고찰을 통해서 수집된 자료를 활용하여 탐색 및 확인적 요인분석을 실시하였다. 이렇게 확인된 정신개념구조를 활용하여 요인 간 상대적 중요도를 전문가 설문을 통해 실시하였다. 통계처리는 SPSS 18.0 for windows와 AMOS 5.0 그리고 Expert Choice 2000을 활용하였다. 이러한 과정을 통해서 결론을 내리면 다음과 같다. 첫째, 경호무도 정신특성과 관련한 요인탐색 결과 4개의 일반요인과 20개 세부요인을 탐색할 수 있었다. 탐색된 요인의 구인타당성을 확인한 결과 모든 기준치에서 안정적인 값을 가지는 것으로 나타났다. 즉 경호무도의 정신특성 개념의 구인은 타당하다고 평가할 수 있다. 이러한 경호무도 정신개념의 일반 요인에 대한 명명화 과정을 통해서 심리관련, 사상관련, 무도관련, 실천관련 정신으로 구성하였고, 심리관련 정신 요인은 집중, 자신감, 자기관리, 몰입, 자부심(자존감)으로, 사상관련 정신 요인은 희생, 정의, 충성, 인류평화, 사명감으로, 무도관련 정신 요인은 예의, 강인, 호신, 심신일여, 용맹(기)으로, 실천관련 정신 요인은 책임, 협동, 겸손, 결단, 프로정신으로 구성하는 것이 타당하다는 결론에 도달했다. 둘째, 경호무도의 위계모형은 4개의 상위 개념과 20개의 하위개념으로 구성하였다. 이러한 경호무도 정신특성 위계모형을 토대로 상대적 중요를 평가한 결과 사상관련 정신(.482), 무도관련 정신(.248), 실천관련 정신(.188), 심리관련 정신(.083) 순으로 중요도가 판명되었다. 그리고 하위개념에 대한 경호무도의 정신특성에 대한 중요도는 희생(.252), 예의(.110), 사명감(.108), 책임(.073), 충성(.053), 강인성(.052), 정의(.049), 호신(.038), 프로정신(.038), 결단(.035), 협동(.029), 자신감(.026), 용맹(기)(.025), 자부심(자존감)(.024), 심신일여(.023), 인류평화(.019), 집중(.014), 겸손(.013), 자기관리(.011), 몰입(.007) 순으로 중요도가 판명되었다. 즉 경호무도는 희생, 정의, 충성, 인류평화, 사명감과 같은 사상관련 정신 요인이 가장 중요한 요인이라고 평가할 수 있다.

  • PDF

The Role of Augmented Reality in Solving Abstract Concepts Teaching Problems: A review article

  • Sayed Shaaban Abd-ul Aliem Younes
    • International Journal of Computer Science & Network Security
    • /
    • 제23권2호
    • /
    • pp.79-88
    • /
    • 2023
  • To find research that concentrated on the use of augmented reality to address issues with teaching abstract concepts, several international databases were examined. Thirty research, published between the years (2013-2022), were analyzed to determine the many functions of augmented reality in resolving issues with abstract notions. These studies discovered numerous roles, which are listed below. The use of augmented reality in the following areas: the simplification of abstract ideas, the embodiment of abstract ideas, the enrichment of examples of abstract ideas, the resolution of conceptual misunderstandings, the stimulation of interest in learning abstract ideas, and more, and the research ended with the presentation of the conclusions.

정책기반 네트워크 관리 시스템의 정책 충돌 탐지 및 복구 (Detection and Recovery of Policy Conflicts in Policy-based Network Management Systems)

  • 이규웅
    • 한국IT서비스학회지
    • /
    • 제6권2호
    • /
    • pp.177-188
    • /
    • 2007
  • Policy-based Network Management (PBNM) has been presented as a paradigm for efficient and customizable management systems. The approach chosen is based on PBNM systems, which are a promising and novel approach to network management. These systems have the potential to improve the automation of network management processes. The Internet Engineering Task Force (IETF) has also used policy concepts and provided a framework to describe the concept as the Policy Core Information Model (PCIM) and its extensions. There are policy conflicts among the policies that are defined as the policy information model and they are not easily and effectively detected and resolved. In this paper, we present the brief description of PBNM and illustrate the concepts of policy core information model and its policy implementation for a network security. Especially we describe our framework for detecting and resolving the policy conflicts for network security.