• 제목/요약/키워드: Security Concepts

Search Result 266, Processing Time 0.022 seconds

Information Technologies in the Formation of Environmental Consciousness in Future Professionals

  • Tomchuk, Mykhailo;Khrolenko, Maryna;Volokhata, Kateryna;Bakka, Yuliia;Ieresko, Oleg;Kambalova, Yanina
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.1
    • /
    • pp.331-339
    • /
    • 2022
  • The global process of transition from industrial to information society, as well as socio-economic changes taking place in Ukraine, require significant changes in many areas of state activity. It is especially connected with the reforms in the sphere of education. Today, national programs provide for the development of education on the basis of new progressive concepts, the introduction of the educational process of new pedagogical technologies and scientific achievements, the creation of a new system of information education, entrance of Ukaine into the transcontinental computer information system. Information technologies are qualitatively changing the key resources of development: this is no longer a space with fixed production, but primarily mobile finance and intelligence. They have a direct impact on the formation of personal growth, professional content and self-organization, emotional and psychological maturity and consciousness, and so on. One of the main factors in ensuring the stability and social education of the country's citizens is the culture of security, the formation and development of which is an urgent problem today. Comprehensive and systematic development of security culture will significantly increase the readiness of the population, the level of environmental, labor and patriotic education, reduce human losses, material damage from emergencies. Ecological education can be carried out more successfully only gradually and in accordance with the socio-psychological periods of one's development: kindergarten - school - college - university. The creation of such a system of environmental education should be enshrined as the basis of state environmental policy as a constitutional norm with the usage of information technology. Graduates of universities, who are the future of our country, after mastering the skills of basic environmental education must have a high level of environmental culture, which is, in turn, part of general human culture, and investigate environmental issues from the standpoint of their profession. It is known that with the help of environmental education the collective intelligence of society is formed, which can predict human activities and processes occurring in nature, and in some way to help with the elimination of crises. It is through environmental education that another system of human values is being formed, which places great emphasis on intangible wealth and solidarity, and great responsibility of humanity for the ecological state of the native country; provides a higher standard of living as a result of sustainable development, through the introduction of information technology in this system. To improve the quality of life, we need better knowledge, which must be implemented through information technology at the international level.

A Secure Multiagent Engine Based on Public Key Infrastructure (공개키 기반 구조 기반의 보안 다중 에이전트 엔진)

  • 장혜진
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.3 no.4
    • /
    • pp.313-318
    • /
    • 2002
  • The Integration of agent technology and security technology is needed to many application areas like electronic commerce. This paper suggests a model of extended multi-agent engine which supports privacy, integrity, authentication and non-repudiation on agent communication. Each agent which is developed with the agent engine is composed of agent engine layer and agent application layer. We describe and use the concepts self-to-self messages, secure communication channel, and distinction of KQML messages in agent application layer and messages in agent engine layer. The suggested agent engine provides an agent communication language which is extended to enable secure communication between agents without any modifications or restrictions to content layer and message layer of KQML. Also, in the model of our multi-agent engine, secure communication is expressed and processed transparently on the agent communication language.

  • PDF

Psychological Motives for Suicide Terrorism of Islamic Suicide Terrorists and Countermeasures (이슬람 자살폭탄테러범의 심리적 범행동기와 대비책)

  • Choi, Kee-Nam
    • Convergence Security Journal
    • /
    • v.15 no.6_2
    • /
    • pp.107-119
    • /
    • 2015
  • The key objective of terrorism is to create favorable conditions for certain political, ideological, or religious interests through deliberate social chaos and the spread of fear. Accordingly, terrorist groups rally the means and methods capable of spreading fear among the public through shocking violence. Consequently, as terrorism manifests the progress in modern civilization and the structure of international community, its concepts, means, and methods evolve organically with the progress. The characteristics of the modern terrorism include that it has evolved as a means of war against countries by non-state militant groups, and suicide terrorism is spreading like epidemic as it fits the strategies of Islamic extremist and terrorist organizations as a part of international politics based on terrorism. The humanity's efforts to eliminate the threat of terrorism led to decades of implementing premature policies of military force, but they were found ineffective and resulted in the spread of extreme threat of suicide terrorism. For prevention of suicide terrorism, the efforts must be made to dismantle the basis of suicide attacks through addressing religious alienation and antipathy against a civilization using the notions similar to treatment of pathology considering psychological motives of suicide terrorists.

New Trends in Private International Law and Our Response (국제상거래(國際商去來)의 사법통일(私法統一)노력과 우리의 대응(對應))

  • Park, Whon-Il
    • THE INTERNATIONAL COMMERCE & LAW REVIEW
    • /
    • v.12
    • /
    • pp.65-84
    • /
    • 1999
  • During the past few decades, we have witnessed three approaches to overcome the legal disparities between trading countries: - determining the individual governing law in accordance with the conflict of laws principle; - unifying and harmonizing private international law into uniform rules and substantive laws under the auspices of ICC, UNCITRAL, UNIDROIT and various NGOs ; and - drafting model laws like the UNCITRAL Model Law on Electronic Commerce and promoting member countries to enact them. Against this backdrop, the United Nations Convention on Contracts for the International Sale of Goods (CISG) and the process by which it was adopted, established the benchmark for the unification of commercial law. The CISG, completed in 1980, merged civil and common law concepts and came into force in 1988 after a certain number of countries endorsed the treaty. Besides the CISG, the U.N. Limitations Convention and the UNIDROIT Principles of International Commercial Law, to name a few, have attempted to set cross-border legal norms and standards in the international business transactions. However, since the advent of computer-based commerce, there have emerged all-out efforts to establish uniform rules before national legal systems have been developed. As a consequence, the Model Law on Electronic Commerce has become a specimen legislation covering functional equivalents of paper-based writing and signature. For the credit enhancement exemplified by the Uniform Rules for Demand Guarantees (ICC Publication No.458), the UNCITRAL prepared the U.N. Convention on Independent Guarantees and Stand-by Letters of Credit, which was adopted by the U.N. General Assembly in 1995 but remains still not effective as only two countries have ratified this treaty so far. In this connection, two draft conventions underway at UNIDROIT and UNCITRAL deserve our attention as the probability of unification in the Korean Peninsula is mounting. They are to create security interests for commercial finance in moveable equipment and accounts receivable. The UCC-type security rights are regarded to be useful to enable the North Koreans with limited properties to borrow from the banks.

  • PDF

Analysis on the Actual Environmental Conditions of Domestic and Oversea Police Detention Facilities (국내외 경찰서 유치시설의 환경 실태 분석)

  • Cho, Hyeonmi
    • Korean Institute of Interior Design Journal
    • /
    • v.22 no.1
    • /
    • pp.339-349
    • /
    • 2013
  • The primary purpose of this research was to set up the standard guidelines for the planning of interior architectural environments of the detention facilities at the Korean Police Stations. By visit-studying the actual interior environmental conditions of 5 different kinds' domestic Correcting Facilities and 5 domestic police detention facilities and 2 foreign police detention facilities, comparing them to the existing Korean correctional institutions' cell facilities, that the strengths and weaknesses had been analyzed to extract the main concepts and the planning scheme for the Standard Korean Police Detention Facilities. By reserching the National human Right Commitee's Anual Reports, three different indexes were picked out for those analysis : the Environmental control index, the Detention Service support index, the Environmental support index. These three indexes will be used as Key factors for the planning of interior architectural environments of the detention facilities at the Korean Police Stations.: (1)the Environmental control index to establish the Space Program, the Spatial Hierarchy and the horizontal & vertical Security Blocks, (2)the Detention Service support index for the central Environmental Control & Security System, the Secured Privacy for both detainees & police offices, (3)the Environmental support index for the gender-respected segregation of cell zones, the psychological & physical safety design factors, the construction standards of all rooms in a detention facility. The result of this study should be used as the guidelines for "The Standard Plans and Regulations for the Korean Police Detention Facilities" to respect fundamental human rights.

Developing an Intelligent System for the Analysis of Signs Of Disaster (인적재난사고사례기반의 새로운 재난전조정보 등급판정 연구)

  • Lee, Young Jai
    • Journal of Korean Society of societal Security
    • /
    • v.4 no.2
    • /
    • pp.29-40
    • /
    • 2011
  • The objective of this paper is to develop an intelligent decision support system that is able to advise disaster countermeasures and degree of incidents on the basis of the collected and analyzed signs of disasters. The concepts derived from ontology, text mining and case-based reasoning are adapted to design the system. The functions of this system include term-document matrix, frequency normalization, confidency, association rules, and criteria for judgment. The collected qualitative data from signs of new incidents are processed by those functions and are finally compared and reasoned to past similar disaster cases. The system provides the varying degrees of how dangerous the new signs of disasters are and the few countermeasures to the disaster for the manager of disaster management. The system will be helpful for the decision-maker to make a judgment about how much dangerous the signs of disaster are and to carry out specific kinds of countermeasures on the disaster in advance. As a result, the disaster will be prevented.

  • PDF

Chosen Plaintext Collision Attack Using the Blacklist (Blacklist를 활용한 선택적 평문 충돌 쌍 공격)

  • Kim, Eun-Hee;Kim, Tae-Won;Hong, Seok-Hie
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.24 no.6
    • /
    • pp.1103-1116
    • /
    • 2014
  • Collision attacks using side channel analysis confirm same intermediate value and restore sensitive data of algorithm using this point. In CHES 2011 Clavier and other authors implemented the improved attack using Blacklist so they carried out the attack successfully using less plaintext than before. However they did not refer the details of Blacklist method and just performed algorithms with the number of used plaintext. Therefore in this paper, we propose the specific method to carry out efficient collision attack. At first we define basic concepts, terms, and notations. And using these, we propose various methods. Also we describe facts that greatly influence on attack performance in priority, and then we try to improve the performance of this attack by analyzing the algorithm and structuring more efficient one.

Future Direction of ROK Navy's Maritime Strategy based on the Recognition and Expansion of Maritime Sphere (해양공간 인식과 확장의 관점에서 본 한국 해양전략의 발전 방향)

  • Jung, Gwang-Ho
    • Strategy21
    • /
    • s.44
    • /
    • pp.142-176
    • /
    • 2018
  • So far, the main threat to South Korea was North Korea. That is why South Korea established a strategy based on the threat of North Korea and most of the budget on defense was used to deter North Korea. Even though the neighboring countries(China, Japan, and Russia) are growing as a real threat with abilities and intentions based on their powerful naval forces, South Korea has not yet been able to establish a strategy that regards neighboring countries as a threat. But the decades-old structural mechanism of the Korean security environment is undergoing a radical change on April 27, 2018, through the South-North summit and the Panmunjom Declaration. Under the changing security environment, South Korea was placed in a complicated dilemma that had to deal with threats of two axes(China), three axes(China, Japan), and four axes(Japan, Russia). If the one axis threat(North Korea) is dominated by land threats, the second, third and fourth axis threats are threats from the sea. This paper analyzed the maritime strategy of Korea within the framework of maritime-geopolitics, in other words recognition and expansion of the sphere of maritime. I have designed that the maritime defense space that we can deny from threats is divided into three lines of defense: 1 line (radius 3,000km), 2 lines (2,000km), and 3 lines (1,000km). The three defense zones of the three lines were defined as an active defense(1 line), defensive offense(2 line), active offense(3 line). The three defense zones of the three lines were defined as the sphere of core maritime, As a power to deny the sphere of core maritime, it was analyzed as a maneuvering unit, a nuclear-powered submarine, the establishment of missile strategy, and the fortification of islands station. The marine strategy of South Korea with these concepts and means was defined as 'Offensive Maritime Denial Strategy'.

Information Systems in Project Management of The Public Sphere

  • Mamatova, Tetiana;Chykarenko, Iryna;Chykarenko, Oleksii;Kravtsova, Тetiana;Kravtsov, Olеg
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.8
    • /
    • pp.141-148
    • /
    • 2021
  • Project management is a current trend of management in the public sphere, based on different principles, methods and tools. The tools include information technologies providing control over time, cost, quality and planning process in order to ensure accountability to interested parties. The goal of the research was to examine the impact of the integration of information systems in project management of the public sphere on the quality of public governance and administration using the example of infrastructure projects involving the private sector in developing countries. The methodology of the research is based on the concepts of "digital-era governance" (DEG), "Information governance" and "project governance" to determine the effectiveness of information systems and technologies in the management of infrastructure projects in the public sphere. The data from the countries with Lower middle income (India, Indonesia, Philippines, Ukraine, Vietnam) and Upper middle income (Argentina, Brazil, China, Colombia, Mexico, Peru, Romania, Russian Federation, Thailand, Turkey) for 1996-2020 were used to study the effects of DEG. The results show two main trends in the countries with Lower middle income and Upper middle income. The first trend is the development of digital governance, the concept of "digital-era governance" through information systems and performance measurement of the governance system, forecasting of investment flows of infrastructure projects, measurement of payback and effectiveness parameters for investment management in the public sector, decision support. The second trend is the existence of systemic challenges related to corruption, social and institutional factors through the development of democracy in developing countries and the integration of NPM similar to developed countries. The confidence of interested parties, especially private investors, in public authorities is determined by other factors - the level of return on investment, risks and assignment of responsibility, probability of successful completion of the project. These data still remain limited for a wide range of project participants, including citizens.

Towards Integrating the Knowledge Management Mechanisms to Employ Innovation Factors within Universities: Critical Appraisal Study

  • Alsereihy, Hassan Awad M.;Harasani, Meshal Hesham
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.8
    • /
    • pp.327-341
    • /
    • 2021
  • The knowledge management was considered as the inevitable result of the rule of knowledge in this era, and its importance became clear in being the main source for achieving success, the need to consider and manage knowledge as an independent field that must be addressed with a clear scientific methodology has become intangible - they are very valuable and a strategic asset. On the other hand, the innovation process relates to all parts of the organization, and helps to improve the behavioral patterns of individuals and their attitudes towards adopting modern and innovative ideas, it is a purposeful process adopted by the senior management and works to provide the capabilities and requirements for embodying the innovative behavior in it. In the field of dealing with the market, it is a product of the organization's innovative approach, which aims at advancement, change, and intended and organized renewal. The main objective of this article is to determine the most appropriate ways to integrate knowledge management mechanisms to employ innovation factors within universities based on the role of universities in supporting innovation. This was achieved through reviewing many relevant research and listing the most prominent concepts of knowledge management, its importance, objectives, and processes determining the stages of knowledge management application, the requirements for applying knowledge management, and the obstacles that impede its application; Then the statement "Innovation in universities, through which it addressed the concept of innovation, its importance, stages, and requirements for its application, as well as identifying the most prominent models of innovation, and obstacles to innovation, in addition to that the role of universities in supporting innovation will be identified. From the surveyed study done in this article, we concluded that the relationship among organizational culture, knowledge management and innovation capability can provide useful insights for managers regarding developing a strong culture, promote knowledge management practices effectively and eventually enhance the whole organization's innovation capability. Also, we found that different components of Knowledge Management as Knowledge activities, Knowledge types, transformation of knowledge and technology have a significant positive effect in bringing innovation through transformation of knowledge into knowledge assets in universities.