• Title/Summary/Keyword: Security Concepts

Search Result 264, Processing Time 0.026 seconds

A Review of Concepts, Advantages and Pitfalls of Healthcare Applications in Blockchain Technology

  • Al-asmari, Aisha M.;Aloufi, Rahaf I.;Alotaibi, Youseef
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.5
    • /
    • pp.199-210
    • /
    • 2021
  • Recently, research in blockchain technology has grown in popularity. Most of these researches have pointed out designing and improving conceptual structures to create digital systems that are more secure, accessible, and effective. Although blockchain offers a wide range of advantages, it also has some pitfalls. This research aims to present an understanding of the properties of blockchain, the advantages, pitfalls, and applications based on blockchain technology. To achieve the goal of understanding blockchain technology concepts, a systematic literature review approach was introduced. 93 papers were chosen and reviewed in total. Therefore, this research provides a summary of recent studies that have been published in the field of blockchain. Moreover, we have created concept maps and tables that aid in a deep understanding of blockchain technology concepts and exhibit some of the blockchain applications. In blockchain-based applications, we focused on two areas, namely the Internet of Things (IoT) and healthcare.

Formation of a Competitive Paradigm of Ensuring Economic Security of Industrial Enterprises in the Conditions of Formation of Circular Economy

  • Pohrebniak, Anna;Tkachenko, Tetiana;Arefieva, Olena;Oksana, Karpenko;Chub, Anton
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.9
    • /
    • pp.118-124
    • /
    • 2021
  • The article examines the formation of a competitive paradigm of economic security of industrial enterprises in the formation of a circular economy. The basic laws of industrial enterprises are formed, which determined the characteristics of competitive positions and threats. The basic competitive concepts and their application at maintenance of economic safety of the industrial enterprises in the conditions of formation of circular economy are described. Thus, the technological approach to the formation of a competitive paradigm is based on production technologies, opportunities for technological modernization and development of infrastructure and intellectual competencies. The institutional concept reveals the regulatory mechanisms for ensuring competitiveness through the protectionism of national industrial enterprises, standardization and regulation of market imbalances. The innovation-investment approach within the competitive paradigm is also manifested in the creation of competitive advantages due to the presence of active innovative developments and their commercialization, knowledge and competencies of staff, capitalization of intelligence and communications, constant updating of infrastructure and technologies. Collectively, innovation and investment effects on the level of economic security allow industrial enterprises to ensure resilience to increasing competition, the emergence of new market challenges in the formation of a circular economy. A strategic approach to the application of a competitive paradigm to ensure the economic security of industrial enterprises allows you to justify the prospects for development and design behavioral models to predict and assess potential threats. The concept of system management is based on the complexity of threat analysis, the integrity of the economic security system, system-forming functions and patterns of implementation of industrial development tasks in the formation of a circular economy. The application of the described concepts is formalized by the authors through the definition of the basic patterns, directions and characteristics of their impact on the elements of the security system of industrial enterprises in the formation of a circular economy.

A Study on the Instructional Model utilizing Scratch for Introductory Programming Classes of SW-Major Students (SW전공자 프로그래밍 입문 수업의 스크래치 활용 수업 모형 연구)

  • KO, Kwangil
    • Convergence Security Journal
    • /
    • v.18 no.2
    • /
    • pp.59-67
    • /
    • 2018
  • The programming language is a core education area of software that is becoming increasingly important in the age of the fourth industrial revolution, but it requires mathematical knowledge and logical thinking skills, so that many local private university and college students with low basic skills are having difficulties learning it. This problem occasionally causes SW-major students to lose interest and confidence in their majors during the introductory course of programming languages; making them change their majors, or give up their studies. In this study, we designed an instructional model using Scratch for educating C-language which is a typical programming introductory language. To do this, we analyzed the concepts that can be trained by Scratch among the programming concepts supported by C-language, and developed the examples of Scratch for exercising the concepts. In addition, we designed an instructional model, by which the programming concepts are first learned through Scratch and then C-language is taught, and conducted an experiment on the SW-major freshman students of a local private university to verify the effectiveness of the model. In the situation where SW education is becoming common, we expect that this study will help programming language education of security IT students.

  • PDF

Return of Geopolitics and the East Asian Maritime Security (지정학의 부활과 동아시아 해양안보)

  • Lee, Choon-Kun
    • Strategy21
    • /
    • s.36
    • /
    • pp.5-32
    • /
    • 2015
  • Geopolitics or Political Geography is an essential academic field that should be studied carefully for a more comprehensive analysis of international security relations. However, because of its tarnished image as an ideology that supported the NAZI German expansion and aggression, geopolitics has not been regarded as a pure academic field and was rejected and expelled from the academic communities starting from the Cold War years in 1945. During the Cold War, ideology, rather than geography, was considered more important in conducting and analyzing international relations. However, after the end of the Cold War and with the beginning of a new era in which territorial and religious confrontations are taking place among nations - including sub national tribal political organizations such as the Al Quaeda and other terrorist organizations - geopolitical analysis again is in vogue among the scholars and analysts on international security affairs. Most of the conflicts in international relations that is occurring now in the post-Cold War years can be explained more effectively with geopolitical concepts. The post - Cold War international relations among East Asian countries are especially better explained with geopolitical concepts. Unlike Europe, where peaceful development took place after the Cold War, China, Japan, Korea, the United States, Taiwan and Vietnam are feeling more insecure in the post-Cold War years. Most of the East Asian nations' economies have burgeoned during the Cold War years under the protection of the international security structure provided by the two superpowers. However, after the Cold War years, the international security structure has not been stable in East Asia and thus most of the East Asian nations began to build up stronger military forces of their own. Because most of the East Asian nations' national security and economy depend on the oceans, these nations desire to obtain more powerful navies and try to occupy islands, islets, or even rocks that may seem like a strategic asset for their economy and security. In this regard, the western Pacific Ocean is becoming a place of confrontation among the East Asian nations. As Robert Kaplan, an eminent international analyst, mentioned, East Asia is a Seascape while Europe is a Landscape. The possibility of international conflict on the waters of East Asia is higher than in any other period in East Asia's international history.

A Study on Cyber Security Information Sharing Model Applicable to Power Generation Control System (발전제어시스템에 적용 가능한 사이버 보안 정보공유 모델 연구)

  • Hogi Min;Junghee Lee
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.34 no.3
    • /
    • pp.463-478
    • /
    • 2024
  • The limitations of previous research on improving security vulnerabilities in power generation control systems were analyzed, and as an alternative, a cyber security information sharing model is proposed. Understanding the operational characteristics of power generation control systems, we examined the concepts and policies of cyber security information sharing, analyzing practical implementation cases. We presented effective policies and technological approaches that can be applied to power generation control systems, and their efficacy was verified through a model evaluation to validate their impact.

Top-Level Implementation of AI4SE, SE4AI for the AI-SE convergence in the Defense Acquisition (무기체계 획득에서 인공지능-시스템엔지니어링 융화를 위한 최상위 수준의 AI4SE, SE4AI 구현방안)

  • Min Woo Lee
    • Journal of the Korean Society of Systems Engineering
    • /
    • v.19 no.2
    • /
    • pp.135-144
    • /
    • 2023
  • Artificial Intelligence (AI) is a prominent topic in almost every field. In Korea, Systems Engineering (SE) procedures are applied in Defense Acquisition, and it is anticipated that SE procedures will also be applied to systems incorporating AI capabilities. This study explores the applicability of the concepts "AI4SE (AI for SE)" and "SE4AI (SE for AI)," which have been proposed in the United States, to the Korean context. The research examines the feasibility of applying these concepts, identifies necessary tasks, and proposes implementation strategies. For the AI4SE, many attempts and studies applying AI to SE Processes both Requirements & Architectures Define, System implementation & V&V, and Sustainment. It needs Explainability and Security. For the SE4AI, the Functional AI implementation level, Quality & Security of the Data-set, AI Ethics, and Review policies are needed. Furthermore, it provides perspectives on how these two concepts should ultimately converge and suggests future directions for development.

A Research on the Development of Information Security Governance Framework (정보보호 거버넌스 프레임워크 개발에 관한 연구)

  • Lee, Seong-Il;Hwang, Kyung-Tae
    • Journal of Information Technology Applications and Management
    • /
    • v.18 no.2
    • /
    • pp.91-108
    • /
    • 2011
  • Enormous losses of shareholders and consumers caused by the risks threatening today's business (e.g., accounting fraud and inside trading) have ignited the necessity of international regulations on corporate ethics and internal control, such as Basel II and SOX. Responding to these regulations, companies are establishing governance system, applying it consistently to the core competency of the company, and increasing the scope of the governance system. Recently occurred security related incidents require companies to take more strict accountability over information security. One of the results includes strengthening of legislation and regulations. For these reasons, introduction of information security governance is needed. Information security governance governs the general information security activities of the company (establishment of information security management system, implementation of information security solutions) in the corporate level. Recognizing that the information security is not restricted to IT domain, but is the issue of overall business, this study develops information security governance framework based on the existing frameworks and systems of IT governance. The information security governance framework proposed in the study include concept, objective, and principle schemes which will help clearly understand the concepts of the information security governance, and execution scheme which will help implement proper organization, process and tools needed for the execution of information security governance.

Adorno's Negative Aesthetic Interpretation of Meta-phenomena in Architectural Design - With a Focus on Mimetic Moments in Generation of Concepts - (건축디자인의 메타성에 대한 아도르노의 부정미학적 해석 - 개념발생의 미메시스적 계기를 중심으로 -)

  • Park, Young-Tae
    • Korean Institute of Interior Design Journal
    • /
    • v.22 no.1
    • /
    • pp.85-96
    • /
    • 2013
  • This study relates to meta-phenomena in architectural design. Among others, this study aims to interpret and demonstrate the cognitive thoughts and methodological systems in 'autonomy and instrumentality' presented in works of art by positivist architects focusing on diagrams after the second modernity in addition to earlier formal experiments by John Hejduk, Peter Eisenman, Bernard Tschumi, and Daniel Libeskind. In order to achieve these aims, this study approached the mimetic concepts developed by Walter Benjamin and Theodor Adorno. Especially, meta-phenomena in the methods of architectural design were connected to productivity in Adorno's mimetic concepts. Also, in terms of formation and creation of works of art, the mimetic backgrounds of Adorno's theories on aesthetics were identified from features of concepts on the part of formal experiments. The results were systemized methodologically based on meta-phenomena appearing in pure arts and overall architectural design. These were presented as a framework to interpret 'autonomy and instrumentality' that exist in the working of negativity and mimesis. In this way, logics and intuition in architectural design as well as methodological systemization of convergent creativity were proved valid. In conclusion, Adorno's mimetic concepts systemized based on negativity and critical awareness may lead to new concepts. It has been proved that it is valid for security of meta-phenomena of architectural design as a production of autonomous spaces for differences and creation.

Introduction to IPSEC(Internet Protocol Security) (인터넷 보안 프로토콜 IPSEC)

  • Choi, Y.B.;Hwang, S.O.;Lee, J.S.;Yoon, K.S.;Kim, M.J.
    • Electronics and Telecommunications Trends
    • /
    • v.14 no.6 s.60
    • /
    • pp.51-63
    • /
    • 1999
  • IPSEC (Internet Protocol Security) is a network layer security protocol that is designed to support secure TCP/IP environment over the Internet considering flexibility, scalability, and interoperability. IPSEC primarily supports security among hosts rather than users unlike the other security protocols. Recently, IPSEC is emphasized as one of the important security infrastructures in the NGI (Next Generation Internet). It also has suitable features to implement VPN (Virtual Private Network) efficiently and its application areas are expected to grow rapidly. In this paper, the basic concepts and related standard documents of IPSEC will be introduced.

Cloud Computing in the Vulnerability Analysis for Personal Information Security (Cloud Computing의 개인 정보 보안을 위한 취약점 분석)

  • Sun, Jae-Hoon;Kim, Kui-Nam J.
    • Convergence Security Journal
    • /
    • v.10 no.4
    • /
    • pp.77-82
    • /
    • 2010
  • Cloud computing is defined as numerous concepts by research institutions and scholars. However, due to the present business trend in the IT sector, emphasizing on cost and efficiency, cloud computing has been defined as a form of computing which can provide extendable mass storage components in the virtual environment. As a result, security issues have been arising due to the variety of cloud computing services provided by the industries. This paper aims to analyze the weaknesses such as security techniques and inquiries, and personal information protection required for various cloud computing services.