• Title/Summary/Keyword: Security Evaluation Model

Search Result 389, Processing Time 0.031 seconds

A Study on the Development of Service Quality Evaluation Model for Private Security Corporation (민간경비 기업의 서비스품질 평가모형 개발에 관한 연구)

  • Kim, kyung-sik;Kim, eun-jung
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2013.05a
    • /
    • pp.235-236
    • /
    • 2013
  • 이 연구는 2013년 민간경비 시스템을 활용하고 있는 사업장을 대상으로 민간경비기업의 서비스품질평가 모형을 개발하는데 그 목적이 있다. 이를 위해 수도권 소재 사업장을 모집단으로 선정한 다음 유의표집법을 활용하여 200명을 표집하였다. 결론은 다음과 같다. 민간경비 기업의 서비스품질의 신뢰도와 타당도는 높다.

  • PDF

The effects of the operation of an information security management system on the performance of information security (정보보호 관리체계의 지속적인 정보보호 관리과정(PDCA)이 정보보호 성과에 미치는 영향에 관한 실증 연구)

  • Jang, Sang-Soo;Lee, Sang-Joon;Noh, Bong-Nam
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.5
    • /
    • pp.1123-1132
    • /
    • 2012
  • Many domestic organizations are introducing and operating various information security management systems capable of coping with technical, administrative, and legal issues comprehensively and systematically, in order to prevent various infringement incidents such as personal information disclosure and hacking preemptively and actively. However, empirical analyses regarding the extent to which an information security management system contributes to information security performance have not been fully conducted, even though enterprises and organizations are actively introducing such systems in order to achieve their information security objectives as a part of their organizational management activities in line with their respective business, by investing considerable effort and resources in developing and operating these systems. This approach can be used to apply, develop, and operate the information management system actively within an organization. this study focused on analyzing how each specific phase of the information security management system affects information security performance, compared with previous studies, which generally focus on the information security control item in analyzing information security performance. The information security management system was analyzed empirically to determine how the Security PCDA cycling model affects information security performance.

Short-Term Generation Scheduling Considering Transmission Line Capacity Limits (선로용량한계를 고려한 단기 발전계획)

  • 김준현;송현선;유인근
    • The Transactions of the Korean Institute of Electrical Engineers
    • /
    • v.35 no.12
    • /
    • pp.594-602
    • /
    • 1986
  • This paper proposes an effective algorithm for short-term generation scheduling for the purpose of economic and secure operation of thermal power systems. Especially, in the procedure of solution by Dynamic Programming, Linear Programming is introduced to promote the possibility of optimal solution and the security of power systems, and evaluation of security function is improved by the application of seven step approximation of normal distribution. Several necessary considerations, that is, time dependent start-up and constant down cost of generating units, demand and spinning reserve constraints, minimum up and sown time constraints, the number of possible start-up of a generating unit in a d and the number of generating units which can be started up at the same time at the same bus, are also incoporated to elevate the usability and flexibility of the algorithm. Finally, the effectiveness of the proposed algorithm has been demonstrated by applying to the 6-gen. 21-bus model power system.

  • PDF

Contingency Severity Ranking Using Direct Method in Power Systems (전력계통에 있어서 직접법을 활용한 상정사고 위험순위 결정)

  • Lee, Sang-Keun
    • The Transactions of the Korean Institute of Electrical Engineers P
    • /
    • v.54 no.2
    • /
    • pp.67-72
    • /
    • 2005
  • This paper presents a method to select contingency ranking considering voltage security problems in power systems. Direct method which needs not the detailed knowledge of the post contingency voltage at each bus is used. Based on system operator's experience and knowledge, the membership functions for the MVAR mismatch and allowable voltage violation are justified describing linguistic representation with heuristic rules. Rule base is used for the computation of severity index for each contingency by fuzzy inference. Contingency ranking harmful to the system is formed by the index for security evaluation. Compared with 1P-1Q iteration, this algorithm using direct method and fuzzy inference shows higher computation speed and almost the same accuracy. The proposed method is applied to model system and KEPCO pratical system which consists of 311 buses and 609 lines to show its effectiveness.

An Improved Pseudorandom Sequence Generator and its Application to Image Encryption

  • Sinha, Keshav;Paul, Partha;Amritanjali, Amritanjali
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.16 no.4
    • /
    • pp.1307-1329
    • /
    • 2022
  • This paper proposes an improved Pseudorandom Sequence Generator (PRSG) based on the concept of modular arithmetic systems with non-integral numbers. The generated random sequence use in various cryptographic applications due to its unpredictability. Here the mathematical model is designed to solve the problem of the non-uniform distribution of the sequences. In addition, PRSG has passed the standard statistical and empirical tests, which shows that the proposed generator has good statistical characteristics. Finally, image encryption has been performed based on the sort-index method and diffusion processing to obtain the encrypted image. After a thorough evaluation of encryption performance, there has been no direct association between the original and encrypted images. The results show that the proposed PRSG has good statistical characteristics and security performance in cryptographic applications.

A Novel Thresholding for Prediction Analytics with Machine Learning Techniques

  • Shakir, Khan;Reemiah Muneer, Alotaibi
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.1
    • /
    • pp.33-40
    • /
    • 2023
  • Machine-learning techniques are discovering effective performance on data analytics. Classification and regression are supported for prediction on different kinds of data. There are various breeds of classification techniques are using based on nature of data. Threshold determination is essential to making better model for unlabelled data. In this paper, threshold value applied as range, based on min-max normalization technique for creating labels and multiclass classification performed on rainfall data. Binary classification is applied on autism data and classification techniques applied on child abuse data. Performance of each technique analysed with the evaluation metrics.

The Legal Structure of Guard & Security Contract and the Prevention & Resolution Method of Security Disputes (경호경비계약의 법적 구조 및 분쟁의 예방과 해결 방안)

  • Ahn, Sung-Cho
    • Korean Security Journal
    • /
    • no.11
    • /
    • pp.129-157
    • /
    • 2006
  • With rapid social change, by culminating the social hazards and the safety problems about it are on the increase too. According to the needs for the safety the demand of the private guard & security provided the safety and security service against danger is also increasing. As the need for the safety is increasing, so recently the private guard & security industry is extended. Therefore the purpose of this study is to grasp and carry out researches into the legal structure on the Security contract, is to analyze the formation of contract and find out the ensuing problem in order to prevent or settle the dispute which is apt to occur between the specific client and the security companies. In order to minimize the dispute going with security relationship in particular, it is necessary that one should write down the agreed contents as the document explicitly to make a security contract with the parties. Hereupon in the plan which standardizes the security contract with each parties autonomously, it is suggested that this study should present the model of Dispute Resolution Clause Especially it is the best means that it is amicable consultation or negotiation as the effective way of settlement methods of private dispute arising from the concerned parties. In inevitable case it recommends the method which solves the dispute by means of an arbitration than litigation at administration of justice(in terms of jurisdiction). If the parties wish to settle the disputes by arbitration, they must come to an arbitration agreement in the form of a arbitration clause in the security contract. After the test and evaluation through application utilizing it in actual security field, the security standard contract regulates about it and this terms should widely apply a individual case to whole industry.

  • PDF

A Study of Simulation Method for Evaluation of Civil Military Operations Performance Level (민군작전 수행수준평가 모의방안 연구)

  • Song, In-Hoy
    • Journal of the Korea Society for Simulation
    • /
    • v.25 no.2
    • /
    • pp.13-20
    • /
    • 2016
  • In times of current warfare, importance of civil military operations(CMO) is more on the rise because the military winning does not couple the political winning immediately. For this reason, CMO Model Development Program has been commenced by ROK JCS since FY 2014. As CMO is non-kinetic operations which is focused on civilians, it depends on the commander's decision that reflects the results of the evaluation of the CMO performance level. The evaluation of CMO performance level is a very important factor of this model. So, I decided my subject a study of simulation method for evaluation of CMO Performance level. It is affected in CMO performance level by the occurrence of some event, and the achievement results of CMO for the response action on such event is evaluated by the 5 factors(administration level, security level, infrastructure level, humanitarian support level, friendship level) on the evaluation of CMO performance level. Even more it is affected in achievement of new CMO and new event by evaluation results. In this study, I provided a methodology of how apply the evaluation results and how simulate the achievement results of CMO performance with the 5 factors on the evaluation of CMO Performance level. Also this study is expected that it will be highly contributed to training and exercise in CMO branch in ROK JCS, when CMO Model Development Program is done as a new model applied such evaluation factors matching military environment in the Korean Peninsular, and applied this simulation method for evaluation of CMO Performance level.

Development Software to Select Boundary Manikins for Product Evaluation: Applied to an Automobile Case (사용성 평가 전용 인체모델 선정 소프트웨어 개발 및 자동차 적용사례)

  • Lim, Young-Jae;Park, Sung-Joon;Park, Woo-Jin;Park, Jun-Soo;Jung, Eui-S.;Lim, Ik-Sung
    • Journal of the Ergonomics Society of Korea
    • /
    • v.29 no.6
    • /
    • pp.831-841
    • /
    • 2010
  • Usability evaluation of physical products involves characterizing complex physical interactions between humans and products. Human models known as manikins have been widely utilized as usability evaluation tools for automobile interior package design. When combined with computer-aided design software programs, such manikins can be used to simulate driving postures and evaluate driver-interior fits early in the design process, and therefore, may greatly facilitate achieving high-quality design in a cost-efficient manner. The purpose of this study was to define a set of manikins for designing automobile interior packages for the South Korean male population. These manikins were conceptualized as "boundary" manikins, which represent individuals lacking in certain physical capacities or having usability-related issues (e.g., an individual with the 5th percentile forward reach capability, an individual with the 95th percentile shoulder width). Such boundary manikins can serve as an efficient tool for determining if an automobile interior design accommodates the majority of the population. The boundary manikins were selected from the large sample of Korean males whose anthropometric dimensions were described in the recent Size Korea anthropometric database. For each male in the database, his comfortable driving posture was represented using a kinematic body linkage model and various physical capacity measured and usability-related characteristics relevant to driver accommodation were evaluated. For each such measure, a boundary manikin was selected among the Korean males. The manikins defined in this study are expected to serve as tools for ergonomic design of automobile interior packages. The manikin selection method developed in this study was implemented as a generic software program useful for various product design applications.

DTLS-based CoAP Security Mechanism Analysis and Performance Evaluation (DTLS 기반의 CoAP 보안 메커니즘 분석 및 성능평가)

  • Han, Sang woo;Park, Chang seop;Cho, Jung mo
    • Convergence Security Journal
    • /
    • v.17 no.5
    • /
    • pp.3-10
    • /
    • 2017
  • Standard Protocol Optimized for Resource-Constrained IoT Environment Constrained Application Protocol (CoAP) supports web-based communication between a sensor node in the IoT environment and a client on the Internet. The CoAP is a Request / Response model that responds to the client's CoAP Request message by responding with a CoAP Response message from the server. CoAP recommends the use of CoAP-DTLS for message protection. However, validation of the use of DTLS in the IoT environment is underway. We analyze CoAP and DTLS security mode, evaluate performance of secure channel creation time, security channel creation step time, and RAM / ROM consumption through Cooja simulator and evaluate the possibility of real environment application.