• Title/Summary/Keyword: Security Evaluation Model

Search Result 389, Processing Time 0.028 seconds

Development of The Criticality Evaluation System for Rare Metals Stockpiling (희유금속 비축 적정성 평가체계 수립)

  • Kim, Yu-Jeong;Kim, Dae-Hyung;Kim, Jinsoo;Kim, Juhan
    • Resources Recycling
    • /
    • v.27 no.3
    • /
    • pp.66-77
    • /
    • 2018
  • The import amount of rare metal in Korea is about 6,034 million USD, but the self-sufficiency of rare metals is about only 1%. In order to secure the stable supply of rare metals, it is necessary to operate an efficient stockpile system. In this study, we established a system to assess the adequacy of stockpiles by quantifying the risk factors of tangible and intangible risks in order to establish an efficient stockpile strategy. The model developed in this study aims to select the rare metals that need to be stockpiled first and to suggest the direction of the stockpiling policy in accordance with technological change and market change from the mid and long term viewpoint. The evaluation results derived from the model can quantitatively measure the security level of each rare metal and enable relative comparison between the rare metals using criticality matrix. Therefore, it is expected that more efficient stockpile policy will be possible if the proposed model is utilized in the future policy making.

Hybrid Trust Computational Model for M2M Application Services (M2M 애플리케이션 서비스를 위한 하이브리드형 신뢰 평가 모델)

  • Kim, Yukyong
    • Journal of Software Assessment and Valuation
    • /
    • v.16 no.2
    • /
    • pp.53-62
    • /
    • 2020
  • In the end-user domain of an IoT environment, there are more and more intelligent M2M devices that provide resources to create and share application services. Therefore, it can be very useful to manage trust by transferring the role of the existing centralized service provider to end users in a P2P environment. However, in a decentralized M2M computing environment where end users independently provide or consume services, mutual trust building is the most important factor. This is because malicious users trying to build malfunctioning services can cause security problems in M2M computing environments such as IoT. In this paper, we provide an integrated analysis and approach for trust evaluation of M2M application services, and an optimized trust evaluation model that can guarantee reliability among users of the M2M community.

The Trends of Domestic SI Industry and Promotion Strategies for the CALS Model Projects (국내 SI업체의 동향 및 CALS 시범사업 추진전략)

  • 정기원;임춘성;정동길
    • The Journal of Society for e-Business Studies
    • /
    • v.2 no.1
    • /
    • pp.131-151
    • /
    • 1997
  • The CALS/EC is the world-wide accepted concept and its application domain is being expanded continuously throughout the private and public sectors. One of the essential points for realization of CALS/EC is to promote the domestic system integration(SI) industry. This paper describes the present status of the domestic SI companies and the clues to solve their facing problems. In order to evaluate the status of the current SI technology, the MBNQA(Malcom Baldridge National Quality Award) is adopted. The surveyed results show that the average levels of 14 SI companies over 7 evaluation criteria turn out to be 30% through 40% point. The major projects' activities of the SI companies on the information systems over the areas of trade, science and technology, industrial manpower, health and welfare, national security, etc are explained. Also, the competitive power of the SI companies is also discussed. As a target sample, the Korea Telecom(KT) CALS model project is described in terms of its Progresses and Problems. Furthermore, the strategic plans and detailed research items are proposed to resolve on-going issues.

  • PDF

An Assessment and Policy Implication of Information Technology Convergence Programs in Korean Public Service Area (공공부문 IT신기술 적용사업의 추진현황 평가와 정책적 시사점)

  • Kim, SungHyun
    • Journal of Information Technology Services
    • /
    • v.11 no.sup
    • /
    • pp.1-16
    • /
    • 2012
  • Information technology is a useful strategic weapon that can create competitive advantage and new business opportunity by applying it in the organization' value chain. IT convergence can be understood as an attempt of industrial level IT adoption to facilitate the innovation of the industry and the birth of a new industry. This study provides the comprehensive review of the Korean government' three IT assimilation programs, ubiquitous technology diffusion program of the Ministry of Knowledge Economy, u-service program of the Ministry of Public Administration and Security, and u-Defence cooperation program of the Department of Defense. The analysis is done through the interpretation of the existing literature and the logic model. The result proposes inter-agency cooperation and building of new technology road-map in the planning stage, flexible management in the execution phase, and failure tolerant evaluation system. The proposal for developing competencies and institutional foundations for IT convergence also presented.

A Study on the Improvement of Estimation Method of an Appraisal Standard to Select of the Subject in VE. (VE 대상선정을 위한 평가기준 중요도 산정방법 개선에 관한 연구)

  • Kwon Byoung Suk;Lee Dong Jun;Chun Jae Youl
    • Proceedings of the Korean Institute Of Construction Engineering and Management
    • /
    • autumn
    • /
    • pp.291-294
    • /
    • 2001
  • This study has established an appraisal standard to select VE subject when they evaluate of design VE by using of a qualify model in an early design step and has suggested an improvement method for importance's estimation method of an appraisal standard. An importance's estimation method is to arrangement of geometric average method using an AHP method to this study, When an evaluation of a quality model, we estimate an importance by establishing of an appraisal standard of economics, construction, security, environmental influence, maintenance, etc.

  • PDF

Family Function and Successful Aging for Vulnerable Elderly Based on Circumplex Model (Circumplex Model에 근거한 취약가구 노인의 가족기능과 성공적 노화)

  • Park, Jee-Won;Ban, Keum-Ok
    • Korean Journal of Adult Nursing
    • /
    • v.22 no.3
    • /
    • pp.239-249
    • /
    • 2010
  • Purpose: The objective of this study was to identify the relationships between family function and successful aging of vulnerable elderly using the circumplex model. Methods: The participants were the elderly (N=401) who were over 65 years old living in H city under the National Livelihood Security Act. Family Adaptability and Cohesion Evaluation Scale III and Successful Aging Instrument were used. Results: The family function perceived by the study subjects was average $43.20{\pm}16.62$ out of maximum 100 points. According to the analysis on family types suggested by circumplex model, there were 183 people for balance family (45.6%) and 218 people (54.4%) for extreme family. The total points on successful aging were $1.67{\pm}0.37$ out of 3 points. When the difference in points on the Successful Aging instrument were analyzed according to the scores on the Family Adaptability and Cohesion Scale those points of the balanced family were statistically significant (t=2.087, p=.038). Conclusion: In case of the balanced family type, the level of perceiving successful aging was relatively higher. For the improvement of family function, it is advised that the successful aging perception among vulnerable elderly can be uplifted through a program that enables effective communication with other family members.

Copula-ARMA Model for Multivariate Wind Speed and Its Applications in Reliability Assessment of Generating Systems

  • Li, Yudun;Xie, Kaigui;Hu, Bo
    • Journal of Electrical Engineering and Technology
    • /
    • v.8 no.3
    • /
    • pp.421-427
    • /
    • 2013
  • The dependence between wind speeds in multiple wind sites has a considerable impact on the reliability of power systems containing wind energy. This paper presents a new method to generate dependent wind speed time series (WSTS) based on copulas theory. The basic feature of the method lies in separating multivariate WSTS into dependence structure and univariate time series. The dependence structure is modeled through the use of copulas, which, unlike the cross-correlation matrix, give a complete description of the joint distribution. An autoregressive moving average (ARMA) model is applied to represent univariate time series of wind speed. The proposed model is illustrated using wind data from two sites in Canada. The IEEE Reliability Test System (IEEE-RTS) is used to examine the proposed model and the impact of wind speed dependence between different wind regimes on the generation system reliability. The results confirm that the wind speed dependence has a negative effect on the generation system reliability.

A Study on Geotechnical Centrifuge Testing Method for Seismic Performance Evaluation of Large Embankment Dams (대형 댐의 지진응답특성평가를 위한 원심모형시험 기법 연구)

  • Kim, Nam-Ryong;Lim, Jeong-Yeul;Im, Eun-Sang
    • Journal of the Earthquake Engineering Society of Korea
    • /
    • v.20 no.4
    • /
    • pp.201-209
    • /
    • 2016
  • Damages of large embankment dams by recent strong earthquakes in the world highlight the importance of seismic security of dams. Some of recent dam construction projects for water storage and hydropower are located in highly seismic zone, hence the seismic performance evaluation is an important issue. While state-of-the-art numerical analysis technology is generally utilized in practice for seismic performance evaluation of large dams, physical modeling is also carried out where new construction technology is involved or numerical analysis technology cannot simulate the behavior appropriately. Geotechnical centrifuge modeling is widely adopted in earthquake engineering to simulate the seismic behavior of large earth structures, but sometimes it can't be applied for large embankment dams due to various limitations. This study proposes a dynamic centrifuge testing method for large embankment dams and evaluated its applicability. Scaling relations for a case which model scale and g-level are different could be derived considering the stress conditions and predominant period of the structure, which is equivalent to previously suggested scaling relations. The scaling principles and testing method could be verified by modified modeling of models using a model at different acceleration levels. Finally, its applicability was examined by centrifuge tests for an embankment dam in Korea.

An Evaluation of the Necessity of Security Management of Personal Information Consignees : using Privacy Policy and ISMS data (개인정보 수탁사의 보안관리 대상 식별 방안 연구 : 개인정보처리방침 및 정보보호인증 데이터 이용)

  • Choi, Won-Nyeong;Kook, Kwang-Ho
    • Convergence Security Journal
    • /
    • v.20 no.3
    • /
    • pp.79-88
    • /
    • 2020
  • Business consignment using personal information is increasing for the operating profit and work efficiency of Internet companies. If the personal information leakage accident occurs at the consignee, the consigner who provided personal information will be damaged greatly. The purpose of this study is to analyze the business attributes of consignee using consigned personal information and present a model that can be used to select companies with high risk of personal information leakage by considering the importance of the involved personal information. For this, personal information consignment relations, consignment services, and personal information items used were analyzed. Social network analysis and cluster analysis were applied to select companies with high network centrality that are advisable to obtain information security certification. The results of this study could be used to establish information protection strategies for private or public enterprises that manage companies using personal information.

A Study on the Establishment of Concept and Selection criteria of Intelligent Security Technology Test-bed based on Spatial Information (공간정보 기반 지능형 방범 실증지구 개념 정립 및 선정기준에 관한 연구)

  • Shin, JuHo;Han, SunHee;Lee, JaeYong
    • Spatial Information Research
    • /
    • v.22 no.6
    • /
    • pp.45-54
    • /
    • 2014
  • Establishment of safety net for the socially disadvantaged attracts large attention because of the recent crime increasing against vulnerable groups. For the successful establishment of social safety net, the test-bed for evaluation and realization of crime-related research results is required. However, previous R&D test-bed projects such as The Korean Land Specialization Program or U-Eco City project remains only to the stage of verification. Therefore, there are limitedness for realization of result technologies or sustainable operation & management of test-bed after projects finished. So, sustainable operation & management system and guideline of test-bed are necessary. Therefore, this study reviews the strengths and weaknesses of existing test-bed cases and intelligent security researches. After reviewing, the concept of a Intelligent Security Test-bed is established and appropriate test-bed selection criteria is also suggested. Based on objective criteria, selected test-bed can achieve sustainable management even after finishing the project and contribute the construction of standard model for citizen's safety.