• 제목/요약/키워드: Security Importance

Search Result 1,108, Processing Time 0.031 seconds

Detection of Signs of Hostile Cyber Activity against External Networks based on Autoencoder (오토인코더 기반의 외부망 적대적 사이버 활동 징후 감지)

  • Park, Hansol;Kim, Kookjin;Jeong, Jaeyeong;Jang, jisu;Youn, Jaepil;Shin, Dongkyoo
    • Journal of Internet Computing and Services
    • /
    • v.23 no.6
    • /
    • pp.39-48
    • /
    • 2022
  • Cyberattacks around the world continue to increase, and their damage extends beyond government facilities and affects civilians. These issues emphasized the importance of developing a system that can identify and detect cyber anomalies early. As above, in order to effectively identify cyber anomalies, several studies have been conducted to learn BGP (Border Gateway Protocol) data through a machine learning model and identify them as anomalies. However, BGP data is unbalanced data in which abnormal data is less than normal data. This causes the model to have a learning biased result, reducing the reliability of the result. In addition, there is a limit in that security personnel cannot recognize the cyber situation as a typical result of machine learning in an actual cyber situation. Therefore, in this paper, we investigate BGP (Border Gateway Protocol) that keeps network records around the world and solve the problem of unbalanced data by using SMOTE. After that, assuming a cyber range situation, an autoencoder classifies cyber anomalies and visualizes the classified data. By learning the pattern of normal data, the performance of classifying abnormal data with 92.4% accuracy was derived, and the auxiliary index also showed 90% performance, ensuring reliability of the results. In addition, it is expected to be able to effectively defend against cyber attacks because it is possible to effectively recognize the situation by visualizing the congested cyber space.

A Study on the Introductioin of Data Trusts System to Expand the Rights of Privacy Self-Determination (개인정보 자기결정권 확대를 위한 데이터 신탁제도 도입 방안 연구)

  • Jang, Keunjae;Lee, Seungyong
    • Journal of Intelligence and Information Systems
    • /
    • v.28 no.1
    • /
    • pp.29-43
    • /
    • 2022
  • With the advent of the Internet and the development of mobile digital devices such as smartphones and tablet PCs, the communication service paradigm began to shift from existing voice services to data services. Recently, as social network services (SNS) are activated and 4th industrial revolution technologies centered on ICT (Information and Communication Technologies) such as Big Data, Blockchain, Cloud, and 5G/6G are rapidly developed, the amount of shared data type and the amount of data are increasing rapidly. As the transition to a digital society begins actively, the importance of using data information, as well as the economic and social values of personal information are becoming increasingly important. As a result, they are actively discussing policies to revitalize the data information industry around the world and ways to efficiently obtain, analyze, and utilize increasingly diverse and vast data, as well as to protect/guarantee the rights of information subjects (providers) in various fields such as society, culture, economy, and politics.. In this paper, in order to improve the self-determination right of personal information on data produced by information subjects, and further expand the use of safe data and the data economy, a differentiated data trusts system was considered and suggested. In addition, the components and data trusts procedures necessary to efficiently operate the data trusts system in Korea were considered, and the non-profit data trusts system and the for-profit data trusts system were considered as a way to flexibly operate the data trusts system. Furthermore, the legal items necessary for the implementation of the data trusts system were investigated and considered. In this paper, in order to propose a domestic data trusts system, cases related to existing data trusts systems such as the United States, Japan, and Korea were reviewed and analyzed. In addition, in order to prepare legislation necessary for the data trusts system, data-related laws in major countries and domestic legal and policy trends were reviewed to study the rights that conflict or overlap with existing laws, and differences were investigated and considered. The Data trusts system proposed in this paper is a reasonable system that is expected to recognize the asset value of data in the capitalist market economy system, to provide legitimate compensation for data produced by data subjects, and further to contribute greatly to the use of safe data and creation of a new service market.

Application Strategies of Superintelligent AI in the Defense Sector: Emphasizing the Exploration of New Domains and Centralizing Combat Scenario Modeling (초거대 인공지능의 국방 분야 적용방안: 새로운 영역 발굴 및 전투시나리오 모델링을 중심으로)

  • PARK GUNWOO
    • The Journal of the Convergence on Culture Technology
    • /
    • v.10 no.3
    • /
    • pp.19-24
    • /
    • 2024
  • The future military combat environment is rapidly expanding the role and importance of artificial intelligence (AI) in defense, aligning with the current trends of declining military populations and evolving dynamics. Particularly, in the civilian sector, AI development has surged into new domains based on foundation models, such as OpenAI's Chat-GPT, categorized as Super-Giant AI or Hyperscale AI. The U.S. Department of Defense has organized Task Force Lima under the Chief Digital and AI Office (CDAO) to conduct research on the application of Large Language Models (LLM) and generative AI. Advanced military nations like China and Israel are also actively researching the integration of Super-Giant AI into their military capabilities. Consequently, there is a growing need for research within our military regarding the potential applications and fields of application for Super-Giant AI in weapon systems. In this paper, we compare the characteristics and pros and cons of specialized AI and Super-Giant AI (Foundation Models) and explore new application areas for Super-Giant AI in weapon systems. Anticipating future application areas and potential challenges, this research aims to provide insights into effectively integrating Super-Giant Artificial Intelligence into defense operations. It is expected to contribute to the development of military capabilities, policy formulation, and international security strategies in the era of advanced artificial intelligence.

A Study to Improve the Trustworthiness of Data Repositories by Obtaining CoreTrustSeal Certification (CoreTrustSeal 인증 획득을 통한 데이터 리포지토리의 신뢰성 향상을 위한 연구)

  • Hea Lim Rhee;Jung-Ho Um;Youngho Shin;Hyung-jun Yim;Na-eun Han
    • Journal of the Korean Society for information Management
    • /
    • v.41 no.2
    • /
    • pp.245-268
    • /
    • 2024
  • As the recognition of data's value increases, the role of data repositories in managing, preserving, and utilizing data is becoming increasingly important. This study investigates ways to enhance the trustworthiness of data repositories through obtaining CoreTrustSeal (CTS) certification. Trust in data repositories is critical not only for data protection but also for building and maintaining trust between the repository and stakeholders, which in turn affects researchers' decisions on depositing and utilizing data. The study examines the CoreTrustSeal, an international certification for trustworthy data repositories, analyzing its impact on the trustworthiness and efficiency of repositories. Using the example of DataON, Korea's first CTS-certified repository operated by the Korea Institute of Science and Technology Information (KISTI), the study compares and analyzes four repositories that have obtained CTS certification. These include DataON, the Physical Oceanography Distributed Active Archive Center (PO.DAAC) from NASA, Yareta from the University of Geneva, and the DARIAH-DE repository from Germany. The research assesses how these repositories meet the mandatory requirements set by CTS and proposes strategies for improving the trustworthiness of data repositories. Key findings indicate that obtaining CTS certification involves rigorous evaluation of organizational infrastructure, digital object management, and technological aspects. The study highlights the importance of transparent data processes, robust data quality assurance, enhanced accessibility and usability, sustainability, security measures, and compliance with legal and ethical standards. By implementing these strategies, data repositories can enhance their reliability and efficiency, ultimately promoting wider data sharing and utilization in the scientific community.

An Empirical Analysis on the Persistent Usage Intention of Chinese Personal Cloud Service (개인용 클라우드 서비스에 대한 중국 사용자의 지속적 사용의도에 관한 실증 연구)

  • Yu, Hexin;Sura, Suaini;Ahn, Jong-chang
    • Journal of Internet Computing and Services
    • /
    • v.16 no.3
    • /
    • pp.79-93
    • /
    • 2015
  • With the rapid development of information technology, the ways of usage have changed drastically. The ways and efficiency of traditional service application to data processing already could not satisfy the requirements of modern users. Nowadays, users have already understood the importance of data. Therefore, the processing and saving of big data have become the main research of the Internet service company. In China, with the rise and explosion of 115 Cloud leads to other technology companies have began to join the battle of cloud services market. Although currently Chinese cloud services are still mainly dominated by cloud storage service, the series of service contents based on cloud storage service have been affirmed by users, and users willing to try these new ways of services. Thus, how to let users to keep using cloud services has become a topic that worth for exploring and researching. The academia often uses the TAM model with statistical analysis to analyze and check the attitude of users in using the system. However, the basic TAM model obviously already could not satisfy the increasing scale of system. Therefore, the appropriate expansion and adjustment to the TAM model (i. e. TAM2 or TAM3) are very necessary. This study has used the status of Chinese internet users and the related researches in other areas in order to expand and improve the TAM model by adding the brand influence, hardware environment and external environments to fulfill the purpose of this study. Based on the research model, the questionnaires were developed and online survey was conducted targeting the cloud services users of four Chinese main cities. Data were obtained from 210 respondents were used for analysis to validate the research model. The analysis results show that the external factors which are service contents, and brand influence have a positive influence to perceived usefulness and perceived ease of use. However, the external factor hardware environment only has a positive influence to the factor of perceived ease of use. Furthermore, the perceived security factor that is influenced by brand influence has a positive influence persistent intention to use. Persistent intention to use also was influenced by the perceived usefulness and persistent intention to use was influenced by the perceived ease of use. Finally, this research analyzed external variables' attributes using other perspective and tried to explain the attributes. It presents Chinese cloud service users are more interested in fundamental cloud services than extended services. In private cloud services, both of increased user size and cooperation among companies are important in the study. This study presents useful opinions for the purpose of strengthening attitude for private cloud service users can use this service persistently. Overall, it can be summarized by considering the all three external factors could make Chinese users keep using the personal could services. In addition, the results of this study can provide strong references to technology companies including cloud service provider, internet service provider, and smart phone service provider which are main clients are Chinese users.

Satisfaction Realization of Apartment House Inhabitants for CPTED Design Element: To with Group by CPTED Application Level, Reciprocal Action Effect of Crime Prevention Effort (CPTED 설계요소에 대한 공동주택주민의 만족도 인식: CPTED 적용수준별 집단과 거주기간, 범죄예방노력의 교호작용효과)

  • Choi, Hyun-Sick;Park, Hyeon-Ho
    • Korean Security Journal
    • /
    • no.22
    • /
    • pp.231-258
    • /
    • 2010
  • A study apartment house inhabitants of to, crime prevention effort is done satisfaction analysis and that deduce design plan of CPTED that can overcome safe life space embodiment and criminal fear from crime in Juminin viewpoint through atomize group's interaction by background fantast. Is positive because factor analysis wave and satisfaction index of deduce universe (Total group) 8 factor are presented more than all 0, and quite was expose by level that is worth accommodating. Satisfaction index of The secondary design group (Group1) 8 factor is positive because is presented more than all 0, and mechanical access control, mechanical surveillance is level that is worth accommodating quite, and level that is proper in remainder 6 dimension appear. Can know that 1 The secondary design group(Group2) is expose by level that satisfaction characteristic of 8 factor can be presented more than all 0 and appeared positively, and accommodate quite in all dimensions. Result that analyze Two-way ANOVA satisfaction difference of environment design of group by satisfaction of the primary and the secondary design group is high in 8 all dimensions of CPTED, and satisfaction by appeared satisfaction high in group less than natural access control, 2 years of natural surveillance, and reciprocal action effect that go with group is high satisfaction in 2 years low in The secondary design group more than the primary and the secondary design group of systematic access control and natural access control, and the primary and the secondary design group appeared high in subgroup of 2 remainders. Satisfaction difference by group by crime prevention effort satisfaction of the primary and the secondary design group is high in 8 all dimensions of CPTED, and satisfaction difference by crime prevention effort appeared satisfaction high in 'A prize' group to The secondary design group, and reciprocal action efficiency is high in 'A prize' group in The secondary design group more than the primary and the secondary design group in mechanical access control, systematic access control, natural access control, territoriality reinforcement, and satisfaction of 'Between' and 'Very' group appeared high in the primary and the secondary design group.

  • PDF

A Study on the Analysis and Efficiency of Police Budget (경찰의 예산분석 및 효율화 방안에 관한 연구)

  • Park, Jong-Seung;Kim, Chang-Yun
    • Korean Security Journal
    • /
    • no.38
    • /
    • pp.7-32
    • /
    • 2014
  • This study is aimed to analyze problems of police budgetary execution and to suggest better ways for establishing effective budget implementation as well as legitimacy of securing budget in the field of police work. For this purpose, this paper analyzed the annual reports on police budgetary execution, from 2009 to 2012, conducted by National Assembly Budget Office. In result, most parts of the police budgetary execution were not satisfied with the audit standard, and especially in terms of management of budgetary execution, it showed 40% in inappropriateness. In addition, excessive and underestimate appropriation in the police budgetary execution, which happened frequently in other offices, was recorded on the second place. 10% of the amount of budget was executed for ordinance violence. Given results analyzed from each division, Transportation Division occupied 40% of the amount of related problems and all of types in the field did not meet the audit standard, thus it is required to manage budgetary execution effectively. In terms of Public Safety Division, the problem was related to budgetary allocation prior to execution, such as overlap in other works, excessive and underestimate appropriation, and inappropriate business plans. Director General for Planning and Coordination did not meet the standard of law system maintenance, Given the light of the result of analyzing programs, traffic safety and securing communication was the most problematic and support for police administration, crime prevention and protecting the disadvantaged, educating professional police officers, and establishment of policing infrastructure were required to be reformed in sequence. In order to resolve these problems, it is demanded to check budgetary execution and the process in business plans on a regular basis. Additionally, in case of using budget in inappropriate parts, tough penality including reduction of budget in related to the local police should be implemented to increase the importance of budgetary execution. Moreover, because of the fact that a part of problem of budgetary execution was originally caused by the budgetary allocation, it is advised to allocate police budget using the budget proposal of National Finance Act and Ministry of Strategy and Finance.

  • PDF

The Critical Factors on Improvement of Medical institution Competitiveness (의료기관 경쟁력 향상에 영향을 미치는 핵심 요인)

  • Yeom, Jae-Kwang;Kang, Chang-Yeol
    • Korea Journal of Hospital Management
    • /
    • v.12 no.1
    • /
    • pp.1-30
    • /
    • 2007
  • The study carried out a survey with employees of hospitals located in Daejeon, Chungnam, and Chungbuk from Sep. 12 to Sep. 30, 2005 in order to derive primary elements that affect the improvement of hospital's competitiveness. The study investigated and analyzed the employees' recognition on the change of competitive environment caused by the change of medical environment. The study also analyzed the elements that affect the hospital's competitiveness and the competitive strategies of the hospitals. The conclusion of this study can be summarized as follows. 1. Summary 1) Most of the employees responded that there is a rival in the competitive environment and the competitive is intense. Especially when the employees are married, live in urban areas, have an education level of university graduate or are managers, they tend to think the competitive is very intense. Also, they said that the competitive is based upon the quality of medical service. They mentioned the element that has the biggest effect on the competitiveness is the element of medical consumer and they recognized that the medical services in university and general hospitals have more competitiveness than the one-department hospitals. 2) It was investigated that the medical technique service has the most effect on the hospital's competitiveness. Also, the external service of medical techniques also has a large effect on the hospital's competitiveness. 3) When they were asked for the factors that affect the patients' decision on selecting a hospital, most of them responded "capability and technique of the medical staffs." Also, they said that "sufficient explanation from doctors" and "special center and clinic" are the factors that have big effects on the patients' decision. 4) In the SWOT analysis, most of them responded that the strength is the hospital's characteristics and the weakness is insufficient and obsolete equipment. They said the opportunity is the demands for professional medical service and the risk is the intense competitive among the hospitals. 5) In the SWOT strategy, they emphasized the strategy that uses the opportunity and the strength and the strategy that uses the opportunity while overcoming the weakness. 6) As for the basic competition strategy, most of them thought of the strategy of professionalizing the medical service most importantly. Next, they focused on the strategy of distinct service and the strategy of lower prime cost. 2. Conclusion 1) Because service competition between hospitals is happening seriously, need competitiveness security through right awareness transfer and satisfaction upgrade about medical consumer. 2) For medical technique service upgrade that equip Hospital's competitiveness but affects most, must solidify the countermeasure because professionalizing the medical service and newest medical technique induction should be achieved first, and compose task force for the external service of medical techniques improvement. 3) To improve SWOT of hospital, opportunity and the strength strategy choice that rescue hospital's characteristics heightening professionalizing the medical service level is fancied. 4) As for the basic competition strategy, will have to try in phase triangular position of hospital which is trusted medical level upgrade and excellent manpower security and finance independence through upgrade. The study was only done with hospitals in Daejeon, Chungnam and Chungbuk. Also, it is a study from the side of suppliers of medical service so there are limitations. However, the significance of the study is to present the basic data for improvement of hospital's competitiveness by examining the importance of medical techniques and external service of medical techniques that are the main effects on the improvement of hospital's competitiveness.

  • PDF

A Comparative Study on Attitude of the Collegiate an4 Non-Collegiate Nursing Students toward Their Clinical Affiliation in a Mental Hospital (정신과 간호 실습에 대한 간호 대학생과 간호학교 학생들의 태도 비교 연구)

  • 김소야자
    • Journal of Korean Academy of Nursing
    • /
    • v.4 no.2
    • /
    • pp.17-31
    • /
    • 1974
  • Today, over seventy five percent of nursing in Korea provide a psychiatric experience in the basic curriculum. The psychiatric affiliation presents numerous major problems of adjustment to the student. The Importance of positive attitude toward the nursing care of psychiatric patients is recognized by the nursing profession. I have fined out the unfavorable attitude of non collegiate nursing students toward psychiatric nursing affiliation by previous research. This study was undertaken in response to a felt need to explore the use of several devices which might yield information about attitudes toward psychiatric nursing as a basis for future planning of the program offered at a selected hospital. This study is designed to meet the following objectives; (1) In order to find out the expressed attitudes of fifty·three collegiate nursing students toward their psychiatric affiliation. (2) To compare responses given by selected group of collegiate and non collegiate nursing students to same questionnaire (3) To determine the relationship between the attitudes of nursing students toward psychiatric nursing and the type of instructions where experience was obtained. A questionnaire, a Korean translation of the "Psychiatric Nursing Attitude Questionnaire" by Moldered Elizabeth fletcher, was administered to fifty-three collegiate nursing students who had completed a four-week psychiatric affiliation in a S hospital psychiatric ward during May 7, 1973 to Dec. 16, 1973. - The questionnaire of 100 statements was administered in the following way; (1) Part Ⅰ, Preconceptions, was, given in individual conferences with each subject, during the first few days of their affiliation, and again during the final week of affiliation. The responses to Part I were oral. (2) Part Ⅱ, Expectations, Part Ⅲ, Personal Relations, Part Ⅳ, Personal Feelings, and Part V, Attitudes and Activities of Patients were given to all of the subjects in a group meeting during the second week of the affiliation, and again, during the fourth week at the termination of the affiliation. Responses to Parts Ⅱ, Ⅲ, Ⅳ·, and V, were written. Each of the 100 statements of the questionnaire was considered to be either Positive or Negative. A favorable response was assigned the positive value of 1 and an unfavorable response was assigned the Negative value of O. The coefficient of correlation was computed between the two sets of scores for the fifty-three nursing students, The mean score, the standard deviation, and the differences in the means on each of the five parts of the questionnaire were computed and the relationships calculated by at-test. The results of the study were as follows; 1. There was no significant correlation between the two sets of the scores for the fifty-three nursing students during the four-week psychiatric affiliation. (r= 0.36) 2. There was no significant difference in the mean scores between the first and final tests for any of the questionnaire. 3. The Part Ⅰ, Preconceptions, data indicated collegiate nursing students have positive attitudes in preconceptions than non collegiate nursing students and preconceptions toward the psychiatric affiliation which affect their psychiatric nursing experience. 4. The Part Ⅱ, Expectations, data indicated more appropriate expectations of collegiate nursing students related to pre psychiatric affiliation orientation and sufficient theory learning than non-collegiate nursing students. 5. The Part Ⅲ, Personal relations, data indicated some students have negative attitudes in personal relations with normal people in respect to psychological security and social responsibilities. 6. The Part Ⅳ, Personal feelings, data indicated nursing students have psychological insecurity & inappropriateness. 7. The Part V, Attitudes and activities of patients, data indicated collegiate nursing students have more positive attitudes to the psychotic behavior of certain situations due to sufficient theory learning. 8. The data indicated collegiate·nursing students have more positive attitude than non-collegiate nursing students. 5. The Part Ⅲ, Personal relations, data indicated some students have negative attitudes in personal relations with normal people in respect to psychological security and social responsibilities. 6. The Part Ⅳ, Personal feelings, data indicated nursing students have psychological insecurity & inappropriateness. 7. The Part V, Attitudes and activities of patients, data indicated collegiate nursing students have more positive attitudes to the psychotic behavior of certain situations due to sufficient theory learning. 8. The data indicated collegiate·nursing students have more positive attitude than non-collegiate nursing students through psychiatric affiliation.

  • PDF

Analyzing Research Trends in Blockchain Studies in South Korea Using Dynamic Topic Modeling and Network Analysis (다이나믹 토픽모델링 및 네트워크 분석 기법을 통한 블록체인 관련 국내 연구 동향 분석)

  • Kim, Donghun;Oh, Chanhee;Zhu, Yongjun
    • Journal of the Korean Society for information Management
    • /
    • v.38 no.3
    • /
    • pp.23-39
    • /
    • 2021
  • This study aims to explore research trends in Blockchain studies in South Korea using dynamic topic modeling and network analysis. To achieve this goal, we conducted the university & institute collaboration network analysis, the keyword co-occurrence network analysis, and times series topic analysis using dynamic topic modeling. Through the university & institute collaboration network analysis, we found major universities such as Soongsil University, Soonchunhyang University, Korea University, Korea Advanced Institute of Science and Technology (KAIST) and major institutes such as Ministry of National Defense, Korea Railroad Research Institute, Samil PricewaterhouseCoopers, Electronics and Telecommunications Research Institute that led collaborative research. Next, through the analysis of the keyword co-occurrence network, we found major research keywords including virtual assets (Cryptocurrency, Bitcoin, Ethereum, Virtual currency), blockchain technology (Distributed ledger, Distributed ledger technology), finance (Smart contract), and information security (Security, privacy, Personal information). Smart contracts showed the highest scores in all network centrality measures showing its importance in the field. Finally, through the time series topic analysis, we identified five major topics including blockchain technology, blockchain ecosystem, blockchain application 1 (trade, online voting, real estate), blockchain application 2 (food, tourism, distribution, media), and blockchain application 3 (economy, finance). Changes of topics were also investigated by exploring proportions of representative keywords for each topic. The study is the first of its kind to attempt to conduct university & institute collaboration networks analysis and dynamic topic modeling-based times series topic analysis for exploring research trends in Blockchain studies in South Korea. Our results can be used by government agencies, universities, and research institutes to develop effective strategies of promoting university & institutes collaboration and interdisciplinary research in the field.