• Title/Summary/Keyword: Security Integration

Search Result 447, Processing Time 0.027 seconds

A Study on the Methods of Fault Analysis to Improve Safety in U-Healthcare System for Managing Emergency Rescue for Seniors (시니어들의 응급구난 관리를 위한 U-Healthcare시스템에서 안전성 개선을 위한 결함 분석 방법에 관한 연구)

  • Kim, Gyu-A;Park, Man-Gon
    • Journal of Korea Multimedia Society
    • /
    • v.17 no.2
    • /
    • pp.170-179
    • /
    • 2014
  • Recently the U-Healthcare system has been rapidly advanced to manage emergence rescue for seniors. We can access emergency rescue systems with high quality services anytime, anywhere under ubiquitous healthcare systems. The more the various systems develop, the more software security systems become important. Therefore, the safety-critical system has been widely spread to the world by advancement of the information and communication technologies. There are a lot kind of fault analysis methods to evaluate software security systems. However due to characteristics of software that is not applied by human error, it can be prevented the enormous damages and losses from improving the safety of safety-critical system. So this paper proposes an integration method of FTA and Forward and Backward FMECA. This method has each strength of FTA and FMECA which is visual and numeric in normalization. First, by use of FTA, we can redraw FTA with Forward FMECA and Backward FMECA in consideration of occurrence, severity, detection, correctness, robustness, and security. Also according to value of NRVP at each event, we can modify FTA diagrams as shown critical paths given by severity and occurrence. Also, we propose the improved emergency rescue service platform of ubiquitous healthcare systems through identifying priorities of the criticality according to normalized risk priority values (NRPV).

A Study on Institutional Foundation on the Korea Counter-Terrorism System (한국 테러대응 시스템의 제도적 구축방안)

  • Kwon, Jeong-Hoon
    • Korean Security Journal
    • /
    • no.25
    • /
    • pp.27-61
    • /
    • 2010
  • This study looks at plans for the efficient functions of the current terror response system in Korea. The results are derived from by comparing and analyzing American, British, German, Japanese, and Korean terror response systems. It focuses especially on addressing some problems with Korea's terror response system and how to operate it effectively. The study will systematically compare and analyze each nation's terror countermeasure studying organizational, functional, and legal aspects as standards. This study shows that there is not an exclusive terror response center in Korea compared with other nations such as America, the United Kingdom, Germany, and Japan. Also it is difficult to expect effective and vigorous operations due to weak cooperation across the relevant organizations. The presidential directive of the state's anti-terrorism action guidelines is legally ineffective. This means that on legal grounds, it is difficult to take actions to prevent the terrorism. Therefore, keys to counteracting terrorism derived from this study are summarized below. In the first place, an integrated terror response system should be set up for expansion of information sharing which leads to emergence effect. In the second place, the superior legislative systems should be made for the cleardefinition and extent of what the terror is, rigid enforcement of investigation, immigration, and keeping an eye on the funds raised by terrorists and tracking down the terrorists, the plan for eco-terrorism. In the third place, to augment security of vital facilities and peoples' awareness of terrorism safety should be emphasized and a cooperative system between civil and government organizations need to be built. In the fourth place, system for crisis management must be provided in an effort to maximize management system of terrorism and unify a decentralized emergency countermeasures effectively.

  • PDF

Review of the Current Policy Related to Exploration and Development of Mineral Resources in China (중국의 광물자원 탐사개발 관련 최신 정책 고찰)

  • Kim, Seong-Yong;Bae, Jun-Hee;Lee, Jae-Wook;Heo, Chul-Ho
    • Economic and Environmental Geology
    • /
    • v.49 no.3
    • /
    • pp.201-212
    • /
    • 2016
  • Due to growing problems securing stable mineral and energy resources with international political and economic changes, China has dedicated itself to strategies and policies to enhance its stable mineral and energy resources security. China has established a rare earth elements(REE) industry policy after the abolition of the REE exports quota system. China's six large REE companies have also been integrated into REE mining, smelting and refining companies. Efforts have been increased to enhance China's energy security through unconventional oil and gas exploration and development investment, as well as effort in R&D. The country will focus on technology development and exploration to promote commercial production of unconventional oil and gas based on countries with shale gas. China is making long-term contracts and joint ventures to ensure the acquisition of reliable mineral and energy resources from abroad. Government of China has proposed a range of initiatives, such as the integration of resources development strategies and environmental development strategies, internationalization of resource management, supply diversification and advancement, strengthening industry linking strategy, grouping and diversification strategy.

A Design of Authority Management Protocol for Secure Storage Access Control in Cloud Environment (클라우드 환경에서 안전한 스토리지 접근 제어를 위한 권한 관리 프로토콜 설계)

  • Min, So-Yeon;Lee, Kwang-Hyong;Jin, Byung-Wook
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.17 no.9
    • /
    • pp.12-20
    • /
    • 2016
  • With the enhancements in existing major industries, cloud computing-based converging services have been created, as well as value-added industries. A variety of converging services are now provided, from personalized services up to industrial services. In Korea, they have become the driving force behind existing industries throughout the whole economy, but mainly in finance, mobile systems, social computing, and home services, based on cloud services. However, not only denial of service (DOS) and distributed DOS (DDOS) attacks have occurred, but also attack techniques targeting core data in storage servers. Even security threats that are hardly detected, such as multiple attacks on a certain target, APT, and backdoor penetration have also occurred. To supplement defenses against these, in this article, a protocol for authority management is designed to provide users with safe storage services. This protocol was studied in cases of integration between a cloud environment and big data-based technology, security threats, and their requirements. Also studied were amalgamation examples and their requirements in technology-based cloud environments and big data. With the protocol suggested, based on this, security was analyzed for attack techniques that occur in the existing cloud environment, as well as big data-based techniques, in order to find improvements in session key development of approximately 55%.

A Study on Methods for the Domestic Diffusion of Intelligent Security Project : With a Focus on the Case of Smart City Integrated Platform (지능형 방범 사업의 국내 확산 방안 연구 : 스마트시티 통합플랫폼을 대상으로)

  • Shin, Young-Seob;Han, Sun-Hee;Lee, Jae-Yong
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.20 no.7
    • /
    • pp.474-484
    • /
    • 2019
  • In this age, where the social environment is changing rapidly and unpredictably, interest in safety from crime is increasing in Korean society. As the desire to live a life free from the fear of crime increases, interest in the construction of safe cities is also rising nationwide. To meet the national demand, the Korean government is promoting a project to link public disaster safety systems by involving municipalities, 112, 119, and other emergency services and institutions through the Smart City Integrated Platform in order to construct a smart safety net. This study investigates the linking of theSmart City Integrated Platform and theIntelligent Security Project. The results are as follows. 1. The linkage's objective is clear. 2. The system sector can provide information to accident-related organizations. 3. The scenario area can be expanded to a crime-prevention sector, and a long-term urban information integration infrastructure can be created. 4. Product testing is enabled by a smart city road map and through continuous consultation with relevant organizations. 5. Project diffusion to other local governments can be promoted with the continued addition of commercial products.

Analysis of major issues in the field of Maritime Autonomous Surface Ships using text mining: focusing on S.Korea news data (텍스트 마이닝을 활용한 자율운항선박 분야 주요 이슈 분석 : 국내 뉴스 데이터를 중심으로)

  • Hyeyeong Lee;Jin Sick Kim;Byung Soo Gu;Moon Ju Nam;Kook Jin Jang;Sung Won Han;Joo Yeoun Lee;Myoung Sug Chung
    • Journal of the Korean Society of Systems Engineering
    • /
    • v.20 no.spc1
    • /
    • pp.12-29
    • /
    • 2024
  • The purpose of this study is to identify the social issues discussed in Korea regarding Maritime Autonomous Surface Ships (MASS), the most advanced ICT field in the shipbuilding industry, and to suggest policy implications. In recent years, it has become important to reflect social issues of public interest in the policymaking process. For this reason, an increasing number of studies use media data and social media to identify public opinion. In this study, we collected 2,843 domestic media articles related to MASS from 2017 to 2022, when MASS was officially discussed at the International Maritime Organization, and analyzed them using text mining techniques. Through term frequency-inverse document frequency (TF-IDF) analysis, major keywords such as 'shipbuilding,' 'shipping,' 'US,' and 'HD Hyundai' were derived. For LDA topic modeling, we selected eight topics with the highest coherence score (-2.2) and analyzed the main news for each topic. According to the combined analysis of five years, the topics '1. Technology integration of the shipbuilding industry' and '3. Shipping industry in the post-COVID-19 era' received the most media attention, each accounting for 16%. Conversely, the topic '5. MASS pilotage areas' received the least media attention, accounting for 8 percent. Based on the results of the study, the implications for policy, society, and international security are as follows. First, from a policy perspective, the government should consider the current situation of each industry sector and introduce MASS in stages and carefully, as they will affect the shipbuilding, port, and shipping industries, and a radical introduction may cause various adverse effects. Second, from a social perspective, while the positive aspects of MASS are often reported, there are also negative issues such as cybersecurity issues and the loss of seafarer jobs, which require institutional development and strategic commercialization timing. Third, from a security perspective, MASS are expected to change the paradigm of future maritime warfare, and South Korea is promoting the construction of a maritime unmanned system-based power, but it emphasizes the need for a clear plan and military leadership to secure and develop the technology. This study has academic and policy implications by shedding light on the multidimensional political and social issues of MASS through news data analysis, and suggesting implications from national, regional, strategic, and security perspectives beyond legal and institutional discussions.

Integration Process of Federation Object Model for Interoperation of Federations (페더레이션 연동을 위한 객체 모델 통합 프로세스)

  • Kwon, Se Jung;Yu, Minwook;Kim, Tag Gon
    • Journal of the Korea Society for Simulation
    • /
    • v.26 no.2
    • /
    • pp.1-8
    • /
    • 2017
  • High Level Architecture(HLA) is a specification for interoperation among heterogeneous simulators which are executed in a distributed environment. HLA originally allows many federates to join in a federation using a single RTI(Run-Time Infrastructure). As the target systems become more complex, the need for the interoperation of federations, performed in a RTI-RTI interoperation environment, has been growing. It can be performed by the confederation interface with the agents, which subrogate the API calls and callbacks of each federation. The existing studies have assumed that the object models of each federation are based on same HLA standard and their object descriptions are equal. Because the existing federations are usually not under this assumption, this paper proposes the integration process of object models for the federation interoperation environment. To integrate the object models for the interoperation of federations, this process resolves the differences of HLA standards, provides conversion process between objects with different descriptions and excludes the security objects. We expect that this process enhances the reusability and effectiveness of interoperation of federations in various domains.

Study on Developmental Strategy of National Defense & IT Convergence (국방IT융합기술의 발전전략에 관한 연구)

  • Koo, Han Lim;Kim, Seong Min;Rhee, Woo Seop
    • Convergence Security Journal
    • /
    • v.14 no.6_1
    • /
    • pp.99-112
    • /
    • 2014
  • National Defense & IT Convergence is ensuring actual force integration by developing new IT Convergence Technology for the purpose of realizing the concept of Network Centric Warfare. The Ministry of Defense has appointed National Defense & IT Convergence Center of Defense Agency for Technology and Quality as a specialized agency for the National Defense & IT Convergence development, a mission in the creative economy era and has been active in military demand inquiry and prior technology plan with the industrial-academic research institute for discovery of National Defense IT Convergence projects based on the Convergence Center. Further, it is promoting focused on the timely introduction of private IT new technology by operating the project planning team comprised of defense domain specialists and by applying the advanced planning method etc. Accordingly, for the development of National Defense & IT convergence, developmental strategy is urgently required to be utilized effectively after considering theoretically on the national IT Convergence policy enforcement and phenomenon of National Defense & IT Convergence technology and analyzing them comprehensively. This thesis promotes in phases the IT Convergence projects which are identified for the development, improves the efficiency of newly created National Defense & IT Convergence center and suggests training program of IT Convergence personnel related to the defense reforms. With such, it will achieve smart defense in advance and will also contribute largely for the realization of the immediate paradigm shift and of the creative economy.

The Construction and Characters of the Welfare Rights (복지권의 구성과 성격)

  • Ahn, Chi-Min
    • Korean Journal of Social Welfare
    • /
    • v.55
    • /
    • pp.5-25
    • /
    • 2003
  • This study analysed the components and characters of welfare rights through discussions of the concepts and types of universal rights, and discussions of human rights and citizenship rights. Welfare rights is claims rights which requires somewhat, and it is positive rights. And it is generally passive rights, but it contains collective participation rights which is active rights. The result of total discussions of rights, human rights, and citizenship rights led us to know the components and characters of welfare rights. Welfare rights contains social rights, economic rights, and cultural environmental rights. Social rights are composed of the right of social security, social welfare service, health, education, and residency. Economic rights are composed of the right of labor, intervension of labor market, job security, and capital control. cultural environmental rights are composed of the right of culture and environment. And welfare rights has several characters. First, it is natural rights which is bestowed on the citizens or people in modern civil societies. it is samely characterised as liberties and political rights. second, it has the same values like other rights such as lberties and political rights. Or it is more important, because it is necessary for other rights. Third, it is not the objective being which is constant, but it is changed, formed and constructed as total rights with human rights and citizenship rights. Fourth, it is truely rights, but is simultaniously accompanied by obligations. But the obligations is unconditional like as other rights. Endly, levels of welfare on the welfare rights must be modicum rather than minimum. The meaning of modicum level is uncertain, but it aims to the entire participation of peoples as citizen and social integration. And it has to aim to the prevention of heridity and continuity of inequality.

  • PDF

A Study on Influential Factors for the Economic Activities of People with Disabilities (장애인의 경제활동에 미치는 영향요인 연구)

  • Lee, Jeong Seo;Kim, Hyun Deok
    • Asia-Pacific Journal of Business Venturing and Entrepreneurship
    • /
    • v.8 no.1
    • /
    • pp.235-242
    • /
    • 2013
  • For people with disabilities, getting a job makes it possible to advocate their own human rights, to improve their self-esteem and self-efficacy, to narrow economic, psychological and social divide between them and those without disabilities and ultimately to attain social integration. According to recent statistical data, there was an increase in the weight of people with disabilities, but their economic activities were on the wane, and it's required to explore what curbs the employment of people with disabilities to find feasible solutions. The purpose of this study was to examine influential factors for the economic activities of people with disabilities. The subjects in this study were the selected people with disabilities in the metropolitan area, on whom a survey was conducted to make an empirical analysis. The findings of the study were as follows: The people with disabilities engaged in less economic activities when they were basic livelihood security recipients, when they were older, and when they were female. And those who underwent job training and who were certified technicians were more likely to participate in economic activities. Therefore differentiated policy setting is required to boost the economic activities of people with disabilities after their general characteristics, characteristics as human resources and characteristics related to vocational training are carefully analyzed. As for general characteristics, whether they are basic livelihood security recipients or not should be considered to assess the degree of their poverty, and their gender, age and presence or absence of spouses should all be taken into account. In terms of vocational training, their certificates and job training experience should be investigated.

  • PDF