• Title/Summary/Keyword: Security Issues

Search Result 1,613, Processing Time 0.025 seconds

Research on BYOD (Bring Your Own Device) policy guidelines with the extension of the "SMART Education" in Korea based on the analyses of the U.S. cases (스마트교육 확산에 따른 국내 BYOD 정책방안 연구 - 미국사례 분석을 중심으로 -)

  • Lim, Keol;Jang, Yoonho;Lee, Eunhwan
    • Journal of Digital Convergence
    • /
    • v.12 no.7
    • /
    • pp.21-36
    • /
    • 2014
  • The purposes of the study was to investigate BYOD (Bring Your Own Device) policy since it would be limited to distribute all of the digital devices required for the schools within the budget of the government. First, the concept and characteristics of BYOD were introduced. Then, the pros and cons of BYOD were analyzed according to the case studies of BYOD policies of the U.S. Based on the previous experiences, guidelines of domestic BYOD policies were established. Regarding the institutional aspect, technical issues, usage, damages, digital divide, information security, and resources were discussed. Additionally, conditions of technology, networks, filtering, software were also considered as essential infrastructure. In sum, as an alternative of distributing digital devices in schools, the importance of BYOD should be regarded as top priorities with systematic preparations in launching digital education. It would be expected that this study play a fundamental role in launching domestic BYOD policy by supporting specific strategies.

A Systematic Literature Review on Smart Factory Research: Identifying Research Trends in Korean Academia (스마트공장에 관한 체계적 문헌 분석: 국내 학술 경향 연구)

  • Kim, Gibum;Lee, Jungwoo
    • Journal of Digital Convergence
    • /
    • v.18 no.11
    • /
    • pp.59-71
    • /
    • 2020
  • The paper reports on a systematic literature review results concerning the smart factory research in Korea. 144 papers were identified from the articles published in Korean journals listed in the Korean citation index by keyword search related to smart factory. Bibliometric analyses were conducted by way of co-occurrence and network analysis using the VOSViewer. Automation, intelligence, and bigdata were identifed as three critical clusters of research while, operating systems, international policy and cases, concept analysis as other three clusters of research. Internet of Things turned out to be a key technology of smart factory linking all of these areas. Servitization studies were small in numbers but seemed to have a lot of potential. Security researches seemed to be lacking connections with other areas of studies. Results of this study can be used as a milestone for identifying future research issues in smart factories.

A Study on the Chain of Custody for Securing the Faultlessness of Forensic Data (포렌식 자료의 무결성 확보를 위한 수사현장의 연계관리 방법 연구)

  • Lee, Gyu-an;Shin, young-Tae;Park, Dea-Woo
    • Journal of the Korea Society of Computer and Information
    • /
    • v.11 no.6 s.44
    • /
    • pp.175-184
    • /
    • 2006
  • Computer Forensics functions by defending the effects and extracting the evidence of the side effects for production at the court. Has the faultlessness of the digital evidence been compromised during the investigation, a critical evidence may be denied or not even be presented at the trial. The presented monograph will deliberate the faultlessness-establishing chain procedures in disk forensics, system forensics, network forensics, mobile forensics and database forensics. Once the faultlessness is established by the methods proposed, the products of investigation will be adopted as a leading evidence. Moreover, the issues and alternatives in the reality of digital investigation are presented along with the actual computer forensics cases, hopefully contributing to the advances in computer digital forensics and the field research of information security.

  • PDF

A New Moving Mobile Base Station (MMBS) Scheme for Low Power RMIMS Wireless System (PARTI: MMBS general issues, clystering and signalling Procedures) (저전력 RMIMS 무선 터미널을 위한 새로운 움직이는 이동 기지국 시스템 구조 (1부 : MMBS 일반사항, 클러스터링 및 신호절차))

  • 박수열;고윤호;유상조;김성대
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.24 no.12B
    • /
    • pp.2298-2319
    • /
    • 1999
  • In this paper, we propose a new moving mobile base station (MMBS) scheme for very low power and micro-size RMIMS (radio-interfaced micro information monitoring system) terminals. RMIMS terminals can be used in various application service areas such as pollution monitoring, environment surveillance, traffic monitoring, emergency monitoring (e.g., building, bridge, railroad breakdown), security monitoring (e.g., theft, alarm) and military application. For these applications based on wireless transmission technologies, sensor type RMIMS terminals must satisfy low cost and low power design (e.g., solar power, life limited battery) requirement. In RMIMS terminal design, this low power requirement limits transmission range of uplink or reverse link and means small cell size. Also these applications using RMIMS terminals may have a little bit non real-time traffic characteristic and low scattering density in service area.

  • PDF

Fault Diagnosis for the Nuclear PWR Steam Generator Using Neural Network (신경회로망을 이용한 원전 PWR 증기발생기의 고장진단)

  • Lee, In-Soo;Yoo, Chul-Jong;Kim, Kyung-Youn
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.15 no.6
    • /
    • pp.673-681
    • /
    • 2005
  • As it is the most important to make sure security and reliability for nuclear Power Plant, it's considered the most crucial issues to develop a fault detective and diagnostic system in spite of multiple hardware redundancy in itself. To develop an algorithm for a fault diagnosis in the nuclear PWR steam generator, this paper proposes a method based on ART2(adaptive resonance theory 2) neural network that senses and classifies troubles occurred in the system. The fault diagnosis system consists of fault detective part to sense occurred troubles, parameter estimation part to identify changed system parameters and fault classification part to understand types of troubles occurred. The fault classification part Is composed of a fault classifier that uses ART2 neural network. The Performance of the proposed fault diagnosis a18orithm was corroborated by applying in the steam generator.

SDR Adaptation for Multimode Maritime Wireless Communications (다중모드 해상 무선통신 지원을 위한 SDR 적용 방안)

  • Kim, Jae-Myoung;Lee, Joa-Hyoung;Shim, Woo-Seong;Lee, Sang-Jeong
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2011.05a
    • /
    • pp.173-176
    • /
    • 2011
  • New paradigm is based on the e-navigation policy which is the harmonised collection, integration, exchange, presentation and analysis of maritime information onboard and ashore by electronic means to enhance berth to berth navigation and related services, for safety and security at sea and protection of the marine environment. One of the requirements is seamless communications between various communication systems. So we need the maritime wireless communications based on the SDR technology. In this paper we analyse characteristics and issues of maritime wireless communication technology and service framework and propose a SDR based maritime system platform which can operate in multi-mode.

  • PDF

Study on a Secure Authentication and Authorization Protocol based on Kerberos (커버로스 기반의 안전한 인증 및 허가 프로토콜 에 관한 연구)

  • 김은환;김명희;전문석
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.29 no.5C
    • /
    • pp.737-749
    • /
    • 2004
  • Kerberos authenticates clients using symmetric-key cryptography, and supposed to Oust other systems of the realm in distributed network environment. But, authentication and authorization are essential elements for the security. In this paper, we design an efficient and secure authentication/authorization mechanism by introducing the public/private-key and installing the proxy privilege server to Kerberos. In the proposed mechanism, to make a system more secure, the value of the session key is changed everytime using MAC(message authentication code) algorithm with the long-term key for user-authentication and a random number exchanged through the public key. Also, we reduce the number of keys by simplifying authentication steps. Proxy privilege server certifies privilege request of client and issues a privilege attribute certificate. Application server executes privilege request of client which is included a privilege attribute certificate. Also, a privilege attribute certificate is used in delegation. We design an efficient and secure authentication/authorization algorithm with Kerberos.

A Convergence Study on Improvement of Emission Regulation in Military Vehicle (군용차량 배출가스 규제 개선에 관한 융합적 고찰)

  • Yoon, Heung-Soo
    • Journal of the Korea Convergence Society
    • /
    • v.11 no.1
    • /
    • pp.181-186
    • /
    • 2020
  • Civil technologies and parts occupy big ratio in military vehicle as military supply goods were commercialized. In case of the military vehicle engine, the civil purposed engine has been militarized without developing engine for defense industry. Because of this, it happens that Euro-5 version is mounted in spite of Euro-6 at present because the civil laws on the civil purpose engine and required operational capability for militarization are applied by overlapping. Therefore, this study focused on current situation and issues on the military vehicle emission regulation and suggested how to improve through analyzing the theses, articles, Korean laws and systems. For improving methods, imposing the emission certification duty and exempting the certification for the vehicle of high strategical importance were suggested through aligning the related laws. Consequently, it is expected that this study will be used for basics of checking the civil laws and connection with military systems for commercialization of military supplied goods.

A Study on the Effects that Personal Characteristics of Market Maven and Time Orientation have on Mobile Shopping - With a Focus on Mobile Shopping - (패션 및 뷰티 제품의 모바일 쇼핑에 영향을 미치는 마켓 메이븐 및 시간지향특성에 관한 연구)

  • Nam, Miwoo
    • Journal of the Korean Society of Costume
    • /
    • v.64 no.5
    • /
    • pp.30-49
    • /
    • 2014
  • Mobile shopping, through the use of the smart phone, has become a very popular shopping method for consumers due to it not being limited by time or place. This research aims do the following:1)find the causes for consumers shifting to mobile shopping with the focus on fashion and beauty items; and in order to so, this research will use the TAM that was found by David et al (1989), and 2) distinguish any behavioral differences between consumer groups divided into purchasing intention of fashion and beauty items through smart phone. Path analysis was performed to verify the cause-and-effect relationship between the variables. Personal characteristics(i.e. market maven, time orientation), perceived usability, ease of use, attitude towards mobile shopping, and purchase intentions were all treated as dependant variables. The results showed that attitude towards mobile shopping was the most important variable on mobile shopping intentions. Time-oriented and Market Maven were thought to affect mobile shopping attitude and the dependent variables of purchase intention. Also, when purchasing smart phones, consumers highly valued smart phone's popularity; people with higher purchasing intention mainly used entertainment and utility apps. The following are the main reasons for not purchasing through mobile shopping: they are slower than computers, inconveniences in viewing due to small size of the screen, and security issues. The consumers used the internet as their main source of acquiring daily information. In this research, factors that affect the purchase intention were studied. However, it is difficult to firmly insist that this research correctly predicts the actual purchase intention-further studies need to be done to investigate the relationship between mobile purchase intention and actual purchase intention.

Analysis of Autonomous Driving Vehicle and Korea's Competitiveness Strategy (자율주행차 현황분석과 한국의 경쟁력 확보 전략)

  • Yang, Eun-ji;Kang, Su-jin;Kwon, So-ei;Kim, Da-yeon;Kim, Ji-won;Lee, Yu-jeong;Hwang, Hye-jeong;Chang, Young-hyun
    • The Journal of the Convergence on Culture Technology
    • /
    • v.3 no.2
    • /
    • pp.49-54
    • /
    • 2017
  • In Korea, partial self-driving feature is added on Genesis G80, Tivoli 2017, and others, and full implementation is under evaluation. Tesla already completed test for full self-driving car, Tesla Model 'X'. Further adoption of self-driving car in market will bring benefits to the elderly and disabled, meanwhile traffic accident will be decreased. However, related regulations for traffic accident with autonomous car including ethical responsibility is not fully established yet. In addition, security and privacy issue of self-driving cars should be improved as well. In this paper, domestic researches and analysis status on autonomous car will be summarized, and proper activation model will be proposed for the previously described issues.