• Title/Summary/Keyword: Security Navigation

Search Result 373, Processing Time 0.029 seconds

Development of User-dependent Mid-point Navigation System (사용자 중심의 중간지점 탐색 시스템의 설계 및 구현)

  • Ahn, Jonghee;Kang, Inhyeok;Seo, Seyeong;Kim, Taewoo;Heo, Yusung;Ahn, Yonghak
    • Convergence Security Journal
    • /
    • v.19 no.2
    • /
    • pp.73-81
    • /
    • 2019
  • In this paper, we propose a user-dependent mid-point navigation system using a time weighted mid-point navigation algorithm and a user preference based mid-point neighborhood recommendation system. The proposed system consists of a mid-point navigation module for calculating an mid-point by applying a time weight of each user based on a departure point between users, and a search module for providing a search for a route to the calculated mid-point. In addition, based on the mid-point search result, it is possible to increase the utilization rate of users by including a place recommending function based on user's preference. Experimental results show that the proposed system can increase the efficiency of using by the user-dependent mid-point navigation and place recommendation function.

A Study on Enterprise and Government Information Security Enhancement with Information Security Management System (정보보호관리체계를 통한 기업 및 정부 정보보안 강화 방안에 관한 연구)

  • Park, Chung-Soo;Lee, Dong-Bum;Kwak, Jin
    • Journal of Advanced Navigation Technology
    • /
    • v.15 no.6
    • /
    • pp.1220-1227
    • /
    • 2011
  • According to the development of IT technology, life itself is becoming the change to Knowledge-based systems or information-based systems. However, the development of IT technology, the cyber attack techniques are improving. And DDoS a crisis occurs frequently, such as cyber terrorism has become a major data leakage. In addition, the various paths of attack from malicious code entering information in the system to work for your company for loss and damage to information assets is increasing. In this environment, the need to preserve the organization and users of information assets to perform ongoing inspections risk management processes within the organization should be established. Processes and managerial, technical, and physical systems by establishing an information security management system should be based. Also, we should be introduced information security product for protecting internal assets from the threat of malicious code incoming to inside except system and process establishment. Therefore we proposed enterprise and government information security enhancement scheme through the introduction of information security management system and information security product in this paper.

A System for Supporting The Cyber Security Control of I&C System (제어계측 시스템 환경에서의 사이버 보안 통제 지원 시스템)

  • Jung, Hyun-Mi;Kim, Seok-Hun;Sung, Kyung
    • Journal of Advanced Navigation Technology
    • /
    • v.17 no.4
    • /
    • pp.442-448
    • /
    • 2013
  • I&C (Instrumentation & Control) system is different from information system and the security design of the two systems are also different. The modeling activity is needed based on the security control guide in order to build I&C system security control. In this paper, the role and by the security control, we designed the relationship (that is, the relation schema) between the documents for 'The system for supporting the cyber security control of I&C system design' based on the security control guide. The designed schema plans 'The system for supporting the cyber security control of I&C system' for observing the security control guide, and is used as the database and content that supports its design and implementation. The process and system of the proposed schema is utilized and designed. The design of the schema and system is intensified in the design phase with the proposed mode and supporting the I&C system cyber security design.

The Strategic Approach of 'Freedom of Navigation Operations' ('항행의 자유 작전'의 전략적 접근)

  • Kim, Jeong-Min
    • Maritime Security
    • /
    • v.3 no.1
    • /
    • pp.115-140
    • /
    • 2021
  • The South China Sea is a significant maritime shipping route with abundant submarine and fishing resources. Over 40,000 ships pass through the South China Sea every year, constituting around 50% of global shipping and 66% of crude oil. In particular, 30% of Korea's import cargo and 90% of energy imports pass through this body of water. The US and China realized the significance of this sea area from early on and are embodying national interest through maritime security at the national strategic level by implementing the 'Indo-Pacific' and 'One Belt One Road' strategies, respectively. Such geopolitical conflicts are manifested in the 'freedom of navigation operations' by the US in the South China Sea. Despite its significance, there is a lack of studies in Korea on the freedom of navigation operations, and most previous studies only focus on analyzing international law and agreements. This article examines the origin and background of the strategic perception of the freedom of navigation operations and derives implications for the peace and security of the Korean Peninsula as the strategic competition between the US and China continues.

  • PDF

The Ship in the New Saudi Commercial Maritime Law

  • BOUZIR, Saoussen
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.4
    • /
    • pp.175-182
    • /
    • 2022
  • The new commercial maritime law in the Kingdom came comprehensive and detailed for all topics related to commercial maritime navigation, thus responding to most of the problems that arise in the field, specifically regarding the ship as the focus of the rules of maritime law. This system defines the ship in law, regulates its civil status, determines how to name it, determine its domicile, and the conditions for acquiring Saudi nationality. It also contained a regulation of the rights granted to ships by ownership, as well as their lease and mortgage, the mechanism of attachment to them to settle debts and the rights in kind dependent on them and controlling the rights of third parties on ships and the procedures for forcibly selling them from precautionary seizure and executive seizure and then forced sale in public auction. Until this research was an effort to present a clear picture about the legal system of the ship in the new Saudi commercial maritime system and confirming the extent of the success of the Saudi legislator with the ship system in highlighting the legal frameworks for this facility prepared for maritime navigation.

An Exploratory Study of Industrial Security Studies for Science and Technologies Protection (제조산업 기술보호를 위한 산업보안학 메타적 분석 연구)

  • Chang, Hang-Bae
    • Journal of Advanced Navigation Technology
    • /
    • v.17 no.1
    • /
    • pp.123-131
    • /
    • 2013
  • If Industrial state-of-the-art technology that made through IT convergence should be to build safely environment that can protect then IT technology and manufacturing industry become convergence and a growth engine become stable positioning. In each industry, there has been a steady effort for the industrial security. However, they introduced only managerial/technical/physical countermeasures. Therefore, it is difficult to find a reference point as industrial security necessity, protecting coverage and things and so on. It is to lack that academic research in industrial security for protecting industrial technology. In detail, a clear definition lack for industrial security. And target range classification lack for industrial security studies. In this study, we redefined the concept of industry security through previous studies. Academic classification designed industrial security studies through delphi method. we analyzed industry security trends based industrial security studies classification and presented domestic industry research orientations.

Importance-Performance Analysis (IPA) of Cyber Security Management: Focused on ECDIS User Experience

  • Park, Sangwon;Chang, Yeeun;Park, Youngsoo
    • Journal of the Korean Society of Marine Environment & Safety
    • /
    • v.27 no.3
    • /
    • pp.429-438
    • /
    • 2021
  • The mandatory installation of the ECDIS (Electronic Chart Display and Information System) became an important navigational equipment for navigation officer. In addition, ECDIS is a key component of the ship's digitalization in conjunction with various navigational equipment. Meanwhile, cyber-attacks emerge as a new threat along with digitalization. Damage caused by cyber-attacks is also reported in the shipping sector, and IMO recommends that cybersecurity guidelines be developed and included in International Security Management (ISM). This study analyzed the cybersecurity hazards of ECDIS, where various navigational equipment are connected. To this end, Importance-Performance Analysis (IPA) was conducted on navigation officer using ECDIS. As a result, the development of technologies for cyber-attack detection and prevention should be priority. In addition, policies related to 'Hardware and Software upgrade', 'network access control', and 'data backup and recovery' were analyzed as contents to be maintained. This paper is significant in deriving risk factors from the perspective of ECDIS users and analyzing their priorities, and it is necessary to analyze various cyber-attacks that may occur on ships in the future.

A Study on the Connective Points between IMO Cyber-security Guideline and e-Navigation Software Quality Guideline with Data Quality Perspectives (데이터품질 관점에서 IMO 사이버보안 가이드라인과 해양소프트웨어 품질 가이드라인의 연계방안)

  • Jung, Jieun;Shim, Hoyong;Lee, Seojeong
    • Proceedings of the Korean Institute of Navigation and Port Research Conference
    • /
    • 2016.05a
    • /
    • pp.38-39
    • /
    • 2016
  • IMO는 e-navigation을 구현하기 위한 전략이행계획에 따라 e-navigation 소프트웨어 품질보증 가이드라인을 개발하였고 이는 IMO의 회람문서로 등재되었다. 이 가이드라인에서 e-navigation 설계 시 고려해야 하는 품질 특성으로 사이버보안에 대해 언급하고 있다. 2016년 6월 MSC 96차 회의에 미국과 BIMCO 등 주요 IMO회원국 및 기구에서 제출한 사이버보안 가이드라인을 주요 의제로 다룬다. 본 논문에서는 데이터 품질 관점에서 IMO 사이버보안 가이드라인과 e-navigation 소프트웨어 품질 가이드라인의 연계방안을 제시하고자 한다.

  • PDF

Ergonomic Designs of Car Navigation for Elderly Users (고령자를 고려한 내비게이션의 인간공학적 설계에 관한 연구)

  • Kim, Chang-Kyoon;Choe, Jae-Ho;Im, Young-Jae;Jung, Eui-S.
    • Journal of the Ergonomics Society of Korea
    • /
    • v.29 no.5
    • /
    • pp.771-782
    • /
    • 2010
  • Today, the number of elderly drivers who use navigation is increasing with the growing number of elderly drivers. The purpose of this study is to provide guidelines on the interface of car navigation for elderly users. To extract significant factors which were distinguished between young and elderly users, both young and elderly users executed the driving test by installing two car navigation alternatives. The analysis was conducted through t-test. The results show that significantly different factors were the number and the meaning of the menu items in the initial screen, the location and the meaning of the menu icons in the map screen, the ease of search of the menu and the text size in the menu screen. Improvements for the factors of the initial screen and map screen were made with reference to ergonomic guidelines, and suggested through experiments comparing design alternatives for the menu screen. Design alternatives were made through a combination of investigative variables, and the analysis was conducted through ANOVA. The results show that Alternative 7 (the location of the tab was placed at the bottom, menu representation was done with the text font size of 18pt and the location of menu navigation icons was shown at the upper left) was preferred in terms of user's preference and the execution time. So if the suggested menu for elderly users are added to the existing design, both users will satisfy their desires. The guidelines suggested in this study will help the designer of car navigation take elderly users into consideration.

Development of Computer-based Remote Technologies and Course Control Systems for Autonomous Surface Ships

  • Melnyk, Oleksiy;Volianska, Yana;Onishchenko, Oleg;Onyshchenko, Svitlana;Kononova, Olha;Vasalatii, Nadiia
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.9
    • /
    • pp.183-188
    • /
    • 2022
  • Recently, more and more researches aimed at the development of automated and autonomous ships are appearing in the scientific environment. One of the main reason is the need to solve the problems of safe navigation and reducing accidents due to human factor, as well as the ever-increasing problem associated with the lack of qualified maritime personnel. Development of technologies based on application of artificial intelligence also plays important role, after all for realization of autonomous navigation concept and enhancement of ship automatic maneuvering processes, advancement of maneuvering functions and elaboration of specific algorithms on prevention of close quarter situations and dangerous approach of ships will be required. The purpose of this work is the review of preconditions of occurrence of the autonomous ship navigation conception, overview of introduction stages and prospects for ship remote control based on unmanned technologies, analysis of technical and intellectual decisions of autonomous surface ships, main research tendencies. The research revealed that the technology of autonomous ship navigation requires further development and improvement, especially in terms of the data transmission protocols upgrading, sensors of navigation information and automatic control systems modernization, which allows to perform monitoring of equipment with the aim of improving the functions of control over the autonomous surface ship operation.