• Title/Summary/Keyword: Security Study

Search Result 10,150, Processing Time 0.047 seconds

Legitimacy of the wartime maritime blockade of the Korean Peninsula : Focusing on the response to ships in neutral countries (전시 한반도 근해 해상봉쇄의 합법성: 중립국 선박에 대한 대응을 중심으로)

  • Park, Hyun-rok
    • Maritime Security
    • /
    • v.5 no.1
    • /
    • pp.85-112
    • /
    • 2022
  • The maritime blockade has long been used as a means of war in that it serves as a bridge for economic warfare by paralyzing enemy maritime transport, although it is not a decisive battle, and in the Korean War, U.N. forces have achieved significant results in the war with limited maritime blockade through the Clark Line. However, with China emerging as a maritime powers based on its strong naval power, there is a lack of consideration on how to set up a blockade to block maritime activities and how to respond neutral ships or carrying wartime contraband products if war breaks out again on the Korean Peninsula, In addition, since maritime blockade should be used as a sensitive and flexible naval force projection in that it has interests with neutral countries, it should be carefully reviewed in that it can be used only through careful and reasonable judgment considering the principle of ensuring the legality of maritime blockade Therefore, in this study, Reexamine the process of change in the application of the International Law of Blockade, and through this, Derive the basic principle of ensuring the legitimacy of maritime blockade. In addition, by reviewing the application of these basic principles in the waters off the Korean Peninsula at wartime, we presented answers to research questions by reviewing what needs to be done to neutral ships and ships carrying wartime contraband products, and considered the implications for us

  • PDF

One-health Approach in the Post-COVID-19 Era: Focusing on Animal Infection (One-health 관점에서 본 Post-COVID-19 시대의 동물 감염)

  • Hye-Jeong Jang;Sun-Nyoung Yu;O-Yu Kwon;Soon-Cheol Ahn
    • Journal of Life Science
    • /
    • v.33 no.2
    • /
    • pp.199-207
    • /
    • 2023
  • To prepare for the threat of a future epidemic in the post-COVID-19 era, research based on the one-health concept (i.e., the health of humans, animals, and the environment as "one") is essential. Cross-species infections are being identified as a result of the high infection rate and viral load of SARS-CoV-2 in humans. The possibility of transmission of SARS-CoV-2 from humans to mink has been determined. In addition, the transmission of SARS-CoV-2 from humans to cats through contact has been considered possible. The data so far show that livestock and poultry are less likely to be infected with SARS-CoV-2. However, if infections are established through a new mutation, the resulting diseases are expected to have enormous ripple effects on various fields, such as human food security, the economy, and trade. In addition, there are concerns about the endemic prospect of SARS-CoV-2 and the high accessibility of companion animals. This is because the evolution of the virus likely occurs in animal hosts. Once SARS-CoV-2 is established in other species, they might serve as intermediate hosts for the re-emergence of the virus in the human population. Thus, it is necessary to ensure a rapid response to future outbreaks by accumulating research data on the animal infection of SARS-CoV-2. These data can have implications for the development of animal models for vaccines and therapeutics against SARS-CoV-2. Therefore, in this study, epidemiological reviews were analyzed, and response strategies against SARS-CoV-2 infection in animals were presented using the One-health approach.

A Study on the AI Home Care Solution for the Mobile Vulnerable (이동약자를 위한 AI 홈케어 솔루션에 관한 연구)

  • ChangBae Noh;Wonshik Na
    • Journal of Industrial Convergence
    • /
    • v.21 no.4
    • /
    • pp.165-170
    • /
    • 2023
  • There are cases where the mobility impaired have difficulty moving from the moment they leave the house. If guardians also do not have time to entrust their families, who are socially disadvantaged, to a shelter, the guardian has no choice but to check directly in order to know the location of the guardian. The AI home care solution was designed to relieve the anxiety and labor of caregivers and to provide convenience for protection facility officials and users. If more facilities distribute and use services free of charge to non-profit foundations and protective facilities, the concern of guardians will be reduced, and the burden of facility officials who have to manage facility users will be reduced. In this paper, we provide emergency notification services to guardians in the event of an emergency as well as location and status alarms for guardians, which are all data related to movement, in consideration of the mobility vulnerable. Furthermore, it is necessary to provide a service function that recommends the optimal route using a navigation function to ease the convenience and burden of facility officials. It is necessary to alleviate anxiety by providing necessary information to the guardian, such as the location of the shuttle used by the mobile weak and the time of getting on and off. In addition, while providing services for free, the goal is to improve the quality of service for facility managers and the quality of service for the mobility weak.

A Study on the Crisis Management Standard Manual for Large-scale Human Accident at Workplace for Efficiency of Disaster Response (재난대응 효율화를 위한 사업장 대규모 인적사고 위기관리 표준매뉴얼 개정방안 연구)

  • Woo Sub Shim;Sang Beam Kim
    • Journal of the Society of Disaster Information
    • /
    • v.19 no.3
    • /
    • pp.656-664
    • /
    • 2023
  • Purpose: The Ministry of Employment and Labor manages disasters based on the standard manual for risk management of large-scale human accidents in workplaces when large-scale disasters such as fires and collapses occur in workplaces. We are going to check the standard manual currently in operation and suggest improvement plans for the insufficient items. Method: Accordingly, the standard manual was checked together with internal and external experts in the disaster management manual and disaster management staff at headquarters and local government offices, and items to be improved were identified with priority. Result: In case of a collapse accident, it is necessary for the Ministry of Public Administration and Security to accurately present the selection criteria in order to eliminate the controversy over the selection of the disaster management department. In addition, it seems necessary to supplement the details of the disaster safety communication network operation and evacuation guidelines. Conclusion: In the future, in order to improve the disaster management system that meets the public's eye level, it is expected to prepare a standard manual for risk management of large-scale human accidents in workplaces that guarantees the lives and safety of workers through the collection of opinions from experts in the relevant field, disaster management personnel, and the general public.

Application of Artificial Intelligence Technology for Dam-Reservoir Operation in Long-Term Solution to Flood and Drought in Upper Mun River Basin

  • Areeya Rittima;JidapaKraisangka;WudhichartSawangphol;YutthanaPhankamolsil;Allan Sriratana Tabucanon;YutthanaTalaluxmana;VarawootVudhivanich
    • Proceedings of the Korea Water Resources Association Conference
    • /
    • 2023.05a
    • /
    • pp.30-30
    • /
    • 2023
  • This study aims to establish the multi-reservoir operation system model in the Upper Mun River Basin which includes 5 main dams namely, Mun Bon (MB), Lamchae (LC), Lam Takhong (LTK), Lam Phraphoeng (LPP), and Lower Lam Chiengkrai (LLCK) Dams. The knowledge and AI technology were applied aiming to develop innovative prototype for SMART dam-reservoir operation in future. Two different sorts of reservoir operation system model namely, Fuzzy Logic (FL) and Constraint Programming (CP) as well as the development of rainfall and reservoir inflow prediction models using Machine Learning (ML) technique were made to help specify the right amount of daily reservoir releases for the Royal Irrigation Department (RID). The model could also provide the essential information particularly for the Office of National Water Resource of Thailand (ONWR) to determine the short-term and long-term water resource management plan and strengthen water security against flood and drought in this region. The simulated results of base case scenario for reservoir operation in the Upper Mun from 2008 to 2021 indicated that in the same circumstances, FL and CP models could specify the new release schemes to increase the reservoir water storages at the beginning of dry season of approximately 125.25 and 142.20 MCM per year. This means that supplying the agricultural water to farmers in dry season could be well managed. In other words, water scarcity problem could substantially be moderated at some extent in case of incapability to control the expansion of cultivated area size properly. Moreover, using AI technology to determine the new reservoir release schemes plays important role in reducing the actual volume of water shortfall in the basin although the drought situation at LTK and LLCK Dams were still existed in some periods of time. Meanwhile, considering the predicted inflow and hydrologic factors downstream of 5 main dams by FL model and minimizing the flood volume by CP model could ensure that flood risk was considerably minimized as a result of new release schemes.

  • PDF

A Study On Artifacts Analysis In Portable Software (무 설치 프로그램에서의 사용자 행위 아티팩트 분석)

  • Taeyeong Heo;Taeshik Shon
    • Journal of Platform Technology
    • /
    • v.11 no.2
    • /
    • pp.39-53
    • /
    • 2023
  • Non-installation program (hereinafter referred to as "portable program") is a program that can be used without an installation process, unlike general software. Since there is no separate installation process, portable programs have high mobility and are used in various ways. For example, when initial setup of multiple PCs is required, a portable program can be stored on one USB drive to perform initial setup. Alternatively, when a problem occurs with the PC and it is difficult to boot normally, Windows PE can be configured on the USB drive and portable programs can be stored for PC recovery. And the portable program does not directly affect PC settings, such as changing registry values, and does not leave a trace. This means that the portable program has high security. If a portable program is deleted after using it, it is difficult to analyze behavior in a general way. If a user used a portable program for malicious behavior, analysis in a general way has limitations in collecting evidence. Therefore, portable programs must have a new way of behavioral analysis that is different from ordinary installation software. In this paper, after installing the Windows 10 operating system on a virtual machine, we proceed with the scenario with a portable program of Opera and Notepad++. And we analyze this in various ways such as file analysis of the operating system and memory forensics, collect information such as program execution time and frequency, and conduct specific behavioral analysis of user.

  • PDF

A Study on Intangible Impact of Personal Information Security Breach to Korean Firm's Value (개인정보 보안사고가 국내 기업의 가치에 미치는 비가시적 영향력에 관한 연구)

  • Lee, JongHyun;Kweon, SeongHo;Chang, Ik
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2009.11a
    • /
    • pp.595-596
    • /
    • 2009
  • 정보화의 발전에 비례하여 정보보호의 중요성도 높아지고 있다. 최근까지 정보보호에 대한 관심과 주요 연구의 흐름은 기술적인 보호조치(예: 암호화, 접근제어, 방화벽 등)와 관리적 관점의 행동연구였다. 최근에 들어서야 국내외적으로 정보보호 투자효과에 대한 연구가 활성화되기 시작했다. 정보보호 투자효과에 대한 계량적 산정이 필요한 이유는 정보보호의 중요성을 정확하게 인식할 수 있어 적정규모의 예산을 책정하고 효율적으로 예산을 투입할 수 있는 기초를 마련할 수 있기 때문이다. 정보보호 투자효과를 측정하기 위한 선행연구로 보안사고의 피해규모를 산정하는 연구가 필수적이다. 보안사고의 피해규모는 가시적 손실(피해복구, 생산성 저하, 손해배상 등)과, 비가시적 손실(고객 충성도 저하, 회사의 브랜드 이미지 하락 등) 규모의 합으로 구성된다. 그 동안 가시적 손실규모 측정에 관한 연구는 상대적으로 많았으나, 비가시적 손실규모 측정에 관한 연구는 상대적으로 미흡하였던 것이 사실이다. 이는 현실적으로 비가시적 손실규모를 측정할 수 있는 접근방법을 고안해내는 것이 어려웠기 때문이다. 이로 인해 막연히 비가시적 손실규모가 가시적 손실규모에 비해 대단히 클 것이라고 짐작해 올 수 밖에 없었다. 본 논문에서는 보안사고의 비가시적 손실규모를 측정하기 위해 대규모 개인정보 보안 사고가 발생한 기업의 매출액 증가율을 경쟁기업과 분석하는 연구방법을 제안한다. 매출액은 영업이익 및 순이익과는 달리 회사 내부적인 회계방침에 의해 규모의 조절이 불가능한 재무요소이면서 회사가 고객 충성도 저하와 회사의 브랜드 이미지 하락으로 인해 받게 되는 영향을 가장 정확하게 반영하는 재무요소이기도 하다. 연구방법에 따라 2008년 대규모 개인정보 보안사고가 발생한 국내기업을 선정하고 그 경쟁사와 매출액 변화추이를 비교 분석하였다. 분석결과 보안사고가 발생한 기업의 평균 매출액 증가율이 경쟁사 평균 매출액 증가율 보다 0.0225% 높다는 사실을 발견했다. 이 결과는 국내의 보안 사고가 기업 가치에 미치는 비가시적 영향이 거의 없거나 또는 발생하더라도 그 영향력이 미미하여 가격정책 및 광고 홍보를 통해 충분히 극복할 수 있다는 점을 대변한다. 본 논문의 결과는 역설적으로 국내 보안사고의 피해규모를 측정하는데 있어 가시적 손실규모의 정확한 측정이 무엇보다 중요함을 의미한다.

A Study on the Fraud Detection for Electronic Prepayment using Machine Learning (머신러닝을 이용한 선불전자지급수단의 이상금융거래 탐지 연구)

  • Choi, Byung-Ho;Cho, Nam-Wook
    • The Journal of Society for e-Business Studies
    • /
    • v.27 no.2
    • /
    • pp.65-77
    • /
    • 2022
  • Due to the recent development in electronic financial services, transactions of electronic prepayment are rapidly growing, leading to growing fraud attempts. This paper proposes a methodology that can effectively detect fraud transactions in electronic prepayment by machine learning algorithms, including support vector machines, decision trees, and artificial neural networks. Actual transaction data of electronic prepayment services were collected and preprocessed to extract the most relevant variables from raw data. Two different approaches were explored in the paper. One is a transaction-based approach, and the other is a user ID-based approach. For the transaction-based approach, the first model is primarily based on raw data features, while the second model uses extra features in addition to the first model. The user ID-based approach also used feature engineering to extract and transform the most relevant features. Overall, the user ID-based approach showed a better performance than the transaction-based approach, where the artificial neural networks showed the best performance. The proposed method could be used to reduce the damage caused by financial accidents by detecting and blocking fraud attempts.

Comparative Analysis of Marine Accidents in Fishing Activity Protection Zones and Port and Navigation Zones to Improve Fishing Vessel Security (어선 통항 안전 확보를 위한 어업활동보호구역과 항만·항행구역의 해양사고 비교분석)

  • Hyundong Kim;Sangwon Park;Young-soo Park;Dae-won Kim;Gokhan Camliyurt
    • Journal of the Korean Society of Marine Environment & Safety
    • /
    • v.29 no.2
    • /
    • pp.118-126
    • /
    • 2023
  • In accordance with the increased demand for ocean use, the Marine Spatial Planning system was introduced to rationally allocate ocean space, under which fishing activity protection zones have been designated to protect fishery activities and promote fishery resource protection. However, fishing vessels that mainly sail in fishing activity protection zones are exposed to risk, such that they account for about 70% of marine accidents that occur in Korea, Proper risk management is thus required. This study aims to analyze marine accidents in fishing activities protection zones and port and navigation zones to secure the safety of fishing vessels passing within fishing activity protection zones. To this end, the traffic volume in marine use zones was investigated, and marine accidents were investigated by ship type, accident type, tonnage, accident cause, and loss of life. Analysis determined that most of the marine accidents per unit area of each type occurred in port and navigation zones, but overall most marine accidents occurred in fishing activity protection zones. In particular, it was found that traffic safety management was necessary because many human accidents occurred.

Analysis of the factors of the failure of the North Korean Army's Great Bypass Maneuver to Honam during the Korea War from an indirect approach strategy: Focusing on the Naval and Marine Corps' Tongyeong Amphibious Operation to Stop the "Dislocation" (간접접근전략으로 본 6·25전쟁기 북한군의 호남 방면 대우회기동 실패 요인 분석 -'교란'을 저지한 해군·해병대의 통영상륙작전을 중심으로-)

  • Choi, Ho-jae
    • Maritime Security
    • /
    • v.6 no.1
    • /
    • pp.109-135
    • /
    • 2023
  • The North Korean military's maneuver toward Honam was the fastest maneuver the North Korean army had demonstrated during the Korean War, and it was a threatening attack that forced the Korean and Allied forces to fully adjust the defenses of the Nakdong River. However, when this study analyzed the North Korean military's maneuver toward Honam in terms of indirect approach strategy, there were a number of factors that inevitably led to its failure. In terms of implementing the indirect approach strategy, the North Korean military cited a number of failure factors, including the dispersion of combat forces, the inflexibility of changing the line of operation, the maneuvering of ground forces, and the lack of psychological distaction. However, the North Koreans were preparing for a final "surprise attack," in which the 7th Division, which was following the North Korean 6th Division, took another diversion and attempted to attack in the direction of Tongyeong. With this, the North Koreans intended to break through the Nakdong River defenses and head for Pusan. However, the North Korean attack was ultimately thwarted by the Korean Navy and Marine Corps' Tongyeong Amphibious Operation. With a swift maneuver using the sea as a maneuvering space, the Navy and Marine Corps occupied key points first, creating an advantageous situation and fending off an attack by the North Korean 7th Division. The Navy and Marine Corps' Tongyeong Amphibious Operation finally thwarted the North Korean military's maneuver toward Honam, thus maintaining the Nakdong River defenses.

  • PDF