• Title/Summary/Keyword: Security Technology Policy

Search Result 700, Processing Time 0.028 seconds

Spatial Decision Support System for Residential Solar Energy Adoption

  • Ahmed O. Alzahrani;Hind Bitar;Abdulrahman Alzahrani;Khalaf O. Alsalem
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.6
    • /
    • pp.49-58
    • /
    • 2023
  • Renewable energy is not a new terminology. One of the fastest growing renewable energies is solar energy. The implementation of solar energy provides several advantages including the reduction of some of the environmental risks of fossil fuel consumption. This research elaborated the importance of the adaption of solar energy by developing a spatial decision support system (SDSS), while the Residential Solar Energy Adoption (RSEA) is an instantiation artifact in the form of an SDSS. As a GIS web-based application, RSEA allows stakeholders (e.g., utility companies, policymakers, service providers homeowners, and researchers) to navigate through locations on a map interactively. The maps highlight locations with high and low solar energy adoption potential that enables decision-makers (e.g., policymakers, solar firms, utility companies, and nonprofit organizations) to make decisions. A combined qualitative and quantitative methodological approach was used to evaluate the application's usability and user experience, and results affirmed the ability of the factors of utility, usefulness, and a positive user experience of the residential solar energy adoption of spatial decision support system (RSEA-SDSS). RSEA-SDSS in improving the decision-making process for potential various stakeholders, in utility, solar installations, policy making, and non-profit renewable energy domains.

Decision Making on Standardization Strategy for Personal Information Security Using Importance-Performance Analysis (중요도-수행도 분석을 이용한 개인정보 보호기술 표준화 추진전략)

  • Koo, Kyoung-Cheol;Woo, Hoon-Shik;Jo, In-June
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.33 no.4
    • /
    • pp.145-152
    • /
    • 2010
  • Under limited resources such as budgets and experts, it is necessary to make decisions for promotion strategy of standardization work items in Information and Communication Technologies (ICTs). This paper focuses on a method of setting standardization promotion strategies for each item of personal information security standardization. As a decision making tool, the Importance Performance Anaysis (IPA) is applied and analyzed to the decision processes. The results are showed and illustrated for useful inputs to practical policy making in the field of standardization activities.

A Study on the Serious Game for the Military Training (군사훈련용 기능성 게임에 관한 연구)

  • Ha, Soo-Cheol
    • Journal of National Security and Military Science
    • /
    • s.7
    • /
    • pp.233-270
    • /
    • 2009
  • Serious game played with a computer in accordance with specific rules, that uses entertainment to further government or corporate training, education, health, public policy, and strategic communication objectives. The main goal of a serious game is usually to train or educate users while giving them an enjoyable experience. Serous games are video games with serious purposes such as teaching or training and whose principal aim is education. The major characteristics of serious games involve pedagogy which are all of the activities that educate, train, or instruct the player. Other characteristics of serious games are that they use entertainment principles, creativity and technology to build games that carry out serious purposes. This study is to introduce a serious game for the military training and to describe the elements of game design for developing it.

  • PDF

A Study on the Security Policy Management for managing Heterogeneous Security Systems (이종의 보안시스템 관리를 위한 보안정책 관리에 관한 연구)

  • Lee, DongYoung;Park, Hyun-Ju
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2012.11a
    • /
    • pp.1119-1121
    • /
    • 2012
  • 이종의 분산환경에서 다양한 보안시스템에 대한 효율적인 보안 관리를 위해서 관리자는 보안 시스템들이 설치된 네트워크 환경에 대한 사전에 전문적인 보안 지식을 갖고 있어야하며, 개방형 네트워크 환경의 경우 새로운 보안시스템이 추가되면 새로운 보안 정책과 기술을 적용해야 한다. 이는 전산망 운영 기관의 보안 관리 비용을 가중시키며 체계적이고 일괄적인 보안 정책 및 기술 구현을 불가능하게 하여 오히려 보안 문제를 야기시키는 역기능을 초래할 수 있다. 이에 본 논문에서는 관리대상 보안 시스템들에 대한 효율성, 편의성 및 보안성 향상을 목적으로 하며, 보안 시스템들 간의 상호연동이 가능하도록 보안정책의 일반화 프로세스를 제시하고자 한다.

Towards the Acceptance of Functional Requirements in M-Learning Application for KSA University Students

  • Badwelan, Alaa;Bahaddad, Adel A.
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.4
    • /
    • pp.145-166
    • /
    • 2021
  • M-learning is one of the most important modern learning environments in developed countries, especially in the context of the COVID-19 pandemic. According to the Ministry of Education policies in Saudi Arabia, gender segregation in education reflects the country's religious values, which are a part of the national policy. Thus, it will help many in the target audience to accept online learning more easily in Saudi society. The literature review indicates the importance to use the UTAUT conceptual framework to study the level of acceptance through adding a new construct to the model which is Mobile Application Quality. The study focuses on the end user's requirements to use M-learning applications. It is conducted with a qualitative method to find out the students' and companies' opinions who working in the M-learning field to determine the requirements for the development of M-learning applications that are compatible with the aspirations of conservative societies.

Trends and Implications of Cybersecurity Policies in Major Countries (주요국 사이버보안 정책 동향 및 시사점)

  • J.S. Lee;S.M. Choi;C.M. Ahn;Y. Yoo
    • Electronics and Telecommunications Trends
    • /
    • v.38 no.4
    • /
    • pp.58-69
    • /
    • 2023
  • Cyberspace is emerging as a critical domain requiring national-level governance and international cooperation owing to its potential financial and societal impacts. This research aims to investigate the cybersecurity policies from major countries for understanding with comprehensive perspectives. Global trends emphasize a comprehensive command-centered approach, with top leadership directing cybersecurity policies. Key policy areas include security across technology ecosystems, protection of critical infrastructure, and software supply chain security. Investment is being focused on zero-trust architectures, software bills, and new technologies like artificial intelligence. For countries like Korea, immediate response and adaptation to these trends are crucial to develop and enforce national cybersecurity policies.

Civil-Military Relations and Military Leadership (민군관계와 국방리더십의 발전방향)

  • Son, Su-Tae
    • Journal of National Security and Military Science
    • /
    • s.4
    • /
    • pp.119-156
    • /
    • 2006
  • Now it is not useful the theory about civil-military relationship that have been analysed for power games between military and civilians Korean society is going on governance society managed by cooperating network of government, civilian society and business market These social change require for new context about civil-Military relationship. Military leadership must contribute desirable civil-military relationship This study will suggest the direction about military leadership for desirable civil-military relationship. Now political issues about military intervention to the government are almost settled, but the worry about complications between military and civilians exist in the part of low issues like policy-making. Another important issues is military leadership about the style of social-being. In recent years, social change is very complex and speedy like global networking and diversity, leadership environment also, changed like leadership paradigm shift. Military leadership must be examined from the principle to the context of social integration At the present age, individual soldier is citizen in uniformed. Also military leadership must to seek the principle in the citizen mind like citizenship. Another charactristics of present day military is influence of high technogy. For the high-tech war military need the transition about science and technology from the whole society. In the context of above the development of military leadership are suggested as follows. First, the development of military control leadership must besought to the context of cooperation between government and military. Government must provide the system to strengthen military professionals in the process of policy-making about national security Second, military leadership must embody the important social values through the advanced military making, Third, military leadership must provide the adaptability to the society through the military education of their soldiers Forth, military leadership must be contributed to the social integration and to the growing up individual soldiers like their socialization and their achievement. Five, an important subject of military leadership is the creation of desirable military culture through the harmony of social culture and military culture.

  • PDF

Computational and experimental forensics characterization of weapons-grade plutonium produced in a thermal neutron environment

  • Osborn, Jeremy M.;Glennon, Kevin J.;Kitcher, Evans D.;Burns, Jonathan D.;Folden, Charles M.III;Chirayath, Sunil S.
    • Nuclear Engineering and Technology
    • /
    • v.50 no.6
    • /
    • pp.820-828
    • /
    • 2018
  • The growing nuclear threat has amplified the need for developing diverse and accurate nuclear forensics analysis techniques to strengthen nuclear security measures. The work presented here is part of a research effort focused on developing a methodology for reactor-type discrimination of weapons-grade plutonium. To verify the developed methodology, natural $UO_2$ fuel samples were irradiated in a thermal neutron spectrum at the University of Missouri Research Reactor (MURR) and produced approximately $20{\mu}g$ of weapons-grade plutonium test material. Radiation transport simulations of common thermal reactor types that can produce weapons-grade plutonium were performed, and the results are presented here. These simulations were needed to verify whether the plutonium produced in the natural $UO_2$ fuel samples during the experimental irradiation at MURR was a suitable representative to plutonium produced in common thermal reactor types. Also presented are comparisons of fission product and plutonium concentrations obtained from computational simulations of the experimental irradiation at MURR to the nondestructive and destructive measurements of the irradiated natural $UO_2$ fuel samples. Gamma spectroscopy measurements of radioactive fission products were mostly within 10%, mass spectroscopy measurements of the total plutonium mass were within 4%, and mass spectroscopy measurements of stable fission products were mostly within 5%.

A Study on Personal Information Protection amid the COVID-19 Pandemic

  • Kim, Min Woo;Kim, Il Hwan;Kim, Jaehyoun;Ha, Oh Jeong;Chang, Jinsook;Park, Sangdon
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.16 no.12
    • /
    • pp.4062-4080
    • /
    • 2022
  • COVID-19, a highly infectious disease, has affected the globe tremendously since its outbreak during late 2019 in Wuhan, China. In order to respond to the pandemic, governments around the world introduced a variety of public health measures including contact-tracing, a method to identify individuals who may have come into contact with a confirmed COVID-19 patient, which usually leads to quarantine of certain individuals. Like many other governments, the South Korean health authorities adopted public health measures using latest data technologies. Key data technology-based quarantine measures include:(1) Electronic Entry Log; (2) Self-check App; and (3) COVID-19 Wristband, and heavily relied on individual's personal information for contact-tracing and self-isolation. In fact, during the early stages of the pandemic, South Korea's strategy proved to be highly effective in containing the spread of coronavirus while other countries suffered significantly from the surge of COVID-19 patients. However, while the South Korean COVID-19 policy was hailed as a success, it must be noted that the government achieved this by collecting and processing a wide range of personal information. In collecting and processing personal information, the data minimum principle - one of the widely recognized common data principles between different data protection laws - should be applied. Public health measures have no exceptions, and it is even more crucial when government activities are involved. In this study, we provide an analysis of how the governments around the world reacted to the COVID-19 pandemic and evaluate whether the South Korean government's digital quarantine measures ensured the protection of its citizen's right to privacy.

Study on Developmental Strategy of National Defense & IT Convergence (국방IT융합기술의 발전전략에 관한 연구)

  • Koo, Han Lim;Kim, Seong Min;Rhee, Woo Seop
    • Convergence Security Journal
    • /
    • v.14 no.6_1
    • /
    • pp.99-112
    • /
    • 2014
  • National Defense & IT Convergence is ensuring actual force integration by developing new IT Convergence Technology for the purpose of realizing the concept of Network Centric Warfare. The Ministry of Defense has appointed National Defense & IT Convergence Center of Defense Agency for Technology and Quality as a specialized agency for the National Defense & IT Convergence development, a mission in the creative economy era and has been active in military demand inquiry and prior technology plan with the industrial-academic research institute for discovery of National Defense IT Convergence projects based on the Convergence Center. Further, it is promoting focused on the timely introduction of private IT new technology by operating the project planning team comprised of defense domain specialists and by applying the advanced planning method etc. Accordingly, for the development of National Defense & IT convergence, developmental strategy is urgently required to be utilized effectively after considering theoretically on the national IT Convergence policy enforcement and phenomenon of National Defense & IT Convergence technology and analyzing them comprehensively. This thesis promotes in phases the IT Convergence projects which are identified for the development, improves the efficiency of newly created National Defense & IT Convergence center and suggests training program of IT Convergence personnel related to the defense reforms. With such, it will achieve smart defense in advance and will also contribute largely for the realization of the immediate paradigm shift and of the creative economy.