• Title/Summary/Keyword: Security Technology Policy

Search Result 686, Processing Time 0.022 seconds

The study of meanings and follow-up tasks for enactment of Assistive Technology Act in Korea (한국의 보조기기법 제정 의의와 후속과제에 대한 연구)

  • Nam, Se-hyun
    • Journal of Digital Convergence
    • /
    • v.14 no.10
    • /
    • pp.535-542
    • /
    • 2016
  • This study was to explore the meanings and follow-up tasks for enactment of Act on Supply and Utilization Promotion of Assistive Technology Devices for People with Disabilities and Seniors(Assistive Technology Act) in Korea. I conducted analysis about contents and establishment process of the Act. The study found meaningful effects ; it provided the basis for supporting assistive technology devices based on the social model, it led to an Implementation of the national obligations such as UN Convention on the Rights of Persons with Disabilities, it provided terms related to assistive technology. It is suggested to conduct follow-up studies and to put the efforts to strengthen additional laws for backing up the effective policy for extended support of assistive technology devices and for security of budget, for establishing regional service centers, for phasing of professional qualification, for controlling quality, for establishing an information system, and for promoting industries.

A Review of a Bill on the Ocean-Based Climate Solution Act (OBCSA) in the U.S and Implications for the Ocean Climate Change-Related Legal System in Korea (미국 해양기반기후해법 법안(Ocean Based Climate Solution Act, OBCSA)의 검토와 국내 해양기후변화 법제에 대한 시사점)

  • Sora Yun;Moonsuk Lee
    • Ocean and Polar Research
    • /
    • v.45 no.2
    • /
    • pp.71-87
    • /
    • 2023
  • Climate change causes ocean warming, ocean acidification, sea-level rise, dynamic coastal risk, change of ecosystem structure and function, and degradation of ecosystem services. Not only that, but it has negatively impacted the well-being of people, society, and culture, including food security, water resources, water quality, livelihood, health, welfare, infrastructure, transport, tourism, recreation, and so on, especially by particularly degrading indigenous communities and generating an inequitable distribution of benefits and costs. As pointed out here, these adverse impacts of climate change on the ocean have been emphasized at the international and national levels. In contrast, the ocean field has been neglected in the climate change conversation for too long. However, since the UNFCCC COP 25, the ocean has been drawn into the discussion as a solution to address climate change. Moreover, the U.S. Congress recently unveiled a bill called the 'Ocean-Based Climate Solution Act, OBCSA' that reflects the new paradigm of the international regime. The comprehensive legislative bill includes elements related to climate inequity, a blue economy, and a community-led bottom-up policy mechanism, which will have a significant bearing on the ocean-climate legal system. Therefore, this study reviews the OBCSA and deduces implications with regard to the ocean-climate legal system in Korea.

The Analysis of Information Security Awareness Using A Text Mining Approach (텍스트 마이닝을 이용한 정보보호인식 분석 및 강화 방안 모색)

  • Lee, Tae-Heon;Youn, Young-Ju;Kim, Hee-Woong
    • Informatization Policy
    • /
    • v.23 no.4
    • /
    • pp.76-94
    • /
    • 2016
  • Recently in Korea, the importance of information security awareness has been receiving a growing attention. Attacks such as social engineering and ransomware are hard to be prevented because it cannot be solved by information security technology. Also, the profitability of information security industry has been decreasing for years. Therefore, many companies try to find a new growth-engine and an entry to the foreign market. The main purpose of this paper is to draw out some information security issues and to analyze them. Finally, this study identifies issues and suggests how to improve the situation in Korea. For this, topic modeling analysis has been used to find information security issues of each country. Moreover, the score of sentiment analysis has been used to compare them. The study is exploring and explaining what critical issues are and how to improve the situation based on the identified issues of the Korean information security industry. Also, this study is also demonstrating how text mining can be applied to the context of information security awareness. From a pragmatic perspective, the study has the implications for information security enterprises. This study is expected to provide a new and realistic method for analyzing domestic and foreign issues using the analysis of real data of the Twitter API.

A Methodology for the Improvement of Accredited Digital Certificate Integrating FIDO Biometric Technology and TrustZone (FIDO 생체기술과 안전영역을 연계한 공인인증서 효율화 방법)

  • Cho, Hwa-Gun;Yang, Hae-Sool
    • Journal of Digital Convergence
    • /
    • v.15 no.8
    • /
    • pp.183-193
    • /
    • 2017
  • Digital accredited certificates issued under the Digital Signature Act provide essential functionalities for online service, so certificates are used for various services such as online banking, e-government. However, certificates can be stolen by hackers and users need to install separate software to use certificates. Recently FIDO, which aims to solve the problems of password-based authentication and the lack of interoperability between authentication methods, is used for biometric authentication and TrustZone, hardware-based secure environment, is used for safe smartphone usage. In this paper, the new service method is suggested which uses FIDO-based biometric authentication and stores certificates in TrustZone. This method can not only improve security and convenience but also be easily applied to the service because it uses built-in functionalities of new smartphones such as biometric sensors and TrustZone. It is expected that people can use certificates in a safe and convenient way with this method.

A Study on portable voice recording prevention device (휴대용 음성 녹음 방지 장치 연구)

  • Kim, Hee-Chul
    • Journal of Digital Convergence
    • /
    • v.19 no.7
    • /
    • pp.209-215
    • /
    • 2021
  • This study is a system development for voice information protection equipment in major meetings and places requiring security. Security performance and stability were secured with information leakage prevention technology through generation of false noise and ultrasonic waves. The cutoff frequency band for blocking the leakage of voice information, which has strong straightness due to the nature of the radio wave to the recording prevention module, blocks the wideband frequency of 20~20,000Hz, and the deception jamming technology is applied to block the leakage of voice information, greatly improving the security. To solve this problem, we developed a system that blocks the recording of a portable smartphone using a battery, and made the installation of a separate device smaller and lighter so that customers do not recognize it. In addition, it is necessary to continuously study measures and countermeasures for efficiently using the output of the anti-recording speaker for long-distance recording prevention.

Economic Values and Implications of Innovation in the Korean Quarantine System on Plant Diseases and Pests

  • Son, Minsu;Kim, Brian H.S.;Park, ChangKeun
    • Asian Journal of Innovation and Policy
    • /
    • v.10 no.1
    • /
    • pp.108-131
    • /
    • 2021
  • The increase of international trade across countries and borders results in increased risks associated with the inflow of new pests and diseases. These risks are likely to be increased more rapidly due to climate change. Some countries implement strict regulations on imports to prevent these risks and protect biosecurity, food safety, and public health. However, the problems arise when the diseases and pests are found in a country where their economic structure largely depends on agricultural exports and cause ripple effects on other industries and ecosystems. Therefore, establishing an effective quarantine system is essential to protect and recover from the damage caused by non-native diseases and pests. This study's objectives are 1) analyzing the agricultural policies relate to the quarantine system on diseases and pests in Korea, 2) evaluating the Korea plant quarantine system's value, and 3) simulating plant quarantine policy strategies. We estimated the Korean quarantine system's benefits on diseases and pests to reach these objectives. The benefits are measured with a willingness to pay from respondents surveyed by the contingent valuation method (CVM). The CVM approach directly asks people how much they would willingly pay for food security. Finally, the Korean quarantine system's values are simulated with several policy scenarios and different scales of infection at the regional level. The results of this study can deliver policy implications on the quarantine system innovation in developing countries including Asia.

Factors Influencing the Introduction of Mobile Security Technology (기업 모바일 보안기술 도입에 영향을 미치는 특성요인)

  • Choi, Woong-Gyu;Lee, Young-Jai
    • The Journal of Society for e-Business Studies
    • /
    • v.18 no.4
    • /
    • pp.215-240
    • /
    • 2013
  • This research has reviewed the major composition concepts and the positive research results in the selected studies which were theoretically based on IDT (Innovation Diffusion Theory), IRM (Model of Innovation Resistance), TAM(Technology Acceptance Model), and IAPA(Information Asset Protection Activity) in order to improve the theoretical explanation of major characterized factors influencing on the introduction of MST (Mobile Security Technology). The characterized factors for the adaptation of MST and 17 hypotheses on the MST study models in order to test the effects on the intention to use are empirically verified by utilizing the analysis method of structure equation model. As a result of a study, First, the most influential characterized factors of IRM are shown as compatibility, complexity, relative advantage, information asset protection in order. Second, the characterized factors affecting intention to use are shown as relative advantage, compatibility, innovation resistance, performance expectancy. The results of this study are relevantly significant to establish the theoretical foundation of the study on the adaptation of MST and The verification of the characterized factors provide strategic implication for the introduction of MST and policy direction which alleviates informational gap between new MST and previous Security Technology to diffusion agency.

An Exploratory Research on the Effects for SMEs of the Technology Battle between the United States and China - A Focus on Information Security Issues of Huawei (미·중 기술 갈등에 따른 우리나라 중소기업의 파급효과에 관한 탐색적 연구 -화웨이 정보보안 이슈를 중심으로 -)

  • Park, Munsu;Son, Wonbae
    • Korean small business review
    • /
    • v.42 no.1
    • /
    • pp.43-56
    • /
    • 2020
  • The technology conflict between the U.S. and China is deepening recently. The U.S.-China battle began as a national security issue but is comprehending as a U.S.'s check for China's rapid technological advancement. China is rapidly growing in several indexes including R&D expenditure, patent application, and publications, and is challenging the U.S. in 5G and Artificial Intelligence. In 2018, Huawei became the largest 5G network/equipment provider and second largest smart phone manufacturer in the world. Now, Huawei is outperforming at AI chipset manufacturing, Bigdata analysis and cloud, positioning to become a critical player in the 4th industrial revolution. The purpose of this research is to analyze the effect of recent Huawei issues to Korean SMEs focusing on the relation between Huawei and Korean companies; the cooperation status from the Global Value Chain (GVC) perpsective, and Korean government's policies related to Huawei's information security issues will be the three main frames for the analysis. Then, this research proposes policy implications such as increasing Korea's competitiveness in manufacturing and information security.

A study on BLE-based ZEP System Attack Techniques and Countermeasures Utilizing the Convergence of Big data Platform and Monitoring System (빅데이터 플랫폼과 모니터링 시스템의 융합을 이용한 BLE기반의 ZEP시스템 공격 기법에 대한 대응방안 연구)

  • Ahn, Ye-Chan;Shin, Young-Hyun;Lee, Keun-Ho
    • Journal of Digital Convergence
    • /
    • v.13 no.8
    • /
    • pp.331-336
    • /
    • 2015
  • Lately, the development and utilization of technology of the Internet of Things(IoT), and Fintech have been on the rise and amid the emerging convergence of system and service, mobile payment system and location based service technology have received much attention. Considering the fact that smartphone users are currently utilizing mobile payment frequently, many corporations are introducing various methods to the market for easy payment process of consumers by grafting various technologies, and by utilizing the technology based on BLE technology and location based technology, it is emerging as new method applied to payment service such as ZEP, for easy payment process. And by checking the existence of security threats and studying the attack techniques in these payment services, we strive to suggest a method of response based on big data platform.

An Architecture of the Military Aircraft Safety Check System Using 4th Industrial Revolution Technology (4차 산업혁명기술을 활용한 군 항공기 안전점검 체계 설계)

  • Eom, Jung-Ho
    • Convergence Security Journal
    • /
    • v.20 no.2
    • /
    • pp.145-153
    • /
    • 2020
  • The aviation safety policy master plan is promoting the development of aviation safety management technology applying the 4th industrial revolution technology with the goal of establishing a flawless aviation safety management system and establishing a future aviation safety infrastructure. The master plan includes the establishment of various aviation safety management systems such as aircraft fault management using AI & Big data and flight training system using VR/AR. Currently, the Air Force is promoting a flight safety management system using new technology under the goal of building smart air force. Therefore, this study intends to apply the 4th Industrial Revolution technology to the aircraft condition check system that finally checks the safety of the aircraft before flight. The Air Force conducts airframe flaw checks and pre-flight aircraft check. In this study, we architect the airframe flaw check system using AI and drones, and the pre-flight aircraft condition check system using the IoT and big data for more precise and detailed check of aircraft condition and flawlessness check.