• Title/Summary/Keyword: Security Technology Policy

Search Result 690, Processing Time 0.026 seconds

Analysis of Technology for Secure Container with RFID (RFID를 활용한 컨테이너 보안기술의 현황분석)

  • Byeon, Eui-Seok;Byeon, Ji-Seok
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.34 no.4
    • /
    • pp.11-16
    • /
    • 2011
  • Information of freight tracking and tracing is one of core elements in logistics point of view. We can monitor the vehicle or vessel where freights are loaded and get the in-transit data via GPS. However, security problem exists after the shipments are unloaded. RFID is well utilized for securing the container which products are stuffed into. International standard organization sets relevant specification and e-seal appears to be at issue. The paper investigates current status of corresponding technology and proposes the policy for development of logistics industry.

Progress of renewable energy in India

  • Kar, Sanjay Kumar;Gopakumar, K.
    • Advances in Energy Research
    • /
    • v.3 no.2
    • /
    • pp.97-115
    • /
    • 2015
  • Energy holds key to economic growth and prosperity of India. Currently, India has very high-energy import dependence, especially in the case of crude oil (80%) and natural gas (40%). Even coal import has been increasing over the years. Considering India's population growth, emphasis on manufacturing, production, and service industry, energy consumption is bound to increase. More fossil energy consumption means greater dependence on energy import leading to widening trade deficit and current account deficit. Therefore, exploitation of indigenous renewable energy production is necessary. The paper reviews the progress and growth of renewable energy production, distribution, and consumption in India. The paper highlights some of the enablers of renewable energy in India. The authors discuss the opportunities and challenges of increasing share of renewable energy to reduce energy import and address issues of energy security in India. The findings suggest that India is ready for a quantum leap in renewable production by 2022.

Global Value Chain in East Asia Under "New Normal": Ideology- Technology-Institution Nexus

  • Choi, Byung-il
    • East Asian Economic Review
    • /
    • v.24 no.1
    • /
    • pp.3-30
    • /
    • 2020
  • This paper analyzes how the current Global Value Chain (GVC) of East Asia has been established, and attempts to project the future trajectory of GVC under New Normal in the global trading system. For this purpose, the framework of Ideology-Technology-Institution nexus is presented with focus on the dynamics of interplay between ideology and technology, duly recognizing the dual-aspect of technology- a platform for business and also for national defense. The paper analyzes how the Information and Communication Technology (ICT) of the 1990s played a role of "facilitator" in shaping the GVC of East Asia, where China plays 'factory for final assembly' and the US plays 'the largest consumer'. Under New Normal, digital technology is likely to play the opposite role of "disrupting" the GVC of East Asia, unlike ICT. The paper explores the mechanism behind this great disruption. What is driving New Normal is the US-China power competition, seeking for dominance in East Asia and beyond. This paper argues that New Normal is not temporary shock, but will last for some time. Under this presumption, the paper presents three scenarios for the future trajectory of GVC in East Asia.

Analysis of Keyword Trend for ICT Convergence Services (ICT 융합 서비스의 키워드 트렌드 분석)

  • Jang, HeeSeon
    • Convergence Security Journal
    • /
    • v.14 no.2
    • /
    • pp.35-41
    • /
    • 2014
  • With ubiquitous computing and network, the concern of government, business and academy for IT or ICT convergence has been increased. In this paper, through the analysis of keyword trend for ICT convergence services from 2000's mid, the efficient policy is proposed by estimating the understanding and concern of common people. In addition to, the concept and development step of convergence are analyzed, and the keyword analysis for the ICT convergence services defined in TTA is performed. The services are classified into smart home work transportation, Health ICT, RFID USN, M2M IoT, e-Navigation, intelligent robot, and the keywords for each service are analyzed. The analytic results indicate that the keyword trend varies in the time, and highly indexing keywords and new trend are defined. To provide the efficient ICT services, the new ICT convergence services needed for customer will be proposed with new IT technology development, IT standard, law management, and policy provisioining.

Domastic Blockchain Legislation and Policy Analysis and the Limitations Deriving and Present Improvement Points (국내 블록체인 법제 및 정책 분석과 한계점 도출 및 향상점 제시 -산업 활성화와 정보보호 중심으로-)

  • An, Myeonggu;Park, Yongsuk
    • Journal of Convergence for Information Technology
    • /
    • v.9 no.9
    • /
    • pp.44-51
    • /
    • 2019
  • Recently, various platforms utilizing blockchains have appeared. In order to develop the blockchain, it is required to improve related laws and institutions. In this respect, we analysis of the laws and systems related to domestic blockchains, draw out the limitations, and suggest directions for improvement. The research method was analyzed the literature and related laws through literature review. It is difficult to analyze the whole law and system at one time, so we examined the necessary laws and systems to revitalize the blockchain. It is confirmed that legal improvement is needed on the scope of electronic transactions and electronic financial transactions, electronic commerce, digital signatures, import and export, personal information protection, blockchain industry promotion and research. Through this, we expect a balanced development of effective blockchain revitalization and protection of national fundamental rights. Individual studies on the legal provisions and systems for each item in the future can be conducted.

Analysis of Strategic Priorities for Strengthening Cybersecurity Capability of Cambodia (캄보디아의 사이버보안 역량강화를 위한 전략적 우선순위 분석)

  • Heng, Mara;Hwang, Gee-Hyun
    • Journal of Digital Convergence
    • /
    • v.17 no.10
    • /
    • pp.93-102
    • /
    • 2019
  • This paper aims to set the priorities for the cybersecurity strategy of Cambodian government. To this end, we built a AHP research model by adopting 4 factors from the ITU national interests model and selecting 7 strategies from best practices of 8 countries leading the cyber security. Using a questionnaire, 19 experts evaluated Cambodia's cybersecurity strategy priorities. The key policy factors were evaluated in the order of homeland defense, economic welfare, value promotion and favorable world order. Their strategic alternatives were identified in the order of legislation, capacity building, and cyber attack prevention for critical infrastructure. This study will contribute to setting the strategic priorities and feasible action plans to strengthen Cambodia's cybersecurity capabilities.

Legal System of Blockchain and Domestic and Foreign Blockchain Legal System - Focusing on Industrial Revitalization - (블록체인의 법률체계와 국내외 블록체인 법제 현황 -산업 활성화를 중심으로-)

  • An, Myeonggu;Park, Yongsuk
    • Journal of Digital Convergence
    • /
    • v.17 no.10
    • /
    • pp.67-75
    • /
    • 2019
  • As 4th industrial revolution has emerged as a hot topic, the blockchain technology capable of enabling super intelligence as a premiere has been an attracting attention. With the interest in blockchains, various platforms using blockchains are emerging. Reflecting this trend, several countries including US, EU, China, and Japan are preparing blockchain and related laws or amending existing laws. In Korea, the platform business based on blockchain is being done, but the related laws are insufficient. In this study, we first present the legal system of the blockchain, examine each component, and then compare the current state of the legal system in US, EU, China, and Japan based on the blockchain legal system. Finally, we propose a brief improvement plan of the legal system for industrial development by commercialization of blockchain. In the future, we would like to study the individual legal system about the blockchain.

Kriging Regressive Deep Belief WSN-Assisted IoT for Stable Routing and Energy Conserved Data Transmission

  • Muthulakshmi, L.;Banumathi, A.
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.7
    • /
    • pp.91-102
    • /
    • 2022
  • With the evolution of wireless sensor network (WSN) technology, the routing policy has foremost importance in the Internet of Things (IoT). A systematic routing policy is one of the primary mechanics to make certain the precise and robust transmission of wireless sensor networks in an energy-efficient manner. In an IoT environment, WSN is utilized for controlling services concerning data like, data gathering, sensing and transmission. With the advantages of IoT potentialities, the traditional routing in a WSN are augmented with decision-making in an energy efficient manner to concur finer optimization. In this paper, we study how to combine IoT-based deep learning classifier with routing called, Kriging Regressive Deep Belief Neural Learning (KR-DBNL) to propose an efficient data packet routing to cope with scalability issues and therefore ensure robust data packet transmission. The KR-DBNL method includes four layers, namely input layer, two hidden layers and one output layer for performing data transmission between source and destination sensor node. Initially, the KR-DBNL method acquires the patient data from different location. Followed by which, the input layer transmits sensor nodes to first hidden layer where analysis of energy consumption, bandwidth consumption and light intensity are made using kriging regression function to perform classification. According to classified results, sensor nodes are classified into higher performance and lower performance sensor nodes. The higher performance sensor nodes are then transmitted to second hidden layer. Here high performance sensor nodes neighbouring sensor with higher signal strength and frequency are selected and sent to the output layer where the actual data packet transmission is performed. Experimental evaluation is carried out on factors such as energy consumption, packet delivery ratio, packet loss rate and end-to-end delay with respect to number of patient data packets and sensor nodes.

A Study on the Customer Satisfaction and Re-Purchase Intention on Characteristics of Social Shopping (소셜쇼핑의 특징이 고객만족 및 재구매의도에 미치는 영향)

  • Gu, Seung-Hwan;Wang, Ping;Jang, Seong Yong
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.15 no.4
    • /
    • pp.2048-2061
    • /
    • 2014
  • This paper redefines the concept of social shopping as the part of social commerce and identifies the significant factors to the customer satisfaction and repurchase intention for the social shopping using the factor analysis based on the selected elements from the previous research results. Structural equation modeling(SEM) result shows that 3 significant factors to the customer satisfaction are price, convenience of web site use and fun. But Security, reliability, diversity did not affect significantly satisfactorily. From the resulting factors to the customer satisfaction, users of social shopping seems to be satisfied with site entertainment like looking around and comparison shopping. The main purpose of visiting social shopping sites is considered as not only purchase of goods or services but also entertainment in the community and cyberspace. The results of this study, it provides an indication of the aspects of marketing that can be used in social shopping practice.

A Study on the Implementation of Management System Based on UHD Transmission Contents (UHD 송출 콘텐츠 기반 관리시스템 구현)

  • Kim, Moo Yeon;Jang, Byung Min;Choi, Seong Jhin
    • Journal of Broadcast Engineering
    • /
    • v.24 no.5
    • /
    • pp.813-826
    • /
    • 2019
  • This paper is a study on the implementation of MAM(Media Asset Management) to utilize UHD contents as high quality broadcast material. The implementation method of this paper is to separate MAM roles with content management functions and transmission workflow functions from workflow, metadata and system interface related work, which are divided into core MAM and MAM-Ex structure. Through the method proposed in this paper, we improved the content management method by applying the page menu method to the material metadata modification and applying the template method to the material structure API. In addition, the storage of UHD material and the configuration of the component server are pooled without any distinction of channels, thereby enhancing the security of UHD transmission assets by minimizing the movement of contents together with broadcasting material protection.