• Title/Summary/Keyword: Security Technology Policy

Search Result 690, Processing Time 0.026 seconds

The Influence of Factors on the Level of Digitalization of World Economies

  • Pyroh, Olha;Kalachenkova, Kateryna;Kuybida, Vasyl;Chmil, Hanna;Kiptenko, Viktoriia;Razumova, Oleksandra
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.5
    • /
    • pp.183-191
    • /
    • 2021
  • The advanced development of the world's economies requires a detailed study of the impact of factors on the level of digitalization, to ensure economic growth and promote the use of information and communication technologies in the digital economy. Digitalization of the world's economies is ensured through the implementation of relevant regulations and policy decisions to implement public policy and strategy of the digital economy. The purpose of the study is to establish the pattern of the impact of factors on the level of digitalization of world economies by conducting a regression analysis to reflect the dependence of the impact of factors on the level of digitalization in 25 economies (by IMD digital competitiveness), to check the level of digitalization of the world's economies. It is necessary to analyze the ranking of countries in the world according to the DiGiX Index, IMD, and DESI Digital Competitiveness Rating. Research methods: information synthesis method; regression analysis; systematization, and generalization. Results. It was found that because of regression analysis, the value of the coefficient of determination indicates that the regression model by 78% explains the relationship between future readiness of countries to implement digital technologies and information and communication technologies, but there are still a small number of other factors not included in the regression model. It is determined that the greatest progress among EU member states for the period 2015-2020 according to the DESI index belongs to Ireland, the Netherlands, Malta, and Spain. It is established that Estonia, Spain, and Denmark are in the lead in the DESI rating, in terms of e-government implementation. The study found that the impact of factors on the level of digitalization of world economies contributes to solving current economic problems through further implementation of information and communication technologies and improving legislation in the digital economy, which will ensure the implementation of effective digital policy. It is established that ensuring the appropriate level of digitalization of the world's economies should solve the problems in the digital economy sector faced by governments and businesses, which requires the implementation of measures to regulate and ensure the continued operation of the digital economy.

A Study on the Institutional Improvement Directions of Industrial Security Programs: Focused upon Policies and Practices in the U.S. (산업보안의 제도적 발전방안 연구: 미국 사례를 중심으로)

  • Choi, Justin Jin-Hyuk
    • Korean Security Journal
    • /
    • no.22
    • /
    • pp.197-230
    • /
    • 2010
  • This study examined the institutional improvement directions of industrial security programs, particularly focusing upon policies and practices in the U.S., to enhance the effectiveness of industrial security programs in Korea. This study also aimed to investigate the significance of institutional and/or policy implementations in preventing economic espionage attempt. Data leakage and/or loss of trade secrets in corporations has been a scary proposition and a serious headache to both the CEOs and the CSOs(Chief Security Officers). Security professionals or practitioners have always had to deal with data leakage issues that arise from e-mail, instant messaging(IM), and other Internet communication channels. In addition, with the proliferation of wireless and mobile technology, it's now much easier than ever for loss by data breaches to occur, whether accidentally or maliciously or even by an economic espionage attempt. The researcher in this study used both a case study and a comparative research to analyze the different strategies and approaches between the U.S. and Korea in regard of implementing policies to mitigate damages by economic espionage attempts and prevent them from occurring. The researcher first examined the current policies and practices in the U.S. in terms of federal government's and agencies' approach and strategies on industrial security programs and their partnerships with private-commercial-sectors. The purpose of this paper is to explain and suggest selected findings, and a discussion of actions to be taken on implementing a proactive and tactical approach to enhance the effectiveness of industrial security programs to fight against information loss or data leaks. This study used case reviews, literatures, newspapers, articles, and Internet resources relating to the subject of this study for triangulation of data. The findings during this research are as follows. This research suggests that both the private and the governmental sector should closely cooperate in the filed of industrial security to strengthen its traditional prevention strategies and reduce opportunities of economic espionage as well. This study finally recognizes both the very importance of institutional development led by the Government in preventing economic espionage attempts and its effectiveness when properly united with effective industrial security programs.

  • PDF

A Systematic Literature Review on Smart Factory Research: Identifying Research Trends in Korean Academia (스마트공장에 관한 체계적 문헌 분석: 국내 학술 경향 연구)

  • Kim, Gibum;Lee, Jungwoo
    • Journal of Digital Convergence
    • /
    • v.18 no.11
    • /
    • pp.59-71
    • /
    • 2020
  • The paper reports on a systematic literature review results concerning the smart factory research in Korea. 144 papers were identified from the articles published in Korean journals listed in the Korean citation index by keyword search related to smart factory. Bibliometric analyses were conducted by way of co-occurrence and network analysis using the VOSViewer. Automation, intelligence, and bigdata were identifed as three critical clusters of research while, operating systems, international policy and cases, concept analysis as other three clusters of research. Internet of Things turned out to be a key technology of smart factory linking all of these areas. Servitization studies were small in numbers but seemed to have a lot of potential. Security researches seemed to be lacking connections with other areas of studies. Results of this study can be used as a milestone for identifying future research issues in smart factories.

Implement of High Available Replicate Systems Based on Cloud Computing (클라우드 컴퓨팅 기반의 고가용성 복제시스템의 구현)

  • Park, Sung-Won;Lee, Moon-Goo;Lee, Nam-Yong
    • 전자공학회논문지 IE
    • /
    • v.48 no.4
    • /
    • pp.61-68
    • /
    • 2011
  • As business management has a high level of dependence on Informational Technology (IT), protecting assets of a company from disaster is one of the most important thing that IT operating managers should consider. Because data or information is a major source of operation of the company, data security is the first priority as an aspect of continuity of business management. Therefore, this paper will realize disaster recovery system, which is suspended because of disaster, based on cloud computing system. Realized High Available Replicate System applied a method of multi thread target database to improve Replicate performance, and real time synchronize technology can improve efficiency of network. From Active to Active operation, it maximizes use of backup system, and it has a effect to disperse load of source database system. Also, High Available Replicate System realized consistency verification mechanism and monitoring technique. For Performance evaluation, High Available Replicate System used multi thread method, which shows more than threefold of replicate performance than single thread method.

The Study on Implementation of Crime Terms Classification System for Crime Issues Response

  • Jeong, Inkyu;Yoon, Cheolhee;Kang, Jang Mook
    • International Journal of Advanced Culture Technology
    • /
    • v.8 no.3
    • /
    • pp.61-72
    • /
    • 2020
  • The fear of crime, discussed in the early 1960s in the United States, is a psychological response, such as anxiety or concern about crime, the potential victim of a crime. These anxiety factors lead to the burden of the individual in securing the psychological stability and indirect costs of the crime against the society. Fear of crime is not a good thing, and it is a part that needs to be adjusted so that it cannot be exaggerated and distorted by the policy together with the crime coping and resolution. This is because fear of crime has as much harm as damage caused by criminal act. Eric Pawson has argued that the popular impression of violent crime is not formed because of media reports, but by official statistics. Therefore, the police should watch and analyze news related to fear of crime to reduce the social cost of fear of crime and prepare a preemptive response policy before the people have 'fear of crime'. In this paper, we propose a deep - based news classification system that helps police cope with crimes related to crimes reported in the media efficiently and quickly and precisely. The goal is to establish a system that can quickly identify changes in security issues that are rapidly increasing by categorizing news related to crime among news articles. To construct the system, crime data was learned so that news could be classified according to the type of crime. Deep learning was applied by using Google tensor flow. In the future, it is necessary to continue research on the importance of keyword according to early detection of issues that are rapidly increasing by crime type and the power of the press, and it is also necessary to constantly supplement crime related corpus.

Analysis of abnormal traffic controller deployed in Internet access point (인터넷 액세스점에서의 이상 트래픽 제어기 성능분석)

  • Kim Kwangsik
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.30 no.1C
    • /
    • pp.107-115
    • /
    • 2005
  • ATC (Abnormal traffic controller) is presented as next generation security technology to securely support reliable Internet service and to guarantee network survivability, which is deployed in Internet access point. The key concept of the ATC is abnormal traffic monitoring and traffic control technology. When fault factors exist continuously and/or are repeated, abnormal traffic control guarantees service completeness as much as possible. The ATC with control policy on abnormal traffic is superior to the ATC with blocking policy as well as conventional network node, when the ratio of effective traffic to abnormal traffic is higher than $30{\%}.$ When traffic intended unknown attack occurs, network IDS is high false positive probability and so is limited to apply. In this environment, the ATC can be a key player to help the network node such as router to control abnormal traffic.

Research on the type of technology convergence in the medical device industry based on topic modeling and citation analysis (토픽모델링과 인용 분석에 기반한 의료기기 산업의 기술융합 유형 연구)

  • Lee, Seonjae;Lee, Sungjoo;Seol, Hyeonju
    • Journal of the Korea Convergence Society
    • /
    • v.12 no.7
    • /
    • pp.207-220
    • /
    • 2021
  • Industrial convergence is manifested in various forms by various drivers, and understanding and categorizing the direction of convergence according to the factors in which the convergence occurs is an essential requirement for the establishment of a company's customized convergence strategy and the government's corporate support policy. In this study, the type of convergence is analyzed from the perspective of knowledge flow between heterogeneous technologies, and for this purpose, the result of topic modeling of the text information of the patent and the citation information of the corresponding patent allocated for each topic are used. The methodology presented through case studies in the medical device field is verified. Through the proposed methodology, companies can predict the flow of convergence and use it as decision-making data to create new business opportunities. It is expected that the government and research institutions will be usefully used as basic data for policy preparation.

Method on DTN Performance Acceleration and Packet Loss Minimization for Transfer Efficiency Maximizing (전송효율성 극대화를 위한 DTN 성능 가속 및 병목구간 패킷손실 최소화 방안)

  • Park, Jong-Seon;Noh, Min-Ki
    • Journal of the Korea Convergence Society
    • /
    • v.9 no.11
    • /
    • pp.37-43
    • /
    • 2018
  • Science DMZ is a network architecture that considers complicated network components such as dedicated network, DTN, and minimum security policy to maximize transfer efficiency. And DTN tuning is an essential component to take full advantage of Science DMZ's available bandwidth. In addition, tuning of network system should be performed concurrently to minimize packet loss due to network bottleneck. In this paper, we propose a tuning method of data transfer node and network system for maximizing transfer efficiency in Science DMZ network architecture. As a result of the performance measurement using the KREONET, the network performance after the DTN tuning shows 180% improvement than that of existing method without DTN tuning. In addition, performance of 9.4Gb/s was shown without loss of performance measurement after tuning network system applying shaping policy.

Countermeasure of Uumanned Aerial Vehicle (UAV) against terrorist's attacks in South Korea for the public crowded places (국내 소프트 타깃 대상 드론테러의 법제도 개선방안 연구)

  • Oh, Hangil
    • Journal of the Society of Disaster Information
    • /
    • v.15 no.1
    • /
    • pp.49-66
    • /
    • 2019
  • Purpose: This study aims to apply the counter terrorism policy in pertain to malicious drone abuse and the croweded public places in South Korea. And, to improve counter terrorism protection measure, this study suggests an adoptation of Anti UAV technology into counter terrorism related regulation. Method: Compared to nations' operations of counter terrorism prevention and protection activities with the South Korean gov, problems and limitations are suggested. Results: Anti UAV technology could not be applied for Multi-user facilities by any law due to the limitation, so that it is required to amend counte terrporism related policies and law. Conclusion: This study intends to identify various protection methods against UAV threats. To reduce the risk of UAV, the law of public safety and counter terrorism should be promoted and reinforced for the first.

Development of Evaluation Factors for Selecting Operator of Rail Traffic-Control (철도 관제권 운영주체 선정을 위한 평가항목 개발)

  • Oh, Jae Kyoung;Chung, Sung Bong;Kim, Ji Yeon;Kim, Sigon
    • Journal of Korean Society of Transportation
    • /
    • v.32 no.4
    • /
    • pp.327-335
    • /
    • 2014
  • The Korean government, as of last year, is attempting to introduce a competitive system in the rail-market. However there are some pertinent issues which need to be addressed in order to select the best possible organization for optimum railway traffic control. As there are no standard guidelines in selecting an agency, objective evaluation factors need to be properly applied to ensure the best possible decision is made. Through literature review and various interviews with experts, appropriate criteria were selected to evaluate the suitability of each potential operator. As generally mentioned, both safety and efficiency play vital roles in the selection process but in addition, there are other factors such as security and fairness, which also need to be considered. The individual weight of these factors were calculated by the AHP, in which three groups of experts were interviewed to acquire their expertise. According to the results, as a potential operator, the score of a railway operating company and the management cooperation of railway is 2.75 and 3.85, respectively. In the future, in preparation towards becoming a competitive rail-market, this research is expected to assist in choosing the best party to control the rail traffic system.