• Title/Summary/Keyword: Security Technology Policy

Search Result 690, Processing Time 0.179 seconds

Comparative Study of US-China Discourse on Cross-border Data Regulation and Cybersecurity: Focusing on ASEAN Development Assistance Cases (미·중 초국경 데이터 규제와 사이버안보 담론 비교: 아세안 개발원조 사례를 중심으로)

  • Kayeon Lee
    • Informatization Policy
    • /
    • v.30 no.1
    • /
    • pp.89-108
    • /
    • 2023
  • Science, technology and innovation (STI) has expanded the activity of actors from the traditional physical territory to the cyberspace. Data-driven platform services and markets advance new discussions on cross-border cooperation and cyber security, as well as discourse on sovereignty in cyberspace. These changes are also affecting the hegemony competition between the US and China. In particular, competition for aid to developing countries that are located along major resource transportation routes, such as natural gas and deep sea resources, is fierce. ASEAN is not only a geopolitical military and security point where the US and China powers collide, but its population of 600 million has great potential for the development of the digital economy due to its data resources. In this regard, this article aims to connect the discourse of liberalism and authoritarianism with data regulation and cybersecurity in international development cooperation, and derive implications for ASEAN integration through this. This study has significance as a convergence study that links international political issues related to big data in terms of global governance.

The study of the relationship of the defense industry-specific factors effect the innovation of manufacturing technology and the market share. (방위산업의 시장구조 결정요인이 기술혁신과 시장지배에 미치는 영향)

  • Chung, Young-Hyun
    • Journal of National Security and Military Science
    • /
    • s.5
    • /
    • pp.241-280
    • /
    • 2007
  • This study examines the relationship of the industry-specific factors that effect innovation of manufacturing technology and the market share within the defense industry. Since the establishment of the basic defense industry framework in 1973, there were numerous interactions of the industry-specific factors of the defense industry structure with the technological innovation and market organization of the defense industry. During last three decades, the domestic defense industry has achieved the considerable level but the framework of the basic system has not developed much in areas of the military science and the defense manufacturing technology. Industry-specific factors were formed in the process and appeared in a variety of behavioral characteristics as subsystems. Currently, there IS a growing trend where the management of defense industry is gradually deteriorating due to limitation of the domestic industry-specific factor (e.g. defense technologies, amount of demand, etc.). If there is a prominent imbalance of the industry-specific factors. it can trigger the potential problem of conflict, lack of cooperation and control, slowing the growth of the manufacturing technology thereby diminishing the market and deteriorating the defense supply/demand relationship. In a research conducted by Joe S. Bain, Bain analyzed the relationship of the traditional industrial organization where industry-specific factor(S) not only impacts the conductor(C). And, conductor(C) influences the shaping of the performance(P) of relationship of the traditional industrial organization. Consequently, the researcher has identified the demand monopoly, barriers to entry, and market competition with comparison of defense industry issues. These defense issues were three industry-specific factors identified, which are 1) The demand monopoly and The entry barriers to new market competition, 2) the industrial technical factor to a production technical competitiveness and a market sharing competitiveness, 3) the probability factor to revolution for military affairs(RMA) and a R&D production. According to baseline with these factors, the following research model is established from the special companies group(Group A), the systematization companies group(Group B), and the general companies group(Group 0. The hypothesis is that if there are more industry-specific factors, then there will be more relationships of defense industry relation statutes. This research is an empirical study on the relationship that the industry specific factors effects the innovation of manufacturing technology and the shaping of the market in the defense industry. Moreover, the existing models to evaluate the industry specific factors of the defense industry IS much to be desired with the controlled statistical analysis of the result. It is vital to study on current situation with suggesting alternative strategy to the efficient strategy. The descriptive analysis approach analysis is conducted with SPSSWIN to conduct reliability test, factor analysis, correlation analysis, cross-tabulation analysis, one-way ANOVA, and multiple regression analysis. However, there were some limitations of the survey such as the rigidity of concept about the technical factors and various market management factors. The wishes is that the decision-maker could be utilized these defence industrial factors to formulate efficient defence policy and strategy in the future.

  • PDF

Biometrics System Technology Trends Based on Biosignal (생체신호 기반 바이오인식 시스템 기술 동향)

  • Choi, Gyu-Ho;Moon, Hae-Min;Pan, Sung-Bum
    • Journal of Digital Convergence
    • /
    • v.15 no.1
    • /
    • pp.381-391
    • /
    • 2017
  • Biometric technology is a technology for authenticating a user using the physical or behavioral features of the inherent characteristics of the individual. With the necessity and efficiency of the technology in the fields of finance, security, access control, medical welfare, inspection, and entertainment, the service range has been expanding. Biometrics using biometric information such as fingerprints and faces have been exposed to counterfeit and disguised threats and become a social problem. Recent studies using a bio-signal from the inside of the body other than the bio-information of the external body are being developed. This paper analyzes the recent research and technology of biometric systems using bio-signals, ECG, heart sounds, EEG, and EMG to present the skills needed for the development direction. In the future, utilizing the deep learning to build and analyze database to manage bio-signal based big data for the complex condition of individuals, biometrics technologies suitable for real time environment are expected to be researched.

Blockchain Technology for Healthcare Big Data Sharing (헬스케어 빅데이터 유통을 위한 블록체인기술 활성화 방안)

  • Yu, Hyeong Won;Lee, Eunsol;Kho, Wookyun;Han, Ho-seong;Han, Hyun Wook
    • The Journal of Bigdata
    • /
    • v.3 no.1
    • /
    • pp.73-82
    • /
    • 2018
  • At the core of future medicine is the realization of Precision Medicine centered on individuals. For this, we need to have an open ecosystem that can view, manage and distribute healthcare data anytime, anywhere. However, since healthcare data deals with sensitive personal information, a significant level of reliability and security are required at the same time. In order to solve this problem, the healthcare industry is paying attention to the blockchain technology. Unlike the existing information communication infrastructure, which stores and manages transaction information in a central server, the block chain technology is a distributed operating network in which a data is distributed and managed by all users participating in the network. In this study, we not only discuss the technical and legal aspects necessary for demonstration of healthcare data distribution using blockchain technology but also introduce KOREN SDI Network-based Healthcare Big Data Distribution Demonstration Study. In addition, we discuss policy strategies for activating blockchain technology in healthcare.

Technology Trends, Research and Design of AIM Framework for Authentication Information Management (인증 정보 관리를 위한 기술 동향과 AIM 프레임워크 연구 및 설계)

  • Kim, Hyun-Joong;Cha, Byung-Rae;Pan, Sung-Bum
    • Journal of Digital Convergence
    • /
    • v.14 no.7
    • /
    • pp.373-383
    • /
    • 2016
  • With mobile-epoch and emerging of Fin-tech, Bio-recognition technology utilizing bio-information in secure method has spread. Specially, In order to change convenient payment services and transportation cards, the combination of biometrics and mobile services are being expanded. The basic concept of authentication such as access control, IA&A, OpenID, OAuth 1.0a, SSO, and Biometrics techniques are investigated, and the protocol stack for security API platform, FIDO, SCIM, OAuth 2.0, JSON Identity Suite, Keystone of OpenStack, Cloud-based SSO, and AIM Agent are described detailed in aspect of application of AIM. The authentication technology in domestic and foreign will accelerate technology development and research of standardization centered in the federated FIDO Universal Authentication Framework(UAF) and Universal 2 Factor Framework(U2F). To accommodate the changing needs of the social computing paradigm recently in this paper, the trends of various authentication technology, and design and function of AIM framework was defined.

A study on the application of blockchain to the edge computing-based Internet of Things (에지 컴퓨팅 기반의 사물인터넷에 대한 블록체인 적용 방안 연구)

  • Choi, Jung-Yul
    • Journal of Digital Convergence
    • /
    • v.17 no.12
    • /
    • pp.219-228
    • /
    • 2019
  • Thanks to the development of information technology and the vitalization of smart services, the Internet of Things (IoT) technology, in which various smart devices are connected to the network, has been continuously developed. In the legacy IoT architecture, data processing has been centralized based on cloud computing, but there are concerns about a single point of failure, end-to-end transmission delay, and security. To solve these problems, it is necessary to apply decentralized blockchain technology to the IoT. However, it is hard for the IoT devices with limited computing power to mine blocks, which consumes a great amount of computing resources. To overcome this difficulty, this paper proposes an IoT architecture based on the edge computing technology that can apply blockchain technology to IoT devices, which lack computing resources. This paper also presents an operaional procedure of blockchain in the edge computing-based IoT architecture.

The International Legality of the North Korean Missile Test (북한미사일 실험의 국제법상 위법성에 관한 연구)

  • Shin, Hong-Kyun
    • The Korean Journal of Air & Space Law and Policy
    • /
    • v.24 no.2
    • /
    • pp.211-234
    • /
    • 2009
  • North Korea conducted the launcher test, which, as North Korea claimed, belonged to the sovereign rights for the purpose of peaceful utilization and exploration of the outer space. The launching was allegedly done for the sole purpose of putting the satellite into earth orbit, while international community stressed the fact that the orbiting of satellite was not confirmed and that the technology used was not distinct from the purpose of building intercontinental ballistic missile. UN Security Council adopted the resolutions which took the effect that the launching was deemed as the missile launching, not the mere launcher test. North Korea declared the moratorium of suspending its test activity. Controversial issues have been raised regarding whether the launcher itself has the legal status of enjoying the freedom of space flight based upon the 1967 Outer Space Treaty. The resolutions, however, has put forward a binding instrument forbidding the launching. UN Security Council resolutions, however, should be read not as defining the missile test illegal, in that the language of resolutions, such as 'demand', should be considered as not formulating a sort of obligatory act or inact. On the other hand, the resolutions should be read as having binding force with respect to any activity relating to the weapons of mass destruction. The resolution 1718 is written in more specific language such as 'decides that the DPRK shall suspend all activities related to its ballistic missile programme and in this context re-establish its pre-existing commitments to a moratorium on missile launching'. Therefore, the lauching activity of the North Korea is banned by the UN Security Council resolution. It should be noted that the resolution does not include any specific provisions defining the space of activity of the North Korea as illegal. But, the legal effect of the moratorium is not denied as to its launching itself, which is corresponding to the missile test clearisibanned in accordance with the resolutions.

  • PDF

A Study on Damage caused by Space Activity (우주활동으로 인한 손해배상에 관한 법적 고찰)

  • Cho, Hong-Je;Shin, Dong-Chun
    • The Korean Journal of Air & Space Law and Policy
    • /
    • v.27 no.1
    • /
    • pp.103-122
    • /
    • 2012
  • Nowadays, advanced countries and international community in which provide many services and profits due to rapid progress space science and technology whereas there is rising possibility of damage by collision of space object and increase of space debris. I will propose the concept and range of damage in the basis of review of space treaty and space liability convention as form of international order to fair and complete compensate to victim of accident and hazardous space activity. And, I will try to discuss possibility of compensation on personal damage and mental damage, scope of material damage, possibility of compensation about environmental contamination, issue of satellite data sending, place of damage, and so on. Also, I would like to propose establishment of space tribunal and regional cooperative agency.

  • PDF

Korea National Health Insurance Service Financial Status and Prospect (건강보험 재정 현황과 전망)

  • Joo, Jae Hong;Jang, Sung-In;Park, Eun-Cheol
    • Health Policy and Management
    • /
    • v.30 no.2
    • /
    • pp.192-198
    • /
    • 2020
  • Background: Korea National Health Insurance Service (NHIS) is operated as a social insurance system in which people pay a portion of their monthly income as insurance premiums and receive benefits when they experience illness or injury. Since 2005, the national health insurance remained surplus accumulating cumulative reserves each year. However, as of 2018, NHIS revenue recorded 62.11 trillion won and spending of 62.29 trillion won. The deterioration of NHIS finances is expected to accelerate with the aging population, income growth, new medical technology development, and enhanced security policies. Methods: To examine the financial health and sustainability of NHIS, we estimated the future revenue and spending until 2030 using the data from Korea Health Insurance Review and Assessment Service statistical yearbook. 2004-2018 average percentage change in NHIS revenue and spending was calculated. We estimated the future NHIS financial status using two methods. In the first method, we calculated the revenue and spending of the future NHIS by applying the 2004-2018 average percentage change to the subsequent years consecutively. In the second method, we estimated the future NHIS financial status after adjusting for the predicted demographic changes such as the aging population and declining birth rate in South Korea. Results: The estimates from this study suggest that the NHIS's cumulative reserves will run out by 2024. Conclusion: In terms of spending on current health insurance, there should be a search for ways of more efficient spending and funding options.

A Study on the International Recognition of the COVID-19 Vaccination Certificates (코로나19 예방접종증명서의 국제적 인정에 관한 연구)

  • Jang, Su Yun;Kwon, Hun Yeong
    • Journal of Information Technology Services
    • /
    • v.20 no.6
    • /
    • pp.45-62
    • /
    • 2021
  • After the COVID-19 outbreak in 2019, the spread of COVID-19 has not been easily caught despite preventive measures in each country. The spread of COVID-19 has hit the world, especially in the economic and tourism sectors. Countries around the world are easing restrictions on the movement of vaccinated people in preparation for the post-corona era. Under the name of "Vaccine Passport," "Vaccination Certificate," and "Digital Health Pass," vaccination measures are being implemented to allow vaccination recipients to use multi-use facilities. However, there is no international agreement on the movement of countries, and each country has its own immigration policy. In order to return to pre-corona daily life, global agreements must be reached from the movement of vaccinated people between countries, and standards and implementation methods must be determined. This study focuses on the implementation and utilization of vaccination certificates suitable for the COVID-19 era. We will look at the spread of COVID-19 and its international response policies. In the case of COVID-19, we will investigate why vaccination certificate installation should be standardized and how far the current standardization has been discussed, and discuss the characteristics of vaccination certificate installation and considerations. In order for the immunization certificate discussed in the previous chapter to be recognized internationally, institutional and technical considerations are identified and security factors that may occur in each implementation are also presented. Finally, the international recognition case of vaccination certificate is discussed, and the method of installation and utilization of vaccination certificate is proposed. This paper can be used as a policy because of its timeliness in studying the standards of vaccination certificates and considerations for international recognition to restore movement between countries in the spread of COVID-19. In addition, if other infectious diseases occur in the future or similar cases where movement between countries is restricted, it can be used as a reference to support the movement of verified people.