• 제목/요약/키워드: Security Technology Policy

Search Result 696, Processing Time 0.029 seconds

National Defense Decision-Making : Prospects and New Directions (국방의사결정 : 전망과 대비방향)

  • Gwon Tae-Yeong
    • Journal of the military operations research society of Korea
    • /
    • v.16 no.1
    • /
    • pp.18-34
    • /
    • 1990
  • In light of the recent developments of transitory nature, it is likely that national defense decision-making will be more difficult to make for years to come. In other words, sudden changes in security environment would call into question the basic assumptions on which we have built our national defense planning and increase the number of the uncertain factors in the decision-making process; the subdivision and ramification of national defense management would increase the factors for decision-making and complicate even further the mutual interactions among these factors; the accelerated pace of sophistication and diversification of weapon systems and military technology would increase the risk of failure and system costs geometrically; and the reduced level of acceptance among the people on the sanctification of national defense in proportion to the rapid progress toward a more democratic and industrial society would engender an increased criticism or checking role by the National Assembly or by the mass media. As the changes in national defense environment and conditions create an innumerable number of new tasks, this paper intends to suggest a few core policy measures to improve the quality of national defense decision-making. More specifically, it proposes to 1) eradicate entirely the bureaucratic behavior and tendencies; 2) utilize actively the brain staff for quality assurance of decision-making; 3) and introduce and apply as a whole set, a total system, or an incorporated pack age the PPBEES(Planning-Programming-Budgeting-Executing-Evaluating-System)/LCMM (Life-Cycle Management Model for System Acquision), the OR/SA(Operations Research/Systems Analysis), and DMIS (Defense Management Information System).

  • PDF

Conservation and Utilization of Insect Pollinators for Promotion of Agricultural Production in Bangladesh

  • Amin, Md. Ruhul;Hossain, Md. Shamim;Suh, Sang Jae;Kwon, Yong Jung
    • Current Research on Agriculture and Life Sciences
    • /
    • v.32 no.4
    • /
    • pp.171-174
    • /
    • 2014
  • Agriculture in Bangladesh is slowly transforming to the production of high-value fruit and vegetable crops to satisfy the nutrient requirements of their large size population, and this transformation is creating new challenges as regards improving and maintaining the productivity and crop quality. The country has a declining trend of insect pollinators due to habitat loss, land use changes, monoculture-dominated agriculture, and the excessive and indiscriminate use of pesticides. Such pollinator deficiencies can cause reduced yields, thereby threatening the subsistence of marginal farmers. In Bangladesh, growers enjoy free pollination services from the naturally occurring insect populations. While honeybees pollinate mustard, onions, and melons, many other hymenopterans, coleopterans, hemipterans, dipterans, and thysanopterans also visit the crop fields, making these insects significant for the food security, environment, and economy of the nation. Therefore, attention should be given to public policy, research, and human resource development that promotes knowledge and appreciation of the conservation and utilization of insect pollinators.

Consistency issues in quantitative safety goals of nuclear power plants in Korea

  • Kim, Ji Suk;Kim, Man Cheol
    • Nuclear Engineering and Technology
    • /
    • v.51 no.7
    • /
    • pp.1758-1764
    • /
    • 2019
  • As the safety level of nuclear power plants (NPPs) relates to the safety of individuals, society, and the environment, it is important to establish NPP safety goals. In Korea, two quantitative health objectives and one large release frequency (LRF) criterion were formally set as quantitative safety goals for NPPs by the Nuclear Safety and Security Commission in 2016. The risks of prompt and cancer fatalities from NPPs should be less than 0.1% of the overall risk, and the frequency of nuclear accidents releasing more than 100 TBq of Cs-137 should not exceed 1E-06 per reactor year. This paper reviews the hierarchical structure of safety goals in Korea, its relationship with those of other countries, and the relationships among safety goals and subsidiary criteria like core damage frequency and large early release frequency. By analyzing the effect of the release of 100 TBq of Cs-137 via consequence analysis codes in eight different accident scenarios, it was shown that meeting the LRF criterion results in negligible prompt fatalities in the surrounding area. Hence, the LRF criterion dominates the safety goals for Korean NPPs. Safety goals must be consistent with national policy, international standards, and the goals of other counties.

A Study on Innovation Resistance of Digital Trade Based On Cloud Services (클라우드 서비스를 활용한 디지털무역 사용자의 혁신저항에 관한 연구)

  • Lee, In-Seong;Kim, Sok-Tae
    • Asia-Pacific Journal of Business
    • /
    • v.12 no.4
    • /
    • pp.313-329
    • /
    • 2021
  • Purpose - Digital trade, which started in the early 2000s, is showing a sharp increase due to the recent pandemic. However, despite this proliferation, users' acceptance of innovation is very slow. Cloud services are at the center of digital trade activation. This study aims to contribute to the spread of digital trade through empirical analysis of the resistance factors that hinder the use of cloud service-based digital trade using the innovation resistance theory and the status quo bias theory. Design/Methodology/Approach - In order to achieve the research purpose, this study was conducted with 171 entrepreneurs using cloud service-based digital trade. Structural equation model(SEM) was used through empirical analysis. Findings - As a result of the study, it was found that the complexity of technology, perceived risk, compatibility, and trust in service providers had a significant effect on innovation resistance, and policy trust did not affect innovation resistance. Also, security concerns and institutional trust were analyzed to have a significant effect on the trust of service providers. Research Implications - This study is meaningful to help the rapid diffusion of innovative technologies through empirical analysis of factors that lower the intention to accept cloud service-based digital trade.

A Study on the Development of Platform-based MyData Service in Financial Industry (금융분야의 플랫폼 기반 마이데이터 서비스 개발에 관한 연구)

  • Jaeseob Choi;Sanghun Cha;Jeongil Choi
    • Journal of Information Technology Services
    • /
    • v.22 no.1
    • /
    • pp.29-42
    • /
    • 2023
  • Amid the global movement to harness individual data and boost the data economy, MyData services that utilize personal data are being implemented in earnest in the financial sector in Korea due to the government's active encouragement policy. To this end, MyData service providers must have a service system for business operators that collects and efficiently loads personal information scattered in various financial institutions with individual consent, and comprehensively analyzes and provides it. The system must not only have strict security management capabilities, but also be built in a flexible form that takes into account future data scalability and additional services. In this paper, it has been proposed to be implemented the essential functions that MyData service system must have and the core functions that can manage the entire data life cycle from data collection, distribution to disposal in the form of a platform. In addition, the strengths of the platform structure were reviewed, and the effectiveness of the platform model was examined upon application.

Electrical Energy Production Using Biomass (바이오매스 기반 전기에너지 생산기술 동향 분석)

  • Jongseo Lee;Sang-Soo Han;Doyeun Kim;JuHyun Kim;Sangjin Park
    • New & Renewable Energy
    • /
    • v.19 no.1
    • /
    • pp.12-21
    • /
    • 2023
  • Governments and global companies are working towards using renewable sources of energy, such as solar, wind, and biomass, to reduce dependency on fossil fuels. In the defense sector, the new strategy seeks to increase the sustainable use of renewable energy sources to improve energy security and reduce military transportation. Renewable energy technologies are affected by factors such as climate, resources, and policy environments. Therefore, governments and global companies need to carefully select the optimal renewable energy sources and deployment strategies. Biomass is a promising energy source owing to its high energy density and ease of collection and harvesting. Many techniques have been developed to convert the biomass into electrical energy. Recently, diverse types of fuel cells have been suggested that can directly convert the chemical energy of biomass into electrical energy. The recently developed biomass flow fuel cell has significantly enhanced the power density several hundred times, reaching to ~100 mW/cm2. In this review, we explore various strategies for producing electrical energy from biomass using modern methods, and discuss the challenges and potential prospects of this method.

Investigations on the Pu-to-244Cm ratio method for Pu accountancy in pyroprocessing

  • Sunil S. Chirayath;Heukjin Boo;Seung Min Woo
    • Nuclear Engineering and Technology
    • /
    • v.55 no.10
    • /
    • pp.3525-3534
    • /
    • 2023
  • Non-uniformity of Pu and Cm composition in used nuclear fuel was analyzed to determine its effect on Pu accountancy in pyroprocessing, while employing the Pu-to-244Cm ratio method. Burnup simulation of a typical pressurized water reactor fuel assembly, required for the analysis, was carried out using MCNP code. Used fuel nuclide composition, as a function of nine axial and two radial meshes, were evaluated. The axial variation of neutron flux and self-shielding effects were found to affect the uniformity of Pu and Cm compositions and in turn the Pu-to-244Cm ratio. However, the results of the study showed that these non-uniformities do not affect the use of Pu-to-244Cm ratio method for Pu accountancy, if the measurement samples are drawn from the voloxidized powder at the feed step of pyroprocessing. 'Material Unaccounted For' and its uncertainty estimates are also presented for a pyrprocessing facility to verify safeguards monitoring requirements of the IAEA.

u-Healthcare Service Authentication Protocol based on RFID Technology (RFID 기술을 이용한 u-헬스케어 서비스 인증 프로토콜)

  • Jeong, Yoon-Su;Lee, Sang-Ho
    • Journal of Digital Convergence
    • /
    • v.10 no.2
    • /
    • pp.153-159
    • /
    • 2012
  • Now a days, U-healthcare comes into the spotlight as a new business model which combines RFID technology with medical service in the well-being era and IT popularization. U-healthcare service needs a method that can deals with hand-writing, overlap data, forgery and falsification of data, difference between information version that happen in medical process because of graft between RFID technology and u-healthcare. This paper proposes RFID based user certification protocol to protect user's privacy who gets medical service through U-healthcare. In the protocol, secret information of patient does the XOR with the secret key that is created in the hospital to reconsider the stability of security system of U-healthcare and user's data forgery and falsification and privacy and then saves it in the secret key field of patient in DB table. Also, it informs the case of illegal access to certification server and make it approved the access of u-healthcare service by differentiating whether u-healthcare is illegal or not.

RFID-based Authentication Protocol for Implantable Medical Device (체내삽입장치에 RFID 기술을 적용한 인증 프로토콜)

  • Jeong, Yoon-Su
    • Journal of Digital Convergence
    • /
    • v.10 no.2
    • /
    • pp.141-146
    • /
    • 2012
  • U-healthcare, which grafted advanced IT technology onto medical technology, is in the limelight because it can provide medical services at anytime and anywhere. U-healthcare system applied RFID technology for Implantable Medical Device (IMD), but patient's biometric information can be easily exposed to third parties. In this article, RFID-based U-healthcare authentication protocol is proposed to prevent illegal usage for personal biometric information exposed to the third patty. The proposed protocol guarantees patients' biometric information integrity as compounding random numbers between administrators and hospital/clinic managers, and uses continuous number SEQ and time stamp T to synchronize IMD/administrators and administrators/hospital managers. Also, to protect user's privacy from the third party, patients' biometric information can be safely guarded by managing patients' security identifiers by administrators.

A Study of protective measures of the source program for the development of the Internet of Things (IoT): Protection of the program as well as plagiarism research (사물인터넷(IoT)발전을 위한 소스프로그램 보호방안 연구: 프로그램의 보호와 유사표절 연구)

  • Lee, Jong-Sik
    • Journal of the Korea Convergence Society
    • /
    • v.9 no.4
    • /
    • pp.31-45
    • /
    • 2018
  • Recent dramatical development of computer technology related to internet technology intensifies the dispute over software of computer or smart device. Research on software has been flourished with political issuing of fierce competition among nations for software development. Particularly industrial growth in ethernet based big data and IoT (Internet of Things) has promoted to build and develop open source programs based on java, xcode and C. On these circumstances, issue on software piracy has been confronted despite the basic security policy protecting intellectual property rights of software and thus it is of substantial importance to protect the rights of originality of source program license. However, the other issue on source technology protection of developer is the possibility of hindrance to advancement in industry and culture by developing programs. This study discuss the way of enhancing legal stability of IoT application program development and reinforcing precision in inspection of program plagiarism by analyzing the source programs with newly introducing text mining technique, thus suggests an alternative protective way of infringement of personal information due to duplicating program.