• Title/Summary/Keyword: Security Technology Policy

Search Result 690, Processing Time 0.022 seconds

A Study of Authentication Scheme using Biometric-Based Effectiveness Analysis in Mobile Devices (모바일 장치에서 신체정보기반의 효용성 분석을 이용한 인증기법에 관한 연구)

  • Lee, Keun-Ho
    • Journal of Digital Convergence
    • /
    • v.11 no.11
    • /
    • pp.795-801
    • /
    • 2013
  • As the life which existed only offline has changed into a life part of which is led online, it is an important problem to identify whether an online user is legitimate one or not. Biometric authentication technology was developed to identify the user more correctly either online or in offline daily life. Biometric authentication is a technology where a person is identified by his or her unique characteristics, and is highlighted as a next-generation authentication technology replacing password. There are various kinds of traits unique to each individual, and biometric authentication technologies drawing on such traits use various devices and algorithms. Firstly, this paper classified such various biometric authentication technologies, and analyzed the effects of them when they are applied on smartphone, smartwatch and M2M of the different devices platforms. Secondly, it suggested the effectiveness-based AIB(Authentication for Integrated Biometrics) authentication technique, a comprehensive authentication technique, which can be used in different devices platforms. We have successfully included the establishment scheme of the effectiveness authentication using biometrics.

The Study of an Analysis on Patent Management Affecting the Company Performance: Korean Metal Industry (특허경영이 경영성과에 미치는 영향에 관한 연구: 국내 금속기업 중심으로)

  • Kil, Sang-Cheol;Kang, Sung-Min
    • Journal of Korea Technology Innovation Society
    • /
    • v.11 no.2
    • /
    • pp.171-193
    • /
    • 2008
  • Every country of the world in the 21st century is going to push forward the policy protecting their intellectual property right, and international movement to protect their intellectual right is still more strengthened. Under these situations, the firm is required to seek for more efficient methods of technology security and business management while the existence of business itself is at risk. The control of intellectual properties in business should be considered in the patent management. In the company, the industrial property right should be into one of the management resource, and its importance has great influence on the existence of the company. The information in patent data can be used for strategic planning purposes. This study systematically evaluates the patenting behaviour of sample of 27 business firms within the Korean metal industry. Utilizing the patent application data between 2000 and 2005, the relationship between these patenting management and company performance is analysed. This study showed that patent activity per employee and labor productivity are positive relationship, but patent activity per employee and firm size are negative relationship. Since a positive relationship between patenting and company performance could be shown, patent activity gains important as a instrument for R&D planning.

  • PDF

A Study on the Fraud Detection through Sequential Pattern Analysis: Focused on Transactions of Electronic Prepayment (순차패턴 분석을 통한 이상금융거래탐지 연구: 선불전자지급수단 거래를 중심으로)

  • Choi, Byung-Ho;Cho, Nam-Wook
    • The Journal of Society for e-Business Studies
    • /
    • v.26 no.3
    • /
    • pp.21-32
    • /
    • 2021
  • Due to the recent development in electronic financial services, transactions of electronic prepayment are rapidly increasing. The increased transactions of electronic prepayment, however, also leads to the increased fraud attempts. It is mainly because electronic prepayment can easily be converted into cash. The objective of this paper is to develop a methodology that can effectively detect fraud transactions in electronic prepayment, by using sequential pattern mining techniques. To validate our approach, experiments on real transaction data were conducted and the applicability of the proposed method was demonstrated. As a result, the accuracy of the proposed method has been 95.6 percent, showing that the proposed method can effectively detect fraud transactions. The proposed method could be used to reduce the damage caused by the fraud attempts of electronic prepayment.

Adjustment effect of the suitability factors of strategy between Information Technology Outsourcing(ITO)'s influence and outcome factors in Government offices (전략의 적합성 요인이 ITO 영향요인과 성과요인 간에 미치는 조절효과 - 공공기관 중심으로)

  • Jun, Je-Man;Yi, Seon-Gyu
    • Journal of Digital Convergence
    • /
    • v.11 no.12
    • /
    • pp.29-40
    • /
    • 2013
  • This study analyzed that adjustment roles of the organization and Information System strategy suitability factors between influence and introduction outcome factors in the IT outsourcing in government offices. Influence factors of IT outsourcing are organization factor(information system maturity, CEO's support), trade factor(asset speciality, uncertainty, using degree of information system), risk factor(risk of security, risk of increase in cost, risk of losing autonomy). And outcome factors are set as economic effect and technology effect. We analyzed that organization and IS strategy suitability factors as moderator variables. Results are the followings. It was analyzed that organization and IS strategy suitability factors are in charge of adjusting role among information system maturity which is lower variable of organization factor, CEO's support, uncertainty of trade factor's lower variable, risk of security which is risk factor's lower variable, risk of increase in cost, loss of autonomy. Therefore, in order for organization to increase the outcome of information technology, organization strategy and IS strategy should be promoted in combined manner. However, it was analyzed that strategy suitability could not take the adjusting role between asset specialty and introduction outcome.

A Study on u-Care Service for the Health and Safety of the Elderly Living Alone (1인 가구 고령자의 건강과 안전을 위한 u-Care에 관한 연구)

  • Kang, Seungae
    • Convergence Security Journal
    • /
    • v.17 no.3
    • /
    • pp.59-64
    • /
    • 2017
  • Korea is experiencing a rapid increase in the number of elderly living alone accompanying the aging society problem, a nd is making efforts to solve the problem through the policy of 'living alone u-care service'. The purpose of this study is to propose a better u-Care service improvement method by applying new technology to improve the user experience of ucare service for the health and safety of the elderly living alone. First, the improvement of u-Care service for elderly livin g alone by applying IoT technology. It provides remote monitoring service using health information data measured through wearable device, and transmits personal health status to medical institution by using personal device such as smart phone, so that remote medical consultation or telemedicine can be connected in the future. Second, improvement of u-Care service through consideration of emotional stability of elderly living alone as well as simple safety and health care through applica tion of emotional service robot technology.It is expected that it will be able to help independent living of one person's elde rly person in the future by providing caring function service to existing u-care service providing service.

A study on unmanned watch system using ubiquitous sensor network technology (유비쿼터스 센서 네트워크 기술을 활용한 무인감시체계 연구)

  • Wee, Kyoum-Bok
    • Journal of National Security and Military Science
    • /
    • s.7
    • /
    • pp.271-303
    • /
    • 2009
  • "Ubiquitous sensor network" definition is this-Someone attaches electro-magnetic tag everything which needs communication between man to man, man to material and material to material(Ubiquitous). By using attached every electro-magnetic tag, someone detects it's native information as well as environmental information such as temperature, humidity, pollution and infiltration information(Sensor). someone connects it realtime network and manage generated information(Network). 21st century's war is joint combined operation connecting with ground, sea and air smoothly in digitalized war field, and is systematic war provided realtime information from sensor to shooter. So, it needs dramatic development on watch reconnaissance, command and control, pinpoint strike etc. Ubiquitous computing and network technologies are essential in national defense to operate 21st century style war. It is possible to use many parts such as USN combined smart dust and sensor network to protect friend unit as well as to watch enemy's deep area by unmanned reconnaissance, wearable computer upgrading soldier's operational ability and combat power dramatically, RFID which can be used material management as well as on time support. Especially, unmanned watch system using USN is core part to transit network centric military service and to get national defense efficiency which overcome the dilemma of national defense person resource reducing, and upgrade guard quality level, and improve combat power by normalizing guardian's bio rhythm. According to the test result of sensor network unmanned watch system, it needs more effort and time to stabilize because of low USN technology maturity and using maturity. In the future, USN unmanned watch system project must be decided the application scope such as application area and starting point by evaluating technology maturity and using maturity. And when you decide application scope, you must consider not only short period goal as cost reduction, soldier decrease and guard power upgrade but also long period goal as advanced defense ability strength. You must build basic infra in advance such as light cable network, frequency allocation and power facility etc. First of all, it must get budget guarantee and driving force for USN unmanned watch system project related to defense policy. You must forwarded the USN project assuming posses of operation skill as procedure, system, standard, training in advance. Operational skill posses is come from step by step application strategy such as test phase, introduction phase, spread phase, stabilization phase and also repeated test application taking example project.

  • PDF

A Study on the Expansion of Workflow for the Collection of Surface Web-based OSINT(Open Source Intelligence) (표면 웹기반 공개정보 수집을 위한 워크플로우 확장 연구)

  • Lee, SuGyeong;Choi, Eunjung;Kim, Jiyeon;Lee, Insoo;Lee, Seunghoon;Kim, Myuhngjoo
    • Journal of Digital Convergence
    • /
    • v.20 no.4
    • /
    • pp.367-376
    • /
    • 2022
  • In traditional criminal cases, there is a limit to information collection because information on the subject of investigation is provided only with personal information held by the national organization of legal. Surface web-based OSINT(Open Source Intelligence), including SNS and portal sites that can be searched by general search engines, can be used for meaningful profiling for criminal investigations. The Korean-style OSINT workflow can effectively profile based on OSINT, but in the case of individuals, OSINT that can be collected is limited because it begins with "name", and the reliability is limited, such as collecting information of the persons with the same name. In order to overcome these limitations, this paper defines information related to individuals, i.e., equivalent information, and enables efficient and accurate information collection based on this. Therefore, we present an improved workflow that can extract information related to a specific person, ie., equivalent information, from OSINT. For this purpose, different workflows are presented according to the person's profile. Through this, effective profiling of a person (individuals) is possible, thereby increasing reliability in collecting investigation information. According to this study, in the future, by developing a system that can automate the analysis process of information collected using artificial intelligence technology, it can lay the foundation for the use of OSINT in criminal investigations and contribute to diversification of investigation methods.

A Study on the Legal and Systemic Aspect of Aviation Accident Investigation Organization -Focusing on the Improvement Method- (항공사고조사기구(航空事故調査機構)에 관한 법적(法的) 제도적(制度的) 고찰(考察) -개선방안(改善方案)을 중심(中心)으로-)

  • Yoo, Kyung-In;Kim, Maeng-Sern
    • The Korean Journal of Air & Space Law and Policy
    • /
    • v.19 no.1
    • /
    • pp.109-139
    • /
    • 2004
  • The first successful sustained powered flight by Wright Brothers was further extended to the rapid development of aviation technology, that led to transpacific flights, the invention of supersonic planes, and enabled hundreds of people to travel in the space, in addition to the fact that around 10 people had stepped on the moon, all of which were made possible within the very same century. However, on the back side of this most wondrous human technology, the vulnerableness to the aviation accident has been constantly accompanied with, right from the very beginning stage of the aircraft development. Moreover, the development of future aircraft is being focused on the aircraft performance, the increment of the number of passengers aboard and also its speed. In proportion to these phenomena of mega sizing the aircraft, the development of new technology and the increment of air traffic volume, the number of aviation accident is expected to augment, resulting in the enormous loss of human lives and properties. In order to prevent the disastrous aviation accident as such, it is essential to conduct the accident investigation in a specialized, systematic and scientific manner. In search for the method to attain the effective function of the aviation accident investigation organization, in this study, issues were examined as follows: The full-time Board Members and the establishment of an integrated investigation agency, The systematized security of status as an accident investigator, Inclusion of a human factors specialist in the investigator group organization, liability limit of an accident investigator Stipulation of the definition and the investigation scope of an accident and serious incident, along with the main body of conducting the investigation into the accident involving both civil and public aircraft, in the regulations related to the accident investigation.

  • PDF

A Study on the Korea Future Internet Promotion Plan for Cyber Security Enhancement (사이버 보안 강화를 위한 한국형 미래 인터넷 추진 방안에 관한 연구)

  • Lim, Gyoo-Gun;Jin, Hai-Yan;Ahn, Jae-Ik
    • Informatization Policy
    • /
    • v.29 no.1
    • /
    • pp.24-37
    • /
    • 2022
  • Amid rapid changes in the ICT environment attributed to the 4th Industrial Revolution, the development of information & communication technology, and COVID-19, the existing internet developed without considering security, mobility, manageability, QoS, etc. As a result, the structure of the internet has become complicated, and problems such as security, stability, and reliability vulnerabilities continue to occur. In addition, there is a demand for a new concept of the internet that can provide stability and reliability resulting from digital transformation-geared advanced technologies such as artificial intelligence and IoT. Therefore, in order to suggest a way of implementing the Korean future internet that can strengthen cybersecurity, this study suggests the direction and strategy for promoting the future internet that is suitable for the Korean cyber environment through analyzing important key factors in the implementation of the future internet and evaluating the trend and suitability of domestic & foreign research related to future internet. The importance of key factors in the implementation of the future internet proceeds in the order of security, integrity, availability, stability, and confidentiality. Currently, future internet projects are being studied in various ways around the world. Among numerous projects, Bright Internet most adequately satisfies the key elements of future internet implementation and was evaluated as the most suitable technology for Korea's cyber environment. Technical issues as well as strategic and legal issues must be considered in order to promote the Bright Internet as the frontrunner Korean future internet. As for technical issues, it is necessary to adopt SAVA IPv6-NID in selecting the Bright Internet as the standard of Korean future internet and integrated data management at the data center level, and then establish a cooperative system between different countries. As for strategic issues, a secure management system and establishment of institution are needed. Lastly, in the case of legal issues, the requirement of GDPR, which includes compliance with domestic laws such as Korea's revised Data 3 Act, must be fulfilled.

Research on regional spatial information analysis platform about NTIS raw data (국가과학기술지식 원시데이터에 관한 지역 공간정보 분석 플랫폼 연구)

  • Lim, Jung-Sun;Kim, Sanggook;Bae, Seoung Hun;Kim, Kwang-Hoon;Won, Dong-Kyu
    • Journal of Cadastre & Land InformatiX
    • /
    • v.50 no.2
    • /
    • pp.21-35
    • /
    • 2020
  • Due to the coronavirus pandemic and diplomatic disputes, governments are actively developing a policy to revitalize·reshore manufacturing and to diversify international cooperations. In order to develop such a policy, it is very important to compare and analyze domestic·international geospatial information. Over the decade, the US·EC governments have conducted a series of national researches to build data-based tools that can monitor·analyze regional geospatial information driven by government R&D investments. In the case of the EC system, it can compare geospatial information in domestic and international(including Korea) regions. Compared to US·EC cases, Korean examples of national researches with available data analplatform need future improvements. Current study is investigating an automated analysis methodologies using "National Institute of Science and Technology Information (NTIS)" DB, which was national security data until recently. Research on data-mining regional geospatial information can contribute to support policy fields that need to discover new issues in response to unexpected social problems such as recently faced corona and trade disputes.