• Title/Summary/Keyword: Security Technology Policy

Search Result 700, Processing Time 0.027 seconds

Adjustment effect of the suitability factors of strategy between Information Technology Outsourcing(ITO)'s influence and outcome factors in Government offices (전략의 적합성 요인이 ITO 영향요인과 성과요인 간에 미치는 조절효과 - 공공기관 중심으로)

  • Jun, Je-Man;Yi, Seon-Gyu
    • Journal of Digital Convergence
    • /
    • v.11 no.12
    • /
    • pp.29-40
    • /
    • 2013
  • This study analyzed that adjustment roles of the organization and Information System strategy suitability factors between influence and introduction outcome factors in the IT outsourcing in government offices. Influence factors of IT outsourcing are organization factor(information system maturity, CEO's support), trade factor(asset speciality, uncertainty, using degree of information system), risk factor(risk of security, risk of increase in cost, risk of losing autonomy). And outcome factors are set as economic effect and technology effect. We analyzed that organization and IS strategy suitability factors as moderator variables. Results are the followings. It was analyzed that organization and IS strategy suitability factors are in charge of adjusting role among information system maturity which is lower variable of organization factor, CEO's support, uncertainty of trade factor's lower variable, risk of security which is risk factor's lower variable, risk of increase in cost, loss of autonomy. Therefore, in order for organization to increase the outcome of information technology, organization strategy and IS strategy should be promoted in combined manner. However, it was analyzed that strategy suitability could not take the adjusting role between asset specialty and introduction outcome.

A Study on u-Care Service for the Health and Safety of the Elderly Living Alone (1인 가구 고령자의 건강과 안전을 위한 u-Care에 관한 연구)

  • Kang, Seungae
    • Convergence Security Journal
    • /
    • v.17 no.3
    • /
    • pp.59-64
    • /
    • 2017
  • Korea is experiencing a rapid increase in the number of elderly living alone accompanying the aging society problem, a nd is making efforts to solve the problem through the policy of 'living alone u-care service'. The purpose of this study is to propose a better u-Care service improvement method by applying new technology to improve the user experience of ucare service for the health and safety of the elderly living alone. First, the improvement of u-Care service for elderly livin g alone by applying IoT technology. It provides remote monitoring service using health information data measured through wearable device, and transmits personal health status to medical institution by using personal device such as smart phone, so that remote medical consultation or telemedicine can be connected in the future. Second, improvement of u-Care service through consideration of emotional stability of elderly living alone as well as simple safety and health care through applica tion of emotional service robot technology.It is expected that it will be able to help independent living of one person's elde rly person in the future by providing caring function service to existing u-care service providing service.

A study on unmanned watch system using ubiquitous sensor network technology (유비쿼터스 센서 네트워크 기술을 활용한 무인감시체계 연구)

  • Wee, Kyoum-Bok
    • Journal of National Security and Military Science
    • /
    • s.7
    • /
    • pp.271-303
    • /
    • 2009
  • "Ubiquitous sensor network" definition is this-Someone attaches electro-magnetic tag everything which needs communication between man to man, man to material and material to material(Ubiquitous). By using attached every electro-magnetic tag, someone detects it's native information as well as environmental information such as temperature, humidity, pollution and infiltration information(Sensor). someone connects it realtime network and manage generated information(Network). 21st century's war is joint combined operation connecting with ground, sea and air smoothly in digitalized war field, and is systematic war provided realtime information from sensor to shooter. So, it needs dramatic development on watch reconnaissance, command and control, pinpoint strike etc. Ubiquitous computing and network technologies are essential in national defense to operate 21st century style war. It is possible to use many parts such as USN combined smart dust and sensor network to protect friend unit as well as to watch enemy's deep area by unmanned reconnaissance, wearable computer upgrading soldier's operational ability and combat power dramatically, RFID which can be used material management as well as on time support. Especially, unmanned watch system using USN is core part to transit network centric military service and to get national defense efficiency which overcome the dilemma of national defense person resource reducing, and upgrade guard quality level, and improve combat power by normalizing guardian's bio rhythm. According to the test result of sensor network unmanned watch system, it needs more effort and time to stabilize because of low USN technology maturity and using maturity. In the future, USN unmanned watch system project must be decided the application scope such as application area and starting point by evaluating technology maturity and using maturity. And when you decide application scope, you must consider not only short period goal as cost reduction, soldier decrease and guard power upgrade but also long period goal as advanced defense ability strength. You must build basic infra in advance such as light cable network, frequency allocation and power facility etc. First of all, it must get budget guarantee and driving force for USN unmanned watch system project related to defense policy. You must forwarded the USN project assuming posses of operation skill as procedure, system, standard, training in advance. Operational skill posses is come from step by step application strategy such as test phase, introduction phase, spread phase, stabilization phase and also repeated test application taking example project.

  • PDF

A Study on the Threat of North Korean Small Drones (북한 소형 드론 위협 사례에 대한 연구)

  • Kwang-Jae Lee
    • The Journal of the Convergence on Culture Technology
    • /
    • v.10 no.4
    • /
    • pp.397-403
    • /
    • 2024
  • North Korea's rapidly advancing drone development and operational capabilities have become a significant threat to South Korea's security. The drone incursions by North Korea in 2014, 2017, and 2022 demonstrate the technological advancement and provocative potential of North Korean drones. This study aims to closely analyze the military threats posed by North Korean drones and seek effective countermeasures. The research examines the development level of North Korean drone technology, its military applications, the characteristics and patterns of recent drone incursions, the adequacy and limitations of South Korea's current response systems, and future countermeasures. For this purpose, domestic and international research literature and media reports were reviewed, and specific North Korean drone incursion cases were analyzed. The results indicate that North Korea's small drones possess technological features such as small size, low altitude, low-speed flight, long-duration flight, and reconnaissance equipment. These drones pose threats that can be utilized for reconnaissance, surveillance, surprise attacks, and terrorism. Additionally, South Korea's current response systems reveal limitations such as inadequate detection and identification capabilities, low interception success rates, lack of an integrated response system, and insufficient specialized personnel and equipment. Therefore, this study suggests various technical, policy, and international cooperative countermeasures, including the development of drone detection and identification technologies, the utilization of diverse drone neutralization technologies, the establishment of legal and institutional foundations, the construction of a cooperative framework among relevant agencies, and the strengthening of international cooperation. The study particularly emphasizes the importance of raising awareness of the North Korean drone threat across South Korean society and unifying national efforts to respond to these threats.

A Study on the Expansion of Workflow for the Collection of Surface Web-based OSINT(Open Source Intelligence) (표면 웹기반 공개정보 수집을 위한 워크플로우 확장 연구)

  • Lee, SuGyeong;Choi, Eunjung;Kim, Jiyeon;Lee, Insoo;Lee, Seunghoon;Kim, Myuhngjoo
    • Journal of Digital Convergence
    • /
    • v.20 no.4
    • /
    • pp.367-376
    • /
    • 2022
  • In traditional criminal cases, there is a limit to information collection because information on the subject of investigation is provided only with personal information held by the national organization of legal. Surface web-based OSINT(Open Source Intelligence), including SNS and portal sites that can be searched by general search engines, can be used for meaningful profiling for criminal investigations. The Korean-style OSINT workflow can effectively profile based on OSINT, but in the case of individuals, OSINT that can be collected is limited because it begins with "name", and the reliability is limited, such as collecting information of the persons with the same name. In order to overcome these limitations, this paper defines information related to individuals, i.e., equivalent information, and enables efficient and accurate information collection based on this. Therefore, we present an improved workflow that can extract information related to a specific person, ie., equivalent information, from OSINT. For this purpose, different workflows are presented according to the person's profile. Through this, effective profiling of a person (individuals) is possible, thereby increasing reliability in collecting investigation information. According to this study, in the future, by developing a system that can automate the analysis process of information collected using artificial intelligence technology, it can lay the foundation for the use of OSINT in criminal investigations and contribute to diversification of investigation methods.

A Study on the Legal and Systemic Aspect of Aviation Accident Investigation Organization -Focusing on the Improvement Method- (항공사고조사기구(航空事故調査機構)에 관한 법적(法的) 제도적(制度的) 고찰(考察) -개선방안(改善方案)을 중심(中心)으로-)

  • Yoo, Kyung-In;Kim, Maeng-Sern
    • The Korean Journal of Air & Space Law and Policy
    • /
    • v.19 no.1
    • /
    • pp.109-139
    • /
    • 2004
  • The first successful sustained powered flight by Wright Brothers was further extended to the rapid development of aviation technology, that led to transpacific flights, the invention of supersonic planes, and enabled hundreds of people to travel in the space, in addition to the fact that around 10 people had stepped on the moon, all of which were made possible within the very same century. However, on the back side of this most wondrous human technology, the vulnerableness to the aviation accident has been constantly accompanied with, right from the very beginning stage of the aircraft development. Moreover, the development of future aircraft is being focused on the aircraft performance, the increment of the number of passengers aboard and also its speed. In proportion to these phenomena of mega sizing the aircraft, the development of new technology and the increment of air traffic volume, the number of aviation accident is expected to augment, resulting in the enormous loss of human lives and properties. In order to prevent the disastrous aviation accident as such, it is essential to conduct the accident investigation in a specialized, systematic and scientific manner. In search for the method to attain the effective function of the aviation accident investigation organization, in this study, issues were examined as follows: The full-time Board Members and the establishment of an integrated investigation agency, The systematized security of status as an accident investigator, Inclusion of a human factors specialist in the investigator group organization, liability limit of an accident investigator Stipulation of the definition and the investigation scope of an accident and serious incident, along with the main body of conducting the investigation into the accident involving both civil and public aircraft, in the regulations related to the accident investigation.

  • PDF

A Study on the Korea Future Internet Promotion Plan for Cyber Security Enhancement (사이버 보안 강화를 위한 한국형 미래 인터넷 추진 방안에 관한 연구)

  • Lim, Gyoo-Gun;Jin, Hai-Yan;Ahn, Jae-Ik
    • Informatization Policy
    • /
    • v.29 no.1
    • /
    • pp.24-37
    • /
    • 2022
  • Amid rapid changes in the ICT environment attributed to the 4th Industrial Revolution, the development of information & communication technology, and COVID-19, the existing internet developed without considering security, mobility, manageability, QoS, etc. As a result, the structure of the internet has become complicated, and problems such as security, stability, and reliability vulnerabilities continue to occur. In addition, there is a demand for a new concept of the internet that can provide stability and reliability resulting from digital transformation-geared advanced technologies such as artificial intelligence and IoT. Therefore, in order to suggest a way of implementing the Korean future internet that can strengthen cybersecurity, this study suggests the direction and strategy for promoting the future internet that is suitable for the Korean cyber environment through analyzing important key factors in the implementation of the future internet and evaluating the trend and suitability of domestic & foreign research related to future internet. The importance of key factors in the implementation of the future internet proceeds in the order of security, integrity, availability, stability, and confidentiality. Currently, future internet projects are being studied in various ways around the world. Among numerous projects, Bright Internet most adequately satisfies the key elements of future internet implementation and was evaluated as the most suitable technology for Korea's cyber environment. Technical issues as well as strategic and legal issues must be considered in order to promote the Bright Internet as the frontrunner Korean future internet. As for technical issues, it is necessary to adopt SAVA IPv6-NID in selecting the Bright Internet as the standard of Korean future internet and integrated data management at the data center level, and then establish a cooperative system between different countries. As for strategic issues, a secure management system and establishment of institution are needed. Lastly, in the case of legal issues, the requirement of GDPR, which includes compliance with domestic laws such as Korea's revised Data 3 Act, must be fulfilled.

Research on regional spatial information analysis platform about NTIS raw data (국가과학기술지식 원시데이터에 관한 지역 공간정보 분석 플랫폼 연구)

  • Lim, Jung-Sun;Kim, Sanggook;Bae, Seoung Hun;Kim, Kwang-Hoon;Won, Dong-Kyu
    • Journal of Cadastre & Land InformatiX
    • /
    • v.50 no.2
    • /
    • pp.21-35
    • /
    • 2020
  • Due to the coronavirus pandemic and diplomatic disputes, governments are actively developing a policy to revitalize·reshore manufacturing and to diversify international cooperations. In order to develop such a policy, it is very important to compare and analyze domestic·international geospatial information. Over the decade, the US·EC governments have conducted a series of national researches to build data-based tools that can monitor·analyze regional geospatial information driven by government R&D investments. In the case of the EC system, it can compare geospatial information in domestic and international(including Korea) regions. Compared to US·EC cases, Korean examples of national researches with available data analplatform need future improvements. Current study is investigating an automated analysis methodologies using "National Institute of Science and Technology Information (NTIS)" DB, which was national security data until recently. Research on data-mining regional geospatial information can contribute to support policy fields that need to discover new issues in response to unexpected social problems such as recently faced corona and trade disputes.

A Study on Research Trends in the Smart Farm Field using Topic Modeling and Semantic Network Analysis (토픽모델링과 언어네트워크분석을 활용한 스마트팜 연구 동향 분석)

  • Oh, Juyeon;Lee, Joonmyeong;Hong, Euiki
    • Journal of Digital Convergence
    • /
    • v.20 no.2
    • /
    • pp.203-215
    • /
    • 2022
  • The study is to investigate research trends and knowledge structures in the Smart Farm field. To achieve the research purpose, keywords and the relationship among keywords were analyzed targeting 104 Korean academic journals related to the Smart Farm in KCI(Korea Citation Index), and topics were analyzed using the LDA Topic Modeling technique. As a result of the analysis, the main keywords in the Korean Smart Farm-related research field were 'environment', 'system', 'use', 'technology', 'cultivation', etc. The results of Degree, Betweenness, and Eigenvector Centrality were presented. There were 7 topics, such as 'Introduction analysis of Smart Farm', 'Eco-friendly Smart Farm and economic efficiency of Smart Farm', 'Smart Farm platform design', 'Smart Farm production optimization', 'Smart Farm ecosystem', 'Smart Farm system implementation', and 'Government policy for Smart Farm' in the results of Topic Modeling. This study will be expected to serve as basic data for policy development necessary to advance Korean Smart Farm research in the future by examining research trends related to Korean Smart Farm.

Blockchain Evaluation Indexes and Methods to Vitalize a Blockchain-based Digital Sharing Economy (블록체인 기반 디지털 공유경제 활성화를 위한 블록체인 평가지표 및 평가방법에 대한 연구)

  • Lee, Il-Gu
    • Journal of Digital Convergence
    • /
    • v.16 no.8
    • /
    • pp.193-200
    • /
    • 2018
  • Recently, there are high expectations of a society benefitting from a digital sharing economy. However, to establish a digital sharing economy, one needs to first create a reliable social structure. Transparency is recognized as the most important measure of value in not just politics or economics, but also in all domains of our lives. Although all nations strive to create "societies based on credit and trust," in truth, rigidity, irregularity, corruption, and inefficiency are widespread in all aspects of society. Thus, there is a growing interest in blockchain technology, also called the "second Internet revolution," seeking trust in digital environments, although it is difficult to obtain trust in such environments. However, the principles and methods of evaluating blockchain technologies are still unclear and not standardized. This study addresses the evaluation indexes such as transaction per second, maximum data size per one transaction, accuracy and blockchain technology application methods in the digital sharing economy and suggest ways to safely vitalize a blockchain-based digital sharing economy.