• Title/Summary/Keyword: Security budget management

Search Result 94, Processing Time 0.02 seconds

Integration System of Several Housing Improvement Programs for Low-Income with Housing Benefit Reorganization (주거급여 개편에 따른 유사 주거환경 개선사업의 통합 운영 방안)

  • Moon, Hyogon;Paik, Hae Sun
    • Journal of the Korean housing association
    • /
    • v.26 no.5
    • /
    • pp.113-121
    • /
    • 2015
  • Several housing improvement programs for low-income have done by Ministry of Health & Welfare, Ministry of Trade, Industry & Energy, Ministry of Security and Public Administration, Ministry of Environment, and Ministry of Land, infrastructure and Transport up to now. Each program practiced separately based on each agency's function and territory, but there are also negative opinion on beneficiary duplication, beneficiary omission, and the inefficient execution of the government budget. This study analyzes the housing improvement programs of each agency on the aspects of coordination, and suggests the integration system with coordination and delivery system. We selected 3 indexes such as similarity, integration effect and availability for integration system and analyzed the effects of integrated programs into one based on cost, repair effect and management. We proposed that the similar housing improvement programs of each agency should be coordinated for integration. But it is not easy to integrate similar programs into one program, therefore similar programs which support the house owner are needed to integrate into housing benefit except same beneficiary who owned own house.

Development of Decision System for Determining Priorities of Re-construction Reservoirs (농업용저수지 재개발을 위한 우선순위 선정시스템 개발)

  • Lee, Gwang-Ya;Kim, Hae-Do;Jeong, Gwang-Geun
    • Proceedings of the Korean Society of Agricultural Engineers Conference
    • /
    • 2005.10a
    • /
    • pp.26-31
    • /
    • 2005
  • In national prospective, the needs to develop water resources has been increased due to water shortage from diverse use of water resources in agricultural areas. Existing agricultural water demand, which has mainly been limited to the use of farming, are now expanding to diverse water uses such as supporting daily lives, diluting environmental pollution as well as industrial use for agricultural complex currently under construction in agricultural region. In this situation, for the sake of effective procurement of water resources and supply method, it is definitely required to enhance the effectiveness of budget investment and project proceedings through integrated re-development which links projects to strengthen existing dams, reservoirs and hydraulic facilities. The major scopes of this research includes developing different types of system such as selecting potential sites to re-construct reservoirs including generating base maps and thematic maps, data collection regarding water demands and reservoir status; analyzing reservoir data; estimating developable capacity and index calculation; and forecasting inundated areas. In addition, this study provides other products such as developing output generation system which can support wide use of data built and analyzed; database generation for better data management; data analysis including selection, extraction, indexation, and calculation of base items through standardization; data security system prohibiting exterior proliferation and malicious manufacturing of data.

  • PDF

Developing a Classification of Vulnerabilities for Smart Factory in SMEs: Focused on Industrial Control Systems (중소기업용 스마트팩토리 보안 취약점 분류체계 개발: 산업제어시스템 중심으로)

  • Jeong, Jae-Hoon;Kim, Tae-Sung
    • Journal of Information Technology Services
    • /
    • v.21 no.5
    • /
    • pp.65-79
    • /
    • 2022
  • The smart factory has spread to small and mid-size enterprises (SMEs) under the leadership of the government. Smart factory consists of a work area, an operation management area, and an industrial control system (ICS) area. However, each site is combined with the IT system for reasons such as the convenience of work. As a result, various breaches could occur due to the weakness of the IT system. This study seeks to discover the items and vulnerabilities that SMEs who have difficulties in information security due to technology limitations, human resources, and budget should first diagnose and check. First, to compare the existing domestic and foreign smart factory vulnerability classification systems and improve the current classification system, the latest smart factory vulnerability information is collected from NVD, CISA, and OWASP. Then, significant keywords are extracted from pre-processing, co-occurrence network analysis is performed, and the relationship between each keyword and vulnerability is discovered. Finally, the improvement points of the classification system are derived by mapping it to the existing classification system. Therefore, configuration and maintenance, communication and network, and software development were the items to be diagnosed and checked first, and vulnerabilities were denial of service (DoS), lack of integrity checking for communications, inadequate authentication, privileges, and access control in software in descending order of importance.

The Improvement on Proposal Evaluation System of National Defense Core Technology R&D Projects (국방핵심기술 연구개발과제의 선정평가 개선 연구)

  • Kim, Chan-Soo;Cho, Kyu-Kab
    • Journal of Technology Innovation
    • /
    • v.15 no.2
    • /
    • pp.123-152
    • /
    • 2007
  • The striking characteristic of the contemporary global security environment is that the nature of threats has become diverse and complex. For example, transnational and non-military threats including terrorism and proliferation of weapon of mass destruction has increased. In this security environment, Advanced countries funnel their investments for defense budgets into the assurance of key force capability and R&D of cutting-edge core technologies, in consideration of future battlefield environments so as to get an edge on not only defense science and technology but also intelligence capabilities. As shown by past practices of the korea's defense acquisition, the ministry of national defense has tried to enhance its force capabilities in the short-term by purchasing foreign weapon systems rather than by investing in domestic R&D. Accordingly, the technological gaps between the korea and advanced countries were widened due to both insufficient investment in development of domestic technologies and avoidance of technological transfer by advanced countries. Thus, for the effective execution of the R&D budget and the successful performance of the projects, the importance of selection, management and evaluation of the R&D projects is emphasized. So, The objective of this study is that the analysis of the proposal-selection evaluation system for the realization of the successful defense core technology R&D projects. This study focused on the improvement of the proposal-selection evaluation model which can be applicable to the national defense core R&D projects. Using the improved proposal-selection evaluation system, we propose a model to enhance the reliability of the national defense core technology R&D project evaluation system.

  • PDF

A Method for Safety of RFID Systems

  • Karygiannis, Tom;Eydt, Bernard;Barber, Greg;Bunn, Lynn;Phillips, Ted
    • 한국정보컨버전스학회:학술대회논문집
    • /
    • 2008.06a
    • /
    • pp.63-70
    • /
    • 2008
  • The authors, Tom Karygiannis of NIST, and Bernard Eydt, Greg Barber, Lynn Bunn, and Ted Phillips of Booz Allen Hamilton, wish to thank Steven Fick, Rick Korchak, Kate Remley, Jeff Guerrieri, Dylan Williams, Karen Scarfone, and Tim Grance of NIST, and Kenneth Waldrop and Beth Mallory of Booz Allen Hamilton. These individuals reviewed drafts of this document and contributed to its technical content. The authors would also like to express their thanks to several experts for their critical review and feedback on drafts of the publication. These experts include V.C. Kumar of Texas Instruments; Simson Garfinkel of the Naval Postgraduate School; Peter Sand of the Department of Homeland Security; Erika McCallister of MITRE; and several professionals supporting Automatic Identification Technology(AIT) program offices within the Department of Defense(DoD), especially Nicholas Tsougas, Fred Naigle, Vince Pontani, Jere Engelman, and Kathleen Smith. During the public comment period we received helpful comments from the following Federal Government agencies: the US Departments of Defense, Health and Human Services, Homeland Security, Labor, and State; the Office of the Director of National Intelligence; the Office of Management and Budget; and the General Services Administration. We also received several helpful contributions from commercial industry, including comments from EPCglobal, VeriSign, and Priway. Finally, the authors wish to thank the following individuals for their comments and assistance: Brian Tiplady, Daniel Bailey, Paul Dodd, Craig K. Harmon, William MacGregor, Ted Winograd, Russell Lange, Perry F. Wilson, John Pescatore, Ronald Dugger, Stephan Engberg, Morten Borup Harning, Matt Sexton, Brian Cute, Asterios Tsibertzopoulos, Mike Francis, Joshua Slob in, Jack Harris, and Judith Myerson.

  • PDF

Future Direction of ROK Navy's Maritime Strategy based on the Recognition and Expansion of Maritime Sphere (해양공간 인식과 확장의 관점에서 본 한국 해양전략의 발전 방향)

  • Jung, Gwang-Ho
    • Strategy21
    • /
    • s.44
    • /
    • pp.142-176
    • /
    • 2018
  • So far, the main threat to South Korea was North Korea. That is why South Korea established a strategy based on the threat of North Korea and most of the budget on defense was used to deter North Korea. Even though the neighboring countries(China, Japan, and Russia) are growing as a real threat with abilities and intentions based on their powerful naval forces, South Korea has not yet been able to establish a strategy that regards neighboring countries as a threat. But the decades-old structural mechanism of the Korean security environment is undergoing a radical change on April 27, 2018, through the South-North summit and the Panmunjom Declaration. Under the changing security environment, South Korea was placed in a complicated dilemma that had to deal with threats of two axes(China), three axes(China, Japan), and four axes(Japan, Russia). If the one axis threat(North Korea) is dominated by land threats, the second, third and fourth axis threats are threats from the sea. This paper analyzed the maritime strategy of Korea within the framework of maritime-geopolitics, in other words recognition and expansion of the sphere of maritime. I have designed that the maritime defense space that we can deny from threats is divided into three lines of defense: 1 line (radius 3,000km), 2 lines (2,000km), and 3 lines (1,000km). The three defense zones of the three lines were defined as an active defense(1 line), defensive offense(2 line), active offense(3 line). The three defense zones of the three lines were defined as the sphere of core maritime, As a power to deny the sphere of core maritime, it was analyzed as a maneuvering unit, a nuclear-powered submarine, the establishment of missile strategy, and the fortification of islands station. The marine strategy of South Korea with these concepts and means was defined as 'Offensive Maritime Denial Strategy'.

A Case Study on BSC System Implementation of Korea Minting & Security Printing Corporation (한국조폐공사 BSC 시스템 구축 사례)

  • Lee, Choong-Seop
    • Information Systems Review
    • /
    • v.9 no.1
    • /
    • pp.191-214
    • /
    • 2007
  • This study analyzes the process of establishing BSC based strategic performance evaluation system of KOMSCO. This case could be a reference to other public institutes for BSC introduction and efficient BSC usage. Internal control system of KOMSCO has been improved by EVA system in 1999, BSC introduction and Job analysis in 2001 through 2002, and BSC performance evaluation system in 2004. KOMSCO tries to reflect BSC concept by inducing employees to cooperate selection process of CSF and KPI and by considering the organizational characteristics of KOMSCO in constructing it's performance indices. It is suggested that these processes are very important and should be followed by other institutes in their BSC introduction. By applying BSC, KOMSCO provides improvement in employees' understanding of strategy, performance management, and performance evaluation. KOMSCO' information system based on ERP and efficiently connected to EIS, KMS, and BSC seems to play an important role of BSC application. BSC system of KOMSCO is now in the early stage of application and needs to be evaluated by the efficiency of usage in terms of overall performance evaluation system, deduction system of evaluation point for excess accomplishment over target, and connection to budget system.

A Study on the Preservation Programs in Libraries and Archives (도서관 및 기록관 자료보존프로그램에 관한 고찰)

  • Cho, Young-Ju
    • Journal of Korean Society of Archives and Records Management
    • /
    • v.4 no.1
    • /
    • pp.101-116
    • /
    • 2004
  • Deterioration and brittleness of resources on the shelves of institutions such as libraries and archives have been increased and accelerated as time passes in accordance with the preservation environment and the nature of their own material. It can be a loss of current information with little importance in prolong the life of valuable materials and to preserve them in security, integrated preservation programs should be developed and implemented according to missions, sizes, the nature of collections, users, and budgets of individual institutions. In reality, most institutions, however, are not able to implement perfect preservation programs due to lack of budget, human resources, and expertise. To solve this problem, some institutions in similar circumstances have planned cooperative preservation programs in various levels. Through cooperative systems individual institutions can not only pursue common interests but gain real benefits for themselves. Consequently institutions are recommended to collaborate with in development and implementation of various preservation programs at local, national, and international levels in addition to individual institutional programs.

A Study on the controversial Issues of the Private Investigator System (공인탐정제도 도입에 따른 주요 쟁점 논의)

  • Jaemin Lee
    • Journal of the Society of Disaster Information
    • /
    • v.19 no.2
    • /
    • pp.254-261
    • /
    • 2023
  • Purpose: With the diversification of modern society, it is difficult to predict crime types, and the limitations of the state's functions, such as human limitations and lack of budget, are increasing. Method: However, as the number of private investigation companies that do not use illegal means to solve the request increased, attempts were made to introduce a public detective system that would manage and supervise it and compensate for the gap in public power. Result: However, due to the nature of the Private Investigator system, legislation has not progressed as the National Police Agency and the Ministry of Justice are at odds with existing laws that guarantee existing jobs such as lawyers and credit research. Conclusion: Therefore, this study analyzes the bills related to the authorized detective to the National Assembly, examines major issues such as the scope of work of the authorized detective business, the selection of management and supervisory authorities, and suggests ways to improve the successful settlement of the Private Investigator system.

Analysis of Success Factors for Technology Commercialization of Venture Companies in the 4th Industry : Focusing on smart farm companies (4차 산업 벤처기업의 기술사업화 성공 요인 분석 : 스마트팜 기업 중심으로)

  • Kim, Dae Yu;Bae, Jang Won
    • Journal of Digital Convergence
    • /
    • v.20 no.3
    • /
    • pp.317-323
    • /
    • 2022
  • The purpose of this study was to analyze how innovative facility investment and innovative research manpower capabilities of venture companies related to the 4th industrial smart farm affect the technological performance of patents and design registrations, and the financial performance of sales and operating profit. As a research method, a total of 47 venture companies were selected as a sample and regression analysis was performed. Research Results This study analyzes the technological commercialization factors of venture companies related to the 4th industrial smart farm and proposes to expand the budget for R&D government tasks for financial and technological success. In the future research direction, I believe that more discussion is needed on the contribution of companies to quantitative and qualitative growth.