• Title/Summary/Keyword: Security budget management

Search Result 93, Processing Time 0.026 seconds

Development of Levee Safety Revaluation for Satellite Images (위성 이미지를 활용한 제방 안정성 평가 기법 개발)

  • Bang, Young Jun;Lee, Seung Oh
    • Journal of Korean Society of Disaster and Security
    • /
    • v.15 no.3
    • /
    • pp.1-14
    • /
    • 2022
  • Recently, the risk of water disasters are increasing due to climate change and the aging of river levees. Existing conventional river embankment inspections have many limitations due to the consumption of a lot of manpower and budget. Thus, it is necessary to establish a new monitoring and forecast/warning method for effective flood response. This study proposes the river levee health monitoring system by analyzing the relationship between river levee deformation and hydrological factors using Sentinel-1. The variance index calculated in this study was classified into 4 grades. And the levees collapse section was judged to be a high vulnerable point in which the variance rapidly increased based on the result of the rapid increase in soil moisture. In the future, it is expected that it will be possible to advance levee maintenance technology and improve national disaster management through the advancement of the existing levee management system and automated monitoring through the forensic method that combines remote technology.

A Study on Improvements on Legal Structure on Security of National Research and Development Projects (과학기술 및 학술 연구보고서 서비스 제공을 위한 국가연구개발사업 관련 법령 입법론 -저작권법상 공공저작물의 자유이용 제도와 연계를 중심으로-)

  • Kang, Sun Joon;Won, Yoo Hyung;Choi, San;Kim, Jun Huck;Kim, Seul Ki
    • Proceedings of the Korea Technology Innovation Society Conference
    • /
    • 2015.05a
    • /
    • pp.545-570
    • /
    • 2015
  • Korea is among the ten countries with the largest R&D budget and the highest R&D investment-to-GDP ratio, yet the subject of security and protection of R&D results remains relatively unexplored in the country. Countries have implemented in their legal systems measures to properly protect cutting-edge industrial technologies that would adversely affect national security and economy if leaked to other countries. While Korea has a generally stable legal framework as provided in the Regulation on the National R&D Program Management (the "Regulation") and the Act on Industrial Technology Protection, many difficulties follow in practice when determining details on security management and obligations and setting standards in carrying out national R&D projects. This paper proposes to modify and improve security level classification standards in the Regulation. The Regulation provides a dual security level decision-making system for R&D projects: the security level can be determined either by researcher or by the central agency in charge of the project. Unification of such a dual system can avoid unnecessary confusions. To prevent a leakage, it is crucial that research projects be carried out in compliance with their assigned security levels and standards and results be effectively managed. The paper examines from a practitioner's perspective relevant legal provisions on leakage of confidential R&D projects, infringement, injunction, punishment, attempt and conspiracy, dual liability, duty of report to the National Intelligence Service (the "NIS") of security management process and other security issues arising from national R&D projects, and manual drafting in case of a breach. The paper recommends to train security and technological experts such as industrial security experts to properly amend laws on security level classification standards and relevant technological contents. A quarterly policy development committee must also be set up by the NIS in cooperation with relevant organizations. The committee shall provide a project management manual that provides step-by-step guidance for organizations that carry out national R&D projects as a preventive measure against possible leakage. In the short term, the NIS National Industrial Security Center's duties should be expanded to incorporate national R&D projects' security. In the long term, a security task force must be set up to protect, support and manage the projects whose responsibilities should include research, policy development, PR and training of security-related issues. Through these means, a social consensus must be reached on the need for protecting national R&D projects. The most efficient way to implement these measures is to facilitate security training programs and meetings that provide opportunities for communication among industrial security experts and researchers. Furthermore, the Regulation's security provisions must be examined and improved.

  • PDF

Study of Information System Model in University (대학 정보시스템 모델연구)

  • Chung, Jong-In
    • The Journal of Korean Association of Computer Education
    • /
    • v.5 no.3
    • /
    • pp.27-35
    • /
    • 2002
  • This paper is presented a model of management and application of PC, one of the most important computer resources and software and a model for optimal speed of network to organize information budget of University. I propose strategies to promote utilization degree of existing PCs, problems and strategies to maintain PC, effective strategies to expand PC and change into new models, and strategies to utilize effectively and purchase softwares. Also, I propose an optimal model for network environment and management, which is core to establish master plan of information system. Network is divided into internal and external network and formula model is proposed to calculate optimal speed of these. And strategy is proposed to maintain security of University preserving its characteristics.

  • PDF

Artificial Intelligence Applications as a Modern Trend to Achieve Organizational Innovation in Jordanian Commercial Banks

  • Al-HAWAMDEH, Majd Mohammed;AlSHAER, Sawsan A.
    • The Journal of Asian Finance, Economics and Business
    • /
    • v.9 no.3
    • /
    • pp.257-263
    • /
    • 2022
  • The objective of this study was to see how artificial intelligence applications affected organizational innovation in Jordanian commercial banks. Both independent and dependent variables were measured in three dimensions: expert systems, neural network systems, and fuzzy logic systems for artificial intelligence applications variable. Product innovation, process innovation, and management innovation for the organizational innovation variable. To achieve study objectives, a questionnaire was developed and distributed to a sample of one hundred fifty-three managers in Jordanian commercial banks, who were selected according to the simple random sampling method. Except for the neural network systems dimension, which comes in at an average level, the study indicated that there is a high level of organizational innovation and artificial intelligence applications. Furthermore, the findings revealed that artificial intelligence applications have a significant impact on organizational innovation in Jordanian commercial banks, with the most important artificial intelligence application being a fuzzy logic system. The study suggested keeping track of technological advancements in the field of artificial intelligence applications and incorporating them into banking operations by benchmarking with the best commercial bank practices and allocating a portion of the budget to technological applications and infrastructure development, as well as balancing between technology use and information security risks to ensure client privacy is protected.

A Study on Facilitators and Inhibitors to the Introduction of Outsourcing in the Hospital Information Systems in Korea (병원 정보시스템 아웃소싱 도입의 촉진 요인과 저해 요인에 관한 연구)

  • Choy, Soon;Shin, Hyeong-Sik;Choi, In-Young;Kim, Suk-Il
    • Journal of Preventive Medicine and Public Health
    • /
    • v.40 no.1
    • /
    • pp.64-70
    • /
    • 2007
  • Objectives : This study was conducted to investigate the current status of outsourcing in Korean hospital information systems and the factors influencing its introduction. Methods : The authors surveyed 136 hospitals located in Seoul and its surrounding vicinities from June 7 to June 23, 2006. The facilitators and inhibitors to outsourcing in hospital information systems were derived from literature and expert reviews. Multiple logistic regression analysis was applied to identify the major influencing factors on outsourcing in hospital information systems. Results : Eighty-six (63.2%) of the 136 hospitals surveyed, which were mainly tertiary hospitals, responded to using outsourcing for their hospital information systems. "Hardware and software maintenance and support," "application development," and "management of service and staff" were the major areas of outsourcing. Outsourcing had been employed for $4\sim7$ years by 45.5% of the hospitals and the proportion of the budget used for outsourcing was less than 20%. A need for an extension in outsourcing was agreed on by 76.5% of the hospitals. The multiple logistic regression analysis showed that both consumer satisfaction and security risk have an influence on hospital information system outsourcing. Conclusions : Outsourcing in hospital information systems is expected to increase just as in other industries. One primary facilitator to outsourcing in other industries is consumer satisfaction. We found that this was also a facilitator to outsourcing in hospital information systems. Security risk, which is usually considered an inhibitor to information technology outsourcing, was proven to be an inhibitor here as well. The results of this study may help hospital information systems establish a strategy and management plan for outsourcing.

A Fundamental Study of a Neo-Grouting Technology for the Decreasing of a Ground Disaster in a High Water Pressure Conditions (고수압 조건에서의 지반재해 저감을 위한 최신 그라우팅 시공관리 기술 기초연구)

  • Kim, Jin-Chun;Yoo, Byung-Sun;Kang, Hee-Jin;Kwon, Young-Sam
    • Journal of Korean Society of Disaster and Security
    • /
    • v.7 no.1
    • /
    • pp.9-16
    • /
    • 2014
  • In the high water pressure construction conditions, it is important that the failures and damages occurrence in the neighboring ground and impermeable prevention methods (design and construction) for a inflow of seawater into structures. Grouting construction markets include a subway construction, a railway construction, a mountain tunnel construction, a new & reinforced construction of river & reservoir levee with big budget per every years. but, there are economic loss about design and construction management parts because that management criteria is not accurate but depends on experiences. Even though grouting technology are using vitally in the major constructions of national levels, it is still serious about the low-reliability problems and the no-criteria problems. therefor the purpose of this study is that provides the fundamental research about the neo-grouting technology for the decreasing of ground disaster in a high water pressure conditions.

Introducing Contract-out in the Policing Service : Focusing on Policing segregated System (치안서비스의 민간위탁 도입에 관한 연구 : 치안분업모델을 중심으로)

  • Choe, Jung-Taek
    • Korean Security Journal
    • /
    • no.12
    • /
    • pp.309-333
    • /
    • 2006
  • These days, the majority of public service area presents increment of utilizing a contracting-out with the following reasons such as cost-efficiency, maintenance of population changes in flexible manner, and convenience of management. The social changes have influence on policing structure and regional security system as well as problems associated with accepting the contracting-out in the public policing sector. However, many issues such as limited contracting-out sector, difficulty of encouragement of participation to private sector, and limitation of making a contract with contracting-out would be brought up when initiate contracting-out to the public policing sector. Changing security system to lower budget, planning restructure of organization, developing alterable partial contracting-out, establishing private and public cooperate system and rationalizing contract system are the suggestions to solve and modify the raising problems. This study suggests a differentiate regulation of policing services compare to currently existing contracting-out method to consider a distinctive working environment. The suggestions are as follows: 1. develop a security segregate model, 2. build a cooperative system between private and public policing sector, 3. broaden opportunity of participation of private policing sector, 4. open-competition among qualified private tender to make a contract. The private contracting-out in the public security service sector should be manage in different manner compare to other private contracting-out in government-oriented public service sector. Since work performance of each private contracting-out agency is strongly bond to safety of every civilian in the nation, it is essential to increase its standard of qualification of each agency.

  • PDF

Cyber Risk Management of SMEs to Prevent Personal Information Leakage Accidents (개인정보유출 사고 방지를 위한 중소기업의 사이버 위험관리)

  • So, Byoung-Ki;Cheung, Chong-Soo
    • Journal of the Society of Disaster Information
    • /
    • v.17 no.2
    • /
    • pp.375-390
    • /
    • 2021
  • Purpose: Most of cybersecurity breaches occur in SMEs. As the existing cybersecurity framework and certification system are mainly focused on financial and large companies, it is difficult for SMEs to utilize it due to lack of cybersecurity budget and manpower. So it is necessary to come up with measures to allow SMEs to voluntarily manage cyber risks. Method: After reviewing Cybersecurity market, cybersecurity items of financial institutions, cybersecurity framework comparison and cybersecurity incidents reported in the media, the criticality of cybersecurity items was analyzed through AHP analysis. And cybersecurity items of non-life insurers were also investigated and made a comparison between them. Result: Cyber risk management methods for SMEs were proposed for 20 major causes of cyber accidents. Conclusion: We hope that the cybersecurity risk assessment measures of SMEs in Korea will help them assess their risks when they sign up for cyber insurance, and that cyber risk assessment also needs to be linked to ERM standardization.

Improved Preservation Methods for Big and Old Tress in South Korea (우리 나라의 노거수자원(老巨樹資源) 보호관리실태(保護管理室態) 및 개선방안(改善方案))

  • Park, Chong-Min;Seo, Byun-Soo;Lee, Cheong-Taek
    • Journal of Korean Society of Forest Science
    • /
    • v.89 no.3
    • /
    • pp.440-451
    • /
    • 2000
  • This study was conducted in order to provide essential data and relevant management proposal to conserve and maintain big and old trees in a rational way. For the field survey, 77 big and old trees preserved by the laws in Chollabuk-do, Korea were investigated. The study results are summarized as follows : 1. To conserve and manage big and old trees, the valuable trees have been designated as natural monument trees and protection-needed trees. There are 141 individuals of 37 species designated as natural monuments and 10,049 individuals of 102 species designated as protection-needed trees. 2. Management budget for natural monument trees was devoted at 70% from the national expenditure, but that for protection-needed trees was devoted at 98% from the local expenditure. 3. Standardized sign boards and sign stones for natural monument trees were well placed and other protection facilities such as fences, branch supports and branch holdings were established. On the other hand, management of protection-needed trees was deficient overall. 4. Problems for designation process and management of protection-needed trees could include items such as insufficient management budget, various development activities, land ownership, misjudgement of tree age and species identification, unsatisfaction of sign board placement, insufficient surgery for damaged trees, pavement around tree root system and environmental pollution around the trees. 5. In order to improve the existing management methods of big and old trees, the following schemes were suggested : the development of practical criteria for natural monument and protection-needed trees, nationwide surveys of big and old tree resources, the security of national budget, securing sufficient spaces for the tree growth, specialization of management systems, extended practices of tree form management, establishment of permanent standard signs and consideration of opinions of village residents.

  • PDF

Integration System of Several Housing Improvement Programs for Low-Income with Housing Benefit Reorganization (주거급여 개편에 따른 유사 주거환경 개선사업의 통합 운영 방안)

  • Moon, Hyogon;Paik, Hae Sun
    • Journal of the Korean housing association
    • /
    • v.26 no.5
    • /
    • pp.113-121
    • /
    • 2015
  • Several housing improvement programs for low-income have done by Ministry of Health & Welfare, Ministry of Trade, Industry & Energy, Ministry of Security and Public Administration, Ministry of Environment, and Ministry of Land, infrastructure and Transport up to now. Each program practiced separately based on each agency's function and territory, but there are also negative opinion on beneficiary duplication, beneficiary omission, and the inefficient execution of the government budget. This study analyzes the housing improvement programs of each agency on the aspects of coordination, and suggests the integration system with coordination and delivery system. We selected 3 indexes such as similarity, integration effect and availability for integration system and analyzed the effects of integrated programs into one based on cost, repair effect and management. We proposed that the similar housing improvement programs of each agency should be coordinated for integration. But it is not easy to integrate similar programs into one program, therefore similar programs which support the house owner are needed to integrate into housing benefit except same beneficiary who owned own house.