• Title/Summary/Keyword: Security limits

Search Result 162, Processing Time 0.029 seconds

A Study on Cell-Broadcasting Based Security Authentication System and Business Models (셀 브로드캐스팅 보안 인증시스템 및 비즈니스 모델에 관한 연구)

  • Choi, Jeong-Moon;Lee, Jungwoo
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.22 no.5
    • /
    • pp.325-333
    • /
    • 2021
  • With the rapidly changing era of the fourth industrial revolution, the utilization of IT technology is increasing. In addition, the demand for security authentication is increasing as shared services or IoT technologies are being developed as new business models. Security authentication is becoming increasingly important for all intelligent devices such as self-driving cars. However, most location-based security authentication technologies are being developed mainly with technologies that utilize server proximity or satellite location tracking, which limits the scope of their physical use. Location-based security authentication technology has recently been developed as a complementary replacement technology. In this study, we introduce location-based security authentication technology using cell broadcasting technology, which has a wider range of applications and is more convenient and business-friendly than existing location-based security authentication technologies. We also introduced application cases and business models related to this. In addition to the current status of technology development, we analyzed current changes in business models being employed. Based on our analysis results, this study draws the implication that technology diversification is necessary to improve the performance of innovative technologies. It is meaningful that it has found and studied advanced technologies other than existing location authentication methods and systems.

A Study on Searching for Valuation Model of Internet Security (인터넷 보안성의 가치 모형 탐색에 관한 연구)

  • Kim, Min-Choel
    • Journal of the Korea Computer Industry Society
    • /
    • v.6 no.2
    • /
    • pp.337-344
    • /
    • 2005
  • This research is a study on the model of the economic value measurement of Internet Business properties(especially security property) that will take considerable parts in ail transactions. The study can contribute to decide the priority of investment among several Internet Business properties and justify the cost for improving Internet Business elements. However the study have some research limits not to be analyzed by the empirical verification. Future research agenda includes the practical survey of WTP of Internet Business properties, and the practical availability of the proposed model. Especially, many problems will occur in the process of the empirical analysis, so additional works should be done in the future.

  • PDF

The survey on the use of firearms & equipment in police and the protection of citizens' rights (경찰의 총기·장구 사용과 국민의 인권보호에 대한 실태연구)

  • Jeong, Jeong-ile
    • Convergence Security Journal
    • /
    • v.16 no.3_2
    • /
    • pp.43-54
    • /
    • 2016
  • Korea's police force has successfully performed its difficult mission of maintaining public order while overcoming difficulties at home and abroad during the past half century. However, the environment in which the forces of law a nd order operate has exponentially increased the demand for, and difficulties faced by, the agents of law enforcement in recent years because of the country's rapid globalization, as well as the move to democracy and localization, and the extensive developments in industrialization and information technology diffusion. This study also intends to investigate the appropriate limits of law enforcement and the use of force by policemen, and the general public's perception of the police as they fulfill their duty of protecting citizens' rights.

Paradigm Shift in Policy of Soil Environment Conservation in Korea (우리나라 토양환경보전 정책의 패러다임 전환)

  • Park, Yong-Ha;Yang, JaeE
    • Journal of Soil and Groundwater Environment
    • /
    • v.23 no.3
    • /
    • pp.10-26
    • /
    • 2018
  • This paper reviews the soil conservation policies (SCP) in the global community and suggests the improved options in SCP in Korea. Soil Environment Conservation Act in Korea states soil is a valuable natural resource and it's value should be enhanced to provide the benefits that soil ecosystem can offer to people. However, SCP in Korea limits its application to not only the scope of soil environment but also the issues on soil pollution. The SCPs in the advanced countries have shifted their scopes from soil environment to soil ecosystem, put emphasis on the conservation of soil health rather than soil quality, and set the goals to optimize the soil ecosystem services to people while minimizing the soil threats. In this context, the soil security initiative was recently proposed to accomplish this goal while employing the nexus concept to bridge the soil ecosystem services with water, atmosphere, climate and biodiversity. Therefore, the key policies in soil conservation in Korea should expand the scope from soil environment to soil ecosystem, focus on soil health management, and develop the holistic governance among diverse stakeholder to maximize the soil ecosystem services. Soil ecosystem should be secured by national soil policies for human health.

Freedom of contract in the digital age and its implementation in modern technologies: theory and practice

  • Davydova, Iryna;Bernaz-Lukavetska, Olena;Tokareva, Vira;Andriienko, Iryna;Tserkovna, Olena
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.12spc
    • /
    • pp.544-548
    • /
    • 2021
  • Scientific and technical development, as well as the emergence of new types of contracts, which do not have their expression in current legislation, force us to explore the issues of contract law to adapt to change. In this context, the principle of freedom of contract is fundamental, which states that each person has the right to enter into a contractual relationship at his discretion. However, such freedom is not absolute, because the freedom of one person should not violate the freedom of another. Together with the conflict of private and public interests, these phenomena are a field for the study of topical issues of theory and application of the principle of freedom of contract in practice. Research methods are philosophical, general scientific, and special scientific methods, in particular, system-structural, formal-legal, hermeneutic; methods of analysis, synthesis, etc. As a result of the research, the main characteristics of the principle of freedom of contract, its role for private law regulation of contract law are given; approaches to understanding the restriction of contract freedom are analyzed; typical examples and means of such restrictions are identified; demonstrated how contract freedom is embodied in the use of IT tools, which types of contracts are most common in the digital environment.

Positive Analysis about Study-trend for a Field of the Korea Security : Papers Contributed($1997{\sim}2007$) to "Korea Security Science Association"- centered (한국 경호경비학의 연구경향 분석: "한국경호경비학회지" 기고논문(1997-2007)을 중심으로)

  • Ahn, Hwang-Kwon;Kim, Sang-Jin
    • Korean Security Journal
    • /
    • no.15
    • /
    • pp.199-219
    • /
    • 2008
  • This study analyzed the contents of the 225 papers included in Korea Security Science Association during the decade -from 1997 to 2007. This study was classified the study method qualitative. First, characteristic of researchers(distinction of sex, distinction of academic degree, regional distribution, one's position and regional distribution, participants per paper). Second, study trends classified by fields of study(where receiving research expenses support or not, change of study subject). Third, study trends classified by methods of study(study method by year, study method by study subject, statistical analysis by year) were subdivided. Analysis shows that there are some shortcomings on the research of Korea Security Science Association as compared with other fields. However, it shows advanced trends for example participation in different study field, evenly distributed regional study participation, variety trial of analysis method. Then again, the distinction of sex, one's position, too much emphasis on independence research, vulnerability about support of research expenses, emphasis on study fields and study trends wandering from industrial circles are getting deeper In study methods, generalized research form such as document study and phenomenon technical case study is limited so deduction of kernel result is not thoroughgoing enough as well as it shows the trend that limits to duplicate and generalized proposal technic.

  • PDF

"Liability of Air Carriers for Injuries Resulting from International Aviation Terrorism" (국제항공(國際航空)테러리즘으로 인한 여객손해(旅客損害)에 대한 운송인(運送人)의 책임(責任))

  • Choi, Wan-Sik
    • The Korean Journal of Air & Space Law and Policy
    • /
    • v.1
    • /
    • pp.47-85
    • /
    • 1989
  • The Fundamental purpose of the Warsaw Convention was to establish uniform rules applicable to international air transportation. The emphasis on the benefits of uniformity was considered important in the beginning and continues to be important to the present. If the desire for uniformity is indeed the mortar which holds the Warsaw system together then it should be possible to agree on a worldwide liability limit. This liability limit would not be so unreasonable, that it would be impossible for nations to adhere to it. It would preclude any national supplemental compensation plan or Montreal Agreement type of requirement in any jurisdiction. The differentiation of liability limits by national requirement seems to be what is occurring. There is a plethora of mandated limits and Montreal Agreement type 'voluntary' limits. It is becoming difficult to find more than a few major States where an unmodified Warsaw Convention or Hague Protocol limitation is still in effect. If this is the real world in the 1980's, then let the treaty so reflect it. Upon reviewing the Warsaw Convention, its history and the several attempts to amend it, strengths become apparent. Hijackings of international flights have given rise to a number of lawsuits by passengers to recover damages for injuries suffered. This comment is concerned with the liability of an airline for injuries to its passengers resulting from aviation terrorism. In addition, analysis is focused on current airline security measures, particularly the pre-boarding screening system, and the duty of air carriers to prevent weapons from penetrating that system. An airline has a duty to exercise a high degree of care to protect its passengers from the threat of aviation terrorism. This duty would seemingly require the airline to exercise a high degree of care to prevent any passenger from smuggling a weapon or explosive device aboard its aircraft. In the case an unarmed hijacker who boards having no instrument in his possession with which to promote the hoax, a plaintiff-passenger would be hard-pressed to show that the airline was negligent in screening the hijacker prior to boarding. In light of the airline's duty to exercise a high degree of care to provide for the safety of all the passengers on board, an acquiescene to a hijacker's demands on the part of the air carrier could constitute a breach of duty only when it is clearly shown that the carrier's employees knew or plainly should have known that the hijacker was unarmed. A finding of willful misconduct on the part of an air carrier, which is a prerequisite to imposing unlimited liability, remains a question to be determined by a jury using the definition or standard of willful misconduct prevailing in the jurisdiction of the forum court. Through the willful misconduct provision of the Warsaw Convention, air carrier face the possibility of unlimited liability for failure to implement proper preventive precautions against terrorist. Courts, therefore, should broadly construe the willful misconduct provision of the Warsaw Convention in order to find unlimited liability for passenger injuries whenever air carrier security precautions are lacking. In this way, the courts can help ensure air carrier safety and prevention against terrorist attack. Air carriers, therefore, would have an incentive to increase, impose and maintain security precautions designed to thwart such potential terrorist attacks as in the case of Korean Air Lines Flight No.858 incident having a tremendous impact on the civil aviation community. The crash of a commercial airliner, with the attending tragic loss of life and massive destruction of property, always gives rise to shock and indignation. The general opinion is that the legal system could be sufficient, provided that the political will is there to use and apply it effectively. All agreed that the main responsibility for security has to be borne by the governments. I would like to remind all passengers that every discovery of the human spirit may be used for opposite ends; thus, aircraft can be used for air travel but also as targets of terrorism. A state that supports aviation terrorism is responsible for violation of International Aviation Law. Generally speaking, terrorism is a violation of international law. It violates the soverign rights of the states, and the human rights of the individuals. I think that aviation terrorism as becoming an ever more serious issue, has to be solved by internationally agreed and closely co-ordinated measures. We have to contribute more to the creation of a general consensus amongst all states about the need to combat the threat of aviation terrorism.

  • PDF

Ensuring the Admissibility of Mobile Forensic Evidence in Digital Investigation (모바일 포렌식 증거능력 확보 방안 연구)

  • Eo, Soowoong;Jo, Wooyeon;Lee, Seokjun;Shon, Taeshik
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.26 no.1
    • /
    • pp.135-152
    • /
    • 2016
  • Because of the evolution of mobile devices such as smartphone, the necessity of mobile forensics is increasing. In spite of this necessity, the mobile forensics does not fully reflect the characteristic of the mobile device. For this reason, this paper analyzes the legal, institutional, and technical considerations for figuring out facing problems of mobile forensics. Trough this analysis, this study discuss the limits of screening seizure on the mobile device. Also, analyzes and verify the mobile forensic data acquisition methods and tools for ensuring the admissibility of mobile forensic evidence in digital investigation.

The New Imperialism, New Security Strategy of the U.S., and the Future of East Asia (신제국주의, 미국의 신안보전략, 그리고 동아시아의 미래)

  • Byung-Doo Choi
    • Journal of the Korean Geographical Society
    • /
    • v.38 no.6
    • /
    • pp.887-905
    • /
    • 2003
  • In this paper, we first understand the concept of imperialism as a 'a dialectical relation between territorial and capitalistic logics of power', as suggested by Harvey, and its history with three phases, the last of which would be seen as the phase of new imperialism. Secondly, we examine the New Security Strategy of the U.S which can be seen as a reflection of the new imperialism of the U.S. with its neo-conservative Bush administration, and explain the wars in Afghanistan and Iraq as the implementation of the new imperialism. And then we take a close look on the current geopolitical situation of East Asia, especially North and South Korea, Japan and China, in terms of the new imperialist foreign policy of the Bush administration. Finally, we consider the limits of the new imperialism of the U.S. and globally emerging movements of anti-imperialism.

Performance Comparison of Machine Learning Algorithms for Network Traffic Security in Medical Equipment (의료기기 네트워크 트래픽 보안 관련 머신러닝 알고리즘 성능 비교)

  • Seung Hyoung Ko;Joon Ho Park;Da Woon Wang;Eun Seok Kang;Hyun Wook Han
    • Journal of Information Technology Services
    • /
    • v.22 no.5
    • /
    • pp.99-108
    • /
    • 2023
  • As the computerization of hospitals becomes more advanced, security issues regarding data generated from various medical devices within hospitals are gradually increasing. For example, because hospital data contains a variety of personal information, attempts to attack it have been continuously made. In order to safely protect data from external attacks, each hospital has formed an internal team to continuously monitor whether the computer network is safely protected. However, there are limits to how humans can monitor attacks that occur on networks within hospitals in real time. Recently, artificial intelligence models have shown excellent performance in detecting outliers. In this paper, an experiment was conducted to verify how well an artificial intelligence model classifies normal and abnormal data in network traffic data generated from medical devices. There are several models used for outlier detection, but among them, Random Forest and Tabnet were used. Tabnet is a deep learning algorithm related to receive and classify structured data. Two algorithms were trained using open traffic network data, and the classification accuracy of the model was measured using test data. As a result, the random forest algorithm showed a classification accuracy of 93%, and Tapnet showed a classification accuracy of 99%. Therefore, it is expected that most outliers that may occur in a hospital network can be detected using an excellent algorithm such as Tabnet.