• 제목/요약/키워드: Security major

검색결과 1,303건 처리시간 0.027초

어머니의 양육행동과 유아의 애착 및 사회적 능력과의 관계 (The Relationship between Mothers' Parenting Behavior and Prcschoolers' Attachmcnt Security and Social Compctence.)

  • 박응임
    • 대한가정학회지
    • /
    • 제36권3호
    • /
    • pp.117-130
    • /
    • 1998
  • The purpose of this study was to investigate the relationship between mothers' parenting behavior and preschoolers' attachment security to their mother and preschoolers' social competence. The sample were 44 mothers and their 49-56 months old preschoolers. The instruments for this study were the modified IPBI(Iowa Parent Behavior Inventory: Mother Form), the Attachment Q-set by Waters and the modified ISCS(Iowa Social Competence Scales: Preschool Form). The data were analyzed by frequency, t-test, Pearson's r, and Multiple Regression Analysis. Major findings were that the responsive maternal parenting behavior was positively related to the preschoolers' attachment security. The guidance of maternal parenting behavior was positively related preschoolers' social activator of social competence. And there were significant correlations between the preschoolers' attachment security and social competence. The attachment security was positively related to the socially activating and cooperative competence.

  • PDF

지능형 치안 서비스 기술 동향 (Trends of Intelligent Public Safety Service Technologies)

  • 방준성;박원주;윤상연;신지호;이용태
    • 전자통신동향분석
    • /
    • 제34권1호
    • /
    • pp.111-122
    • /
    • 2019
  • As society develops, the demand for safety and security services increases. Developed nations such as the United States use advanced technology to lower crime rate and promote intelligent security services. First, this article examines intelligent systems that are used for monitoring and detecting crimes and dangerous situations. Recently, we have been studying technologies that enable preemptive responses through prediction of crime and hazardous situations. In this paper, we examine the cases of security services based on a crime/risk prediction model and explain the structure and major technologies of an intelligent security system. In addition, we propose a direction for technological development for achieving future security services.

얼굴추출 및 인식 영상정보 시스템 상용화 성공요인 분석 (A Factor Analysis for the Success of Commercialization of the Facial Extraction and Recognition Image Information System)

  • 김신표;오세동
    • 산업융합연구
    • /
    • 제13권2호
    • /
    • pp.45-54
    • /
    • 2015
  • This Study aims to analyze the factors for the success of commercialization of the facial extraction and recognition image security information system of the domestic companies in Korea. As the results of the analysis, the internal factors for the success of commercialization of the facial extraction and recognition image security information system of the company were found to include (1) Holding of technology for close range facial recognition, (2) Holding of several facial recognition related patents, (3) Preference for the facial recognition security system over the fingerprint recognition and (4) strong volition of the CEO of the corresponding company. On the other hand, the external environmental factors for the success were found to include (1) Extensiveness of the market, (2) Rapid growth of the global facial recognition market, (3) Increased demand for the image security system, (4) Competition in securing of the engine for facial extraction and recognition and (5) Selection by the government as one of the 100 major strategic products.

  • PDF

A Study on the Development Plan of Smart City in Korea

  • KIM, Sun-Ju
    • 융합경영연구
    • /
    • 제10권6호
    • /
    • pp.17-26
    • /
    • 2022
  • Purpose: This study analyzes advanced cases of overseas smart cities and examines policy implications related to the creation of smart cities in Korea. Research design, data, and methodology: Analysis standards were established through the analysis of best practices. Analysis criteria include Technology, Privacy, Security, and Governance. Results: In terms of technology, U-City construction experience and communication infrastructure are strengths. Korea's ICT technology is inferior to major countries. On the other hand, mobile communication, IoT, Internet, and public data are at the highest level. The privacy section created six principles: legality, purpose limitation, transparency, safety, control, and accountability. Security issues enable urban crime, disaster and catastrophe prediction and security through the establishment of an integrated platform. Governance issues are handled by the Smart Special Committee, which serves as policy advisory to the central government for legal system, standardization, and external cooperation in the district. Conclusions: Private technology improvement and participation are necessary for privacy and urban security. Citizens should participate in smart city governance.

A Review on IoT: Layered Architecture, Security Issues and Protocols

  • Tooba Rashid;Sumbal Mustafa
    • International Journal of Computer Science & Network Security
    • /
    • 제23권9호
    • /
    • pp.100-110
    • /
    • 2023
  • The Internet of Things (IoT) is the most creative and focused technology to be employed today. It increases the living conditions of both individuals and society. IoT offers the ability to recognize and incorporate physical devices across the globe through a single network by connecting different devices by using various technologies. As part of IoTs, significant questions are posed about access to computer and user privacy-related personal details. This article demonstrates the three-layer architecture composed of the sensor, routing, and implementation layer, respectively, by highlighting the security risks that can occur in various layers of an IoT architecture. The article also involves countermeasures and a convenient comparative analysis by discussing major attacks spanning from detectors to application. Furthermore, it deals with the basic protocols needed for IoT to establish a reliable connection between objects and items.

Crop Science Approaches to Alleviate the Food Security Concerns in Korea

  • Hee-Jong Koh
    • 한국작물학회:학술대회논문집
    • /
    • 한국작물학회 2022년도 추계학술대회
    • /
    • pp.8-8
    • /
    • 2022
  • Unstable crop production and distribution affected by climate change and COVID-19 pandemic has raised the food security concerns worldwide. In particular, Russia's invasion to Ukraine has blocked the grain trade such as wheat and com to importing countries, which has aggravated the situation. Korea has relied on foreign imports for about 80% of domestic grain demand, raising great concerns on food security. Considering situations related to Korea's food security, some points in view of a crop scientist are suggested and discussed as follows; 1) Domestic production of major grain crops should be increased through encouraging farmers by appropriate governmental subsidy programs 2) International corporation should be strengthened and diversified for sustainable overseas agricultural development and for stable import even in case of food crisis and emergency. 3) Self-sufficiency target should be specified by law so that more budget investments could be put to alleviate the food security concerns. 4) Technologies for climate smart agriculture and for competitive agricultural products should be developed aided by social and governmental support.

  • PDF

Security Threat Analysis for Remote Monitoring and Control Functions of Connected Car Services

  • Jin Kim;Jinho Yoo
    • Journal of Information Processing Systems
    • /
    • 제20권2호
    • /
    • pp.173-184
    • /
    • 2024
  • The connected car services are one of the most widely used services in the Internet of Things environment, and they provide numerous services to existing vehicles by connecting them through networks inside and outside the vehicle. However, although vehicle manufacturers are developing services considering the means to secure the connected car services, concerns about the security of the connected car services are growing due to the increasing number of attack cases. In this study, we reviewed the research related to the connected car services that have been announced so far, and we identified the threats that may exist in the connected car services through security threat modeling to improve the fundamental security level of the connected car services. As a result of performing the test to the applications for connected car services developed by four manufacturers, we found that all four companies' applications excessively requested unnecessary permissions for application operation, and the apps did not obfuscate the source code. Additionally, we found that there were still vulnerabilities in application items such as exposing error messages and debugging information.

u-Eco City에서의 정보보호 정책 (Information Security Policy in Ubiquitous-Ecological City)

  • 장희선
    • 융합보안논문지
    • /
    • 제12권1호
    • /
    • pp.43-48
    • /
    • 2012
  • 본 논문에서는 u-Eco(ubiquitous ecological) City에서의 정보보호 정책을 제시한다. 이를 위하여 먼저, 다양한 유비쿼터스 도시의 정의를 살펴보고 u-Eco City의 개념, 주요 서비스 및 추진 과제를 정리한다. 그리고 유비쿼터스 서비스를 제공하기 위해 중추적인 역할을 수행하는 통합운영센터의 프레임워크를 제시하고, 센터에서의 개인정보 및 사생활 보호, 데이터 보호, 망설비 보호와 관련된 요구사항을 분석한다. 기존 정보보호 알고리즘과 달리 u-Eco City에서 운영되는 USN(ubiquitous sensor network)에서 정보의 수집, 가공 및 제공시 경량화된 암호화 알고리즘을 이용한 정보보호 기술(블록/스트림 암호화, 의사난수 생성기, 해쉬함수 및 공개키 암호화 등)이 요구되며 개인정보의 기밀성과 인증성을 보장해주기 위한 정책이 사전에 마련되어야 함을 알 수 있다.

보안 전술과 Broker 아키텍처 패턴간의 호환성 분석 (Compatibility Analysis Between Security Tactics and Broker Architecture Pattern)

  • 김순태
    • 한국인터넷방송통신학회논문지
    • /
    • 제15권4호
    • /
    • pp.19-24
    • /
    • 2015
  • 보안은 소프트웨어 개발에 있어서 주요한 관심사중 하나이다. 보안 전술(Security tactics)은 아키텍처 수준에서 보안의 문제를 해결하기 위한 재사용 가능한 빌딩 블록으로, 소프트웨어 시스템의 구조를 수립하기 위한 일반적인 해결책인 아키텍처 패턴(Architectural Pattern)과 자주 함께 사용된다. 하지만, 아키텍처 패턴에서의 아키텍처 전술은 패턴이나 전술 참여자들이 구조적/행위적으로 어떻게 함께 설계되어야 하는지에 대한 구체적인 이해 없이 보통 개념적으로만 이해되고 만다. 본 논문에서는 대표적인 아키텍처 패턴중 하나인 Broker패턴에서 이와 함께 사용 가능한 보안 전술을 모델 기반으로 표현하고, 실세계에서 어떻게 이 개념이 적용되었는지에 대한 구체적인 사례를 소개한다.

원스톱 보안(One-Stop Security) 도입을 통한 항공화물 공급망 보안체계 강화 연구 - ICAO 국제기준 및 EU 사례를 중심으로 - (A Study on Securing of Air Cargo Supply Chain by Adapting One-Stop Security - Focusing on ICAO SARPs and EU Case -)

  • 박만희;이승열;허백용;황호원
    • 한국항공운항학회지
    • /
    • 제28권3호
    • /
    • pp.18-26
    • /
    • 2020
  • Cost reduction and equality by exempting re-scanning of passengers, baggage and cargo secured from the first airport of departure, mainly in the European Union/European Economic Area(EU/EEA), Switzerland, etc. One-Stop Security(OSS) is being promoted to maintain the level of security while increasing speed and convenience, and movement is expected to expand worldwide. Therefore, this paper establishes the basic concept of OSS through a literature review of ICAO Standards and Recommended Practices(SARPs), and analyzes the actual conditions of OSS implementation in major countries such as the United States and the EU. It is intended to present the political, economic benefits for Korea and highlight the urgency of implementing the OSS system in the aviation industry including the cargo sector. Therefore, the practical implications of strengthening international cooperation through the expansion of government and airport operators OSS implementation to overcome the resource shortage problem of the existing national air cargo security system and to strengthen the status as a global aviation powerhouse were drawn up. There is academic significance that it raised the need for effective implementation of OSS, which was not previously covered.