• Title/Summary/Keyword: Social Security Platform

Search Result 77, Processing Time 0.034 seconds

A Study on the Policy Alternatives for Intelligent National Territorial Disaster Prevention in Preparation for Future Disaster (미래형 재난에 대비한 국토방재 지능화 정책대안 고찰 연구)

  • Byoung Jae Lee
    • Journal of Korean Society of Disaster and Security
    • /
    • v.16 no.1
    • /
    • pp.37-48
    • /
    • 2023
  • The possibility of a super-large disaster is increasing due to changes in national territory, urban space and social environment, extreme weather conditions due to climate change, and paralysis of national infrastructure due to natural disasters. In this study, in order to support the systematic establishment of national territorial disaster prevention strategies for future disasters, alternatives to intelligent national territorial disaster prevention policies for future disasters were considered. Changes in the national environment related to future disasters, domestic and foreign prior studies and policy trends related to national disaster prevention, and studies related to the national disaster management system were investigated, and institutional and technical policy alternatives were derived. As a policy alternative, it was suggested that the creation of a self-adapting national territory for future disasters should be systematized and continuously supported through a technically intelligent decision-making support system.

Mid to Long Term R&D Direction of UAV for Disaster & Public Safety (재난치안용 무인기 중장기 연구개발 방향)

  • Kim, Joune Ho
    • Journal of Aerospace System Engineering
    • /
    • v.14 no.5
    • /
    • pp.83-90
    • /
    • 2020
  • Disasters are causing significant damage to the lives and property of our society and are recognized as social problems that need to be solved nationally and globally. The 4th industrial revolution technologies affecting society as a whole such as the Internet of Things(IoT), Artificial Intelligence(AI), Drones(Unmanned Aerial Vehicles), and Big Data are continuously absorbed into the disaster and safety industries as scientific and technological tools for solving social problems. Very soon, twenty-nine domestic UAV-related organizations/companies will complete the construction of a multicopter type small UAV integrated system ('17~'20) that can be operated at disaster and security sites. The current work considers and proposes the mid-to-long term R&D direction of disaster UAV as a strategic asset of the national disaster response system. First, the trends of disaster and safety industry and policy are analyzed. Subsequently, the development status and future plans of small UAV, securing shortage technology, and strengthening competitiveness are analyzed. Finally, step-by-step R&D direction of disaster UAV in terms of development strategy, specialized mission, platform, communication, and control and operation is proposed.

The Influential Relations on Sharing Economy and Consumer Traits (공유경제와 소비자의 특성과의 영향 관계)

  • LI, Qing-Zhu;Lee, Jong-Ho
    • The Journal of Industrial Distribution & Business
    • /
    • v.8 no.6
    • /
    • pp.75-86
    • /
    • 2017
  • Purpose - The purpose of this study is to grasp the concept, characteristics and application status of sharing economy, and to derive a research model based on sharing economic service, and to analyze factors and influences of consumers' intention to reuse of sharing economy. Research design, data, and methodology - The questionnaires were created to examine variables for practical and theoretical implications. After pilot survey, conducted for 24 days from March 10th to April 2st in 2017, total numbers were 377. But 330 copies were used for the analysis with IBM SPSS Statistics 23.0 and IBM SPSS AMOS 23.0. The structural equation model was applied for this. Results - First, sharing economic services remain at an early stage, but it is meaningful to identify the revenue mechanism of the business model of the sharing economic platform. Second, in this study, it is meaningful that we systematized the theoretical structure by examining existing studies on the characteristics of the sharing economic service and consumer characteristics, and by examining empirically. Third, Satisfaction and Reliability are related to the characteristics of Sharing Economic Service (Security, Convenience, Discount, Sharing, Social Interaction), Consumer Characteristics (Personal Innovation, Word-of-Mouth) It is meaningful to broaden the understanding of the factors by verifying the mediating effect. Fourth, the sharing economy business is meaningful in that it is a new consumption trend that changes the meaning of consumption to consumers. Gradually, more and more people are recalling that purchasing something is not consumption, but sharing and borrowing is also consumption. In other words, through the sharing economy, consumers can experience more products and services, have more choices, and are expected to have a positive impact on economic growth by increasing the utilization of idle resources. Conclusions - Currently, the sharing economy is growing rapidly all over the world. Therefore, in the subsequent study, it is necessary to compare Korea and China's sharing economy and study the cultural and social characteristics of Korea and China. In particular, I think that steady research is necessary for more precise and specific direction on the influence of the shared economy.

Type Analysis and Countermeasures of Side Effects of using Smart Phone (스마트폰 이용의 부작용 유형 분석 및 대응 방안)

  • Kim, Tae-Hee;Kang, Moon-Seol
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.17 no.12
    • /
    • pp.2984-2994
    • /
    • 2013
  • The emergence of smart phones has brought about a revolution in introducing a computer into the palm of a hand, and this revolution has lead to a smart society that offers comfort and joy in life; however, some side effects including a smart phone syndrome have been identified on a wider and more varied scale compared with any other IT devices of the past. This paper deduced side effect types and key issues according to type focusing on risk factors in accordance with the purpose of the use of smart phones, and diagnosed social effects based on them. In addition, based on the diagnosed results, the study proposed solutions to minimize side effects in order to produce social understanding and sympathy concerning the desirable utilization of smart phones. The proposed solutions should be able to cope with visible and potential side effects systematically by helping people to utilize smart phones, which are a platform of creativity, cooperation, communications, and entertainments, in a desirable way.

Android Malware Detection Using Auto-Regressive Moving-Average Model (자기회귀 이동평균 모델을 이용한 안드로이드 악성코드 탐지 기법)

  • Kim, Hwan-Hee;Choi, Mi-Jung
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.40 no.8
    • /
    • pp.1551-1559
    • /
    • 2015
  • Recently, the performance of smart devices is almost similar to that of the existing PCs, thus the users of smart devices can perform similar works such as messengers, SNSs(Social Network Services), smart banking, etc. originally performed in PC environment using smart devices. Although the development of smart devices has led to positive impacts, it has caused negative changes such as an increase in security threat aimed at mobile environment. Specifically, the threats of mobile devices, such as leaking private information, generating unfair billing and performing DDoS(Distributed Denial of Service) attacks has continuously increased. Over 80% of the mobile devices use android platform, thus, the number of damage caused by mobile malware in android platform is also increasing. In this paper, we propose android based malware detection mechanism using time-series analysis, which is one of statistical-based detection methods.We use auto-regressive moving-average model which is extracting accurate predictive values based on existing data among time-series model. We also use fast and exact malware detection method by extracting possible malware data through Z-Score. We validate the proposed methods through the experiment results.

A study on the policy implementation strategy through public participation (정부의제의 국민참여를 통한 정책화 추진 전략에 관한 연구)

  • Lee, Hyangsoo;Lee, Seong-Hoon;Jung, Yonghun
    • Journal of Digital Convergence
    • /
    • v.20 no.4
    • /
    • pp.45-54
    • /
    • 2022
  • This study examines the actual operation and performance of the public participation platform by analyzing various public participation processes from 2018 to 2021, when 'Gwanghwamun 1st Street', a representative public participation platform operated by the Ministry of Public Administration and Security, was launched. Through this, the influencing factors that were able to successfully induce the process of policyization through public participation were derived as follows. First, online participation channels were diversified to encourage public participation. Second, it is also important that the public opinion contest and compensation for public review were implemented to encourage and expand public participation. Third, the participation of experts was encouraged to refine and refine the people's ideas. Through these research results, it is judged that the Korean government will be able to contribute to inducing the policyization process through continuous public participation. In deriving success factors for policyization through public participation in the future, how influencing factors such as the public participation process, communication through online channels, and collaboration with experts affect the public participation process using quantitative analysis techniques A study to prove it will have to be conducted subsequently.

Indicator-based Behavior Ontology for Detecting Insider Threats in Network Systems

  • Kauh, Janghyuk;Lim, Wongi;Kwon, Koohyung;Lee, Jong-Eon;Kim, Jung-Jae;Ryu, Minwoo;Cha, Si-Ho
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.10
    • /
    • pp.5062-5079
    • /
    • 2017
  • Malicious insider threats have increased recently, and methods of the threats are diversifying every day. These insider threats are becoming a significant problem in corporations and governments today. From a technology standpoint, detecting potential insider threats is difficult in early stage because it is unpredictable. In order to prevent insider threats in early stage, it is necessary to collect all of insiders' data which flow in network systems, and then analyze whether the data are potential threat or not. However, analyzing all of data makes us spend too much time and cost. In addition, we need a large repository in order to collect and manage these data. To resolve this problem, we develop an indicator-based behavior ontology (IB2O) that allows us to understand and interpret insiders' data packets, and then to detect potential threats in early stage in network systems including social networks and company networks. To show feasibility of the behavior ontology, we developed a prototype platform called Insider Threat Detecting Extractor (ITDE) for detecting potential insider threats in early stage based on the behavior ontology. Finally, we showed how the behavior ontology would help detect potential inside threats in network system. We expect that the behavior ontology will be able to contribute to detecting malicious insider threats in early stage.

Nano Convergence Systems for Smart Living

  • Yeo, Jong-Souk
    • Proceedings of the Korean Vacuum Society Conference
    • /
    • 2015.08a
    • /
    • pp.55-55
    • /
    • 2015
  • Today, engineers are facing new set of challenges that are quite different from the conventional ones. Information technologies are rapidly commoditizing while the paths beyond the current roadmaps became uncertain as various technologies have been pushed to their limits. Along with these changes in IT ecosystems, grand challenges such as global security, health, sustainability, and energy increasingly require trans-disciplinary solutions that go beyond the traditional arenas in STEM (Science, Technology, Engineering and Mathematics). Addressing these needs is shifting engineering education and research to a new paradigm where the emphasis is placed on the consilience for holistic and system level understanding and the convergence of technology with AHSD (arts, humanities, social science, and design). At the center of this evolutionary convergence, nanotechnologies are enabling novel functionalities such as bio-compatibility, flexibility, low power, and sustainability while on a mission to meet scalability and low cost for smart electronics, u-health, sensing networks, and self-sustainable energy systems. This talk introduces the efforts of convergence based on the emerging nano technology tool sets in the newly launched School of Integrated Technology and the Yonsei Institute of Convergence Technology at Yonsei International Campus. While the conventional devices have largely depended upon the inherent material properties, the newer devices are enabled by nanoscale dimensions and structures in increasingly standardized and scalable fabrication platform. Localized surface plasmon resonance in 0 dimensional nano particles and structures leads to subwavelength confinement and enhanced near-field interactions enabling novel field of metal photonics for sensing and integrated photonic applications [1,2]. Unique properties offered by 1 dimensional nanowires and 2 dimensional materials and structures can enable novel electronic, photonic, nano-bio, and biomimetic applications [3-5]. These novel functionalities offered by the emerging nanotechnologies are continuously finding pathways to be part of smart systems to improve the overall quality of life.

  • PDF

Technology Trends, Research and Design of AIM Framework for Authentication Information Management (인증 정보 관리를 위한 기술 동향과 AIM 프레임워크 연구 및 설계)

  • Kim, Hyun-Joong;Cha, Byung-Rae;Pan, Sung-Bum
    • Journal of Digital Convergence
    • /
    • v.14 no.7
    • /
    • pp.373-383
    • /
    • 2016
  • With mobile-epoch and emerging of Fin-tech, Bio-recognition technology utilizing bio-information in secure method has spread. Specially, In order to change convenient payment services and transportation cards, the combination of biometrics and mobile services are being expanded. The basic concept of authentication such as access control, IA&A, OpenID, OAuth 1.0a, SSO, and Biometrics techniques are investigated, and the protocol stack for security API platform, FIDO, SCIM, OAuth 2.0, JSON Identity Suite, Keystone of OpenStack, Cloud-based SSO, and AIM Agent are described detailed in aspect of application of AIM. The authentication technology in domestic and foreign will accelerate technology development and research of standardization centered in the federated FIDO Universal Authentication Framework(UAF) and Universal 2 Factor Framework(U2F). To accommodate the changing needs of the social computing paradigm recently in this paper, the trends of various authentication technology, and design and function of AIM framework was defined.

An Empirical Analysis on the Compromised Delivery Model of Traditional Market Using Delivery Application (배달앱을 활용한 전통시장 배송 모형에 관한 실증분석)

  • YOO, Chang-Kwon;KIM, Gi-Pyoung
    • The Journal of Industrial Distribution & Business
    • /
    • v.10 no.10
    • /
    • pp.45-51
    • /
    • 2019
  • Purpose - The purpose of this study was to propose a win-win development plan for not only suppliers of delivery applications but also traditional market vendor companies and delivery riders by analyzing existing delivery models and presenting a new delivery model to enhance competitiveness of the traditional market using delivery apps. Research desgin, data, and methodology - Specifically, small retailers, such as traditional markets and supermarkets, presented a compromised delivery model that utilizes the platform of specialized delivery app service providers for order reception, and that the delivery is delivered by delivery systems jointly hired by Vendor companies, such as franchising companies. To validate the significance of the trade-off delivery model, a cost-benefit analysis was conducted by those involved in the delivery application. Results - From the perspective of suppliers of specialized delivery applications, it is analyzed that the use of specialized delivery applications in traditional markets will be a new market opportunity for service providers to achieve increased sales. It is expected that consumer choice and satisfaction will be increased as convenience and accessibility of traditional market businesses that were available only through direct visit from the user side of the delivery application will be expanded. From the standpoint of delivery application franchises, it is analyzed that they can seek to increase sales and increase customer service as well as ease labor cost burden due to joint employment of delivery riders. The delivery rider will be able to seek to improve customer service due to job security, wage stability, risk reduction and overheated competition due to direct employment. Conclusion - In conclusion, the compromised delivery model solved the problems raised in the preceding study conducted on delivery application suppliers, users, franchises, and riders to establish that it could be a strategic alternative to increasing sales and expanding detailed rights for the self-employed in the traditional market, which are experiencing difficulties in management. However, the adoption of a compromise delivery model requires social consensus from those involved in the delivery application and requires legal, institutional and policy support, which will require continued follow-up research on the delivery model in the future.