• Title/Summary/Keyword: Societal Security

Search Result 161, Processing Time 0.031 seconds

A Study on the Validity and Utility of Urban Plan Facilities for Prevention of Disaster (재해예방을 위한 도시계획시설의 타당성과 효용성에 관한 연구)

  • Choi, Woong;Park, Jeong Yong;Kim, Young Gyun
    • Journal of Korean Society of societal Security
    • /
    • v.4 no.1
    • /
    • pp.57-65
    • /
    • 2011
  • Studying the operation of urban control plan and control program of urban plan facilities to present development direction of urban plan in the future by performing multi-variate analysis, the research acquired the following conclusion. It is required to institutionally activate the inhabitants' participation by reflecting spontaneous participation and opinion of inhabitants to adminstration so that the effect of business can be maximized in the stage of establishing urban control plan. Furthermore, the participation of role dividing type is necessary to adjust and connect the interest of expert that has experience in practical business of overall urban plan, inhabitant and self-governing body. It is required to reduce the service supplied by government so as to enhance policy of plan-first and development last for facilities with high importance and utility such as road, park and water supply/sewage, etc as well as to seek control program that expands the participation of private sector for administration for which private service is possible.

  • PDF

Environmental and Socioeconomic Determinants of Grain Virtual Water Trade: An Empirical Analysis using Decomposition and Decoupling Model

  • Golden Odey;Bashir Adelodun;Seulgi Lee;Kyung Sook Choi
    • Proceedings of the Korea Water Resources Association Conference
    • /
    • 2023.05a
    • /
    • pp.394-394
    • /
    • 2023
  • The world's sustainable growth is being severely hampered by the inefficient use of water resources. Despite the widely acknowledged importance of trade in global and regional water and food security, societal reliance on local production as well as international trade remains inadequately assessed. Therefore, using South Korea as a case study, this study fills in this research gap by applying the virtual water concept, the logarithmic mean divisia index (LMDI) method, and the Tapio decoupling model. The virtual water concept was used to estimate South Korea's net virtual water trade for major grain crops from 1992 to 2017. Then, the LMDI method was utilized to assess the driving factors causing changes in net virtual water trade. Lastly, the Tapio decoupling model was used to investigate the decoupling relationships between economic growth and the driving factors of net virtual water trade. Results showed that South Korea remains a net importer of virtual water flows with respect to grain crops, with an average import of 16,559.24 million m3 over the study period. In addition, the change in net virtual water trade could be attributed to water intensity effect, product structure effect, economic effect, and population effect. However, water intensity and economic effects were the major decisive factors for decrease and increase in net virtual water trade respectively, while the population and product structure effects had minor positive influences on the net virtual water trade. Furthermore, water intensity and economic growth showed a strong decoupling in most periods, while the decoupling state between product structure and economic growth was observed as expansive negative decoupling. Likewise, population size and economic growth showed a weak decoupling in most periods. The results reveal South Korea's status as it concerns the virtual water trade of grain crops, thus providing valuable insights into the sustainability of trade activities for the management of local water resources.

  • PDF

A Study on IAM-Based Personal Data Protection Techniques in BaaS (BaaS에서 IAM을 이용한 개인정보 보호 기법에 관한 연구)

  • Mi-Hui Kim;Myung-Joe Kang
    • Journal of IKEEE
    • /
    • v.27 no.4
    • /
    • pp.548-555
    • /
    • 2023
  • With the advancement of the internet, the use of personal information in online interactions has increased, underscoring the significance of data protection. Breaches of personal data due to unauthorized access can result in psychological and financial damage to individuals, and may even enable wide-ranging societal attacks aimed at those associated with the victims. In response to such threats, there is active research into security measures using blockchain to safeguard personal information. This study proposes a system that uses middleware and IAM (Identity and Access Management) services to protect personal information in a BaaS (Blockchain as a Service) environment where blockchain is provided via the Internet. The middleware operates on servers where IAM roles and policies are applied, authenticates users, and performs access control to allow only legitimate users to access blockchain data existing in the cloud. Additionally, to understand the impact of the proposed personal information protection method on the system, we measure the response time according to the time taken and the number of users under three assumed scenarios, and compare the proposed method and research related to personal information protection using blockchain in terms of security characteristics such as idea, type of blockchain, authentication, and confidentiality.

Trends in Cryptocurrency Custody Services and Evaluation Guidelines for DeFi Protocols' Custody Poten (가상자산 커스터디 서비스의 최신 동향 및 DeFi 프로토콜 커스터디 가능성 평가 가이드라인 제시)

  • Hyunggeun Lee;Moonho Joo;Jihun Lim;Beomjoong Kim;Kiseok Jeon;Junsik Sim;Junghee Lee
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.34 no.4
    • /
    • pp.811-831
    • /
    • 2024
  • This paper has two main objectives. The primary objective is to conduct a comprehensive review of existing survey papers on the advantages, disadvantages, taxonomy, and technical vulnerabilities of cryptocurrency custody services. Additionally, we examined recent regulatory developments, the application of existing frameworks, conditions for performing custody services, and service providers' obligations. The secondary objective is to identify DeFi protocols in the regulatory 'grey area' and analyze their technical aspects and governance mechanisms. By synthesizing these findings, we propose guidelines for assessing DeFi decentralization and their potential for integration within the regulatory framework, providing insights for industry experts, regulators, and policymakers to balance industry needs with societal benefits.

Consumers' Perception of Fashion Companies' Sustainability and Its Effect on Trust, Preference, and Purchase Intention (패션기업의 지속가능성에 대한 소비자 인식이 신뢰, 선호도 및 구매의도에 미치는 영향)

  • Suk, HyoJung
    • Journal of the Korean Society of Clothing and Textiles
    • /
    • v.39 no.5
    • /
    • pp.656-671
    • /
    • 2015
  • Discussions on sustainability in the fashion industry highlight the need for a holistic and strategic approach. This study investigated consumers' perception of fashion companies' sustainability and its relationship with value and perceived consumer effectiveness as well as with consumer trust, preference, and purchase intention. The assessment scale of fashion companies' sustainability was developed for this study and data were obtained from 645 consumers in their 20's to 60's in Korea. As a result, consumers' value and perceived consumer effectiveness had significant effects on consumers' perception of fashion companies' sustainability. Universalism, security/benevolence and perceived consumer effectiveness were variables that had significant effects on all four dimensions of sustainability. Consumer's perception of fashion companies' sustainability significantly influenced consumer trust, preference and purchase intention. Especially, environmental, societal, and cultural sustainability (rather than economic dimension) were shown to have a greater impact on consumers' trust, preference and purchase intention.

Intrusion Detection Algorithm based on Motion Information in Video Sequence (비디오 시퀀스에서 움직임 정보를 이용한 침입탐지 알고리즘)

  • Kim, Alla;Kim, Yoon-Ho
    • Journal of Advanced Navigation Technology
    • /
    • v.14 no.2
    • /
    • pp.284-288
    • /
    • 2010
  • Video surveillance is widely used in establishing the societal security network. In this paper, intrusion detection based on visual information acquired by static camera is proposed. Proposed approach uses background model constructed by approximated median filter(AMF) to find a foreground candidate, and detected object is calculated by analyzing motion information. Motion detection is determined by the relative size of 2D object in RGB space, finally, the threshold value for detecting object is determined by heuristic method. Experimental results showed that the performance of intrusion detection is better one when the spatio-temporal candidate informations change abruptly.

Internet Governance in the light of Human Rights (인권적 관점에서 본 인터넷 거버넌스)

  • Park, Seong Hoon
    • Review of Korean Society for Internet Information
    • /
    • v.14 no.3
    • /
    • pp.52-57
    • /
    • 2013
  • Information and Communication Technologies(ICTs) have substantially enlarged both the opportunities to realize one's human rights but have also resulted in the emergence of new challenges. ICTs are so deeply embedded and cental to almost all aspects of human activity. And ICTs are assuming an increasingly central role in all aspects of human and societal development across the world. But this is especially true of the right to privacy, which faces challenges such as profiling and data mining for public(including national security) and private purposes. ICTs access is a fundamental right for all humans in the information age. So we have need for regulation based on human rights in the digital age. And governments have a responsibility to protect individuals against violations of human rights and data protection by public authorities, but also by private entities. In addition, internet governance and multi-stakeholder principle have to be stressed on all of the internet issues because internet governance is included in the principle of democracy which have bottom-up communication and equality. So it is very importance that Internet Governance Forum is the space for a meaningful discussion on public policy issues relating to the internet.

  • PDF

A Critical Approach on Family Support, Social Security, and its Direction: Focusing on Old Parents and Children from Divorced Families (가족부양 쟁점에 관한 일고찰: 노인과 이혼가족 아동을 중심으로)

  • Song, Da-Young
    • Korean Journal of Social Welfare
    • /
    • v.57 no.2
    • /
    • pp.143-164
    • /
    • 2005
  • The study is to analyze support-related issues, particularly associated with elderly and children care, which have been a fundamental agenda of family welfare policy. We are expected for societal-level controversy on the relationship of family support and social security in the near future because of rapid increase in ageing and divorce rate. Accordingly, we need to establish social consensus on the extent to which both family support system and social support system are responsible for the life maintenance of the elderly and the children from divorced family. We also clarify the various characteristics(including scope, degree, period of time, and need/manageability) of support provided by family members. Considering the changes of family structure and population composition, the policy of supporting the old and children should go for social responsibility. Findings show that civil law and social welfare law have unclear application on the relationship between family support and social security, and contents in family support. In particular, public assistance law strongly emphasizes the principle of family support while social insurance laws provide only limited and insufficient family maintenance. The suggestions of further study on support-related issues are given in the rapidly changing society and the increasing economic instability.

  • PDF

CCTV and Privacy - Tools for Security or Eyes of Surveillance? - (CCTV와 프라이버시 - 안전을 위한 도구인가, 감시의 눈인가? -)

  • Lee, Yun-bok
    • Journal of Korean Philosophical Society
    • /
    • v.143
    • /
    • pp.215-244
    • /
    • 2017
  • It is said that we live in an age of technology. And indeed, science and technology do play key roles to our life of happiness, but they are equally central in all events that threaten it. Science and technology are the means we often turn to in seeking solutions to our problems, and in turn are often the apparent sources of new problems. Thus it is not surprising that they have two aspects at the same time. CCTV has been presented to us as a technical solution to security problems. With the help of CCTV, we can more effectively prevent, detect, and prosecute crimes. With the help of CCTV, both public and private spaces can be made more secure. But of course, CCTV also has a down side. The down side most prominently anticipated has been loss of privacy and proliferation of surveillance. It is largely this potential problem with CCTV that has been regulated against. It is said that one reason for imposing a limitation on individual privacy is the societal interest in the prevention of crime. Accordingly a balance between the need to prevent crime through the use of CCTV and the duty to respect the privacy interests of individual citizens is in need of redress. In other hand, two theories of socio-political philosophy may have provided useful ways of understanding the role of CCTV in contemporary society. Firstly, neo-Marxist frameworks, for instance, stress the use of CCTV to police existing unequal socioeconomic divisions within society and the dominance of particular forms of order based upon materialist agendas. Secondly, Foucauldian frameworks contend that Foucault's notion of panoptic surveillance underpinning (self) disciplinary society is an appropriate template for understanding CCTV in late-modern society. In order to find a new point of valance between security and privacy in the use of CCTV, the participation of each citizen in the discourse to make the new norm is necessary. And to prevent its political misuse, their surveillance, or check for the potential surveillance-power is required.

How to improve carrier (telecommunications) billing services to prevent damage (통신과금서비스의 피해예방을 위한 개선방안)

  • Yoo, Soonduck;Kim, Jungil
    • Journal of Digital Convergence
    • /
    • v.11 no.10
    • /
    • pp.217-224
    • /
    • 2013
  • Due to the development of mobile technologies, the carrier (telecommunications) billing service market is rapidly growing. carrier (telecommunications) billing service allows users to make on-line purchases through mobile-billing. Users find this particularly convenient because the payment acts as a credit transaction. Furthermore, the system is commonly believed to be secure through its use of SMS (Short Message Service) authentication and a real-time transaction history to confirm the transaction. Unfortunately, there is a growing number of fraudulent transactions threaten the future of this system. The more well documented types of security breaches involves hackers intercepting the authentication process. By contaminating the device with security breaching applications, hackers can secretly make transactions without notifying users until the end of month phone bill. This study sheds light on the importance of this societal threat and suggests solutions. In particular, "secure" systems need to be more proactive in addressing the methods hackers use to make fraudulent transactions. Our research partially covers specific methods to prevent fraudulent transactions on carrier billing service providers' systems. We discuss about the proposed improvements such as complement of electronic payment systems, active promotion for fraudulent transactions enhanced monitoring, fraud detection and introduce a new authentication service. This research supports a future of secure communications billing services, which is essential to expanding new markets.