• Title/Summary/Keyword: Sub-prime Security

Search Result 3, Processing Time 0.018 seconds

Professional Security Management and Investigation for the New Competitive Advantage

  • Button, Mark;Lee, Ju-Lak;Kim, Hak-Kyong
    • International Journal of Contents
    • /
    • v.7 no.3
    • /
    • pp.71-81
    • /
    • 2011
  • This paper is mainly associated with setting out an agenda for the transformation of security by creating a new framework for a security system, which can maximise its effectiveness. Noticeably, this research shows empirically that crimes are getting a major cost to organisations, which if reduced by security and investigations could reap substantial rewards to the finances of an organisation. However, the problem is that the delivery of security is frequently delegated to personnel (e.g. security guards) with limited training, inadequate education, and no real commitment to professionalism - 'sub-prime' security, finally causing security failures. Therefore, if security can be enhanced to reduce the crime cost, this will produce financial benefits to business, and consequently could produce a competitive advantage. For this, the paper basically draws upon Luke's theoretical framework for deconstructing 'power' into three dimensions. Using this three-dimensional approach, the paper further sets out a model of how security can be enhanced, utilising a new Security Risk Management (SRM) model, and how can this SRM model create competitive advantage in business. Finally, this paper ends with the six strategies needed to enhance the quality of security: refiguring as SRM, Professional Staff, Accurate Measurement, Prevention, Cultural Change, and Metrics.

A Security SoC supporting ECC based Public-Key Security Protocols (ECC 기반의 공개키 보안 프로토콜을 지원하는 보안 SoC)

  • Kim, Dong-Seong;Shin, Kyung-Wook
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.24 no.11
    • /
    • pp.1470-1476
    • /
    • 2020
  • This paper describes a design of a lightweight security system-on-chip (SoC) suitable for the implementation of security protocols for IoT and mobile devices. The security SoC using Cortex-M0 as a CPU integrates hardware crypto engines including an elliptic curve cryptography (ECC) core, a SHA3 hash core, an ARIA-AES block cipher core and a true random number generator (TRNG) core. The ECC core was designed to support twenty elliptic curves over both prime field and binary field defined in the SEC2, and was based on a word-based Montgomery multiplier in which the partial product generations/additions and modular reductions are processed in a sub-pipelining manner. The H/W-S/W co-operation for elliptic curve digital signature algorithm (EC-DSA) protocol was demonstrated by implementing the security SoC on a Cyclone-5 FPGA device. The security SoC, synthesized with a 65-nm CMOS cell library, occupies 193,312 gate equivalents (GEs) and 84 kbytes of RAM.

Evaluation of lines of NERICA 1 introgressed with Gn1a and WFP for yield and yield components as affected by nitrogen fertilization in Kenya

  • Makihara, Daigo;Samejima, Hiroaki;Kikuta, Mayumi;Kimani, John M.;Ashikari, Motoyuki;Angeles-Shim, Rosalyn;Sunohara, Hidehiko;Jena, Kshirod K.;Yamauchi, Akira;Doi, Kazuyuki
    • Proceedings of the Korean Society of Crop Science Conference
    • /
    • 2017.06a
    • /
    • pp.323-323
    • /
    • 2017
  • In many sub-Saharan African countries, boosting rice production is a pressing food security issue. To contribute to the increase in rice production, we have developed lines of NERICA 1 introgressed with the gene for spikelet number, Gn1a, and the gene for primary rachis-branch number, WFP by cross breeding. The performance of rice lines introgressed with the genes for yield related traits can be affected by cultivation environment and management. Thus, in this study, we aimed to evaluate the lines of NERICA 1 introgressed with Gn1a or/and WFP for yield and yield components under different nitrogen fertilization conditions in Kenya. A field trial was conducted at a paddy field in Kenya Agricultural and Livestock Research Organization-Mwea, Kirinyaga County ($0^{\circ}39^{\prime}S$, $0^{\circ}20^{\prime}E$) from August 2016 to January 2017. Eight lines of NERICA 1 introgressed with Gn1a and/or WFP, and their parents, NERICA 1 and ST12, were grown under 0 (NF) and $75(SF)kg\;N\;ha^{-1}$. At maturity, five hills per plot were harvested to determine the yield and yield components. The number of primary and secondary rachis-branches per panicle was measured on the longest panicle in each hill. Under SF, the introgression of WFP to NERICA 1 increased the number of primary and secondary rachis-branches by 27 and 25%, respectively. On the other hand, Gn1a did not increase the number of primary rachis-branches, whereas the number of secondary rachis-branches was increased by 38% on average. The number of primary and secondary rachis-branches of the lines introgressed with both genes increased by 25 and 56%, respectively. Although grain number per panicle increased 33% by Gn1a, 34% by WFP, and 43% by Gn1a+WFP, the yield increase by Gn1a, WFP, and Gn1a+WFP was only 14, 7, and 14%, respectively. The suppression of the yield increase was mainly attributed to the decline in the filled grain ratio. Under NF, WFP increased the number of primary and secondary rachis-branches by 20 and 19%, respectively. The introgression of both genes increased the former and the later by 19 and 35%, respectively. However, Gn1a did not change them under NF. Thus, even under NF, grain yield increased 11% by WFP and 24% by Gn1a+WFP due to the increased grain number although filled grain ratio declined. Our findings suggest that the introgression of Gn1a and WFP could contribute to the rice productivity improvement in sub-Saharan Africa even under low fertility conditions. Improving filled grain ratio of the lines introgressed with these genes by further breeding and fertilization management will be the focus of subsequent work.

  • PDF