• 제목/요약/키워드: Technological Security

검색결과 403건 처리시간 0.023초

코로나19와 플라스틱 배출량과의 상관관계 분석: 업사이클 (Correlation Analysis between COVID-19 and Plastic Emissions: Upcycle)

  • 이지현;황승연;김정준
    • 한국인터넷방송통신학회논문지
    • /
    • 제22권5호
    • /
    • pp.165-170
    • /
    • 2022
  • 환경부는 코로나19 발생 초기인 2020년 2월 지자체가 한시적으로 일회용품 사용을 허용할 수 있게 하였다. 그러나 코로나19 기간 생활 폐기물이 증가하자, 무분별한 일회용품 사용을 줄이기 위해 다시 사용을 금지하는 '일회용품 사용규제 제외대상' 개정안을 올해 1월 고시하였다. 이렇게 플라스틱의 사용량이 기존보다 더 많아지고 시민들마저 편리함에 익숙해져 오히려 더 일회용품 사용을 원하는 상황에 이르렀다. 하지만, 이러한 코로나19 확산과 이전보다 더욱 심각해지는 환경문제에 대한 중요성이 높아지면서 친환경 '업사이클'제품이 주목받고 있다. 본 연구에서는 코로나로 증가한 플라스틱, 플라스틱 배출량의 변화로 인한 업사이클 산업에 대해서 연관성을 파악하고 이를 대시보드로 나타내고자 한다. 이를 통해 대시보드를 구성하는 각 시각화를 제작하고 환경보호와 지속가능한 친환경 제품, 업사이클 산업 및 문화에 대해서 알리기가 가능할 것으로 기대된다.

Fifteen Deadly Cybersecurity Threats Aimed Covid-19

  • Alaboudi, Abdulellah A.
    • International Journal of Computer Science & Network Security
    • /
    • 제21권12호
    • /
    • pp.123-130
    • /
    • 2021
  • Cybersecurity has been vital for decades and will remain vital with upcoming ages with new technological developments. Every new day brings advancement in technology, which leads to new horizons, and at the same time, it brings new security challenges. Numerous researchers around the globe are continuously striving hard to provide better solutions for the daily basis of new arising security issues. However, the challenges are always there. These challenges become new norms during the current Covid pandemic, where most industries, small industrial enterprises, education, finance, public sectors, etc. were under several attacks and threats globally. The hacker has more opportunities during the pandemic period by shifting most of the operations live. This research enlightened the several cybersecurity attacks and threats during this pandemic time globally. It provided the best possible recommendations to avoid them using the cyber awareness and with appropriately linked training. This research can provide a guideline to the above stated sector by identifying the related attacks.

지능형 치안 서비스 기술 동향 (Trends of Intelligent Public Safety Service Technologies)

  • 방준성;박원주;윤상연;신지호;이용태
    • 전자통신동향분석
    • /
    • 제34권1호
    • /
    • pp.111-122
    • /
    • 2019
  • As society develops, the demand for safety and security services increases. Developed nations such as the United States use advanced technology to lower crime rate and promote intelligent security services. First, this article examines intelligent systems that are used for monitoring and detecting crimes and dangerous situations. Recently, we have been studying technologies that enable preemptive responses through prediction of crime and hazardous situations. In this paper, we examine the cases of security services based on a crime/risk prediction model and explain the structure and major technologies of an intelligent security system. In addition, we propose a direction for technological development for achieving future security services.

A Systematic Review on Human Factors in Cybersecurity

  • Alghamdi, Ahmed
    • International Journal of Computer Science & Network Security
    • /
    • 제22권10호
    • /
    • pp.282-290
    • /
    • 2022
  • A huge budget is spent on technological solutions to protect Information Systems from cyberattacks by organizations. However, it is not enough to invest alone in technology-based protection and to keep humans out of the cyber loop. Humans are considered the weakest link in cybersecurity chain and most of the time unaware that their actions and behaviors have consequences in cyber space. Therefore, humans' aspects cannot be neglected in cyber security field. In this work we carry out a systematic literature review to identify human factors in cybersecurity. A total of 27 papers were selected to be included in the review, which focuses on the human factors in cyber security. The results show that in total of 14 identified human factors, risk perception, lack of awareness, IT skills and gender are considered critical for organization as for as cyber security is concern. Our results presented a further step in understanding human factors that may cause issues for organizations in cyber space and focusing on the need of a customized and inclusive training and awareness programs.

선박설계를 위한 인터넷기반의 협동설계시스템에 관한 연구 (A Study on the Internet Based Cooperation-Design system for Ship Design)

  • 조민철;박제웅;이근무;김영훈
    • 한국해양공학회지
    • /
    • 제15권4호
    • /
    • pp.80-85
    • /
    • 2001
  • The early construction of the internet based ship basic planning supporting system based on the concurrent engineering and the internet technology is essential as a means for the improvement of technology and design productivity our ship building industry is facing currently. Further more, technological base construction for the construction for the construction of the cooperation system on the level of ship building industry is necessary for the technological base security to maintain and develop ship building industry continuosly in the 21st century of the information industry environment and for the technological improvement of the middle and small shipyard falling behind relatively and finally for the breaking through our ship building industry environment in which inter-enterprise competition is deeping. In this study, we designed the frame-system of the ship design supporting system and presented the development scenario based on core element technology.

  • PDF

주요국 전략기술 정책 비교: 기술 선정을 중심으로 (Strategic Technology Policy Trends and Implications in Leading Countries)

  • 박정렬;김성민;최새솔;연승준
    • 전자통신동향분석
    • /
    • 제38권4호
    • /
    • pp.12-24
    • /
    • 2023
  • The acquisition of advanced scientific and technological knowledge is essential for the economic and security interests of any nation. Major countries are actively accumulating capacities by strategically identifying and nurturing key technologies, aiming to gain a competitive advantage amidst internal and external environmental shifts and the global competition for technological dominance. By comparing and analyzing trends in strategic technology policies in leading countries, we may be able to understand Korea's technology status and level as well as identify technologies to focus or develop. Accordingly, this study scrutinizes policy trends, criteria for technology selection, objectives, and strategies adopted by major countries regarding strategic technologies and offers insights into Korea's technological development by means of comparative analyses across strategic technologies among these countries.

Hybrid feature extraction of multimodal images for face recognition

  • Cheema, Usman;Moon, Seungbin
    • 한국정보처리학회:학술대회논문집
    • /
    • 한국정보처리학회 2018년도 추계학술발표대회
    • /
    • pp.880-881
    • /
    • 2018
  • Recently technological advancements have allowed visible, infrared and thermal imaging systems to be readily available for security and access control. Increasing applications of facial recognition for security and access control leads to emerging spoofing methodologies. To overcome these challenges of occlusion, replay attack and disguise, researches have proposed using multiple imaging modalities. Using infrared and thermal modalities alongside visible imaging helps to overcome the shortcomings of visible imaging. In this paper we review and propose hybrid feature extraction methods to combine data from multiple imaging systems simultaneously.

Growing Hadiths Ontology

  • Alamri, Salah
    • International Journal of Computer Science & Network Security
    • /
    • 제21권9호
    • /
    • pp.317-322
    • /
    • 2021
  • The modern technological era has brought about the Semantic Web. Ontologies are essential to achieve the vision of the Semantic Web. Ontologies enable machines to understand data. The Arabic Language currently does not have a significant presence on the Web. To achieve a comparable level of Arabic access to other important languages, further work is needed to build Arabic ontologies. A goal is to design and create a robust Arabic ontology that represents the concepts from a large and significant subset of Arabic. We use a source of Hadiths (prophet saying and deeds) from Riyadh As-Saliheen. Preliminary results are very promising.

Gifted Students' Viewpoints on Using Educational Technology in their Schools in the Saudi Context

  • Alammari, Abdullah
    • International Journal of Computer Science & Network Security
    • /
    • 제22권5호
    • /
    • pp.245-249
    • /
    • 2022
  • This paper explored gifted students' perspectives on using educational technologies in their schools in the Saudi context. Adopting a descriptive research approach, a questionnaire was used to collect information from a sample of 196 gifted secondary school students in Jeddah. Findings showed that educational technology was used to a high degree, with an overall mean of 3.74 and 4.06 for the degree of importance of technological usage. Based on the findings, the researcher forwards some recommendations for effectively using such technologies to promote gifted students' abilities and talents.

기업의 지속적 정보보안 강화를 위한 접근법 개발 (A Development of Comprehensive Framework for Continuous Information Security)

  • 정태석;임명성;이재범
    • 디지털융복합연구
    • /
    • 제10권2호
    • /
    • pp.1-10
    • /
    • 2012
  • 컴퓨터의 활용의 지속적 증가는 전 세계적으로 보안에 대한 인식을 새롭게 하고 있다. 역사적으로 볼 때, 그동안의 연구들은 정보시스템의 보안을 기술적인 대안을 기반으로 접근하여 왔다. 그러나 절차나 논리적 혹은 물리적 장치의 복잡성의 증가로 인해 더 이상 이러한 접근법이 효력을 발생하는 데는 한계가 있다. 즉, 정보기술환경에 대한 보안을 유지하기 위해서는 오늘날에 발생하고 있는 현상을 반영한 포괄적인 이해가 필요하다. 이를 위해 본 연구는 오늘날의 현상을 반영한 포괄적인 정보보안 접근법을 제시하고자 한다.