• Title/Summary/Keyword: Technology Security

Search Result 6,739, Processing Time 0.029 seconds

Risk based policy at big data era: Case study of privacy invasion (빅 데이터 시대 위험기반의 정책 - 개인정보침해 사례를 중심으로 -)

  • Moon, Hyejung;Cho, Hyun Suk
    • Informatization Policy
    • /
    • v.19 no.4
    • /
    • pp.63-82
    • /
    • 2012
  • The world's best level of ICT(Information, Communication and Technology) infrastructure has experienced the world's worst level of ICT accident in Korea. The number of major accidents of privacy invasion has been three times larger than the total number of Internet user of Korea. The cause of the severe accident was due to big data environment. As a result, big data environment has become an important policy agenda. This paper has conducted analyzing the accident case of data spill to study policy issues for ICT security from a social science perspective focusing on risk. The results from case analysis are as follows. First, ICT risk can be categorized 'severe, strong, intensive and individual'from the level of both probability and impact. Second, strategy of risk management can be designated 'avoid, transfer, mitigate, accept' by understanding their own culture type of relative group such as 'hierarchy, egalitarianism, fatalism and individualism'. Third, personal data has contained characteristics of big data such like 'volume, velocity, variety' for each risk situation. Therefore, government needs to establish a standing organization responsible for ICT risk policy and management in a new big data era. And the policy for ICT risk management needs to balance in considering 'technology, norms, laws, and market'in big data era.

  • PDF

Restoration of Antique (Sam-Sae Buddhistic Painting) In Song-Kwang Temple (전남 승주군 송광사 승보전 유물(삼세불화)보수)

  • Cheon, Kyeong-Mee;Cheon, Cheol
    • Journal of the Korean Wood Science and Technology
    • /
    • v.27 no.3
    • /
    • pp.82-90
    • /
    • 1999
  • The buddhistic painting of Song-Kwang temple in Seungjoo-gun, Chonnam, Korea is not known in chronicle, but it could be estimated to works in the early 19th century through it's remaining records and qualities of materials. And it was analysed the qualities of materials consisting of pigment layer, silken-ground layer and support layer in order to preserve buddhistic painting, made back-adherent paper of the support layer proper to it, tested its compatibility, and then concluded as follows. 1. The section structures of buddhistic painting is consisted of the pigment layer, silken-ground layer of silk and the support layer of Korean hand made paper, it could be recognized that buddhistic painting in 19th century was basically composed of the pigment layer, the silken-ground layer and the support layer. Moreover the pigment layer and the silken-ground layer got adhered with glue, and sheets of support layers got back adhered with paste. 2. The support layer of buddhistic painting consisted of 5 layers and two kinds of paper were used for them. The first and second layers were composed of Korean hand made paper made of pure paper mulberry bast fibers, and the rest of them of paper that paper mulberry bast fibers were mixed into recycled hemp fibers. Though it is difficult to assert without the security of more data, finding out the then situation through the qualities of materials, it was presumed that the society in 19th century was suffered from economical difficulties and the operation of the paper industry of temples was rather difficult and so low-qualitative recycled hemp fibers might used for back-adherent paper. 3. Considering tension between silken-ground layers and support layers of this materials, newly made back-adherent paper was used for repair, and then I could conform that it was proper to back-adherent paper for repair.

  • PDF

Producing Firefighting Vulnerability Maps Using GIS - A Case Study of Dalseo-gu, Daegu - (GIS를 이용한 화재진압 취약성 지도 제작 - 대구광역시 달서구를 사례로 -)

  • KIM, Sung-Jae;CHOI, Gap-Yong;CHANG, Eun-Mi;SONG, Wan-Young
    • Journal of the Korean Association of Geographic Information Studies
    • /
    • v.18 no.3
    • /
    • pp.11-20
    • /
    • 2015
  • Fire incidents, which occur every year, cause huge damage to properties and humans. Significant time and costs have been invested in minimizing and responding to such accidents. With the recent advances in the development of spatial information, in the firefighting field, studies have been conducted to effectively bring fires under control using GIS(Geographic Information System). Most of such studies, however, focused on individual analyses of firefighting-related factors, but comprehensive research on the vulnerability factors in fire control activities, a major part of firefighting activity, has yet to be done. This study sought to pinpoint and analyze the factors that obstruct fire controlling, and to gather relevant data and create GIS-based databases. Based on such database, GIS-based overlay analysis was conducted to produce a fire control vulnerability map. The findings of this study will enable a quantitative analysis of firefighting obstruction factors to assist the personnel engaging in firefighting in rational decision-making, such as in formulating a firefighting operation plan for securing golden time.

Deficiencies of China's General Aviation Law and its Improvement (중국 일반항공법의 법적 흠결과 개선방향)

  • Zhang, Chrystal;Diao, Weimin
    • The Korean Journal of Air & Space Law and Policy
    • /
    • v.28 no.2
    • /
    • pp.145-181
    • /
    • 2013
  • General aviation is an integral part of civil aviation and involves the widest range of aviation segments except commercial aviation. Featured with different operational procedures and practices to satisfy the economic needs and safety requirements of a sovereign state, general aviation tends to be regulated by an individual state. The last three decades have seen exponential growth of commercial air transport in China, but its general aviation sector has remained disproportionally underdeveloped. With the deepening of the reform of low-altitude airspace, the sector is poised for a radical change and rapid growth. However, legislation governing general aviation activities in China is distorted causing inconsistency and confusions in their application and implementation. This paper aims to analyse China's prevailing legislation regulating general aviation activities. It first discusses the various definitions adopted by ICAO and its member states and reviews the development of general aviation in the US, EU, Australia and China. It then examines the sources of China's general aviation laws, e.g. Chicago Convention and its annexes, and Chinese domestic legislature which covers legislation, laws, directives, rules and procedures. The paper continues to analyse and establish the deficiencies of its prevailing legal framework by pointing out the following: variation of definitions in different regulations, inconsistency of principles in existing laws and regulations, legal vacuum concerning government subsidy, environment protection, safety and security, and other operational areas such as aerial club, sightseeing, and search and rescue. In this process, the paper argues that a coherent, consistent and systematic legal framework is required in order to ensure fair competition and safety for a healthy, progressive and sustainable general aviation growth. Suggestions for rectification and improvement are proposed.

  • PDF

Discovery of Market Convergence Opportunity Combining Text Mining and Social Network Analysis: Evidence from Large-Scale Product Databases (B2B 전자상거래 정보를 활용한 시장 융합 기회 발굴 방법론)

  • Kim, Ji-Eun;Hyun, Yoonjin;Choi, Yun-Jeong
    • Journal of Intelligence and Information Systems
    • /
    • v.22 no.4
    • /
    • pp.87-107
    • /
    • 2016
  • Understanding market convergence has became essential for small and mid-size enterprises. Identifying convergence items among heterogeneous markets could lead to product innovation and successful market introduction. Previous researches have two limitations. First, traditional researches focusing on patent databases are suitable for detecting technology convergence, however, they have failed to recognize market demands. Second, most researches concentrate on identifying the relationship between existing products or technology. This study presents a platform to identify the opportunity of market convergence by using product databases from a global B2B marketplace. We also attempt to identify convergence opportunity in different industries by applying Structural Hole theory. This paper shows the mechanisms for market convergence: attributes extraction of products and services using text mining and association analysis among attributes, and network analysis based on structural hole. In order to discover market demand, we analyzed 240,002 e-catalog from January 2013 to July 2016.

Analysis on the Water Footprint of Crystalline Silicon PV System (결정질 실리콘 태양광시스템의 물 발자국 산정에 대한 연구)

  • Na, Won-Cheol;Kim, Younghwan;Kim, Kyung Nam;Lee, Kwan-Young
    • Clean Technology
    • /
    • v.20 no.4
    • /
    • pp.449-456
    • /
    • 2014
  • There has been increasing concerns for the problems of water security in countries, caused by the frequent occurrence of localized drought due to the climate change and uncertainty of water balance. The importance of fresh water is emphasized as considerable amount of usable fresh water is utilized for power generation sector producing electricity. PV power system, the source of renewable energy, consumes water for the every steps of life cycle: manufacturing, installation, and operation. However, it uses relatively less water than the traditional energy sources such as thermal power and nuclear power sources. In this study, to find out the use of water for the entire process of PV power system from extracting raw materials to operating the system, the footprint of water in the whole process is measured to be analyzed. Measuring the result, the PV water footprint of value chain was $0.989m^3/MWh$ and the water footprint appeared higher specially in poly-Si and solar cell process. The following two reasons explain it: poly-Si process is energy-intensive process and it consumes lots of cooling water. In solar cell process, deionized water is used considerably for washing a high-efficiency crystalline silicon. It is identified that PV system is the source using less water than traditional ones, which has a critical value in saving water. In discussing the future energy policy, it is vital to introduce the concept of water footprint as a supplementary value of renewable energy.

Realization of a Web-based Distribution System for the Monitoring of Business Press Releases and News Gathering Robots (기업 보도자료 모니터링을 위한 웹기반 배포시스템 및 기사 수집로봇 구현)

  • Shin, Myeong-Sook;Oh, Jung-Jin;Lee, Joon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.18 no.12
    • /
    • pp.103-111
    • /
    • 2013
  • At present, a variety of Korean news stories have been about important online content and its importance in the press is becoming higher. Diverse news from businesses are provided to the public as press releases through newspapers or broadcasting media. For such news to become information for a press release, enterprises visit reporters, use e-mails, faxes, or couriers to deliver the information. However, such methods have problems with time, human resources, expenses, and file damage. Also, with these methods it is bothersome for enterprises to check what has been released and for the press to make frequent contact with enterprises for interviews and for content to be released. Therefore, this study aimed to realize a distribution system which enterprises can use to distribute data to be released to the press and to easily check what is to be released while the press can ask for interview requests in a simple way, as well as a news gathering robot that can collects news on the enterprises involved from articles online or in portal sites.

Safety Risk Management Policy of United States small unmanned aerial system (미 소형 무인비행체계의 안전성 위험관리 정책)

  • Hong, Jin-Keun
    • Journal of Convergence for Information Technology
    • /
    • v.11 no.9
    • /
    • pp.35-42
    • /
    • 2021
  • The purpose of this paper is to review the small unmanned aerial system (sUAS) safety policy promoted by the United States(US) government. Therefore, in this paper, along with sUAS risk factors, the risk factors of sUAS that the US government is interested in are described. In addition, the risk factors were classified into physical and non-physical factors, and provisions mentioned in the Federal Aviation Administration(FAA) Relicensing Act were reviewed. Other risk scenarios were analyzed focusing on target scenario items that the FAA is interested in, such as flight operation disruption, infrastructure damage, and facility trespassing. Of course, we looked at the risk management principles promoted by the US FAA. In this paper, as a research method, the direction and contents of the FAA's sUAS policy were studied and reviewed from the analysis of major foreign journals and policy. In the research result of this paper, by analyzing the FAA sUAS safety risk management policy, the integrated operation and safety policy, physical risk management policy, operation and safety regulation, and sUAS policy and technology direction necessary for establishing the sUAS safety risk management guide in Korea are presented. The contribution of this study is to identify the leading US sUAS safety policy direction, and it can be used as basic data for deriving future domestic policy directions from this. Based on the research results presented in the future, policy studies are needed to derive detailed implementation plans.

The Improvement Plan for Indicator System of Personal Information Management Level Diagnosis in the Era of the 4th Industrial Revolution: Focusing on Application of Personal Information Protection Standards linked to specific IT technologies (제4차 산업시대의 개인정보 관리수준 진단지표체계 개선방안: 특정 IT기술연계 개인정보보호기준 적용을 중심으로)

  • Shin, Young-Jin
    • Journal of Convergence for Information Technology
    • /
    • v.11 no.12
    • /
    • pp.1-13
    • /
    • 2021
  • This study tried to suggest ways to improve the indicator system to strengthen the personal information protection. For this purpose, the components of indicator system are derived through domestic and foreign literature, and it was selected as main the diagnostic indicators through FGI/Delphi analysis for personal information protection experts and a survey for personal information protection officers of public institutions. As like this, this study was intended to derive an inspection standard that can be reflected as a separate index system for personal information protection, by classifying the specific IT technologies of the 4th industrial revolution, such as big data, cloud, Internet of Things, and artificial intelligence. As a result, from the planning and design stage of specific technologies, the check items for applying the PbD principle, pseudonymous information processing and de-identification measures were selected as 2 common indicators. And the checklists were consisted 2 items related Big data, 5 items related Cloud service, 5 items related IoT, and 4 items related AI. Accordingly, this study expects to be an institutional device to respond to new technological changes for the continuous development of the personal information management level diagnosis system in the future.

An Approach to Conceal Hangul Secret Message using Modified Pixel Value Decomposition (수정된 화소 값 분해를 사용하여 한글 비밀 메시지를 숨기는 방법)

  • Ji, Seon-su
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.14 no.4
    • /
    • pp.269-274
    • /
    • 2021
  • In secret communication, steganography is the sending and receiving of secret messages without being recognized by a third party. In the spatial domain method bitwise information is inserted into the virtual bit plane of the decomposed pixel values of the image. That is, the bitwise secret message is sequentially inserted into the least significant bit(LSB) of the image, which is a cover medium. In terms of application, the LSB is simple, but has a drawback that can be easily detected by a third party. If the upper bit plane is used to increase security, the image quality may deteriorate. In this paper, I present a method for concealing Hangul secret messages in image steganography based on the lo-th bit plane and the decomposition of modified pixel intensity values. After decomposing the Hangeul message to be hidden into choseong, jungseong and jongseong, then a shuffling process is applied to increase confidentiality and robustness. PSNR was used to confirm the efficiency of the proposed method. It was confirmed that the proposed technique has a smaller effect in terms of image quality than the method applying BCD and Fibonacci when inserting a secret message in the upper bit plane. When compared with the reference value, it was confirmed that the PSNR value of the proposed method was appropriate.