• Title/Summary/Keyword: Threat Integration

Search Result 55, Processing Time 0.02 seconds

A Political Economy of Media Power (언론 권력의 정치경제학: 베네주엘라, 이탈리아, 영국의 사례분석)

  • Kim, Seung-Soo
    • Korean journal of communication and information
    • /
    • v.22
    • /
    • pp.39-75
    • /
    • 2003
  • This essay begins with the following questions; "What is a fundamental source of media power?" and "How can the media power dominate market?". This essay aims at answering the questions. I made my selection of countries such as Venezuela, Italy and UK for this article with a political economic approach. This analysis found evidence that an enormous conglomerate ownership, and alliance or convergence between media and political power are two fundamental source of the media power. With the integration of newspaper and television the media monopoly increased their supplies and political influences as I have shown. Despite the growing threat of media monopoly power to democracy and public interest, in recent years, governments worldwide have chosen to ease regulations.

  • PDF

Research Design to Evaluate an Academic Library's Orientation Program Applying Mobile Augmented Reality

  • Kang, Ji Hei
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.49 no.2
    • /
    • pp.215-233
    • /
    • 2015
  • Despite the continuous efforts of academic libraries to develop various user-centered outreach programs, services and new processes, library anxiety still remains a threat to university students' full use of academic library resources. Meanwhile, a new generation of students, called the "Net Generation," has grown up with developed information and communication technology enter university and must be persuaded to turn to the library. To serve this new group of patrons better, libraries need to adopt new technologies. However, since an initial introduction cost and labor efforts are involved in the integration of the technology, identifying the right time for introduction and the right scope of innovation is essential but difficult. The study proposes a not-yet-well-known, novel experimental design, Regression Point Displacement (RPD), to evaluate an orientation program applying Mobile Augmented Reality (MAR) for STEM students. Since this RPD design requires only one treatment group, the model is expected to be the incomparable and rational way to evaluate the new MAR technology. In the context of an informal learning experience, the findings of the study will determine the effectiveness of an orientation employing the MAR technology.

Opportunities for Synergistic Collaboration between U.S. and Asia in Construction Business, Research, and Education

  • Liu, LiangY.
    • Proceedings of the Korean Institute Of Construction Engineering and Management
    • /
    • 2007.11a
    • /
    • pp.3-8
    • /
    • 2007
  • "The world is flat" as the popular author Thomas L. Friedman declares in his best belling book about the progress of business globalization in the $21^{st}$ century [3]. Construction projects and related businesses have been global since the 1800's, but it has never seen such rapid transformation in both scope and depth as in the past decade. Construction projects today often bring together international design talents, construction management firms, local and international labor forces, and global suppliers. On a visit to Dubai in the United Arab Emirates on the Persian Gulf, a person will experience the complexity of globalization of modern construction projects- with Arab owners, European engineering and design companies, American construction management teams, Korean general contractors, Jordanian subcontractors, and labor forces from Thailand, Indonesia, Turkey, and Sri Lanka. A count of material suppliers reveals over 60 countries involved, covering all continents. Indeed construction projects are getting more and more complex and competitive, as is the project execution. The trend toward globalization poses both challenges and opportunities to construction and engineering companies competing on a global scale. While global competition may be a threat to many companies, there are, however, many opportunities for synergistic collaborations that can create win-win scenarios for construction business, research, and education. This paper presents some of the opportunities between the U.S. and Asia in business integration, research collaboration on technologies, and educational development, which may mutually benefit countries on either side of the Pacific.

  • PDF

Probabilistic Assessment of Voltage Stability Margin in Presence of Wind Speed Correlation

  • Li, Hongxin;Cai, DeFu;Li, Yinhong
    • Journal of Electrical Engineering and Technology
    • /
    • v.8 no.4
    • /
    • pp.719-728
    • /
    • 2013
  • Probabilistic assessment of voltage stability margin (VSM) with existence of correlated wind speeds is investigated. Nataf transformation is adopted to establish wind speed correlation (WSC) model. Based on the saddle-node bifurcation transversality condition equations and Monte Carlo simulation technique, probability distribution of VSM is determined. With correlation coefficients range low to high value, the effect of WSC on VSM is studied. In addition, two risk indexes are proposed and the possible threat caused by WSC is evaluated from the viewpoint of risk analysis. Experimental results show that the presence of correlated wind speeds is harmful to safe and stable operation of a power system as far as voltage stability is concerned. The achievement of this paper gives a detailed elaboration about the influence of WSC on voltage stability and provides a potentially effective analytical tool for modern power system with large-scale wind power sources integration.

Research on the Development Strategies of Confucius Institute for Expanding China's Foreign Trade

  • Yanni, Qiao;Jinge, Yao;Bae, Ki-Hyung
    • International Journal of Contents
    • /
    • v.17 no.3
    • /
    • pp.15-29
    • /
    • 2021
  • The purpose of this paper is to explore how the Confucius Institute Chinese international promotion could better promote the development of China's foreign trade, by analyzing the distribution of the Confucius Institute worldwide, based on the theory of language economics, using SWOT analysis to analyze the advantages and disadvantages of the internal environment, opportunities and challenges of the external environment of Chinese international promotion of Confucius Institute. The following findings were gathered: as a language teaching institution and information exchange platform, Confucius Institute has the ability to share trade information and increase trade opportunities; to improve cultural identity and reduce transaction costs; to promote cultural communication and integration, and drive the development of related industries. The internal disadvantages were mainly reflected in the mismatch between the global regional distribution structure of Confucius Institutes, and the economic and trade structure, such as, the asymmetry between language, culture output, and demand. In addition, the management mechanism was not perfect. External opportunities were mainly new opportunities brought by economic globalization, cultural diversity, and the development of the Belt and Road initiative. External challenges were mainly influenced by the China threat theory and the fierce cultural competition among countries. The corresponding countermeasures were put forward based on the advantages of the platform and grasping the external opportunities: improving the quality of operation and speeding up the localization process; respecting cultural differences and realizing cultural common learning; seeking multilateral cooperation and enhancing the capacity for independent development.

A Multi-level Perception Security Model Using Virtualization

  • Lou, Rui;Jiang, Liehui;Chang, Rui;Wang, Yisen
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.11
    • /
    • pp.5588-5613
    • /
    • 2018
  • Virtualization technology has been widely applied in the area of computer security research that provides a new method for system protection. It has been a hotspot in system security research at present. Virtualization technology brings new risk as well as progress to computer operating system (OS). A multi-level perception security model using virtualization is proposed to deal with the problems of over-simplification of risk models, unreliable assumption of secure virtual machine monitor (VMM) and insufficient integration with virtualization technology in security design. Adopting the enhanced isolation mechanism of address space, the security perception units can be protected from risk environment. Based on parallel perceiving by the secure domain possessing with the same privilege level as VMM, a mechanism is established to ensure the security of VMM. In addition, a special pathway is set up to strengthen the ability of information interaction in the light of making reverse use of the method of covert channel. The evaluation results show that the proposed model is able to obtain the valuable risk information of system while ensuring the integrity of security perception units, and it can effectively identify the abnormal state of target system without significantly increasing the extra overhead.

Islamic Legal Reasoning for the Justification of Tax Evasion: The Case of Indonesia

  • HIDAYAT, Nurul;SHARKEY, Nolan
    • The Journal of Asian Finance, Economics and Business
    • /
    • v.8 no.8
    • /
    • pp.475-486
    • /
    • 2021
  • Religiosity is often perceived as a trait that can effectively suppress attitudes and behavior that lead to people evading taxes. However, this study finds that Islamic religiosity has a complicated relationship with tax evasion. This study employs a mixed-method, which involves collecting, analyzing, and integrating quantitative and qualitative research, and this integration provides a better understanding of the research problem. Qualitative analyses of the sermons of prominent Islamic clerics speaking on taxes on YouTube channels revealed different views. The textualists/conservative clerics viewed taxes are prohibited based on the fact of Islamic history and tax prohibition stated in a hadith. Furthermore, tax compliance is determined solely by the threat of punishment from the government. On the other hand, the moderate preachers seem to be more flexible in response to tax issues. They involve the framework of contextual and analogical-historical practice. Quantitative analyses from the survey found that Islamic religiosity is not directly correlated with tax evasion. However, the sentiment of Islamic law adoption by the state has significantly mediated the correlation between them. In addition, respondents who affiliate with moderate Islamic organizations tend to have less justification of tax evasion than those who affiliate with conservative organizations or movements.

The Economic Cooperation Potential of East Asia's RCEP Agreement

  • Armstrong, Shiro;Drysdale, Peter
    • East Asian Economic Review
    • /
    • v.26 no.1
    • /
    • pp.3-25
    • /
    • 2022
  • East Asia's Regional Comprehensive Economic Partnership (RCEP) came into force in 2022 as the world's largest free trade agreement. RCEP was concluded, signed and brought into force in the face of major international uncertainty and is a significant boost to the global trading system. RCEP brings Australia, China, Japan, South Korea and New Zealand into the same agreement with the ten member ASEAN group at its centre. It keeps markets open and updates trade and investment rules in East Asia, a major centre of global economic activity, at a time of rising protectionism when the WTO itself is under threat. The agreement builds on ASEAN's free trade agreements and strengthens ASEAN centrality. One of the pillars of RCEP is an economic cooperation agenda which has its antecedents in ASEAN's approach to bringing along its least developed members and builds on the experience of capacity building in APEC and technical cooperation under the ASEAN Australia-New Zealand Free Trade Agreement. There is an opportunity to create a framework that facilitates deeper economic cooperation that involves experience-sharing, extending RCEP's rules and membership at the same time as strengthening political cooperation. The paper suggests some areas that might be best suited to cooperation - that is confidence and trust building instead of or before negotiation - and discusses how non-members may be engaged and the membership expanded. Options such as multilateralising provisions and becoming a platform for policy convergence and coordinating unilateral reforms are canvassed.

Quantitative Methodology to Assess Cyber Security Risks of SCADA system in Electric Power Industry (전력 SCADA 시스템의 사이버 보안 위험 평가를 위한 정량적 방법론에 관한 연구)

  • Kang, Dong-Joo;Lee, Jong-Joo;Lee, Young;Lee, Im-Sop;Kim, Huy-Kang
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.23 no.3
    • /
    • pp.445-457
    • /
    • 2013
  • This paper is about the study to build a quantitative methodology to assess cyber threats and vulnerabilities on control systems. The SCADA system in power industry is one of the most representative and biggest control systems. The SCADA system was originally a local system but it has been extended to wide area as both ICT and power system technologies evolve. Smart Grid is a concept to integrate energy and IT systems, and therefore the existing cyber threats might be infectious to the power system in the integration process. Power system is operated on a real time basis and this could make the power system more vulnerable to the cyber threats. It is a unique characteristic of power systems different from ICT systems. For example, availability is the most critical factor while confidentiality is the one from the CIA triad of IT security. In this context, it is needed to reflect the different characteristics to assess cyber security risks in power systems. Generally, the risk(R) is defined as the multiplication of threat(T), vulnerability(V), and asset(A). This formula is also used for the quantification of the risk, and a conceptual methodology is proposed for the objective in this study.

Model Inversion Attack: Analysis under Gray-box Scenario on Deep Learning based Face Recognition System

  • Khosravy, Mahdi;Nakamura, Kazuaki;Hirose, Yuki;Nitta, Naoko;Babaguchi, Noboru
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.3
    • /
    • pp.1100-1118
    • /
    • 2021
  • In a wide range of ML applications, the training data contains privacy-sensitive information that should be kept secure. Training the ML systems by privacy-sensitive data makes the ML model inherent to the data. As the structure of the model has been fine-tuned by training data, the model can be abused for accessing the data by the estimation in a reverse process called model inversion attack (MIA). Although, MIA has been applied to shallow neural network models of recognizers in literature and its threat in privacy violation has been approved, in the case of a deep learning (DL) model, its efficiency was under question. It was due to the complexity of a DL model structure, big number of DL model parameters, the huge size of training data, big number of registered users to a DL model and thereof big number of class labels. This research work first analyses the possibility of MIA on a deep learning model of a recognition system, namely a face recognizer. Second, despite the conventional MIA under the white box scenario of having partial access to the users' non-sensitive information in addition to the model structure, the MIA is implemented on a deep face recognition system by just having the model structure and parameters but not any user information. In this aspect, it is under a semi-white box scenario or in other words a gray-box scenario. The experimental results in targeting five registered users of a CNN-based face recognition system approve the possibility of regeneration of users' face images even for a deep model by MIA under a gray box scenario. Although, for some images the evaluation recognition score is low and the generated images are not easily recognizable, but for some other images the score is high and facial features of the targeted identities are observable. The objective and subjective evaluations demonstrate that privacy cyber-attack by MIA on a deep recognition system not only is feasible but also is a serious threat with increasing alert state in the future as there is considerable potential for integration more advanced ML techniques to MIA.