• Title/Summary/Keyword: Vulnerability market

Search Result 69, Processing Time 0.022 seconds

Health Inequalities Among Korean Employees

  • Choi, Eunsuk
    • Safety and Health at Work
    • /
    • v.8 no.4
    • /
    • pp.371-377
    • /
    • 2017
  • Background: Social status might be a determinant of occupational health inequalities. This study analyzed the effects of social status on both work environments and health outcomes. Methods: The study sample consisted of 27,598 wage employees aged 15 years and older from among the Korean Working Condition Survey participants in 2011. Work environments included atypical work, physical risks, ergonomic risks, work demands, work autonomy, social supports, and job rewards. Health outcomes comprised general health, health and safety at risk because of work, the World Health Organization-5 Well-being Index, work-related musculoskeletal disease, and work-related injury. Multivariable logistic-regression models were used to identify the associations between social status and work environments and health outcomes. Results: Employees in the demographically vulnerable group had lower occupational status compared with their counterparts. Low social status was largely related to adverse work environments. Especially, precarious employment and manual labor occupation were associated with both adverse work environments and poor health outcomes. Conclusion: Precarious and manual workers should take precedence in occupational health equity policies and interventions. Their cumulative vulnerability, which is connected to demographics, occupational status, adverse work environments, or poor health outcomes, can be improved through a multilevel approach such as labor market, organizations, and individual goals.

Reform of National R&D Structure under Economic Crisis : The Irony of Korea

  • Park, Yong-Tae
    • Journal of Technology Innovation
    • /
    • v.7 no.1
    • /
    • pp.1-13
    • /
    • 1999
  • In this article, we first present an inductive taxonomy of national R&D structures in terms of relative R&D flows among prime actors. The R&D structure of Korea, along with the Japanese one, turns out to be an ill-balanced one characterized by the dominant role of private sector, vis-a-vis the minimal share of public R&D. In nature, private R&D is sensitive to business cycle and the vulnerability of the Korean structure has been invisible under prosperity but now is disclosed under depression. This problem is nothing new and indeed has long been recognized by the Korean government but the prescription seemed almost impossible. Ironically, the current economic crisis of Korea renders an unexpected opportunity for structural reform. As private firms are cutting down R&D investment, the relative share of public sector becomes significant. A simulation predicts that balanced systems will be achieved in some years if public R&D budget is kept up. Although the contraction of private R&D is by no means desirable, it is the right time for the Korean government to expand public R&D. Public R&D should be considered not only a remedy for market-failure but also a shock-absorber against cyclic instability. This is why the balance between public R&D and private R&D is emphasized.

  • PDF

The Study on Software Tamper Resistance for Securing Game Services (게임 서비스 보호를 위한 소프트웨어 위변조 방지기술 연구)

  • Chang, Hang-Bae;Kang, Jong-Gu;Joe, Tae-Hee
    • Journal of Korea Multimedia Society
    • /
    • v.12 no.8
    • /
    • pp.1120-1127
    • /
    • 2009
  • The commensurate number of the attacks and infringement targeting a vulnerability of the game service has been increasing constantly, due to the dramatic growth and expansion of the impact of the game industry. However, there exist no subsequent researches for the differentiated technology, which is to prevent the reverse function of the game service. Therefore, in this study, we examined the current status of infringement toward online game services which are provided in the market currently and designed the proper technical measures for a manipulation of the game service which is the most vulnerable part. We have encrypted an execution file and decrypted it in real time process. Furthermore, we conducted debugging, disassemble, and prevented a its own memory dump, also concealed the information to overcome the module dependency to preclude a manipulation.

  • PDF

Importance Assessment of Multiple Microgrids Network Based on Modified PageRank Algorithm

  • Yeonwoo LEE
    • Korean Journal of Artificial Intelligence
    • /
    • v.11 no.2
    • /
    • pp.1-6
    • /
    • 2023
  • This paper presents a comprehensive scheme for assessing the importance of multiple microgrids (MGs) network that includes distributed energy resources (DERs), renewable energy systems (RESs), and energy storage system (ESS) facilities. Due to the uncertainty of severe weather, large-scale cascading failures are inevitable in energy networks. making the assessment of the structural vulnerability of the energy network an attractive research theme. This attention has led to the identification of the importance of measuring energy nodes. In multiple MG networks, the energy nodes are regarded as one MG. This paper presents a modified PageRank algorithm to assess the importance of MGs that include multiple DERs and ESS. With the importance rank order list of the multiple MG networks, the core MG (or node) of power production and consumption can be identified. Identifying such an MG is useful in preventing cascading failures by distributing the concentration on the core node, while increasing the effective link connection of the energy flow and energy trade. This scheme can be applied to identify the most profitable MG in the energy trade market so that the deployment operation of the MG connection can be decided to increase the effectiveness of energy usages. By identifying the important MG nodes in the network, it can help improve the resilience and robustness of the power grid system against large-scale cascading failures and other unexpected events. The proposed algorithm can point out which MG node is important in the MGs power grid network and thus, it could prevent the cascading failure by distributing the important MG node's role to other MG nodes.

A Design Communication System for Message Protection in Next Generation Wireless Network Environment (차세대 무선 네트워크 환경에서 메시지 보호를 위한 통신 시스템 설계)

  • Min, So-Yeon;Jin, Byung-Wook
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.16 no.7
    • /
    • pp.4884-4890
    • /
    • 2015
  • These days most of people possesses an average of one to two mobile devices in the world and a wireless network market is gradually expanding. Wi-Fi preference are increasing in accordance with the use growth of mobile devices. A number of areas such as public agencies, health care, education, learning, and content, manufacturing, retail create new values based on Wi-Fi, and the global network is built and provides complex services. However, There exist some attacks and vulnerabilities like wireless radio device identifier vulnerability, illegal use of network resources through the MAC forgery, wireless authentication key cracking, unauthorized AP / devices attack in the next generation radio network environment. In addition, advanced security technology research, such as authentication Advancement and high-speed secure connection is not nearly progress. Therefore, this paper designed a secure communication system for message protection in next-generation wireless network environments by device identification and, designing content classification and storage protocols. The proposed protocol analyzed safeties with respect to the occurring vulnerability and the securities by comparing and analyzing the existing password techniques in the existing wireless network environment. It is slower 0.72 times than existing cypher system, WPA2-PSK, but enforces the stability in security side.

A Study on Cryptography Scheme and Secure Protocol for Safety Secure Scheme Construction in 13.56Mhz RFID (13.56Mhz RFID 환경에서 안전한 보안 스킴 구축을 위한 암호 스킴 및 보안 프로토콜 연구)

  • Kang, Jung-Ho;Kim, Hyung-Joo;Lee, Jae-Sik;Park, Jae-Pyo;Jun, Moon-Seog
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.14 no.3
    • /
    • pp.1393-1401
    • /
    • 2013
  • What is RFID Microchip tag attached to an object, the reader recognizes technology collectively, through communication with the server to authenticate the object. A variety of RFID tags, 13.56Mhz bandwidth RFID card, ISO/IEC 14443 standards based on NXP's Mifare tag occupies 72.5% of the world market. Of the Mifare tags, low cost tag Mifare Classic tag provided in accordance with the limited hardware-based security operations, protocol leaked by a variety of attacks and key recovery vulnerability exists. Therefore, in this paper, Cryptography Scheme and Secure Protocol for Safety Secure Scheme Construction in 13.56Mhz RFID have been designed. The proposed security scheme that KS generated by various fixed values and non-fixed value, S-Box operated, values crossed between LFSR and S-Box is fully satisfied spoofing, replay attacks, such as vulnerability of existing security and general RFID secure requirement. Also, It is designed by considering the limited hardware computational capabilities and existing security schemes, so it could be suit to Mifare Classic now.

Development of Safe Korean Programming Language Using Static Analysis (정적 분석을 이용한 안전한 한글 프로그래밍 언어의 개발)

  • Kang, Dohun;Kim, Yeoneo;Woo, Gyun
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.5 no.4
    • /
    • pp.79-86
    • /
    • 2016
  • About 75% of software security incidents are caused by software vulnerability. In addition, the after-market repairing cost of the software is higher by more than 30 times than that in the design stage. In this background, the secure coding has been proposed as one of the ways to solve this kind of maintenance problems. Various institutions have addressed the weakness patterns of the standard software. A new Korean programming language Saesark has been proposed to resolve the security weakness on the language level. However, the previous study on Saesark can not resolve the security weakness caused by the API. This paper proposes a way to resolve the security weakness due to the API. It adopts a static analyzer inspecting dangerous methods. It classifies the dangerous methods of the API into two groups: the methods of using tainted data and those accepting in-flowing tainted data. It analyses the security weakness in four steps: searching for the dangerous methods, configuring a call graph, navigating a path between the method for in-flowing tainted data and that uses tainted data on the call graph, and reporting the security weakness detected. To measure the effectiveness of this method, two experiments have been performed on the new version of Saesark adopting the static analysis. The first experiment is the comparison of it with the previous version of Saesark according to the Java Secure Coding Guide. The second experiment is the comparison of the improved Saesark with FindBugs, a Java program vulnerability analysis tool. According to the result, the improved Saesark is 15% more safe than the previous version of Saesark and the F-measure of it 68%, which shows the improvement of 9% point compared to 59%, that of FindBugs.

Risk of Carbon Leakage and Border Carbon Adjustments under the Korean Emissions Trading Scheme

  • Oh, Kyungsoo
    • Journal of Korea Trade
    • /
    • v.26 no.2
    • /
    • pp.45-64
    • /
    • 2022
  • Purpose - This paper examines South Korea's potential status as a carbon leakage country, and the level of risk posed by the Korean emissions trading scheme (ETS) for Korean industries. The economic effects of border carbon adjustments (BCAs) to protect energy-intensive Korean industries in the process of achieving the carbon reduction target by 2030 through the Korean ETS are also analyzed. Design/methodology - First, using the Korean Input-Output (IO) table, this paper calculates the balance of emissions embodied in trade (BEET) and the pollution terms of trade (PTT) to determine Korean industries' carbon leakage status. Analyses of the risk level posed by carbon reduction policy implementation in international trade are conducted for some sectors by applying the EU criteria. Second, using a computable general equilibrium (CGE) model, three BCA scenarios, exemption regulations (EXE), reimbursement (REB), and tariff reduction (TAR) to protect the energy-intensive industries under the Korean ETS are addressed. Compared to the baseline scenario of achieving carbon reduction targets by 2030, the effects of BCAs on welfare, carbon leakage, outputs, and trading are analyzed. Findings - As Korea's industrial structure has been transitioning from a carbon importing to a carbon leaking country. The results indicate that some industrial sectors could face the risk of losing international competitiveness due to the Korean ETS. South Korea's industries are basically exposed to risk of carbon leakage because most industries have a trade intensity higher than 30%. This could be interpreted as disproving vulnerability to carbon leakage. Although the petroleum and coal sector is not in carbon leakage, according to BEET and PTT, the Korean ETS exposes this sector to a high risk of carbon leakage. Non-metallic minerals and iron and steel sectors are also exposed to a high risk of carbon leakage due to the increased burden of carbon reduction costs embodied in the Korean ETS, despite relatively low levels of trade intensity. BCAs are demonstrated to have an influential role in protecting energy-intensive industries while achieving the carbon reduction target by 2030. The EXE scenario has the greatest impact on mitigation of welfare losses and carbon leakage, and the TAF scenario causes a disturbance in the international trade market because of the pricing adjustment system. In reality, the EXE scenario, which implies completely exempting energy-intensive industries, could be difficult to implement due to various practical constraints, such as equity and reduction targets and other industries; therefore, the REB scenario presents the most realistic approach and appears to have an effect that could compensate for the burden of economic activities and emissions regulations in these industries. Originality/value - This paper confirms the vulnerability of the Korean industrial the risk of carbon leakage, demonstrating that some industrial sectors could be exposed to losing international competitiveness by implementing carbon reduction policies such as the Korean ETS. The contribution of this paper is the identification of proposed approaches to protect Korean industries in the process of achieving the 2030 reduction target by analyzing the effects of BCA scenarios using a CGE model.

Implementation of Security Information and Event Management for Realtime Anomaly Detection and Visualization (실시간 이상 행위 탐지 및 시각화 작업을 위한 보안 정보 관리 시스템 구현)

  • Kim, Nam Gyun;Park, Sang Seon
    • Asia-pacific Journal of Multimedia Services Convergent with Art, Humanities, and Sociology
    • /
    • v.8 no.5
    • /
    • pp.303-314
    • /
    • 2018
  • In the past few years, government agencies and corporations have succumbed to stealthy, tailored cyberattacks designed to exploit vulnerabilities, disrupt operations and steal valuable information. Security Information and Event Management (SIEM) is useful tool for cyberattacks. SIEM solutions are available in the market but they are too expensive and difficult to use. Then we implemented basic SIEM functions to research and development for future security solutions. We focus on collection, aggregation and analysis of real-time logs from host. This tool allows parsing and search of log data for forensics. Beyond just log management it uses intrusion detection and prioritize of security events inform and support alerting to user. We select Elastic Stack to process and visualization of these security informations. Elastic Stack is a very useful tool for finding information from large data, identifying correlations and creating rich visualizations for monitoring. We suggested using vulnerability check results on our SIEM. We have attacked to the host and got real time user activity for monitoring, alerting and security auditing based this security information management.

The Occupational Health and Safety of Migrant Workers and the Migrantisation of Risk: A Case Study of the UK Construction Industry (이주노동자의 산업안전보건과 위험의 이주화: 영국 건설업 사례를 중심으로)

  • Julia Jiwon Shin;Junho Chae
    • Journal of the Economic Geographical Society of Korea
    • /
    • v.27 no.1
    • /
    • pp.18-37
    • /
    • 2024
  • This study examines migrant workers' occupational health and safety issues through a case study of the UK construction industry, focusing on structural vulnerabilities. Migrant workers are at the bottom of the hierarchically fragmented labour market, performing outsourced hazardous work. Structural vulnerability focuses on the social structures that create hierarchies and increase risk in the workplace, rather than on individual responsibility or 'cultural' differences of migrant workers. The study considers the structural factors that perpetuate the migrantisation of risk in the UK construction industry, focusing on the structural necessity of low-wage migrant labour, precarious employment and the legal status of migrant workers, and discusses how these three factors interact to increase migrant workers' vulnerability to health and safety. The migrantisation of risk is not only a matter of occupational health and safety or universal workers' compensation, but also of the intertwining of labour migration policies with employment structures that rely on low-wage, low-skilled labour. This calls for proactive measures to address structural risks that go beyond passive declaratory policies that do not exclude migrant workers from education, training or legal systems.