• Title/Summary/Keyword: collective security

Search Result 58, Processing Time 0.023 seconds

Communal Antecedents in the Adoption of Secure Coding Methodologies

  • Kim, Sung Kun;Kim, Ji Young
    • Asia pacific journal of information systems
    • /
    • v.26 no.2
    • /
    • pp.231-246
    • /
    • 2016
  • Technology acceptance model has demonstrated that technology adoption behavior can be explained by two user belief constructs: perceived usefulness and perceived ease of use. A number of studies have explored how these beliefs develop by utilizing primarily individual-level antecedents. However, because innovation and new techniques bear a direct relation to social concerns, non-individual antecedents may be necessary. Therefore, in this study, social and organizational supports are used to understand how software developers foster beliefs regarding secure coding practices. We compiled data from 83 software developers to evaluate the technology acceptance model. Our findings show that these collective antecedents can effectively explain user belief constructs and the intention to adopt secure coding methodologies. These findings imply that society and organizations offering more concrete support programs will experience smoother deployment of security-enhancing measures.

A Study on Standardization of Copyright Collective Management for Digital Contents (디지털콘덴츠 집중관리를 위한 표준화에 관한 연구)

  • 조윤희;황도열
    • Journal of the Korean Society for information Management
    • /
    • v.20 no.1
    • /
    • pp.301-320
    • /
    • 2003
  • The rapidly increasing use of the Internet and advancement of the communication network, the explosive growth of digital contents from personal home pages to professional information service the emerging file exchange service and the development of hacking techniques . these are some of the trends contributing to the spread of illegal reproduction and distribution of digital contents, thus threatening the exclusive copyrights of the creative works that should be legally protected Accordingly, there is urgent need for a digital copyright management system designed to provide centralized management while playing the role of bridge between the copyright owners and users for smooth trading of the rights to digital contents, reliable billing, security measures, and monitoring of illegal use. Therefore, in this study, I examined the requirements of laws and systems for the introduction of the centralized management system to support smooth distribution of digital contents, and also researched on the current status of domestic and international centralized management system for copyrights. Furthermore, 1 tried to provide basic materials for the standardization of digital contents copyright management information through the examination of the essential elements of the centralized digital contents management such as the system for unique identification the standardization for data elements, and the digital rights management (DHM) .

Open Policy Agent based Multilateral Microservice Access Control Policy (개방형 정책 에이전트 기반 다자간 마이크로서비스 접근제어 정책)

  • Gu Min Kim;Song Heon Jeong;Kyung Baek Kim
    • Smart Media Journal
    • /
    • v.12 no.9
    • /
    • pp.60-71
    • /
    • 2023
  • A microservice architecture that accommodates the heterogeneity of various development environments and enables flexible maintenance can secure business agility to manage services in line with rapidly changing requirements. Due to the nature of MSA, where communication between microservices within a service is frequent, the boundary security that has been used in the past is not sufficient in terms of security, and a Zerotrust system is required. In addition, as the size of microservices increases, definition of access control policies according to the API format of each service is required, and difficulties in policy management increase, such as unnecessary governance overhead in the process of redistributing services. In this paper, we propose a microservice architecture that centrally manages policies by separating access control decision and enforcement with a general-purpose policy engine called OPA (Open Policy Agent) for collective and flexible policy management in Zerotrust security-applied environments.

Innovative Technologies in Higher School Practice

  • Popovych, Oksana;Makhynia, Nataliia;Pavlyuk, Bohdan;Vytrykhovska, Oksana;Miroshnichenko, Valentina;Veremijenko, Vadym;Horvat, Marianna
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.11
    • /
    • pp.248-254
    • /
    • 2022
  • Educational innovations are first created, improved or applied educational, didactic, educative, and managerial systems and their components that significantly improve the results of educational activities. The development of pedagogical technology in the global educational space is conventionally divided into three stages. The role of innovative technologies in Higher School practice is substantiated. Factors of effectiveness of the educational process are highlighted. Technology is defined as a phenomenon and its importance is emphasized, it is indicated that it is a component of human history, a form of expression of intelligence focused on solving important problems of being, a synthesis of the mind and human abilities. The most frequently used technologies in practice are classified. Among the priority educational innovations in higher education institutions, the following are highlighted. Introduction of modular training and a rating system for knowledge control (credit-modular system) into the educational process; distance learning system; computerization of libraries using electronic catalog programs and the creation of a fund of electronic educational and methodological materials; electronic system for managing the activities of an educational institution and the educational process. In the educational process, various innovative pedagogical methods are successfully used, the basis of which is interactivity and maximum proximity to the real professional activity of the future specialist. There are simulation technologies (game and discussion forms of organization); technology "case method" (maximum proximity to reality); video training methodology (maximum proximity to reality); computer modeling; interactive technologies; technologies of collective and group training; situational modeling technologies; technologies for working out discussion issues; project technology; Information Technologies; technologies of differentiated training; text-centric training technology and others.

A Dilemma of Kyrgyzstan Goes Through the Process of Nation-Building: National Security Problems and Independent National Defense Capability (국가건설과정에서 키르기스스탄의 국가안보와 자주국방의 딜레마)

  • Kim, Seun Rae
    • Journal of International Area Studies (JIAS)
    • /
    • v.14 no.4
    • /
    • pp.27-52
    • /
    • 2011
  • The regions of Central Asia have each acquired an elevated strategic importance in the new security paradigm of post-September 1lth. Comprised of five states, Kazakhstan, Kyrgyzstan, Tajikistan, Turkmenistan and Uzbekistan, Central Asia's newly enhanced strategic importance stems from several other factors, ranging from trans-national threats posed by Islamic extremism, drug production and trafficking, to the geopolitical threats inherent in the region's location as a crossroads between Russia, Southwest Asia and China. Although the U.S. military presence in the region began before September 11th, the region became an important platform for the projection of U.S. military power against the Taliban in neighboring Afghanistan. The analysis goes on to warn that 'with US troops already in place to varying extents in Central Asian states, it becomes particularly important to understand the faultlines, geography, and other challenges this part of the world presents'. The Kyrgyz military remains an embryonic force with a weak chain of command, the ground force built to Cold War standards, and an almost total lack of air capabilities. Training, discipline and desertion - at over 10 per cent, the highest among the Central Asian republics - continue to present major problems for the creation of combat-effective armed forces. Kyrgyzstan has a declared policy of national defence and independence without the use of non-conventional weapons. Kyrgyzstan participates in the regional security structures, such as the Collective Security Treaty Organisation (CSTO) and the Shanghai Co-operation Organisation (SCO) but, in security matters at least, it is dependent upon Russian support. The armed forces are poorly trained and ill-equipped to fulfil an effective counter-insurgency or counter-terrorist role. The task of rebuilding is much bigger, and so are the stakes - the integrity and sovereignty of the Kyrgyz state. Only democratization, the fight against corruption, reforms in the military and educational sectors and strategic initiatives promoting internal economic integration and national cohesion hold the key to Kyrgyzstan's lasting future

The Role and Issue analysis of the ADR's Committee in the Revision of Personal Information Protection Act (데이터 3법 개정에 따른 분쟁조정위원회 역할과 이슈분석)

  • Yoon, Duck Joong;Jee, Yoon Seok;Kim, Youngae;Shin, Yongtae
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.2
    • /
    • pp.279-286
    • /
    • 2020
  • On February 4, 2020, the Personal Information Protection Act ("Privacy Act") was amended to facilitate the convergence and utilization of data, a key resource of the Fourth Industrial Revolution, and to support the development of the data industry. As the scope of the law applies to telecommunications operators, financial operators, and personal information processing providers, the scope of related dispute settlement is expected to increase. Therefore, this paper first introduces the role and function of the Personal Information Dispute Committee and the institutional standards for personal information dispute mediation, and researches the roles and issues that the Personal Information Dispute Mediation Committee should play in accordance with the revision of the Data 3 Law. In this study, For efficient operation of personal information dispute mediation, expert deliberation by field, new adjustment criteria for new industrial technologies, way to secure business continuity between the Personal Information Dispute Committee and the Personal Information Committee, Secure the link between the mediation decision and courts, and Suggested the strengthening of the operational standards for collective dispute mediation.

The Novel Configuration of Integrated Network for Building Energy System (빌딩 에너지시스템 통합네트워크 구축에 관한 연구)

  • Hong, Won-Pyo
    • Proceedings of the Korean Institute of IIIuminating and Electrical Installation Engineers Conference
    • /
    • 2008.10a
    • /
    • pp.229-234
    • /
    • 2008
  • The new millennium has started with several innovations driven by fast evolution of the technologies in energy sector. A strong impulse towards the diffusion of new economical efficient technologies regulatory incentives related to energy production from renewable source and a small scale building trigeneration and to promotion of more sustainable environmental-friendly generation solutions, the evolution of electricity markets, more and more binding local emission constraints, and the need for improving the security of supply to reduce the energy system vulnerability. The 24 percentage energy quantify of total energy consumption consumes in commercial buildings and residential houses and the 30% portion of total $CO_2$ emissions covers also in the commercial buildings and residential houses sector. To cope with efficiently this energy sinuation in building sector, Building microgrid or building tooling, heating & power(BCHP) system has been interested in recent day due to meeting thermal and electric energy requirements efficiently and with appropriate energy quality. A multi agent system is a collective of intelligent agents that communicate with each other and work cooperatively to achieve common goals. Also, it is to medicate and coordinate communication between Control Areas and Security Coordinators for teal-time control of the BCHP system and the power pid. In this new circumstance, it is very important to integrate the power and energy delivery system and the information system(communication, networks, and intelligent equipment) that controls it. Therefore, development of smart control modules with open communication protocol and seamlessly interchange the data and information between control network and data network including extranet and intranet give a great meanings. We designed and developed the TCP/IP-CAN IED agent modules and ModBus./LonTalk/(TCP/IP) IED agent ones to configure the multi-agent system based smart energy network of commercial buildings and also intelligent algorithms for inverter fault diagnostics which ran be operated in control level or agent level network.

  • PDF

Administrative Leaders and Their Role in Bringing About Development and Organizational Change in Universities (Northern Border University Case Study)

  • Abdelrahman, Rashid Abdelbasit Saad
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.9
    • /
    • pp.67-78
    • /
    • 2021
  • The research aims to identify the role of administrative leaders working in universities in the success of organizational development and change, and the extent of the relationship and ability of administrative leaders at all levels of leadership within universities to the effectiveness of the process of development and organizational change at Northern Border University. In addition to presenting some recommendations and suggestions that can contribute to identifying the best leadership styles that contribute to the success of the development process and positive organizational change. Where leadership, whether in the private sector or the public sector, is one of the main functions concerned with the processes of direction, development, and modernization in the performance of the facility and an important element to activate the organizations' ability to perform their role and achieve their goals. The behavior and trends of leaders represent an important indicator in knowing the type of efforts made by them to improve performance and develop organizations and human resources. The research reached many results, perhaps the most important of which is that the dominant leadership style in universities is the democratic style, followed by the bureaucratic leadership style. The results also showed that there is a significant role for administrative leaders in bringing about development and positive change at Northern Border University at the level of individuals, groups, and organizations. And it became clear that there is an availability of leadership capabilities to an acceptable degree in the administrative leaders. The results of the statistical analysis showed a positive relationship between administrative leadership ability and democratic style. In addition to the existence of a negative relationship between the administrative leadership ability and the bureaucratic style and the freestyle. It was also clear that there were no differences in dealing between males and females, as well as age, educational qualification, experience, and job grade, but there were differences in dealing with the job title.

The Business Model of IoT Information Sharing Open Market for Promoting IoT Service (IoT 서비스 활성화를 위한 IoT 정보공유 오픈 마켓 비즈니스 모델)

  • Kim, Woo Sung
    • Journal of Information Technology Services
    • /
    • v.15 no.3
    • /
    • pp.195-209
    • /
    • 2016
  • IoT (Internet of Things) is a collective term referring to application services that provide information through sensors/devices connected to the internet. The real world application of IoT is expanding fast along with growing number of sensors/devices. However, since IoT application relies on vertical combination of sensors/devices networks, information sharing within IoT services remains unresolved challenge. Consequently, IoT sensors/devices demand high construction and maintenance costs, rendering the creation of new IoT services potentially expensive. One solution is to launch an IoT open market for information sharing similar to that of App Store for smart-phones. Doing so will efficiently allow novel IoT services to emerge across various industries, because developers can purchase licenses to access IoT resources directly via an open market. Sharing IoT resource information through an open market will create an echo-system conducive for easy utilization of resources and communication between IoT service providers, resource owners, and developers. This paper proposes the new business model of IoT open market for information sharing, and the requirements for ensuring security and standardization of open markets.

A Study on Quality Factors of Web Enabled Collective Intelligence as a Donor for Business Success (기업성과 향상을 위한 웹기반 집단지성의 품질요인에 관한 연구)

  • Normatov, R. Ismatilla;Joo, Jae-Hun
    • The Journal of Information Systems
    • /
    • v.20 no.3
    • /
    • pp.209-235
    • /
    • 2011
  • 비즈니스 조직에서 집단지성을 경쟁우위의 중요한 요소로 활용하는 사례가 증가하고 있다. 인터넷과 소셜 네트워크 서비스는 물론이고 위키와 같은 편집도구 등은 집단지성을 가능하게 하는 대표적인 정보기술이다. 그러나 집단지성은 전문가 지식에서와는 다른 품질의 문제가 제기되기도 한다. 따라서 본 연구에서는 집단지성의 품질에 영향을 주는 요인을 분석하는데 그 목적이 있다. 선행연구를 통해 집단지성의 품질에 영향을 주는 개인의 동기(love, money, glory, professional development), 집단특성(expertise, diversity, size), 집단지성의 도구(navigating, usefulness, agility, user preference) 차원에서 총 11개의 영향요인을 파악하였다. 조직 경쟁우위의 핵심으로 집단지성을 활용하는 대표적인 성공사례인 Threadless, InnoCentive, iStockphoto, Panda Security, Wikipedia를 분석하여 3개 차원에서 11개의 명제를 제안하였다. 사례분석의 결과, 개인의 동기, 집단특성, 집단지성을 위한 도구는 집단지성의 품질에 긍정적 영향을 주는 것으로 나타났다. 예를 들어, 개인적 동기가 뚜렷하고 다양한 특성을 지닌 다수가 참여할수록 소집단에서보다 더 잘 문제를 해결하고 있는 것으로 분석되었다. 따라서 집단지성의 품질을 개선하고 이를 통해 혜택을 얻기 위해서 조직에서는 다양성을 지닌 대규모 커뮤니티를 구성하고, 참여에 대한 동기를 부여하고, 적절한 집단지성의 도구를 선택하여 활용하여야 한다.