• Title/Summary/Keyword: logistics security

Search Result 232, Processing Time 0.027 seconds

Privacy protection and non-repudiation security mechanisms for logistics (프라이버시 보호 및 부인방지를 위한 물류 운송 보안 기법)

  • Choi, Min-Seok;Lee, Dong-Hoon;Kang, Min-Soo
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2012.04a
    • /
    • pp.695-698
    • /
    • 2012
  • 개인정보보호법이 제정 및 시행됨에 따라서 고유식별정보를 처리하는 경우 그 고유식별정보가 분실, 도난, 유출, 변조 또는 훼손 되지 않아야 한다[1]. 하지만 현재 운송업계의 택배 서비스를 이용 시 고유식별정보가 고스란히 노출 되어있으며, 위 변조 또한 가능하다. 이러한 주소, 성명, 전화번호 등 개인을 식별할 수 있는 개인정보를 악용하여, 명의 도용이나 피싱 등의 심각한 문제가 발생될 수 있다. 현재 택배 시스템은 발신, 수신, 배송에 대한 사고 및 논쟁 발생 시 그에 따른 증거자료가 부족하기 때문에 책임이 불명확하다. 이를 사전에 방지하기 위해서는 관련된 증거를 생성, 수집, 유지, 활용, 검사하는 절차와 그 역할을 담당할 신뢰된 제3의 기관이 필요하다. 본 논문에서는 현재의 택배 시스템을 점검해 보고 개인정보보호 차원에서의 해결방안을 모색하는 것과 발신, 수신, 배송의 부인방지 서비스 적용을 목표로 한다.

A Study of China's Condition as the Logistics Hub of Northeast Asia and a Development Strategy (중국의 동북아 물류중심화 현황과 발전전략에 관한 연구)

  • Oh, Moon-Kap
    • Journal of Distribution Science
    • /
    • v.12 no.2
    • /
    • pp.95-103
    • /
    • 2014
  • Purpose - Korea has a better geographical location than other nations in the Northeast Asian region. This means that Korea has an opportunity to become the center of international physical distribution in Northeast Asia. Korea should take advantage of this opportunity by exploring appropriate strategies to achieve this goal, assuming government willingness, with a view to capitalizing on the geographical advantage of the Korean peninsula and constructing a comprehensive physical distribution network system. If we prepare for this scenario, Korea could become the center of international physical distribution in Northeast Asia. Research design, data, and methodology - This study has the purpose of determining how shipping companies form partnerships with third-party logistics providers, and the relevant implications. The survey methods used were personal interview and a questionnaire distributed through e-mail, fax, mail, and telephone. A total of 600 questionnaires were distributed, out of which 285 were returned. Of the collected questionnaires, 10 were excluded because of insufficient content, leaving 275 to be used in the study as available valid samples. The data that was collected from these samples was analyzed using the data coating process and by employing a statistical package program. Results - Flexible policies, administration, and systems will be needed to create better business practices. In this dissertation, first and foremost, the results reveal that in order to become the center of Northeast Asian logistics, Korea must transition into a new paradigm based on the current economic and social systems that have stemmed from bureaucracy, inflexibility, chauvinism, and egalitarianism. Flexible policies, administration, and systems will be required to create better business practices. Domestic logistics corporations need to occupy a strategic logistics hub, create a logistics network, and activate value-added logistics business strategies by ensuring significant manpower and by building a logistics information system to strengthen their competitive edge, creating an improved system. Conclusions - In this dissertation, first and foremost, we point out that in order to become a center of North East Logistics, Korea should change to a new paradigm from the old one based on current economic and social systems that have stemmed from bureaucracy, inflexibility, chauvinism, and egalitarianism. More reasonable business laws, systems, and policies based on market-driven flexibility and transparency should be created. Moreover, social norms and rules should be reasonably established, to accomplish political and social security. Korea has to cultivate a culture of tolerance for foreign companies. This involves a change of paradigm for the development of the capital city and satellite cities. It will take a powerful task force or organization to plan and execute the vision that aims to meet these needs, accomplish the necessary goals, use the appropriate system effectively, and make Korea a key country in the field of Northeast Asian logistics.

Efficiency Analysis of Social Security Expenditure in 31 Provinces and Autonomous Regions in China

  • ZHOU, Lin-Lin;KIM, Hyung-Ho
    • East Asian Journal of Business Economics (EAJBE)
    • /
    • v.9 no.2
    • /
    • pp.1-10
    • /
    • 2021
  • Purpose - The purpose of this study is to measure the efficiency of social security expenditure in 31 provinces, cities and autonomous regions in China and proposes corresponding improvement plans. Research design, data, and methodology - The data were obtained from the statistical yearbook of each province. The BCC and CCR models of DEA model and Malmquist index are used to analyze the efficiency, and the input-output index is expanded. Result - The results show that the social security performance of the Chinese government has improved on the whole despite the unbalanced development in different regions. Each region should look for strategies to improve the efficiency of social security according to its own problems. The study suggests that provinces affected by TCI should improve their internal environment, such as raising social security fund structure and strengthening fund supervision, to improve efficiency. Areas affected by TECI need to be more responsive to policy, socio-economic and technological development. Conclusion - The research conclusion can provide reference for Chinese provinces to improve the efficiency of social security expenditure in the future. This study is not comprehensive enough in the selection of input-output indicators, which can be further expanded in the future.

Cybersecurity Development Status and AI-Based Ship Network Security Device Configuration for MASS

  • Yunja Yoo;Kyoung-Kuk Yoon;David Kwak;Jong-Woo Ahn;Sangwon Park
    • Journal of Navigation and Port Research
    • /
    • v.47 no.2
    • /
    • pp.57-65
    • /
    • 2023
  • In 2017, the International Maritime Organization (IMO) adopted MSC.428 (98), which recommends establishing a cyber-risk management system in Ship Safety Management Systems (SMSs) from January 2021. The 27th International Association of Marine Aids to Navigation and Lighthouse Authorities (IALA) also discussed prioritizing cyber-security (cyber-risk management) in developing systems to support Maritime Autonomous Surface Ship (MASS) operations (IALA guideline on developments in maritime autonomous surface ships). In response to these international discussions, Korea initiated the Korea Autonomous Surface Ship technology development project (KASS project) in 2020. Korea has been carrying out detailed tasks for cybersecurity technology development since 2021. This paper outlines the basic concept of ship network security equipment for supporting MASS ship operation in detailed task of cybersecurity technology development and defines ship network security equipment interface for MASS ship applications.

Design of Port Security System Using Deep Learning and Object Features (딥러닝과 객체 특징점을 활용한 항만 보안시스템 설계)

  • Wang, Tae-su;Kim, Minyoung;Jang, Jongwook
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2022.05a
    • /
    • pp.50-53
    • /
    • 2022
  • Recently, there have been cases in which counterfeit foreign ships have entered and left domestic ports several times. Vessels have a ship-specific serial number given by the International Maritime Organization (IMO) to identify the vessel, and IMO marking is mandatory on all ships built since 2004. In the case of airports and ports, which are representative logistics platforms, a security system is essential, but it is difficult to establish a security system at a port and there are many blind spots, which can cause security problems due to insufficient security systems. In this paper, a port security system is designed using deep learning object recognition and OpenCV. The security system process extracts the IMO number of the ship after recognizing the object when entering the ship, determines whether it is the same ship through feature point matching for ships with entry records, and stores the ship image and IMO number in the entry/exit DB for the first arrival vessel. Through the system of this paper, port security can be strengthened by improving the efficiency and system of port logistics by increasing the efficiency of port management personnel and reducing incidental costs caused by unauthorized entry.

  • PDF

Modeling Of Management Decisions Of Organization Of Production Systems

  • Arutiunian, Yevhen;Mikhailutsa, Olena;Pozhuyev, Andriy;Аzhazha, Maryna;Arutiunian, Iryna;Zrybnieva, Iryna;Slyva, Yuliia
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.7
    • /
    • pp.87-92
    • /
    • 2021
  • Analysis of current state of construction industry functioning in Ukraine allows us to identify a number of problems having negative impact on sustainable development of construction industry, especially in terms of its organization. Therefore, it is absolutely essential to study existing methods of organization system supplying construction sites with necessary material resources. Companies can develop their own logistics departments, which independently solve logistics issues related to transportation organization and management, accounting and inventory management, acquisition and warehousing, intercommunication (ability to obtain both final and intermediate information during transporting materials). Using a complex of methods is substantiated: the hierarchy analysis method (Saati's method), the network method, the defect elimination algorithm DEA, the transportation problem that finds optimal problem solutions for construction sector with the purpose of rational supplying uninterrupted construction with building resources in the designed model "provider-transportation-costs".

A Study on Cyber Security Management Awareness of Vessel Traffic Service Personnel Using IPA (IPA분석을 활용한 해상교통관제 인원의 사이버 보안 관리 인식 연구)

  • Sangwon Park;Min-Ji Jeong;Yunja Yoo;Kyoung-Kuk Yoon
    • Journal of the Korean Society of Marine Environment & Safety
    • /
    • v.28 no.7
    • /
    • pp.1140-1147
    • /
    • 2022
  • With the development of digital technology, the marine environment is expected to change rapidly. In the case of autonomous vessels, technology is being developed in many countries, and the international community has begun to discuss ways to operate it. Changes in ships cause changes in the marine traffic environment and urge changes to aids to navigation. This study aims to analyze the cyber security management awareness of VTS personnel to improve the cyber security system for aids to navigation. To this end, the current status of cyber security management was reviewed with a focus on VTS, and a survey was conducted on VTS personnel. The survey analysis used the IPA methodology, and as a result of the analysis, a clear difference was observed in the perception of cybersecurity between those with experience in security and those without experience. In addition, technical measures related to cyber-attack detection and blocking should be implemented with the highest priority. The results of this study can be used as basic data for improving the cyber security management system for aids to navigation.

Anti-Crisis Management In The System Of Economic Security Of International Business

  • Blakyta, H.V.;Zubko, T.L.;Zhuk, O.S.;Kasianova, A.O.;Guliaieva, N.M.;Vavdiichyk, I.M.
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.8
    • /
    • pp.269-274
    • /
    • 2022
  • Economy of Ukraine is characterized by the rapidly increased level of financial failures at a corporate level. Conditions of doing business in Ukraine become tighter year after year and it should motivate the business owners not only to watch more accurately the state in which their business is but also to introduce new, more precise, more tight systems of crisis management and economic security. The experience shows that in order to stay afloat and not to suffer losses companies should pay more attention to different areas of economic security, such as production potential, financial indicators, logistics, staff, etc. For this purpose companies should use a system of valuation of the most important for their activity indicators and transform their values in an integral one in order to use this assessment in making managerial decisions. Such a valuation is one of the components which the article presents. The article also reveals the key points which characterize crisis management as an integral part of enterprise development and economic security. There are specified the essence and problems of crisis management and proposed the ways of raising the level of economic security of a company based on the example of an industrial and commercial enterprise. The key focus of the enterprise's economic security management is defined as constructive responses to threats from the external environment and, as a result, ensuring stable functioning and effective realization of untapped potential in the future. The current assumption is to explain the scheme of strategic management of an industrial and commercial enterprise and to calculate the methodology of an express assessment of the level of enterprise economic security, taking into account the components of crisis management. To assess the level of economic security of the enterprise, it is proposed to use the method of point assessment, which is based on a multi-level system of indicators, which covers the main areas of the enterprise's activity.

Priority of Modularization in Weapon System by using Grey Relational Analysis (GRA를 활용한 무기체계 모듈화 우선순위선정)

  • Lee, Kang-Taek;Lee, Jung-Hoon;Cho, Il-Hoon;Jung, Joo-Hyun;Kim, Geun-Hyung
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.17 no.9
    • /
    • pp.647-654
    • /
    • 2016
  • In the defense industry, national security takes priority over economic sense and this has translated into high cost and long-term research and development. However, the exponential growth of technology and rapid changes in the security situation in recent years have resulted in a call for the development of systems at a low cost within a short period of time. In order to implement a modularization strategy in the field of defense, the introduction of line replaceable units in OO systems needs to be prioritized. This study selects six criteria following a literature review and prioritizes 11 modules for OO systems using the project evaluation method, Grey Relational Analysis (GRA). Based on the GRA results, the grey relational grades were derived as 0.83, 0.81 and 0.80 for the M11 (Main board), M8 (EMI module), M3 (Single board computer) modules, respectively. The cost and time of development is expected to be reduced in accordance with the grey relational grade. The results of this research could be utilized for decision making on adopting modularization in similar system development or product improvement programs (PIPs).

Authing Service of Platform: Tradeoff between Information Security and Convenience (플랫폼의 소셜로그인 서비스(Authing Service): 보안과 편의 사이의 적절성)

  • Eun Sol Yoo;Byung Cho Kim
    • Information Systems Review
    • /
    • v.20 no.1
    • /
    • pp.137-158
    • /
    • 2018
  • Online platforms recently expanded their connectivity through an authing service. The growth of authing services enabled consumers to enjoy easy log in access without exerting extra effort. However, multiple points of access increases the security vulnerability of platform ecosystems. Despite the importance of balancing authing service and security, only a few studies examined platform connectivity. This study examines the optimal level of authing service of a platform and how authing strategies impact participants in a platform ecosystem. We used a game-theoretic approach to analyze security problems associated with authing services provided by online platforms for consumers and other linked platforms. The main findings are as follows: 1) the decreased expected loss of consumers will increase the number of players who participate in the platform; 2) linked platforms offer strong benefits from consumers involved in an authing service; 3) the main platform will increase its effort level, which includes security cost and checking of linked platform's security if the expected loss of the consumers is low. Our study contributes to the literature on the relationship between technology convenience and security risk and provides guidelines on authing strategies to platform managers.