• Title/Summary/Keyword: secure communication

Search Result 1,667, Processing Time 0.03 seconds

Effective Management of Invasive Nutria (Myocastor coypus) in the UK and the USA (영국과 미국에서 침입성 뉴트리아 (Myocastor coypus)의 효과적 관리)

  • Kil, Jihyon;Lee, Do-hun;Kim, Young-chae
    • Ecology and Resilient Infrastructure
    • /
    • v.2 no.4
    • /
    • pp.265-273
    • /
    • 2015
  • It is the better to take preventative measures against the natural intrusion in advance from invasive alien species that reduce biodiversity and cause economic loss to humans. If the prevention of intrusion and spread fails, we need to make active control and eradication. This study aims to introduce nutria (Myocastor coypus) control cases performed in the United Kingdom and the United States and to provide information for the contribution of nutria management measure improvements. The nutria eradication campaign in the United Kingdom was developed as a long-term plan based on sufficient understanding on the management target and objective and suitable support. Sufficient information on nutria was accumulated and the management strategy was flexibly modified according to the changes in management that were proactively reflected in the field. Regarding the eradication project at Chesapeake Bay in the United States, based on long-term ecological information, more advanced capture technology than in the United Kingdom were introduced and the eradication plan, strategy and implementation were configured by analyzing the strengths and weaknesses of the eradication campaign in the United Kingdom. The successful cases in the United Kingdom and the United State provide an information on how to improv the nutria management measure. For the eradication of nutria, it is necessary to reach a consensus between stakeholders and to form a consultative group between related organizations for periodic communication. Opinions on the field must be actively accepted in the consultation process for strategy and policy decision, and the eradication plan needs to be developed based on a management index. The eradication plan is required to be managed, evaluated and adjusted in a systematic way. Scientific management must be introduced and the management performance must be evaluated objectively so that a practical plan can be flexibly adjusted. It is also required to secure a long-term budget support and a stable organization and to input a concentrated budget at the proper period when there is high efficiency of eradication.

A Study on the Stereotype of ICT SMEs' R&D: Empirical Evidence from Korea (ICT 중소기업 R&D의 스테레오타입에 대한 연구 : 한국의 사례를 중심으로)

  • Jun, Seung-pyo;Choi, San;Jung, JaeOong
    • Journal of Korea Technology Innovation Society
    • /
    • v.20 no.2
    • /
    • pp.334-367
    • /
    • 2017
  • The ICT industry has been the main driver of Korea's economy with international competitiveness and is expected to be the growth engine that will revitalize the currently depressed economy. A broad range of different perspectives and opinions on the industry exist in Korea and overseas. Some of these are stereotypes, not all of which are based on objective evidence. Stereotypes refer to widely-held fixed opinions on a specific group and do not necessarily have negative connotations. However, they should not be viewed lightly because they can substantially affect decision-making process. In this regard, this study sought to review the stereotypes of ICT industry and identify objective and relative stereotypes. In the study, a decision-tree analysis was conducted on a survey result of 3,300 small and medium-sized enterprises (SMEs) in order to identify Korean ICT companies' characteristics that distinguish them from other technology companies. The decision-tree analysis, a data mining process based on machine learning, took a total of 291 variables into account in 10 subjects such as: corporate business in general, technology development activities as well as organization and people in technology development. Identifying the variables that distinguish ICT companies from other technology companies with the decision-tree analysis, the study then came up with a list of objective stereotypes of ICT companies. The findings from the stereotypes of Korean ICT companies are as follows. First, the companies are in need of technology policies that help R&D planning and market penetration. Second, policies must better support the companies working to sell new products or explore new business. Third, the companies need policies that support secure protection of development outcomes and proper management of IP rights. Fourth, the administrative procedures related to governmental support for ICT companies' R&D projects must be simplified. It is hoped that the outcome of this study will provide meaningful guidance in establishment, implementation and evaluation of technology policies for ICT SMEs, particularly to policymakers or researchers in relevant government agencies who determine R&D policies for ICT SMEs.

A Study about the Direction and Responsibility of the National Intelligence Agency to the Cyber Security Issues (사이버 안보에 대한 국가정보기구의 책무와 방향성에 대한 고찰)

  • Han, Hee-Won
    • Korean Security Journal
    • /
    • no.39
    • /
    • pp.319-353
    • /
    • 2014
  • Cyber-based technologies are now ubiquitous around the glob and are emerging as an "instrument of power" in societies, and are becoming more available to a country's opponents, who may use it to attack, degrade, and disrupt communications and the flow of information. The globe-spanning range of cyberspace and no national borders will challenge legal systems and complicate a nation's ability to deter threats and respond to contingencies. Through cyberspace, competitive powers will target industry, academia, government, as well as the military in the air, land, maritime, and space domains of our nations. Enemies in cyberspace will include both states and non-states and will range from the unsophisticated amateur to highly trained professional hackers. In much the same way that airpower transformed the battlefield of World War II, cyberspace has fractured the physical barriers that shield a nation from attacks on its commerce and communication. Cyberthreats to the infrastructure and other assets are a growing concern to policymakers. In 2013 Cyberwarfare was, for the first time, considered a larger threat than Al Qaeda or terrorism, by many U.S. intelligence officials. The new United States military strategy makes explicit that a cyberattack is casus belli just as a traditional act of war. The Economist describes cyberspace as "the fifth domain of warfare and writes that China, Russia, Israel and North Korea. Iran are boasting of having the world's second-largest cyber-army. Entities posing a significant threat to the cybersecurity of critical infrastructure assets include cyberterrorists, cyberspies, cyberthieves, cyberwarriors, and cyberhacktivists. These malefactors may access cyber-based technologies in order to deny service, steal or manipulate data, or use a device to launch an attack against itself or another piece of equipment. However because the Internet offers near-total anonymity, it is difficult to discern the identity, the motives, and the location of an intruder. The scope and enormity of the threats are not just focused to private industry but also to the country's heavily networked critical infrastructure. There are many ongoing efforts in government and industry that focus on making computers, the Internet, and related technologies more secure. As the national intelligence institution's effort, cyber counter-intelligence is measures to identify, penetrate, or neutralize foreign operations that use cyber means as the primary tradecraft methodology, as well as foreign intelligence service collection efforts that use traditional methods to gauge cyber capabilities and intentions. However one of the hardest issues in cyber counterintelligence is the problem of "Attribution". Unlike conventional warfare, figuring out who is behind an attack can be very difficult, even though the Defense Secretary Leon Panetta has claimed that the United States has the capability to trace attacks back to their sources and hold the attackers "accountable". Considering all these cyber security problems, this paper examines closely cyber security issues through the lessons from that of U.S experience. For that purpose I review the arising cyber security issues considering changing global security environments in the 21st century and their implications to the reshaping the government system. For that purpose this study mainly deals with and emphasis the cyber security issues as one of the growing national security threats. This article also reviews what our intelligence and security Agencies should do among the transforming cyber space. At any rate, despite of all hot debates about the various legality and human rights issues derived from the cyber space and intelligence service activity, the national security should be secured. Therefore, this paper suggests that one of the most important and immediate step is to understanding the legal ideology of national security and national intelligence.

  • PDF

Universal Ethics and Pragmatic Pluralism (보편윤리학과 실용주의적 다원론)

  • Kwon, Su-Hyeon
    • The Journal of the Convergence on Culture Technology
    • /
    • v.7 no.1
    • /
    • pp.446-453
    • /
    • 2021
  • This paper deals with two methods regarding fact and value. One is the method of H. Putnam, which is to break the boundary between fact and value and to make a world where the two have an inherent connection. The other is the method of J. Habermas, which regards fact and value as the product of an intersubjective agreement based on argumentation. Putnam, through his position of internal realism, moves from realism to pragmatism, especially by combining the rationalist tradition of Kant and Dewey's pragmatic views. Habermas also stands in the tradition of rationalism and universalism in Kant, at the same time emphasizing the practicability of truth in Hegel's tradition of historical reason. The significance of the strategy of Putnam and Habermas is that they have attempted to revive the realm of value against the strict dichotomy of facts and values and the subsequent devaluation of rationality in the realm of value. The starting point of this attempt is that the practical foundation of rationality is laid on life and practice. This could provide the room for escaping from rationality, which prioritizes only truths that reveal facts, that is, instrument-reduced rationality, the room for the revival of practical rationality through reflection on what is the purpose of life, and, in turn, the room for resisting to pass the realm of values and norms to the logic of habitual routines or customs. However, despite such common goal, there are clear limitations to Putnam's approach due to the differences in the strategies taken on facts and values. Putnam's method can demolish the whole universal framework that is the foundation where pragmatic pluralism will be fostered, eliminating the difference between the specificity of values and the universality of norms and shaking up the status of universal ethics. Therefore, Habermas' ethical theory is proposed as an alternative to establish a basis for universal ethics by relying on communication rationality and to secure the coercion of norms and blossom cultural pluralism as a diverse lifestyle based on this coercion.

Science and Technology ODA Promotion of Korea through ICT of Global Problem Solving Centers -Suggestion on the mid- and short-term projects promotion of science and technology ODA roadmap- (글로벌문제해결거점 ICT화를 통한 한국형 과학기술 ODA 추진 -과학기술 ODA 중·단기 과제 추진에 대한 제언-)

  • Jung, Woo-Kyun;Shin, Kwanwoo;Jeong, Seongpil;Park, Hunkyun;Park, Eun Sun;Ahn, Sung-Hoon
    • Journal of Appropriate Technology
    • /
    • v.7 no.2
    • /
    • pp.162-171
    • /
    • 2021
  • The Korean government proposed the K-SDGs in 2019 to promote the UN SDGs, but the role and tasks of science and technology, an important means of implementing the SDGs, have not been materialized. Accordingly, the role of science and technology ODA for the SDGs was established through the Ministry of Science and ICT's policy research project 'Science and Technology ODA Promotion Roadmap for Spreading the New Southern Policy and Realizing the 2030 SDGs'. In addition, goals, strategies, and core tasks for the next 10 years were derived in 10 fields such as water, climate change, energy, and ICT. In this paper, we analyze 30 key tasks of the ODA promotion roadmap for science and technology for the realization of SDGs, and propose mid- and short-term tasks and implementation plans for effective roadmap promotion. Among the key tasks in each field, four common elements were derived: ICT/smartization, a global problem-solving center, cooperation/communication platform, and business model/startup support platform/living lab that can create and integrate roadmap implementation conditions. In addition, the four mid- and short-term tasks, 1) Establishment of science and technology ODA network, 2) Establishment of living lab business platform linked to start-up support business, 3) Local smartization of recipient countries, and 4) Expand and secure sustainability of global problem-solving centers, were set in relation to the implementation of the detailed roadmap. For the derived mid- and short-term tasks, detailed implementation plans based on the ICTization of global problem-solving centers were presented. The implementation of the mid- and short-term tasks presented in this paper can contribute to the more effective achievement of the science and technology ODA roadmap, and it is expected that Korea's implementation of SDGs will also achieve high performance.

A Study on the Korea Future Internet Promotion Plan for Cyber Security Enhancement (사이버 보안 강화를 위한 한국형 미래 인터넷 추진 방안에 관한 연구)

  • Lim, Gyoo-Gun;Jin, Hai-Yan;Ahn, Jae-Ik
    • Informatization Policy
    • /
    • v.29 no.1
    • /
    • pp.24-37
    • /
    • 2022
  • Amid rapid changes in the ICT environment attributed to the 4th Industrial Revolution, the development of information & communication technology, and COVID-19, the existing internet developed without considering security, mobility, manageability, QoS, etc. As a result, the structure of the internet has become complicated, and problems such as security, stability, and reliability vulnerabilities continue to occur. In addition, there is a demand for a new concept of the internet that can provide stability and reliability resulting from digital transformation-geared advanced technologies such as artificial intelligence and IoT. Therefore, in order to suggest a way of implementing the Korean future internet that can strengthen cybersecurity, this study suggests the direction and strategy for promoting the future internet that is suitable for the Korean cyber environment through analyzing important key factors in the implementation of the future internet and evaluating the trend and suitability of domestic & foreign research related to future internet. The importance of key factors in the implementation of the future internet proceeds in the order of security, integrity, availability, stability, and confidentiality. Currently, future internet projects are being studied in various ways around the world. Among numerous projects, Bright Internet most adequately satisfies the key elements of future internet implementation and was evaluated as the most suitable technology for Korea's cyber environment. Technical issues as well as strategic and legal issues must be considered in order to promote the Bright Internet as the frontrunner Korean future internet. As for technical issues, it is necessary to adopt SAVA IPv6-NID in selecting the Bright Internet as the standard of Korean future internet and integrated data management at the data center level, and then establish a cooperative system between different countries. As for strategic issues, a secure management system and establishment of institution are needed. Lastly, in the case of legal issues, the requirement of GDPR, which includes compliance with domestic laws such as Korea's revised Data 3 Act, must be fulfilled.

A Changes in China's Landscape Scenic Sites System and Suggestions for Application of Major Policies to Scenic Sites of Korea (중국 풍경명승구 제도의 변천과 주요정책의 국내 명승 적용 제언)

  • Kim, Dong-Hyun;Lee, Jian-Feng;Shin, Hyun-Sil
    • Journal of the Korean Institute of Traditional Landscape Architecture
    • /
    • v.41 no.2
    • /
    • pp.11-18
    • /
    • 2023
  • This study aims to distinguish what can be used in consideration of the national situation with Korea for Chinese Scenic and Historic Interest Areas, and the results are as follows; First, the Chinese Scenic and Historic Interest Areas expanded to the existing scenic cruise culture, travel, and tourism culture in the process of the influx of Western culture in the modern and contemporary era, and became popular as a travel destination. Accordingly, the Chinese government developed the tourism industry around the scenic sites, and thanks to the development of transportation and communication, the Scenic and Historic Interest Areas has become an important national heritage. This influenced the establishment of the system related to Scenic and Historic Interest Areas, and today, it is operated around the Scenic and Historic Interest Areas ordinance. Second, the designation of the Scenic and Historic Interest Areas is divided into the size of the site according to the area, and the process of selecting the Scenic and Historic Interest Areas classification, rating evaluation, and comprehensive value evaluation according to evaluation indicators and rating standards is carried out. Accordingly, according to the results of the classification, it is subdivided from the national level to the Scenic and Historic Interest Areas at the local level. Third, the central government is in charge of managing and supervising Scenic and Historic Interest Areas across the country, and the local government's construction department is in charge of supervising Scenic and Historic Interest Areas in the region. The management organization of Scenic and Historic Interest Areas established by local governments above the county level has a system that actually protects, utilizes, and manages Scenic and Historic Interest Areas. In addition, 14 detailed indicators are used to monitor Scenic and Historic Interest Areas. Based on these results, considering the application of the domestic scenic site policy, the method of developing the policy that has established the system from the perspective of the utilization of the people is worth considering. On the other hand, the evaluation of the designation and management system through the setting of various indicators has limitations in that it is difficult to secure objectivity in impressing or evaluating the landscape. Therefore, rather than blindly introducing quantified evaluation, it seems that guidance and promotion on how to expand consensus on scenic values and enjoy heritage should be prioritized.