• Title/Summary/Keyword: secure communications

Search Result 486, Processing Time 0.029 seconds

Understanding ESG Management and the Possibility of ESG Archives (ESG 경영의 이해와 ESG 아카이브의 가능성)

  • Lim, JongChul
    • The Korean Journal of Archival Studies
    • /
    • no.79
    • /
    • pp.33-82
    • /
    • 2024
  • Interest in ESG management, which spread through the UN PRI in 2006, has recently spread throughout our society. Consumers use a company's activeness in the ESG field as the standard of consumption behavior, and the international community is reorganizing and strengthening various regulatory measures. In the investment market, non-financial performance (ESG information) is used as an important investment indicator along with financial performance (credit rating). Due to these changes in the corporate evaluation paradigm and market pressure, if a company neglects ESG response activities, it is more likely to be excluded from market selection, and accordingly, the importance of ESG management is also increasing. Companies are making various efforts to secure legitimacy in response to these market pressures, but in the process, it is difficult to systematically manage and utilize records/data that are the basis for ESG management. For a basic understanding of ESG management, this paper summarizes the emerging process of ESG and the current ESG-related regulations applied to companies. Through this, it can be seen that ESG management is not carried out with the good will of the company, but is accepted as a management strategy for the survival of the company according to the change in the corporate evaluation paradigm. Through interviews with the company's ESG-related personnel, the company's ESG response process was divided into passive communication and active communication, and the problems identified during the interview were summarized for each communication type. In addition, in the process of passively and actively communicating ESG management information with internal and external stakeholders, the possibility that ESG archives can function as a tool to overcome problems for each communication type was raised, and five types of ESG archives that can play this role were presented.

A Performance Comparison of the Mobile Agent Model with the Client-Server Model under Security Conditions (보안 서비스를 고려한 이동 에이전트 모델과 클라이언트-서버 모델의 성능 비교)

  • Han, Seung-Wan;Jeong, Ki-Moon;Park, Seung-Bae;Lim, Hyeong-Seok
    • Journal of KIISE:Information Networking
    • /
    • v.29 no.3
    • /
    • pp.286-298
    • /
    • 2002
  • The Remote Procedure Call(RPC) has been traditionally used for Inter Process Communication(IPC) among precesses in distributed computing environment. As distributed applications have been complicated more and more, the Mobile Agent paradigm for IPC is emerged. Because there are some paradigms for IPC, researches to evaluate and compare the performance of each paradigm are issued recently. But the performance models used in the previous research did not reflect real distributed computing environment correctly, because they did not consider the evacuation elements for providing security services. Since real distributed environment is open, it is very vulnerable to a variety of attacks. In order to execute applications securely in distributed computing environment, security services which protect applications and information against the attacks must be considered. In this paper, we evaluate and compare the performance of the Remote Procedure Call with that of the Mobile Agent in IPC paradigms. We examine security services to execute applications securely, and propose new performance models considering those services. We design performance models, which describe information retrieval system through N database services, using Petri Net. We compare the performance of two paradigms by assigning numerical values to parameters and measuring the execution time of two paradigms. In this paper, the comparison of two performance models with security services for secure communication shows the results that the execution time of the Remote Procedure Call performance model is sharply increased because of many communications with the high cryptography mechanism between hosts, and that the execution time of the Mobile Agent model is gradually increased because the Mobile Agent paradigm can reduce the quantity of the communications between hosts.

A Study about the Direction and Responsibility of the National Intelligence Agency to the Cyber Security Issues (사이버 안보에 대한 국가정보기구의 책무와 방향성에 대한 고찰)

  • Han, Hee-Won
    • Korean Security Journal
    • /
    • no.39
    • /
    • pp.319-353
    • /
    • 2014
  • Cyber-based technologies are now ubiquitous around the glob and are emerging as an "instrument of power" in societies, and are becoming more available to a country's opponents, who may use it to attack, degrade, and disrupt communications and the flow of information. The globe-spanning range of cyberspace and no national borders will challenge legal systems and complicate a nation's ability to deter threats and respond to contingencies. Through cyberspace, competitive powers will target industry, academia, government, as well as the military in the air, land, maritime, and space domains of our nations. Enemies in cyberspace will include both states and non-states and will range from the unsophisticated amateur to highly trained professional hackers. In much the same way that airpower transformed the battlefield of World War II, cyberspace has fractured the physical barriers that shield a nation from attacks on its commerce and communication. Cyberthreats to the infrastructure and other assets are a growing concern to policymakers. In 2013 Cyberwarfare was, for the first time, considered a larger threat than Al Qaeda or terrorism, by many U.S. intelligence officials. The new United States military strategy makes explicit that a cyberattack is casus belli just as a traditional act of war. The Economist describes cyberspace as "the fifth domain of warfare and writes that China, Russia, Israel and North Korea. Iran are boasting of having the world's second-largest cyber-army. Entities posing a significant threat to the cybersecurity of critical infrastructure assets include cyberterrorists, cyberspies, cyberthieves, cyberwarriors, and cyberhacktivists. These malefactors may access cyber-based technologies in order to deny service, steal or manipulate data, or use a device to launch an attack against itself or another piece of equipment. However because the Internet offers near-total anonymity, it is difficult to discern the identity, the motives, and the location of an intruder. The scope and enormity of the threats are not just focused to private industry but also to the country's heavily networked critical infrastructure. There are many ongoing efforts in government and industry that focus on making computers, the Internet, and related technologies more secure. As the national intelligence institution's effort, cyber counter-intelligence is measures to identify, penetrate, or neutralize foreign operations that use cyber means as the primary tradecraft methodology, as well as foreign intelligence service collection efforts that use traditional methods to gauge cyber capabilities and intentions. However one of the hardest issues in cyber counterintelligence is the problem of "Attribution". Unlike conventional warfare, figuring out who is behind an attack can be very difficult, even though the Defense Secretary Leon Panetta has claimed that the United States has the capability to trace attacks back to their sources and hold the attackers "accountable". Considering all these cyber security problems, this paper examines closely cyber security issues through the lessons from that of U.S experience. For that purpose I review the arising cyber security issues considering changing global security environments in the 21st century and their implications to the reshaping the government system. For that purpose this study mainly deals with and emphasis the cyber security issues as one of the growing national security threats. This article also reviews what our intelligence and security Agencies should do among the transforming cyber space. At any rate, despite of all hot debates about the various legality and human rights issues derived from the cyber space and intelligence service activity, the national security should be secured. Therefore, this paper suggests that one of the most important and immediate step is to understanding the legal ideology of national security and national intelligence.

  • PDF

Public Interest and Ownership Regulations in the Media Industry in the Era of Convergence Focused on Domestic Daily Newspapers' Ownership of Broadcasting Station (융합시대 미디어산업의 공익성과 소유규제 국내 종합일간지와 방송의 교차소유 문제를 중심으로)

  • Jun, Young-Beom
    • Korean journal of communication and information
    • /
    • v.46
    • /
    • pp.511-555
    • /
    • 2009
  • Media-related regulations can be classified into two categories; regulations of individual media contents and regulations regarding the entry to and withdrawal from a certain field. In this dissertation, ownership regulations are regarded as legal and political measures so as to prevent the monopoly and oligopoly of public opinion, and to secure its diversity. Every country has its own regulation model according to its particular media environment. Korea too is obliged to actively respond to its environmental changes, at the same time vitalizing the media industry and protecting consumers' rights and interests. Strong political intentions to protect the public interest is necessary when it comes to media regulation policies, especially in the circumstances that public interest is an industrial priority. As the convergence of broadcasting and telecommunications is leading to a major shift in the media industry, the regulation of cross-media ownership is an issue involving potential conflicts among media-owners, non-governmental organizations and the authorities concerned, depending on their various viewpoints regarding the media industry. In this paper, an attempt was made to search necessity of redefining 'public interest', which is the logic behind the restriction of cross-media ownership, and to reconceptualize issues on the centralization and diversity of media. First, an examination of the actual conditions of newspaper companies was carried out in order to reinvestigate domestic cross-media ownership issues, which is represented by the cross-ownership issue of newspapers and broadcasting stations. Next, the dilemma of policies stimulated by the fusion of media was discussed based on cross-media ownership restrictions, and the need for efficient conflict control was suggested. Finally, proposals on the independency and public confidence of media-related policy-making authorities, the rationalization of regulation models, an itemized discussion on cross-media ownership regulation issues, the elaboration of measures for a balanced development among media were made. It could be found that a number of foreign countries were still facing challenges to prevent monopoly and oligopoly of the public opinion and the industry. A solution to settle disagreements about the dilemma of the media industry, including the cross-media ownership regulation issues, must be arranged on the grounds of 'mutual respect of public interest and industrial interest', In Korea, an ease on the ownership regulations adapting to the change in the media industry may be considered, however the softening of the cross-media ownership regulations must be approached with the utmost care. Paradoxically Relieving cross-media ownership regulations may be considered the foundation of a richer field of journalism, where there is no need for concern over the monopoly and oligopoly of public opinion.

  • PDF

Science and Technology ODA Promotion of Korea through ICT of Global Problem Solving Centers -Suggestion on the mid- and short-term projects promotion of science and technology ODA roadmap- (글로벌문제해결거점 ICT화를 통한 한국형 과학기술 ODA 추진 -과학기술 ODA 중·단기 과제 추진에 대한 제언-)

  • Jung, Woo-Kyun;Shin, Kwanwoo;Jeong, Seongpil;Park, Hunkyun;Park, Eun Sun;Ahn, Sung-Hoon
    • Journal of Appropriate Technology
    • /
    • v.7 no.2
    • /
    • pp.162-171
    • /
    • 2021
  • The Korean government proposed the K-SDGs in 2019 to promote the UN SDGs, but the role and tasks of science and technology, an important means of implementing the SDGs, have not been materialized. Accordingly, the role of science and technology ODA for the SDGs was established through the Ministry of Science and ICT's policy research project 'Science and Technology ODA Promotion Roadmap for Spreading the New Southern Policy and Realizing the 2030 SDGs'. In addition, goals, strategies, and core tasks for the next 10 years were derived in 10 fields such as water, climate change, energy, and ICT. In this paper, we analyze 30 key tasks of the ODA promotion roadmap for science and technology for the realization of SDGs, and propose mid- and short-term tasks and implementation plans for effective roadmap promotion. Among the key tasks in each field, four common elements were derived: ICT/smartization, a global problem-solving center, cooperation/communication platform, and business model/startup support platform/living lab that can create and integrate roadmap implementation conditions. In addition, the four mid- and short-term tasks, 1) Establishment of science and technology ODA network, 2) Establishment of living lab business platform linked to start-up support business, 3) Local smartization of recipient countries, and 4) Expand and secure sustainability of global problem-solving centers, were set in relation to the implementation of the detailed roadmap. For the derived mid- and short-term tasks, detailed implementation plans based on the ICTization of global problem-solving centers were presented. The implementation of the mid- and short-term tasks presented in this paper can contribute to the more effective achievement of the science and technology ODA roadmap, and it is expected that Korea's implementation of SDGs will also achieve high performance.

Chinese Communist Party's Management of Records & Archives during the Chinese Revolution Period (혁명시기 중국공산당의 문서당안관리)

  • Lee, Won-Kyu
    • The Korean Journal of Archival Studies
    • /
    • no.22
    • /
    • pp.157-199
    • /
    • 2009
  • The organization for managing records and archives did not emerge together with the founding of the Chinese Communist Party. Such management became active with the establishment of the Department of Documents (文書科) and its affiliated offices overseeing reading and safekeeping of official papers, after the formation of the Central Secretariat(中央秘書處) in 1926. Improving the work of the Secretariat's organization became the focus of critical discussions in the early 1930s. The main criticism was that the Secretariat had failed to be cognizant of its political role and degenerated into a mere "functional organization." The solution to this was the "politicization of the Secretariat's work." Moreover, influenced by the "Rectification Movement" in the 1940s, the party emphasized the responsibility of the Resources Department (材料科) that extended beyond managing documents to collecting, organizing and providing various kinds of important information data. In the mean time, maintaining security with regard to composing documents continued to be emphasized through such methods as using different names for figures and organizations or employing special inks for document production. In addition, communications between the central political organs and regional offices were emphasized through regular reports on work activities and situations of the local areas. The General Secretary not only composed the drafts of the major official documents but also handled the reading and examination of all documents, and thus played a central role in record processing. The records, called archives after undergoing document processing, were placed in safekeeping. This function was handled by the "Document Safekeeping Office(文件保管處)" of the Central Secretariat's Department of Documents. Although the Document Safekeeping Office, also called the "Central Repository(中央文庫)", could no longer accept, beginning in the early 1930s, additional archive transfers, the Resources Department continued to strengthen throughout the 1940s its role of safekeeping and providing documents and publication materials. In particular, collections of materials for research and study were carried out, and with the recovery of regions which had been under the Japanese rule, massive amounts of archive and document materials were collected. After being stipulated by rules in 1931, the archive classification and cataloguing methods became actively systematized, especially in the 1940s. Basically, "subject" classification methods and fundamental cataloguing techniques were adopted. The principle of assuming "importance" and "confidentiality" as the criteria of management emerged from a relatively early period, but the concept or process of evaluation that differentiated preservation and discarding of documents was not clear. While implementing a system of secure management and restricted access for confidential information, the critical view on providing use of archive materials was very strong, as can be seen in the slogan, "the unification of preservation and use." Even during the revolutionary movement and wars, the Chinese Communist Party continued their efforts to strengthen management and preservation of records & archives. The results were not always desirable nor were there any reasons for such experiences to lead to stable development. The historical conditions in which the Chinese Communist Party found itself probably made it inevitable. The most pronounced characteristics of this process can be found in the fact that they not only pursued efficiency of records & archives management at the functional level but, while strengthening their self-awareness of the political significance impacting the Chinese Communist Party's revolution movement, they also paid attention to the value possessed by archive materials as actual evidence for revolutionary policy research and as historical evidence of the Chinese Communist Party.