• Title/Summary/Keyword: security demands

Search Result 252, Processing Time 0.022 seconds

Challenges in nuclear energy adoption: Why nuclear energy newcomer countries put nuclear power programs on hold?

  • Philseo Kim;Hanna Yasmine;Man-Sung Yim;Sunil S. Chirayath
    • Nuclear Engineering and Technology
    • /
    • v.56 no.4
    • /
    • pp.1234-1243
    • /
    • 2024
  • The pressing need to mitigate greenhouse gas emissions has stimulated a renewed interest in nuclear energy worldwide. However, while numerous countries have shown interest in nuclear power over the course of history, many of them have not continued their pursuit and chosen to defer or abandon their peaceful nuclear power projects. Scrapping a national nuclear power program after making initial efforts implies significant challenges in such a course or a waste of national resources. Therefore, this study aims to identify the crucial factors that influence a country's decision to terminate or hold off its peaceful nuclear power programs. Our empirical analyses demonstrate that major nuclear accidents and leadership changes are significant factors that lead countries to terminate or defer their nuclear power programs. Additionally, we highlight that domestic politics (democracy), lack of military alliance with major nuclear suppliers, low electricity demand, and national energy security environments (energy import, crude oil price) can hamper a country's possibility of regaining interest in a nuclear power program after it has been scrapped, suspended, or deferred. The findings of this study have significant implications for policymakers and stakeholders in the energy sector as they strive to balance the competing demands of energy security, and environmental sustainability.

The Factors That Cause Customer Satisfaction in Private Security Service: Comparison between Corporate Clients and Individual Clients (민간경비 서비스의 고객 만족도에 영향을 미치는 요인: 사업자고객과 개인고객의 비교)

  • Shin, So-Ra;Cho, Youn-Oh
    • Korean Security Journal
    • /
    • no.34
    • /
    • pp.161-184
    • /
    • 2013
  • The purpose of this research is to achieve qualitative growth for private security industry as a sector of service industry to attract clients and promote the growth of the private security industry by analyzing the factors which influence the customer's service satisfaction in using the private security services. A regression analysis was conducted to determine the factors which influences the satisfaction of private security service to ultimately achieve the research purpose. In the regression analysis, the difference between corporate clients and individual clients were analyzed for the sake of providing better security services and marketing applications. As a result, the factors that influences the satisfaction of the categorized groups were very clearly signified. Both individual and corporate clients showed increase in satisfaction rate when the fear of crime decreased. This result implies that the private security firms must possess segmented strategies as well as strategies to lower the fear factors of clients. There were no differences in all satisfaction-influencing factors when the fear reduction variable was exempted among both corporate and individual clients in usage satisfaction. This result shows that clients demand varies according to the client and the security firms must react to these demands by the clients. Although private security industry possess very clear publicity, it is a profit generating industry sector therefore, like other service industry, the private security services must implement strategies to keep up with the paradigm. If the satisfaction determinants from the research results are grafted into strategies such relationship marketing and target market selection, higher service satisfaction can be achieved from the clients.

  • PDF

A Study on the Development of a Training Course for Ship Cyber Security Officers (선박 사이버보안 책임자를 위한 교육과정 개발에 관한 연구)

  • Lee, Eunsu;Ahn, Young-Joong;Park, Sung-ho
    • Journal of the Korean Society of Marine Environment & Safety
    • /
    • v.26 no.7
    • /
    • pp.830-837
    • /
    • 2020
  • With the rapid development of information and communication technology, information exchange between ships and shore has become faster and more convenient, However, accessing ship information has also become easier and concerns about cyber security attacks are growing. When a ship suffers a cyber-attack, it may cause considerable damage and incurs enormous costs and time to repair. In response to this threat, the maritime industry now demands that a cyber security officer be assigned to each ship to take charge of cyber security management onboard. In order to reduce the damage cause by an attack and to respond effectively, a specialized training course for the ship's cyber security officer is required. The purpose of this study was to present a training course for the position of the ship's cyber security officer, and to highlight the necessity of amending current legislation, To this end, domestic and foreign trends, ship cyber security incident cases, and cyber security training courses were investigated, and based on the results a standard training course for a ship's cyber security of icer was developed. Additionally, recommendations on the related amendments to legislation ware established. The results of the study can be used as basic data to establish future training courses for cyber security officers.

Building a Database of DQT Information to Identify a Source of the SmartPhone JPEG Image File (스마트폰 JPEG 파일의 출처 식별을 위한 DQT 정보 데이터베이스 구축)

  • Kim, MinSik;Jung, Doowon;Lee, Sang-jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.26 no.2
    • /
    • pp.359-367
    • /
    • 2016
  • As taking pictures by using smartphones has become more common in society, there are many incidents which are unexpected manipulation of images and leak of confidential information. Because of those incidents, demands that identify forgery/alteration of image file and proves of the original copy is constantly increasing. In general, smartphone saves image file as JPEG form and it has DQT which determines a compression rate of image in a header part of image. There is also DQT in Thumbnail image which inside of JPEG. In previous research, it identified a smartphone which take image by only using DQT, However, the research has low accuracy to identify the devices. There are two main purposes in this research. First, this research will analogize a smartphone and an application that takes a picture, edits and save an image file by testing not only about a DQT information but also a information of Thumbnail image. Second, the research will build a database of DQT and Thumbnail information in JPEG file to find more accurate image file's origin.

A Comparative Study on Reforming the Resident Registration Number (주민등록번호 개선방안 비교연구)

  • Kim, Seon-Ju;Lee, Kyung-Ho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.3
    • /
    • pp.673-689
    • /
    • 2015
  • Resident Registration Number(RRN) has been used broadly by public institutions or civilian departments as a means of personal identification due to its effectiveness and convenience in managing the information. Recently, because of personal information leakage including resident registration number, the potential damage is increasing public anxiety. In this situation, there have been demands requiring systems that can end the link between the resident registration number and personal information. In order to solve the problem, multiple alternatives are under consideration. In this research, we will discuss limits, needs for change of the system, and the basic concepts or traits that new registration number require. Also, by comparing the alternatives being discussed, we will analyze personal information security level and the cost required for reorganizing the system to present alternative that has high effectiveness.

A study on development strategies for military spiritual education complying with the era of peace and prosperity on the Korean Peninsula (한반도 평화와 번영시대에 부합하는 군 정신전력 교육 발전방안)

  • Kim, Nam-Seok;Park, Hyo-Sun
    • Journal of National Security and Military Science
    • /
    • s.15
    • /
    • pp.1-30
    • /
    • 2018
  • This study focused on how to supplement and develop military spiritual education in response to promotion of peace and prosperity and Change of Security Environment on the Korean Peninsula. In order to succeed in the peace and prosperity on the Korean Peninsula policy, Strengthening the military spiritual education is necessary. This study was analyzed through the survey and the results are as follows: First, the awareness level of military spiritual education is more than 68%. Second, the satisfaction level of education has been quit motivated, but, the respondents demands various methods of eduction. Third, the current mental power scores showed no significant difference for environmental change. In addition, based on the results of the research, the problem of military spiritual education is as follows. It is not enough to secure the identity that can firmly support the era of peace and prosperity on the Korean peninsula. Poor budget support might hinder improving poor education facilities and outdated equipment. Furthermore, there is a lack of research on future-oriented educational system in support of traditional education methods of repetition-type repeated education and unification. Therefore, we deducted the following development strategies for the military spiritual education in this paper. First, it is necessary to strengthen the military spiritual education to support the era of peace and prosperity on the Korean Peninsula. Second, for enhancing educational environments, the educational facilities and equipments should be improved by understanding the characteristics of the education target. Third, the integrated management of military research institutes specialized in military spiritual education should be pursued as a system development for ensuring the continuous effect of education. In conclusion, continuous attention and research are needed to establish national perspective and national security perspective, raise the military spirit and utilize various education development programs in order to develop efficient military spiritual education in the future.

  • PDF

Anonymity User Authentication Scheme with Smart Cards preserving Traceability (추적이 가능한 스마트카드 사용자 인증 기법)

  • Kim, Se-Il;Chun, Ji-Young;Lee, Dong-Hoon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.18 no.5
    • /
    • pp.31-39
    • /
    • 2008
  • Recently, remote user authentication schemes using smart cards has been researched to provide user privacy because of increasing interest and demands. Previously, provided authentication schemes were only concerned about providing user privacy against outside attackers, but the scheme. which guarantees user privacy against both a remote server and outside attackers, has been recently demanded because the user's information has leaked out through the service providers. When the remote server perceives a user doing a malicious act, the server should be able to trace the malicious user by receiving help from a trust agency. In this paper, we suggest a scheme which not only guarantees user privacy against both a remote server and outside attackers, but also provides traceable anonymity authentication.

A Basic Study on the Development of Standard Service Model Provided by Korea Coast Guard at Fishing Port (어항의 해양경찰 서비스 표준 모델개발에 관한 기초 연구)

  • Park, Seong-Ryong;Jin, Sung-Yong;Ju, Jong-Kwang;Lee, Eun-Bang
    • Proceedings of KOSOMES biannual meeting
    • /
    • 2008.05a
    • /
    • pp.25-31
    • /
    • 2008
  • In order to develope the standard service model of coast guard at fishing ports, which responses to the demand of users and provides them with the good and tailored maritime administration services with limited resources, the services of Korea coast guard related to fishermen are sorted and their demands are analyzed at Nokdong fishing port. The standard service model for Nokdong on the basis of user's requests and maritime administration demands in the future is designed.

  • PDF

BandBlock: Bandwidth allocation in blockchain-empowered UAV-based heterogeneous networks

  • Kuna Venkateswarararao;Pratik Kumar;Akash Solanki;Pravati Swain
    • ETRI Journal
    • /
    • v.44 no.6
    • /
    • pp.945-954
    • /
    • 2022
  • The 5G mobile network is promising to handle the dynamic traffic demands of user equipment (UE). Unmanned aerial vehicles (UAVs) equipped with wireless transceivers can act as flying base stations in heterogeneous networks to ensure the quality of service of UE. However, it is challenging to efficiently allocate limited bandwidth to UE due to dynamic traffic demands and low network coverage. In this study, a blockchain-enabled bandwidth allocation framework is proposed for secure bandwidth trading. Furthermore, the proposed framework is based on the Cournot oligopoly game theoretical model to provide the optimal solution; that is, bandwidth is allocated to different UE based on the available bandwidth at UAV-assisted-based stations (UBSs) with optimal profit. The Cournot oligopoly game is performed between UBSs and cellular base stations (CBSs). Utility functions for both UBSs and CBSs are introduced on the basis of the available bandwidth, total demand of CSBs, and cost of providing cellular services. The proposed framework prevents security attacks and maximizes the utility functions of UBSs and CBSs.

A Study on Correlations between Private Security Enterprise's Relationship Characteristics and Purchasing Behaviors (민간경비업체의 관계적 특성과 구매행동의 관계)

  • Kim, In-Jae;Cho, Sung-Jin
    • Korean Security Journal
    • /
    • no.29
    • /
    • pp.35-57
    • /
    • 2011
  • While demands on private securities have been increase, expectations on the service quality as compensation for the investment expensive is also rising. However, private security services are in situations of not satisfying various customer's needs owing to insufficient special manpower, capital, and skills in spite of expected high-quality services toward customers. Therefore, this study aims to find out the causality between private security enterprises and relationship characteristics, purchasing behaviors of customers, and then searching for a marketing strategy that can provide best services to the enterprises that are confronting to limitless competitive systems by grasping customer's needs and necessities. For achieving this goal, the study objected to shop employees using private security enterprises after diving Cheonan City of South Chungcheong Province into South, East and East, West, and then collected 236 persons by using the convenience sampling. Regarding to research tools, this study used questionnaire having been recomposed based on previous researches home and abroad, and frequency analysis, reliability analysis, factor analysis, correlation analysis, and regression analysis were carried out data was treated by treatments by using SPSS version 18.0 statistic package for treating the data. Through above research methods and procedures, results could be gotten same as followings. First, correlations between private security enterprise's relationship characteristics and purchasing behaviors showed positive (+) relations, and the latter was increased as much as relationship characteristics were high. Second, as the result of analyzing correlations between private security enterprise's relationship characteristics and purchasing behaviors, reputation, physical features, and communication affected influences to word of mouth activities. Third, reputation and communication affected to repeated purchasing behaviors as the result of analyzing private security's relationship characteristics and repeat purchasing behaviors.

  • PDF