• Title/Summary/Keyword: security service

Search Result 3,770, Processing Time 0.035 seconds

A Study on the Introduction of Effective Route Exchange System in the VTS Area (해상교통관제해역 내 효과적 경로교환 체계 도입에 관한 연구)

  • Pak, Chae-Hong;Jung, Chang-Hyun;Park, Sung-Hyeon
    • Journal of Navigation and Port Research
    • /
    • v.38 no.3
    • /
    • pp.217-225
    • /
    • 2014
  • The system that covers gathering, integrating, exchanging, presenting and analyzing of information within ships and shores for the safety and security in Marine Environment is known as e-Navigation Policy. Northern Europe has been conducting research and development. It came up into a concept that deals with ship's route information between vessels as well as vessels to shores which is better known as route exchange system. The research showed substantial advantages on navigational safety by exchanging the route information between vessels in vicinity and vessels to shores. Therefore, upon the adaptation of route exchange System as a major function in integrated navigational system, the existing procedures in VTS could be changed for betterment. In this study, it was verified the effectiveness of route exchange system by the adaptation of a recent collision accident occurred in Korean coast and suggested that route exchange system which would be carried out by the discretion of VTS center in VTS area. Finally, it proposed the new functions for outstanding services and procedures of integrating traffic organization services on coastal VTS for an effective route exchange system in Korean coastal area.

Process Model for 6 Sigma(${\sigma}$) in Construction Management(CM) (건설사업관리(CM)에서의 6시그마(${\sigma}$) 적용 조건 분석을 통한 추진 모델 구축)

  • Kim, Chan-Gyo;Lee, Jea-Sauk;Chun, Jae-Youl
    • Proceedings of the Korean Institute Of Construction Engineering and Management
    • /
    • 2006.11a
    • /
    • pp.478-482
    • /
    • 2006
  • The domestic enterprises in order to secure the freshness location of market from the international competition which is keen are propelling a price and a quality high position strategy steadily. It is put in competitive situation with the overseas enterprises and even from construction industry it follows in construction market opening and there is not another idea to the research the management strategies, directions and focus competitive elements of the enterprise against, what it sees consequently and to rise to the priority where the competitive power reinforcement of the enterprise is important, it becomes. Competitive power of like this enterprise for a reinforcement the technique which induces a big interest 6 Sigma is technique from the many companies. 6 sigma preceding researches of manufacturing and service industry the fact that it is accomplished with the object which will carry most. The research which relates with construction industry is staying to an introduction of 6 sigma the investigation phase, the actual introduction introduces and "S" construction there is not only a possibility against the application result of having a limit because it is applying. It is like that but like referring to a minute description for the international competitive power security which it follows in the change which market environment is sudden 6 sigma the introduction will judge, indispensability development of the logical propriety against hereupon and it will reach and it verifies the question investigation for to lead, 6 sigma of the construction companies it confirms the application possibility and presents the propulsion model as 6 sigma the fact that overcoming the limit characteristic of that introduction application as objective of sample research means it will do.

  • PDF

Significant Factors for Building Enterprise Mobile Cloud (기업용 모바일 클라우드 시스템 구축 시 고려 요인)

  • Lee, Jae-Jin;Oh, Jun-Seok;Lee, Bong-Gyou
    • The KIPS Transactions:PartD
    • /
    • v.18D no.6
    • /
    • pp.481-492
    • /
    • 2011
  • Recently, various mobile services are provided by the spread of wireless network infrastructures and smart devices. The improvement of cloud computing technologies increases the interests for enterprise mobile cloud services in various IT companies as well. By increasing the interests for enterprise mobile cloud services, it is necessary to evaluate the use of enterprise mobile cloud services. Therefore, the factors which affect the user acceptance of enterprise mobile cloud services are analyzed on the basis of Davis' technology acceptance model in this research. As analysis results, four external variables have significant effects on perceived ease of use of mobile cloud services. Also, these variables indirectly affect attitude toward using cloud services. The results show that the security is the most important factor for attitude toward using enterprise mobile cloud services. The service users also consider the interoperability as an important factor for the user acceptance of cloud services. The perceived ease of use has more contribution than the perceive usefulness on attitude toward using enterprise mobile cloud services. This research has both industrial and academic contributions because it provides the guideline to companies for introducing the enterprise mobile cloud services and apply the technology acceptance model on new IT services.

Implementation and Validation of the Web DDoS Shelter System(WDSS) (웹 DDoS 대피소 시스템(WDSS) 구현 및 성능검증)

  • Park, Jae-Hyung;Kim, Kang-Hyoun
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.4 no.4
    • /
    • pp.135-140
    • /
    • 2015
  • The WDSS improves defensive capacity against web application layer DDoS attack by using web cache server and L7 switch which are added on the DDoS shelter system. When web DDoS attack occurs, security agents divert traffic from backbone network to sub-network of the WDSS and then DDoS protection device and L7 switch block abnormal packets. In the meantime, web cache server responds only to requests of normal clients and maintains stable web service. In this way, the WDSS can counteract the web DDoS attack which generates small traffic and depletes server-client session resource. Furthermore, the WDSS does not require IP tunneling because it is not necessary to retransfer the normal requests to original web server. In this paper, we validate operation of the WDSS and verify defensive capability against web application layer DDoS attacks. In order to do this, we built the WDSS on backbone network of an ISP. And we performed web DDoS tests by using a testing system that consists of zombie PCs. The tests were performed by three types and various amounts of web DDoS attacks. Test results suggest that the WDSS can detect small traffic of the web DDoS attacks which do not have repeat flow whereas the formal DDoS shelter system cannot.

Comparative Study of the Effects of the Intermodal Freight Transport Policies (인터모달 추진 정책과 효과에 관한 비교연구)

  • Woo, Jung-Wouk
    • Journal of Distribution Science
    • /
    • v.13 no.10
    • /
    • pp.123-133
    • /
    • 2015
  • Purpose - The Korean government has devised intermodal transportation policies and granted subsidies to shippers and logistics companies that made a conversion of transportation means through the policies. This provides support by expanding the complex uniform railroad transportation and overhauling the deteriorated railroad facilities. As for 2013, however, the freight transportation percentage of railroad was 4.5% in tons and 8.5% in ton kilometers. Meanwhile, since the 1990s, developed countries such as the U.S. and Europe have been trying to expand intermodal freight transport with a legal and institutional support to build a logistics system corresponding with social and economic environmental changes. In this study, I set out to examine the effects of the intermodal freight transport policies in the EU and the U.S., and to explore the direction of setting up a rail intermodal transport system in South Korea. Research design, data, and methodology - The paper used a qualitative research methodology through the literature review. First, was an overview of Intermodal transportation in the EU, U.S. and UN. Second, it describes the development of transport in Europe and the U.S. with particular emphasis on intermodal freight transport. Third, it explores the direction of setting up a intermodal freight transport in South Korea. The last section contains concluding remarks. Results - As for the EU, it has been promoting integration between transport and intermodal logistics network designs while utilizing ITS or ICT and supports for rail freight intermodal by giving reduction to a facilities fee or subsidizing for rail freight in order to minimize the cost of external due to freight transport. On the other hand, as for the U.S., it has been made up of an industrial-led operating project and has been promoting it to improve accessibility between intermodal hubs and cargo terminals through intermodal corridor program, and an intermodal cargo hub access corridor projects, etc. Moreover, it has tried to construct intermodal transport system using ITS or ICT and to remove Barrier. As a result, in these countries, the proportion of intermodal freight transport is going to be the second significant transport compared with rail and maritime transport. An Effective rail intermodal transport system is needed in South Korea, as seen in the case of these countries. In order to achieve this object, the following points are required to establish radical infrastructure policy; diversify investment financing measures taken under public-private partnerships, legal responsibilities, improvement of utilization of existing facilities to connect the railway terminal and truck terminal, and enhancement service competitiveness through providing cargo tracking and security information that combines the ITS and ICT. Conclusions - This study will be used as a basis for policy and support for intermodal freight transport in South Korea. In the future, it is also necessary to examine from the perspective of the shipper companies using the rail intermodal transport, ie, recognition of shipper, needed institutional supports, and transportation demand forecasting and cost-effective analysis of the railway infrastructure systems improvement.

Application and Policy Direction of Blockchain in Logistics and Distribution Industry (물류 및 유통산업의 블록체인 활용과 정책 방향)

  • Kim, Ki-Heung;Shim, Jae-Hyun
    • The Journal of Industrial Distribution & Business
    • /
    • v.9 no.6
    • /
    • pp.77-85
    • /
    • 2018
  • Purpose - The purpose of this study is to subdivide trade transaction-centered structure in a logistics/distribution industry system to apply blockchain, to establish and resolve with which types of technology, and to provide policy direction of government institution and technology to apply blockchain in this kind of industry. Research design, data, and methodology - This study was conducted with previous researches centered on cases applied in various industry sectors on the basis of blockchain technology. Results - General fields of blockchain application include digital contents distribution, IoT platform, e-Commerce, real-estate transaction, decentralized app. development(storage), certification service, smart contract, P2P network infrastructure, publication/storage of public documents, smart voting, money exchange, payment/settlement, banking security platform, actual asset storage, stock transaction and crowd funding. Blockchain is being applied in various fields home and abroad and its application cases can be explained in the banking industry, public sector, e-Commerce, medical industry, distribution and supply chain management, copyright protection. As examined in the blockchain application cases, it is expected to establish blockchain that can secure safety through distributed ledger in trade transaction because blockchain is established and applied in various sectors of industries home and abroad. Parties concerned of trade transaction can secure visibility even in interrupted specific section when they provide it as a base for distributed ledger application in trade and establish trade transaction model by applying blockchain. In case of interrupted specific section by using distributed ledger, blockchain model of trade transaction needs to be formed to make it possible for parties concerned involved in trade transaction to secure visibility and real-time tracking. Additionally, management should be possible from the time of contract until payment, freight transfer to buyers through land, air and maritime transportation. Conclusions - In order to boost blockchain-based logistics/distribution industry, the government, institutionally, needs to back up adding legal plan of shipping, logistics and distribution, reviewing standardization of electronic switching system and coming up with blockchain-based industrial road maps. In addition, the government, technologically, has to support R&D for integration with other high technology, standardization of distribution industry's blockchain technology and manpower training to expand technology development.

A Study on the Threat of Biological Terrorism in modern society (현대사회의 환경변화에 따른 Bio-Terror의 위협요인 연구)

  • Kang, young-sook;Kim, Tae-hwan
    • Journal of the Society of Disaster Information
    • /
    • v.1 no.1
    • /
    • pp.3-26
    • /
    • 2005
  • In recent years, there is growing concern about the potential use of biological agents in war or acts of terrorism accompanied an increased realization that rapid preparedness and response are needed to prevent or treat the human damage that can be caused by these agents. The threat is indeed serious, and the potential for devastating numbers of casualties is high. The use of agents as weapons, even on a small scale, has the potential for huge social and economic disruption and massive diversion of regional and national resources to combat the threat, to treat primary disease, and to clean up environmental contamination. Biological weapons are one of weapons of mass destruction (or mass casualty weapons, to be precise. since they do not damage non-living entities) that are based on bacteria, viruses, rickettsia, fungi or toxins produced by these organisms. Biological weapons are known to be easy and cheap to produce and can be used to selectively target humans, animals, or plants. Theses agents can cause large numbers of casualties with minimal logistical requirements (in wide area). The spread of disease cannot be controlled until there is awareness of the signs of infection followed by identification of agents; and if the organism is easily spread from person to person, as in the case of smallpox, the number of casualties could run into the tens of thousands. Biological weapons could be used covertly, there can be a lot of different deployment scenarios. A lot of different agents could be used in biological weapons. And, there are a lot of different techniques to manufacture biological weapons. Terrorist acts that make use of Biological Agents differ in a number of ways from those involving chemicals. The distinction between terrorist and military use of Biological Weapon is increasingly problematic. The stealthy qualities of biological weapons further complicate the distinction between terrorism and war. In reality, all biological attacks are likely to require an integrated response involving both military and civilian communities. The basic considerations when public health agencies establish national defence plan against bioterrorism must be 1) arraying various laws and regulations to meet the realistic needs, 2)education for public health personnels and support of concerned academic society, 3)information collection and cooperative project with other countries, 4)Detection and surveillance(Early detection is essential for ensuring a prompt response to biological or chemical attack, including the provision of prophylactic medicines, chemical antidotes, or vaccines) and 5) Response(A comprehensive public health response to a biological or chemical terrorist event involves epidemiologic investigation, medical treatment and prophylaxis for affacted persons, and the initiation of disease prevention or environmental decontamination measures). The purpose of this paper is providing basic material of preparedness and response for biological terrorism in modern society.

  • PDF

Recommendations of the Korean Society for Health Education and Promotion for Developing the Korean Credentialing Policy of Health Education Specialist (보건교육사 제도정립의 방향)

  • Kim, Kwang-Kee;Kim, Keon-Yeop;Kim, Young-Bok;Kim, Hye-Kyeong;Park, Kyoung-Ok;Park, Chun-Man;Lee, Moo-Sik
    • Korean Journal of Health Education and Promotion
    • /
    • v.25 no.2
    • /
    • pp.73-89
    • /
    • 2008
  • Objectives: This research was conducted to suggest a recommendation for the Korean credentialing policy of health education specialist as the primary human resource in community health promotion activities from the special group perspective of the Korean Society for Health Education and Promotion. Methods: This research was conducted by the professional focus group discussion and descriptive literature review on health education and promotion. Results: This draft recommendation for Korean credentialing system development of health education specialist was based on the four background reasons for modifying health promotion related acts, for developing better policy of health education credentialing, for keeping the public and ethical responsibilities as the competitive professional society, and for improving health promotion activities in Korea. Theoretical background of the four reasons was Ottawa Charter. We classified three credentialing levels of health education specialist based on health education own competencies, coordiating competencies with environmental factors, and research competencies. Furthermore, we developed 10 major roles and categorized 53 sub-roles based on these competencies above. We recommended 10 classes required to take to become Health Education Specialist. These 10 classes were developed based on the credentialing systems in the United States and Japan. These 10 classes were about health education and promotion methods and strategies not health intervention topics. We also built the draft plan for continuing education to keep KCHES based on the NCHEC in the United States. Conclusions: Further research should be conducted to build better health education specialist credentialing systems modifing current communtiy-based health promotion activities in terms of modifying public regulation, developing KCHEC examination system, protecting job security both in public and private sectors, and creating professionalism in KCHEC.

Automatic Detection Approach of Ship using RADARSAT-1 Synthetic Aperture Radar

  • Yang, Chan-Su
    • Journal of the Korean Society of Marine Environment & Safety
    • /
    • v.14 no.2
    • /
    • pp.163-168
    • /
    • 2008
  • Ship detection from satellite remote sensing is a crucial application for global monitoring for the purpose of protecting the marine environment and ensuring marine security. It permits to monitor sea traffic including fisheries, and to associate ships with oil discharge. An automatic ship detection approach for RADARSAT Fine Synthetic Aperture Radar (SAR) image is described and assessed using in situ ship validation information collected during field experiments conducted on August 6, 2004. Ship detection algorithms developed here consist of five stages: calibration, land masking, prescreening, point positioning, and discrimination. The fine image was acquired of Ulsan Port, located in southeast Korea, and during the acquisition, wind speeds between 0 m/s and 0.4 m/s were reported. The detection approach is applied to anchoring ships in the anchorage area of the port and its results are compared with validation data based on Vessel Traffic Service (VTS) radar. Our analysis for anchoring ships, above 68 m in length (LOA), indicates a 100% ship detection rate for the RADARSAT single beam mode. It is shown that the ship detection performance of SAR for smaller ships like barge could be higher than the land-based radar. The proposed method is also applied to estimate the ship's dimensions of length and breadth from SAR radar cross section(RCS), but those values were comparatively higher than the actual sizes because of layover and shadow effects of SAR.

  • PDF

The Impact of Change Management Activities on Members' Emotional-Organizational Commitment During the Military Restructuring - Focused on the Mediating Effect of Change Acceptance - (조직구조 개편 시 변화관리활동 지각이 구성원의 정서적 조직몰입에 미치는 영향 - 변화수용의 매개효과를 중심으로 -)

  • Seo, Jeong-Wan;Baek, Seung-Nyoung
    • Management & Information Systems Review
    • /
    • v.38 no.4
    • /
    • pp.159-182
    • /
    • 2019
  • The purpose of this study is to investigate the impact of members' perception of unit change management efforts on their emotional-organizational commitment during the military restructuring. The mediating effect of change acceptance of the members in this relationship is also studied. Currently, the military is seeking to restructure its military construct in order to actively cope with the rapidly changing security situation and the decrease in military service resources. If an organization fails to effectively manage its changes when undergoing restructuring, it is difficult to expect the success of organizational change due to its members' resistance to change. Therefore, this study suggested the effect of members' perception of personnel fairness and transformational leadership on their emotional-organizational commitment and the mediating role of the members' change acceptance in the relationship between them as the hypotheses. Survey results show that personnel justice and transformational leadership has a positive impact on the emotional-organizational commitment of the members, and that the change acceptance of the members partially mediates the relationship between them. By presenting the mediating effect of change acceptance with theoretical implications, the theory has been expanded. In practice, the change management activities for the restructuring of the military structure have been identified, and the effort for enhancing the change acceptance of the members is required to success on the organizational restructuring.