• Title/Summary/Keyword: 보안성 강화

Search Result 853, Processing Time 0.021 seconds

Traffic Operation Strategy for the Mixed Traffic Flow on Autonomous Vehicle Pilot Zone: Focusing on Pangyo Zero City (자율주행차 혼재 시 시범운행지구 교통운영전략 수립: 판교제로시티를 중심으로)

  • Donghyun Lim;Woosuk Kim;Jongho Kim;Hyungjoo Kim
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.22 no.1
    • /
    • pp.172-191
    • /
    • 2023
  • This study was undertaken to strategize the mixed traffic operation of autonomous vehicles in the pilot zone. This was achieved by analyzing the changes expected when autonomous vehicles are mixed in the autonomous vehicle pilot zone. Although finding a safe and efficient traffic operation strategy is required for the pilot zone to serve as a test bed for autonomous vehicles, there is no available operation strategy based on the mixture of autonomous vehicles. In order to presents a traffic operation strategies for each period of autonomous vehicle introduction, traffic efficiency and safety analysis was performed according to the autonomous vehicle market percentage rate. Based on the analysis results, the introduction stage was divided into introductory stage, transition period, and stable period based on the autonomous vehicle market share of 30% and 70%. This study presents the following traffic operation strategies. Considering the traffic flow operation strategy, we suggest the advancement of the existing road infrastructure at the introductory stage, and operating an autonomous driving lane and the mileage system during the transition period. We also propose expanding the operation of autonomous driving lanes and easing the speed limit during the stable period. In the traffic safety strategy, we present a manual and legal system for responding to autonomous vehicle accidents in the introductory stage, an analysis of the causes of autonomous vehicle accidents and the implementation of preventive policies in the transition period, and the advancement of the autonomous system and the reinforcement of the security system during the stable period. Through the traffic operation strategy presented in this study, we foresee the possibility of preemptively responding to the changes of traffic flow and traffic safety expected due to the mixture of autonomous vehicles in the autonomous vehicle pilot zone in the future.

Comparative Analysis of Anti-Terrorism Act and its Enforcement Ordinance for Counter-Terrorism Activities (대테러 활동을 위한 테러 방지법과 시행령의 비교 분석)

  • Yoon, Hae-Sung
    • Korean Security Journal
    • /
    • no.48
    • /
    • pp.259-285
    • /
    • 2016
  • As the need for anti-terrorism legislation has been continuously argued, Anti-terrorism act has been enacted and enforced. On the other hand, there still remain a lot of points to be discussed regarding the definition of the concept of terrorism, matters of human rights violations, strengthening authority of the investigation and intelligence agencies, and mobilization military forces for the suppression of terrorism. Also, reviewing Anti-terrorism act and its enforcement ordinance draft, this legislation seems to regulate terrorist groups like IS. If so, in the case of terrorism of North Korea or domestic anti-government organizations, whether this law would be applied could become an issue. In the case of terrorism of North Korea, Ministry of National Defense has a right of commandership in the military operations, however, it is also possible to apply the article 4 of Natural Security Act a crime of performing objective-or a crime of foreign exchange on Criminal law as legal grounds for not military terrorisms but general investigations. Therefore, it is necessary to involve consideration about this matter. Furthermore, in the view of investigation, Anti-terrorism act and its enforcement ordinance draft do not mention Supreme Prosecutors Office and Ministry of Justice that conduct investigations. In the case of terrorism, the police and prosecution should conduct to arrest criminals and determine crimes at the investigation stage, however, any explicit article related to this content in Anti-terrorism act and its enforcement ordinance draft was unable to be found. Although Anti-terrorism act is certainly toward preventive aspects, considering some matters such as prevention, actions on the scene, maneuver after terrorism, arresting terrorists, investigation direction, cooperation, and mutual assistance, it is necessary to reflect these contents in Anti-terrorism act. In other words, immediately after terrorists attacks, it is possible to mobilize the military operations by Integrated Defense act in order to arrest them in the case of military terrorism. Nevertheless, because both military terrorism and general one are included in the investigation stage, it needs to begin an investigation under the direction of the prosecution. Therefore, above all, a device for finding out the truth behind the case at the investigation stage is not reflected in the current Anti-terrorism act and its enforcement ordinance draft. Accordingly, if National Intelligence Service approaches information at the prevention level in this situation, it may be necessary to come up with follow-up measures of the police, the prosecution, and military units.

  • PDF

Influence of Motivational, Social, and Environmental Factors on the Learning of Hackers (동기적, 사회적, 그리고 환경적 요인이 해커의 기술 습득에 미치는 영향)

  • Jang, Jaeyoung;Kim, Beomsoo
    • Information Systems Review
    • /
    • v.18 no.1
    • /
    • pp.57-78
    • /
    • 2016
  • Hacking has raised many critical issues in the modern world, particularly because the size and cost of the damages caused by this disruptive activity have steadily increased. Accordingly, many significant studies have been conducted by behavioral scientists to understand hackers and their practices. Nonetheless, only qualitative methods, such as interviews, meta-studies, and media studies, have been employed in such studies because of hacker sampling limitations. Existing studies have determined that intrinsic motivation was the dominant factor influencing hackers, and that their techniques were mainly acquired from online hacking communities. However, such results have yet to be causally proven. This study attempted to identify the causal factors influencing the motivational and environmental factors encouraging hackers to learn hacking skills. To this end, hacker community members using the theory of planned behavior were observed to identify the causal factors of their learning of hacking skills. We selected a group of students who were developing their hacking skills. The survey was conducted over a two-week period in May 2015 with a total of 227 students as respondents. After list-wise deletion, 215 of the responses were deemed usable (94.7 percent). In summary, the hackers were aware that hacking skills are considered socially unethical, and their attitudes toward the learning of hacking skills were affected by both intrinsic and extrinsic motivations. In addition, the characteristics of the online hacking community affected their perceived behavioral control. This study introduced new concepts in the process of conducting a causal relationship analysis on a hacker sample. Moreover, this research expanded the discussion on the causal direction of subjective norms in unethical research, and empirically confirmed that both intrinsic and extrinsic motivations affect the learning of hacking skills. This study also made a practical contribution by raising the educational and policy response issues for ethical hackers and demonstrating the necessity to intensify the punishment for hacking.