• Title/Summary/Keyword: 사회적 위협

Search Result 670, Processing Time 0.025 seconds

Analysis of the Application Method of Cyber Security Control to Develop Regulatory Requirement for Digital Assets in NPP (원전디지털자산 사이버보안 규제 요건 개발을 위한 보안조치 적용 방안에 대한 분석)

  • Kim, In-kyung;Byun, Ye-eun;Kwon, Kook-heui
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.5
    • /
    • pp.1077-1088
    • /
    • 2019
  • As the cyber threats of nuclear power plants become more necessary to systematically prepare against the cyber attack, the international community and the domestic government are urged to apply proper security controls for Critical Digital Assets (CDA) through cyber security regulatory guidelines. In this study, we suggests the application of security controls to develop the regulatory requirements of the graded approach through the analysis of domestic and foreign cyber security regulation guidelines and best practices for digital assets directly related to nuclear accidents. In order to apply the regulatory requirements based on the consequence(impact of infringement) of the regulated facility, which is a basic consideration of the graded approach, we will classify two methods and describe details of each method. By reanalyzing existing security controls, it is introduced that the method of demanding digital assets directly related to accident to enhance security controls required for existing CDA or develop additional security controls and requiring minimum security controls for CDA that are not directly related to accident.

Proposal on for Response System to International Terrorism (국제 테러리즘의 대응체제 구축방안)

  • Suh, Sang-Yul
    • Korean Security Journal
    • /
    • no.9
    • /
    • pp.99-131
    • /
    • 2005
  • Terrorism which became today's common phenomena over the world is one of the most serious threats the world confront. Although International society make and operate outstanding anti-terrorism system, terror would never end without solving fundamental problems. The main body of terrorism converts from nation to organization and from organization to cell, which makes it difficult for us to recognize the main body. Since the target of today's new terrorism is many and unspecified persons, terrorists will never hesitate to use mass destruction weapons such as nuclear, biological, chemical weapons, and also use cyber-technique or cyber-terrorism. So, effective counter-terrorism measures should be performed as follows. First, it must be better for international society should make long-time plan of solving fundamental problems of terrorism other than to operate directly on terror organization and its means. Second, preventive method should be made. The most effective method of eradicating terrorism is prevention. For this, it is necessary to remove environmental elements of terrorism and terrorist bases, and to stop inflow of money and mass destruction weapons to terrorists. Third, integrated anti-terror organization should be organized and operated for continuous counter-terrorism operations. Also international alliance for anti-terrorism should be maintained to share informations and measures. Fourth, concerned department in the government should prepare counter-terrorism plans in their own parts as follows and make efforts to integrate the plans. - Ministry of Government Administration and Home Affairs : conventional terror - Ministry of Health and Welfare : bio-terror - Ministry of Science and Technology : nuclear-terror Especially, they should convert their policy and operation from post-terror actions to pre-terror actions, designate terror as national disaster and organize integrated emergency response organization including civil, government, and military elements. In conclusion, pre-terror activities and remedy of fundamental causes is the best way to prevent terror. Also, strengthening of intelligence activities, international cooperations, and preventive and comprehensive counter-measures must not ignored.

  • PDF

Design and Implementation of a Project Work Unit-based Scheduling Application (프로젝트 작업 단위 기반 일정 관리 애플리케이션의 설계 및 구현)

  • Bomin Kim;Minyoung Kim
    • The Journal of the Convergence on Culture Technology
    • /
    • v.9 no.6
    • /
    • pp.1173-1178
    • /
    • 2023
  • In modern society, there is a tendency to emphasize efficiency and lead to detailed planning of team projects and individual tasks within organizations. In a 24-hour routine, the ability to use time effectively is considered an indicator of conscientiousness, and people try to imitate planned and organized people and utilize various systems to manage their daily lives. The reason why you want to perform a given task efficiently is because it affects the success or failure of the project by completing the task within a set period of time. Neglecting the project schedule is considered a major risk that threatens a successful outcome. This applies not only to large-scale organizational projects but also to individual life, and utilizes a variety of schedule management tools that emphasize time-based efficient management. In project management, it is necessary to carefully understand the detailed work progress rather than simply based on Today. In this paper, we propose an Android application that can manage schedules by accessing the user's project in units of tasks rather than dates, and introduce its implementation. The application we implemented in this paper can manage the project's goals and schedule by registering the project to which the user belongs. In addition, it provides the ability to approach work efficiently by visualizing the progress of the entire project or individual goals. As a result, users can use the application we propose in this paper to focus on their projects and manage schedules by task, thereby improving the overall efficiency of the project.

Efficacy of UN's Sanctions on North Korea's Nuclear and North Korea's Regime Survival Strategy (유엔의 북핵 대북제재조치의 실효성과 북한의 체제생존전략)

  • KIM, JOO-SAM
    • Korea and Global Affairs
    • /
    • v.2 no.1
    • /
    • pp.69-92
    • /
    • 2018
  • North Korea conducted a total of six nuclear tests from the 1st test of 2006 to September, 2017. North Korea developed an armed forces security strategy at the level of regime protection and defense to respond to U.S. hostile policy. However, it is certain that strategic goals of North Korea's nuclear test were to overcome a crisis in North Korea's regime through US-North Korea negotiation and complete nuclear armed forces for socialist unification on the Korean Peninsula. North Korea's continuous nuclear test is a direct factor in threatening peace on the Korean Peninsula and an indirect factor in security dynamics of Northeast Asia. The U.N. Security Council has enforced sanctions against North Korea through six resolutions against North Korea's reckless nuclear test for the past 10 years. However, Kim Jong-Un's regime is in a position to stick to simultaneous pursuit of nuclear and economic development in spite of anti-North sanction of international society including U.N. and U.S.A. It is understood that North Korea was stimulated to conduct intense nuclear test as U.N. and U.S.A's anti-North sanction was not effective on North Korea. Full-scale and local wars are expected as military options, one of anti-North sanctions of the Trump administration. The Trump administration has attempted diplomatic pressure strategy as a secondary boycott unlike previous administrations. Nevertheless, North Korea has stood against U.N. and U.S.A's anti-North sanction with brinkmanship tactics, announcing full-scale military confrontation against U.S. It is judged that North Korea will pursue simultaneous nuclear weapons and economic development in terms of regime survival. North Korea will have less strategic choices in that its regime may collapse because of realistic national strategy between U.S.A. and China.

Smart IoT Service Users' Compliance with Personal Information Protection Behavior: An Empirical Study on the Message Design Features to Induce Installation of Software Updates (스마트 IoT 서비스 사용자의 개인정보 보호 행동 준수: 소프트웨어 업데이트 유도를 위한 메세지 디자인 특성에 관한 실증 연구)

  • Lee, Ho-Jin;Kim, Hyung-Jin;Lee, Ho-Geun
    • Informatization Policy
    • /
    • v.31 no.2
    • /
    • pp.82-104
    • /
    • 2024
  • Smart home services are growing rapidly as the development of the Internet of Things (IoT) opens the era of the so-called "Connected Living." Although personal information leaks through smart home cameras are increasing, however, users-while concerned-tend to take passive measures to protect their personal information. This study theoretically explained and verified how to design effective software update notification messages for smart home cameras to ensure that users comply with the recommended security behavior (i.e., update installation). In a survey experiment participated in by 120 actual users, the effectiveness of both emotional appeals (i.e., security breach warning images for fear appeals) and rational appeals (i.e., loss-framed messages emphasizing the negative consequences of not installing the updates) were confirmed. The results of this study provide theoretical interpretations and practical guidelines on the message design features that are effective for threat appraisals (i.e., severity, vulnerability) of smart home camera users and their protection motivation.

The Nuclear Security Summit Achievements, Limitations, and Tasks against Nuclear Terrorism Threat (핵테러리즘 위협에 대한 핵안보정상회의 성과, 한계 및 과제)

  • Yoon, Taeyoung
    • Convergence Security Journal
    • /
    • v.17 no.3
    • /
    • pp.73-81
    • /
    • 2017
  • In April 2009, in the wake of President Obama's Prague speech, the international community held four nuclear sec urity summits from 2010 to 2016 to promote nuclear security and prevent nuclear terrorism. The Nuclear Security S ummit has made significant progress in preventing terrorists from attempting to acquire nuclear weapons or fissile materials, but it still has limitations and problems. To solve this problem, the international community should resume the joint efforts for strengthening bilateral cooperation and multilateral nuclear security regime, and the participating countries should strive to protect their own nuclear materials and fulfill their commitments to secure nuclear facilitie s. Second, the United Nations(UN), the IAEA(International Atomic Energy Agency), International Criminal Police Or ganization(INTERPOL), the Global Initiative to Combat Nuclear Terrorism(GICNT), and the Global Partnership(G P) must continue their missions to promote nuclear security in accordance with the five action plans adopted at the Fourth Nuclear Security Summit. Third, the participating countries should begin discussions on the management and protection of military nuclear materials that could not be covered by the Nuclear Security Summit. Fourth, the intern ational community must strive to strengthen the implementation of the Convention on the Physical Protection of Nuc lear Material(CPPNM) Amendment and International Convention for the Suppression of Acts of Nuclear Terrori sm(ICSANT), prepare for cyber attacks against nuclear facilities, and prevent theft, illegal trading and sabotage invo lving nuclear materials.

Social Identity Threat and Across-Domain Compensatory Consumption Intention (사회적 아이덴티티의 위협과 영역 외 보상소비의도)

  • CHOI, Nak-Hwan
    • The Journal of Industrial Distribution & Business
    • /
    • v.10 no.11
    • /
    • pp.35-47
    • /
    • 2019
  • Purpose: Current study focused on investigating the effects of the self-dissociation as a thought in which consumers dis-identify or dissociate with the threatened in-group and the escapism as a tendency of consumers' distracting themselves and avoiding their thoughts about the in-group under severe but adoptable criticism by turning their attention elsewhere on across-domain compensatory consumption intention. And It explored not only the positive roles of undesirability thought against the in-group in consumers' forming the self-dissociation and the escapism, but also the effects of negative emotion to the in-group felt at the place of being exposed to the criticism against the in-group on the escapism. Research design, data, and methodology: The experiment was performed with the in-group-threatening single factor within-subject design. Questionnaire data were collected from 196 undergraduate students, and the data were used to testing research hypotheses by structural equation model of Amos 21.0. Results: First, both the self-dissociation of consumers' dis-identifying with the in-group criticized severely by others and the escapism of their deliberately directing their thoughts and distracting their attention away from thinking the in-group positively influenced on the across-domain compensatory consumption intention. Second, the negative emotion positively influenced on the escapism. Third, the undesirability thought to the in-group under the severe criticism positively effected on the self-dissociation as well as the escapism. Putting in the nutshell, the findings of this study are consistent with the idea that consumers can overcome the negative self-discrepancy on one dimension of their social identity by distracting themselves and avoiding thinking about the threatened in-group to find meaning on another dimension which might lead them to the place of doing the across-domain compensatory consumption. Conclusions - Focusing on the results of this study, checking which aspects of consumers' social identity are linked to products or brands is at issue to marketers when the consumers are faced with the criticism against the in-group. The marketers should build the messages about their products or brand not related to the checked aspects, and communicate the messages, to lead the consumers to the place of doing the across-domain compensatory consumption by their products or brands.

Study on Influence Analysis of Radioactive Terror Scenarios by Weather Conditions (기상조건에 따른 방사능테러 시나리오 영향 분석)

  • Kim, Tae Woo;Jeon, Yeo Ryeong;Chang, Sunyoung;Kim, Yongmin
    • Journal of the Korean Society of Radiology
    • /
    • v.12 no.6
    • /
    • pp.719-725
    • /
    • 2018
  • After 9/11 attacks in the U.S, Terrorism has increased the number of unspecified casualties through multi-use facility terror attacks compared to the past. The subsequent London bombings and the self-destruction of Pakistan increased people's fear and social anxiety. As international events have been held in Korea recently, awareness and concern over radioactive terrorism and security management of radioactive materials are increasing. In this paper, we compared the results of different meteorological conditions using HotSpot Code. After creating a possible terror scenario in Korea, sources likely to be use in RDD and Dirty bomb were investigated. The meteorological condition was selected by comparing the Pasquill-Gifford stability class with the most stable condition F and the most unstable condition A. The result value of the A and F condition through simulation were shown not to cause citizens to die from acute effects due to radiological effects. The range of radioactivity is different according to the wind speed and the meteorological stability, and the degree of radioactivity dilution is different according to meteorological conditions. Analysis results are expected to be used for initial response in the event of a radioactive terrorist attack.

Spatio-temporal analysis with risk factors for five major violent crimes (위험요인이 포함된 시공간 모형을 이용한 5대 강력범죄 분석)

  • Jeon, Young Eun;Kang, Suk-Bok;Seo, Jung-In
    • The Korean Journal of Applied Statistics
    • /
    • v.35 no.5
    • /
    • pp.619-629
    • /
    • 2022
  • The five major violent crimes including murder, robbery, rape·forced indecent act, theft, and violence are representative crimes that threaten the safety of members of society and occur frequently in real life. These crimes have negative effects such as lowering the quality of citizens' life. In the case of Seoul, the capital of Korea, the risk for the five major violent crimes is increasing because the population density of Seoul is increasing as a large number of people in the provinces move to Seoul. In this study, to reduce this risk, the relative risk for the occurrence of the five major violent crimes in Seoul is modeled using three spatio-temporal models. In addition, various risk factors are included to identify factors that significantly affect the relative risk of the five major violent crimes. The best model is selected in terms of the deviance information criterion, and the analysis results including various visualizations for the best model are provided. This study will help to establish efficient strategies to sustain people's safe everyday living by analyzing important risk factors affecting the risk of the five major violent crimes and the relative risk of each region.

Reviews in Medical Geography: Spatial Epidemiology of Vector-Borne Diseases (벡터매개 질병(vector-borne diseases) 공간역학을 중심으로 한 보건지리학의 최근 연구)

  • Park, Sunyurp;Han, Daikwon
    • Journal of the Korean Geographical Society
    • /
    • v.47 no.5
    • /
    • pp.677-699
    • /
    • 2012
  • Climate changes may cause substantial changes in spatial patterns and distribution of vector-borne diseases (VBD's), which will result in a significant threat to humans and emerge as an important public health problem that the international society needs to solve. As global warming becomes widespread and the Korean peninsula characterizes subtropical climate, the potentials of climate-driven disease outbreaks and spread rapidly increase with changes in land use, population distributions, and ecological environments. Vector-borne diseases are typically infected by insects such as mosquitoes and ticks, and infected hosts and vectors increased dramatically as the habitat ranges of the VBD agents have been expanded for the past 20 years. Medical geography integrates and processes a wide range of public health data and indicators at both local and regional levels, and ultimately helps researchers identify spatiotemporal mechanism of the diseases determining interactions and relationships between spatial and non-spatial data. Spatial epidemiology is a new and emerging area of medical geography integrating geospatial sciences, environmental sciences, and epidemiology to further uncover human health-environment relationships. An introduction of GIS-based disease monitoring system to the public health surveillance system is among the important future research agenda that medical geography can significantly contribute to. Particularly, real-time monitoring methods, early-warning systems, and spatial forecasting of VBD factors will be key research fields to understand the dynamics of VBD's.

  • PDF