• Title/Summary/Keyword: 정보보호방안

Search Result 2,025, Processing Time 0.026 seconds

A Study on the RFID's Application Environment and Application Measure for Security (RFID의 보안업무 적용환경과 적용방안에 관한 연구)

  • Chung, Tae-Hwang
    • Korean Security Journal
    • /
    • no.21
    • /
    • pp.155-175
    • /
    • 2009
  • RFID that provide automatic identification by reading a tag attached to material through radio frequency without direct touch has some specification, such as rapid identification, long distance identification and penetration, so it is being used for distribution, transportation and safety by using the frequency of 125KHz, 134KHz, 13.56MHz, 433.92MHz, 900MHz, and 2.45GHz. Also it is one of main part of Ubiquitous that means connecting to net-work any time and any place they want. RFID is expected to be new growth industry worldwide, so Korean government think it as prospective field and promote research project and exhibition business program to linked with industry effectively. RFID could be used for access control of person and vehicle according to section and for personal certify with password. RFID can provide more confident security than magnetic card, so it could be used to prevent forgery of register card, passport and the others. Active RFID could be used for protecting operation service using it's long distance date transmission by application with positioning system. And RFID's identification and tracking function can provide effective visitor management through visitor's register, personal identification, position check and can control visitor's movement in the secure area without their approval. Also RFID can make possible of the efficient management and prevention of loss of carrying equipments and others. RFID could be applied to copying machine to manager and control it's user, copying quantity and It could provide some function such as observation of copy content, access control of user. RFID tag adhered to small storage device prevent carrying out of item using the position tracking function and control carrying-in and carrying-out of material efficiently. magnetic card and smart card have been doing good job in identification and control of person, but RFID can do above functions. RFID is very useful device but we should consider the prevention of privacy during its application.

  • PDF

Risk Assessment of Pine Tree Dieback in Sogwang-Ri, Uljin (울진 소광리 금강소나무 고사발생 특성 분석 및 위험지역 평가)

  • Kim, Eun-Sook;Lee, Bora;Kim, Jaebeom;Cho, Nanghyun;Lim, Jong-Hwan
    • Journal of Korean Society of Forest Science
    • /
    • v.109 no.3
    • /
    • pp.259-270
    • /
    • 2020
  • Extreme weather events, such as heat and drought, have occurred frequently over the past two decades. This has led to continuous reports of cases of forest damage due to physiological stress, not pest damage. In 2014, pine trees were collectively damaged in the forest genetic resources reserve of Sogwang-ri, Uljin, South Korea. An investigation was launched to determine the causes of the dieback, so that a forest management plan could be prepared to deal with the current dieback, and to prevent future damage. This study aimedto 1) understand the topographic and structural characteristics of the area which experienced pine tree dieback, 2) identify the main causes of the dieback, and 3) predict future risk areas through the use of machine-learning techniques. A model for identifying risk areas was developed using 14 explanatory variables, including location, elevation, slope, and age class. When three machine-learning techniques-Decision Tree, Random Forest (RF), and Support Vector Machine (SVM) were applied to the model, RF and SVM showed higher predictability scores, with accuracies over 93%. Our analysis of the variable set showed that the topographical areas most vulnerable to pine dieback were those with high altitudes, high daily solar radiation, and limited water availability. We also found that, when it came to forest stand characteristics, pine trees with high vertical stand densities (5-15 m high) and higher age classes experienced a higher risk of dieback. The RF and SVM models predicted that 9.5% or 115 ha of the Geumgang Pine Forest are at high risk for pine dieback. Our study suggests the need for further investigation into the vulnerable areas of the Geumgang Pine Forest, and also for climate change adaptive forest management steps to protect those areas which remain undamaged.

A Study on the Current State of the Integrated Human Rights of the Elderly in Rural Areas of South Korea (농촌지역 거주 노인의 통합적 인권보장 실태에 관한 연구)

  • Ahn, Joonhee;Kim, MeeHye;Chung, SoonDool;Kim, SooJin
    • 한국노년학
    • /
    • v.38 no.3
    • /
    • pp.569-592
    • /
    • 2018
  • This study purported to investigate the current state of human rights of older adults residing in rural areas of Korea. The study utilized, as an analytic framework, 4 priority directions (1. "older persons and development", 2. "rural area development", 3. "advancing health and well-being into old age", and 4. "ensuring enabling and supportive environments") with 13 task actions recommended by Madrid International Plan of Action on Ageing (MIPAA). Furthermore, the study examined gender differences in all items included in the analytic framework. Data was collected by the face-to-face survey on 800 subjects aged 65 and over. Statistical analyses were conducted using STATA 13.0 program. The main results were summarized in order of 4 priority directions as follows. First, average working hours per day were 6.2, and men reportedly participated in economic activities and needed job training more than women, while women participated in lifelong education programs more than men. Awareness of fire and disaster prevention facilities was low in both genders. Second, accessibility to the support center for the elderly living alone as well as protective services for the vulnerable elderly was found to be low. IT-based services and networking were used more by men than women, and specifically, IT-based financial transactions and welfare services were least used. Third, medical check-ups and vaccinations were well received, while consistent treatments for chronic illnesses and long-term care services were relatively less given. In addition, accessibility to mental health service centers was considerably low. Fourth, although old house structures and the lack of convenience facilities were found to be circumstantial risk factors for these elders, experiences of receiving housing support services were scarce. The elderly were found to rely more on informal care, and concerns for their care were higher in women than men. Plus, accessibility to elderly abuse services was markedly low. Based on these results, discussed were implications for implementing policies and practical interventions to raise the levels of the human rights for this population.

Effects on cooperative spirit of a cohort by instruction types of Taekwondo (태권도 지도자의 지도유형이 집단응집력에 미치는 영향)

  • Jeong, Chan-Sam
    • Korean Security Journal
    • /
    • no.13
    • /
    • pp.471-485
    • /
    • 2007
  • This study is performed to find out what type instructions are produced to players by coaches and what effects are resulted in cooperative spirit of the concerned group. Furthermore the study has its aims at advancing instructors' skills by using finding of it. The study used 'SPSS 11.0 FOR WINDOW - Statistical Package' to analyze the collected samples and dealt with data of 174 individuals. Statistical analysis of the research for hypothesis verification was about frequency, trust level, mutual relationship, variables, and T-verification. The meaningful level for any result was ranged within 95%(p< .05), 99%(p<.01). The finding are as follows. Effects on pleasure, one of elements of team spirits taken by instructor's training style are analyzed as follows. It was proved to be meaningful in relation with a series of activities like training, democratic, social, compensatory aspects and showed also considerable relation with power based behaviors. That says, players are found to enjoy high pleasure when social and bureaucratic behaviors of instructors are very energetic. In addition to that, training, democratic, and compensatory activities didn't show any meaningful effect. Team spirit was found to play a main role between instructor's behaviors and training, democratic, social rewarding activities. Democratic and social acts influence on team spirit. Looking into the detailed aspects, team spirit was resulted very high in the individuals with low democratic mind and was shown high group spirit by groups with high sociable activities. Teamworks was found to be affected by relation between instructor's acts and training, democratic, social and compensatory aspects and it showed meaningful relations with training, social, bureaucratic behaviors. Low degree of training and bureaucratic activities are found to prefer for power team spirit, and high social activities led a strong teamworks. Group binding spirit was influenced by training, democratic, social compensatory, bureaucratic behaviors and it showed to give effects on democratic, social, and bureaucratic activities of instructors. Low degree of democratic and bureaucratic behaviors are found to produce strong team spirit. In contrast with that, strong social activities was found to be motive of powerful team spirit. Value of team spirit was found to play a main role between instructor's behaviors and training, democratic, social, rewarding activities. It didn't show any meaningful effect on behavior of instructors.

  • PDF

Multinational Enforcement of the Capital Markets Act - Focusing on the Anti-Fraud Regulation by the Public Regulators - (다국적 차원의 자본시장법규 집행 - 공적기관에 의한 불공정거래 규제를 중심으로 -)

  • Chang, Kun-Young
    • Journal of Legislation Research
    • /
    • no.53
    • /
    • pp.419-454
    • /
    • 2017
  • Faced with the internationalization of capital markets, Korea needs to protect its investors and markets by applying the relevant laws extraterritorially. The Financial Investment Services and Capital Markets Act ("Capital Markets Act") explicitly introduced a new provision recognizing the extraterritoriality of the Act. While Article 2 of the Capital Markets Act comprehensively provides for prescriptive extraterritorial jurisdiction, the enactment of extraterritoriality alone does not guarantee that the Act will apply to cross-border transactions effectively. The effective extraterritorial application of an act is inseparable from the adjudicative and enforcement jurisdiction of the act. Specifically, active investigations and detections by the public regulators might be the first step for enforcing the Capital Markets Act. Unlike domestic regulations, however, multinational enforcement actions outside a regulator's home country becomes more problematic because of various obstacles. This Article examines difficulties which domestic regulators may confront in enforcing the Capital Markets Act extraterritorially and makes several recommendations for more effective multinational enforcement as follows. First, the Korean regulators should continue to foster cooperation through the IOSCO and provide international markets with the information and tools necessary for successful regulation of cross-border transactions. Second, the principle of dual criminality should be applied in a modified form for the effective mutual legal assistance in criminal matters. Third, there should be a legal device for the domestic regulator to freeze foreign wrongdoer's assets located outside Korea to repatriate those assets for distribution to defrauded investors in Korea.

A Study on the Rational Improvement of the Regulation and System about Embryo Preservation (배아 보존에 관한 합리적 제도 개선을 위한 연구)

  • Baik, Sujin;Moon, Hannah;Park, Inkyoung;Cha, Seunghyun;Park, Joonseok;Lee, Gyeonghun;Park, Chun-seon;Cho, Heesoo;Kim, Myung-Hee
    • The Korean Society of Law and Medicine
    • /
    • v.22 no.3
    • /
    • pp.57-95
    • /
    • 2021
  • Korea's period for preservation of embryos is up to five years (the Bioethics Act). However, the study reviewed domestic and foreign laws and drew issues due to the recent demand that the development of related science and technology and the period limitation limit the rights of consent holder for embryo production. the first issue is that preserved embryos are intended for pregnancy, and it is important to ensure that the autonomy of the consent holder is protected through careful consideration based on information such as scientific evidence. the second is that regulations regarding the obligation to manage embryonic preservation institutions are needed. the third is to create a social atmosphere in which embryo creation, preservation, and disposal take place in a minimum range, considering the special status of embryos. based on this issue, the first of the proposals for rational improvement of the regulation and system about embryo preservation is the introduction of an environment in which sufficient explanation and appropriate consent can be exercised and to extend the reasons for the extension of the period, rather than specifying the specific period in law. the second is that institutionalization is necessary considering not only the obligation to manage preservation institutions but also the overall site, such as concerns that may arise as a result. lastly, we propose the introduction of a management method considering the future use of embryos, such as transfer to provide research purposes and donation of pregnancy purposes by others. this process should be a method of sufficient social discussion and consensus, as well as a general consideration of the family relationship with the born child.

Adaptive Data Hiding Techniques for Secure Communication of Images (영상 보안통신을 위한 적응적인 데이터 은닉 기술)

  • 서영호;김수민;김동욱
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.29 no.5C
    • /
    • pp.664-672
    • /
    • 2004
  • Widespread popularity of wireless data communication devices, coupled with the availability of higher bandwidths, has led to an increased user demand for content-rich media such as images and videos. Since such content often tends to be private, sensitive, or paid for, there exists a requirement for securing such communication. However, solutions that rely only on traditional compute-intensive security mechanisms are unsuitable for resource-constrained wireless and embedded devices. In this paper, we propose a selective partial image encryption scheme for image data hiding , which enables highly efficient secure communication of image data to and from resource constrained wireless devices. The encryption scheme is invoked during the image compression process, with the encryption being performed between the quantizer and the entropy coder stages. Three data selection schemes are proposed: subband selection, data bit selection and random selection. We show that these schemes make secure communication of images feasible for constrained embed-ded devices. In addition we demonstrate how these schemes can be dynamically configured to trade-off the amount of ded devices. In addition we demonstrate how these schemes can be dynamically configured to trade-off the amount of data hiding achieved with the computation requirements imposed on the wireless devices. Experiments conducted on over 500 test images reveal that, by using our techniques, the fraction of data to be encrypted with our scheme varies between 0.0244% and 0.39% of the original image size. The peak signal to noise ratios (PSNR) of the encrypted image were observed to vary between about 9.5㏈ to 7.5㏈. In addition, visual test indicate that our schemes are capable of providing a high degree of data hiding with much lower computational costs.

Ubiquitous Sensor Network Application Strategy of Security Companies (시큐리티업체의 유비쿼터스 센서네트워크(USN) 응용전략)

  • Jang, Ye-Jin;An, Byeong-Su;Ju, Choul-Hyun
    • Korean Security Journal
    • /
    • no.21
    • /
    • pp.75-94
    • /
    • 2009
  • Since mechanical security systems are mostly composed of electronic, information and communication devices, they have effects in the aspects of overall social environment and crime-oriented environment. Also, the importance is increasing for wireless recognition of RFID and tracing function, which will be usefully utilized in controlling the incomings and outgoings of people/vehicles or allowance, surveillance and control. This is resulting from the increase in the care for the elderly according to the overall social environment, namely, the aging society, and the number of women entering, as well as the increase in the number of heinous crimes. The purpose of this study is to examine the theoretical considerations on ubiquitous sensor network and present a direction for securities companies for their development by focusing on the technological and application areas. To present strategies of response to a new environment for security companies, First, a diversification strategy is needed for security companies. The survival of only high level of security companies in accordance with the principle of liberal market competition will bring forth qualitative growth and competitiveness of security market. Second, active promotion by security companies is needed. It is no exaggeration to say that we are living in the modern society in the sea of advertisements and propaganda. The promotional activities that emphasize the areas of activity or importance of security need to be actively carried out using the mass media to change the aware of people regarding security companies, and they need to come up with a plan to simultaneously carry out the promotional activities that emphasize the public aspect of security by well utilizing the recent trend that the activities of security agents are being used as a topic in movies or TV dramas. Third, technically complementary establishment of ubiquitous sensor network and electronic tag is needed. Since they are used in mobile electronic tag services such as U-Home and U-Health Care, they are used throughout our lives by forming electronic tag environment within safe ubiquitous sensor network based on the existing privacy guideline for the support of mobile electronic tag terminal commercialization, reduction in communication and information usage costs, continuous technical development and strengthening of privacy protection, and the system of cooperation of academic-industrial-research needs to be established among the academic world and private research institutes for these parts.

  • PDF

Sea Fog Level Estimation based on Maritime Digital Image for Protection of Aids to Navigation (항로표지 보호를 위한 디지털 영상기반 해무 강도 측정 알고리즘)

  • Ryu, Eun-Ji;Lee, Hyo-Chan;Cho, Sung-Yoon;Kwon, Ki-Won;Im, Tae-Ho
    • Journal of Internet Computing and Services
    • /
    • v.22 no.6
    • /
    • pp.25-32
    • /
    • 2021
  • In line with future changes in the marine environment, Aids to Navigation has been used in various fields and their use is increasing. The term "Aids to Navigation" means an aid to navigation prescribed by Ordinance of the Ministry of Oceans and Fisheries which shows navigating ships the position and direction of the ships, position of obstacles, etc. through lights, shapes, colors, sound, radio waves, etc. Also now the use of Aids to Navigation is transforming into a means of identifying and recording the marine weather environment by mounting various sensors and cameras. However, Aids to Navigation are mainly lost due to collisions with ships, and in particular, safety accidents occur because of poor observation visibility due to sea fog. The inflow of sea fog poses risks to ports and sea transportation, and it is not easy to predict sea fog because of the large difference in the possibility of occurrence depending on time and region. In addition, it is difficult to manage individually due to the features of Aids to Navigation distributed throughout the sea. To solve this problem, this paper aims to identify the marine weather environment by estimating sea fog level approximately with images taken by cameras mounted on Aids to Navigation and to resolve safety accidents caused by weather. Instead of optical and temperature sensors that are difficult to install and expensive to measure sea fog level, sea fog level is measured through the use of general images of cameras mounted on Aids to Navigation. Furthermore, as a prior study for real-time sea fog level estimation in various seas, the sea fog level criteria are presented using the Haze Model and Dark Channel Prior. A specific threshold value is set in the image through Dark Channel Prior(DCP), and based on this, the number of pixels without sea fog is found in the entire image to estimate the sea fog level. Experimental results demonstrate the possibility of estimating the sea fog level using synthetic haze image dataset and real haze image dataset.

A Study on the Types of Dispute and its Solution through the Analysis on the Disputes Case of Franchise (프랜차이즈 분쟁사례 분석을 통한 분쟁의 유형과 해결에 관한 연구)

  • Kim, Kyu Won;Lee, Jae Han;Lim, Hyun Cheol
    • The Korean Journal of Franchise Management
    • /
    • v.2 no.1
    • /
    • pp.173-199
    • /
    • 2011
  • A franchisee has to depend on the overall system, such as knowhow and management support, from a franchisor in the franchise system and the two parties do not start with the same position in economic or information power because the franchisor controls or supports through selling or management styles. For this, unfair trades the franchisor's over controlling and limiting the franchisee might occur and other side effects by the people who give the franchisee scam trades has negatively influenced on the development of franchise industry and national economy. So, the purpose of this study is preventing unfair trade for the franchisee from understanding the causes and problems of dispute between the franchisor and the franchisee focused on the dispute cases submitted the Korea Fair Trade Mediation Agency and seeking ways to secure the transparency of recruitment process and justice of franchise management process. The results of the case analysis are followed; first, affiliation contracts should run on the franchisor's exact public information statement and the surely understanding of the franchisee. Secondly, the franchisor needs to use their past experiences and investigated data for recruiting franchisees. Thirdly, in the case of making a contract with the franchisee, the franchisor has to make sure the business area by checking it with franchisee in person. Fourthly, the contracts are important in affiliation contracts, so enacting the possibility of disputes makes the disputes decreased. Fifthly, lots of investigation and interests are needed for protecting rights and interests between the franchisor and franchisee and preventing the disputes by catching the cause and more practical solutions of the disputes from the government.