• Title/Summary/Keyword: 정보보호활동

Search Result 532, Processing Time 0.029 seconds

The Environmental Preservation and Sustainable Use of Apsan(Mountain) in Daegu (대구 앞산의 환경보존과 지속가능한 이용)

  • Jeon, Young-Gweon
    • Journal of the Korean association of regional geographers
    • /
    • v.12 no.6
    • /
    • pp.645-655
    • /
    • 2006
  • Apsan, as part of the main ecosystem of Daegu city, plays an important role for maintaining the environmental sustainability of the large city. Especially varieties of valuable resources, which are cultural, historical, biological, geomorphological and geological, are distributed around Apsan. Therefore the positive preservation plan is required. This paper aims to examine the environmental characteristics of Apsan and then suggests the following ideas for the environmental preservation and sustainable use of Apsan. 1) 'The New Map of Apsan' that includes more exact information needs to be produced. 2) The Apsan ecosystem management plan should be made under the precision natural ecology investigation. 3) For the protection of inanimate object resources, such as geographical feature and geology, the Geotourism Department needs to be established within Daegu metropolitan office of education or the tourism division of Daegu city government. 4) An effective environmental-impact-assessment system should be officially established. 5) the positive administrative and financial support system led by local NGOs is required for the Apsan environmental protection activities and education. 6) It is necessary to bring out into the open prayer sites to prevent forest fire. 7) 'The nature rest year system' enforcement is required to restore the damaged ecological space of Apsan.

  • PDF

Development Strategies for Local Assemblers of Agricultural Products (농산물 산지유통인의 제도권 편입 방안)

  • Kim, Dong-Hwan
    • Journal of Distribution Research
    • /
    • v.16 no.5
    • /
    • pp.1-18
    • /
    • 2011
  • Local assemblers of agricultural products perform important distribution functions such as providing sales outlets, labor forces, market information, and financing, forward contracting, farming, physical distribution, and etc. However, their business activities are not transparent and producers are not effectively protected from unfair practices done by local assemblers. In order to enhance transparency and to increase effectiveness of governmental policies, local assemblers, which are mostly private management, should be organized as corporations. In order to organize corporations, the government should emphasize the importance of education and should provide corporations with governmental funds for improvement of agricultural distribution. Corporations should be developed to marketing cooperatives in the long run, and are requested to form their federations. It is also necessary to have transparent forward contracting system by local assemblers. In order to have transparent system, producers and local assemblers are guided to use standard contract forms and to operate offices handling unfair trade practices by local assemblers. We also need a place to exchange forward contracts, which can be developed to a futures market in the long run. In summary, local assemblers of agricultural products, which are mostly private management, should be developed to corporations and be operated by a transparent manner in order to protect agricultural producers and increase efficiency of trading.

  • PDF

Wearable oxygen saturation measurement platform for worker safety management (작업자의 안전관리를 위한 웨어러블 산소포화도 측정 플랫폼)

  • Lee, Yun Ju;Song, Chai Jong;Yoo, Sun Kook
    • Smart Media Journal
    • /
    • v.11 no.9
    • /
    • pp.30-38
    • /
    • 2022
  • It is important to grasp biometric data in real time for prompt action in the event of a safety accident at a work site where the risk of safety accidents exists. Among them, blood oxygen saturation is the most important factor in maintaining human life, so real-time oxygen saturation measurement and monitoring is necessary according to the situation as a preemptive response for worker safety management. By receiving real-time bio-signals from workers wearing health and life-risk protective clothing, and sharing and analyzing the worker's risk status in an external system, it is possible to diagnose the worker's current condition and efficiently respond to emergencies that may occur to the worker. In this paper, we propose a wearable oxygen saturation measurement platform technology that can monitor the risk of harmful gases and oxygen saturation of the wearer in real time and ensure the wearer's activity and safety in order to cope with emergency situations at the scene of an accident. If we overcome the limitations identified through the results of the proposed system later and apply improved biodata such as motion correction to the platform, we expect that it will be usable not only in hazardous gas environments, but also in hospitals and homes for emergency patients.

A Study about the Direction and Responsibility of the National Intelligence Agency to the Cyber Security Issues (사이버 안보에 대한 국가정보기구의 책무와 방향성에 대한 고찰)

  • Han, Hee-Won
    • Korean Security Journal
    • /
    • no.39
    • /
    • pp.319-353
    • /
    • 2014
  • Cyber-based technologies are now ubiquitous around the glob and are emerging as an "instrument of power" in societies, and are becoming more available to a country's opponents, who may use it to attack, degrade, and disrupt communications and the flow of information. The globe-spanning range of cyberspace and no national borders will challenge legal systems and complicate a nation's ability to deter threats and respond to contingencies. Through cyberspace, competitive powers will target industry, academia, government, as well as the military in the air, land, maritime, and space domains of our nations. Enemies in cyberspace will include both states and non-states and will range from the unsophisticated amateur to highly trained professional hackers. In much the same way that airpower transformed the battlefield of World War II, cyberspace has fractured the physical barriers that shield a nation from attacks on its commerce and communication. Cyberthreats to the infrastructure and other assets are a growing concern to policymakers. In 2013 Cyberwarfare was, for the first time, considered a larger threat than Al Qaeda or terrorism, by many U.S. intelligence officials. The new United States military strategy makes explicit that a cyberattack is casus belli just as a traditional act of war. The Economist describes cyberspace as "the fifth domain of warfare and writes that China, Russia, Israel and North Korea. Iran are boasting of having the world's second-largest cyber-army. Entities posing a significant threat to the cybersecurity of critical infrastructure assets include cyberterrorists, cyberspies, cyberthieves, cyberwarriors, and cyberhacktivists. These malefactors may access cyber-based technologies in order to deny service, steal or manipulate data, or use a device to launch an attack against itself or another piece of equipment. However because the Internet offers near-total anonymity, it is difficult to discern the identity, the motives, and the location of an intruder. The scope and enormity of the threats are not just focused to private industry but also to the country's heavily networked critical infrastructure. There are many ongoing efforts in government and industry that focus on making computers, the Internet, and related technologies more secure. As the national intelligence institution's effort, cyber counter-intelligence is measures to identify, penetrate, or neutralize foreign operations that use cyber means as the primary tradecraft methodology, as well as foreign intelligence service collection efforts that use traditional methods to gauge cyber capabilities and intentions. However one of the hardest issues in cyber counterintelligence is the problem of "Attribution". Unlike conventional warfare, figuring out who is behind an attack can be very difficult, even though the Defense Secretary Leon Panetta has claimed that the United States has the capability to trace attacks back to their sources and hold the attackers "accountable". Considering all these cyber security problems, this paper examines closely cyber security issues through the lessons from that of U.S experience. For that purpose I review the arising cyber security issues considering changing global security environments in the 21st century and their implications to the reshaping the government system. For that purpose this study mainly deals with and emphasis the cyber security issues as one of the growing national security threats. This article also reviews what our intelligence and security Agencies should do among the transforming cyber space. At any rate, despite of all hot debates about the various legality and human rights issues derived from the cyber space and intelligence service activity, the national security should be secured. Therefore, this paper suggests that one of the most important and immediate step is to understanding the legal ideology of national security and national intelligence.

  • PDF

Secure Routing Mechanism using one-time digital signature in Ad-hoc Networks (애드혹 네트워크에서의 one-time 전자 서명을 이용한 라우팅 보안 메커니즘)

  • Pyeon, Hye-Jin;Doh, In-Shil;Chae, Ki-Joon
    • The KIPS Transactions:PartC
    • /
    • v.12C no.5 s.101
    • /
    • pp.623-632
    • /
    • 2005
  • In ad-hoc network, there is no fixed infrastructure such as base stations or mobile switching centers. The security of ad-hoc network is more vulnerable than traditional networks because of the basic characteristics of ad-hoc network, and current muting protocols for ad-hoc networks allow many different types of attacks by malicious nodes. Malicious nodes can disrupt the correct functioning of a routing protocol by modifying routing information, by fabricating false routing information and by impersonating other nodes. We propose a routing suity mechanism based on one-time digital signature. In our proposal, we use one-time digital signatures based on one-way hash functions in order to limit or prevent attacks of malicious nodes. For the purpose of generating and keeping a large number of public key sets, we derive multiple sets of the keys from hash chains by repeated hashing of the public key elements in the first set. After that, each node publishes its own public keys, broadcasts routing message including one-time digital signature during route discovery and route setup. This mechanism provides authentication and message integrity and prevents attacks from malicious nodes. Simulation results indicate that our mechanism increases the routing overhead in a highly mobile environment, but provides great security in the route discovery process and increases the network efficiency.

Open Markets and FDS(Fraud Detection System) (오픈마켓과 부당거래 방지 시스템)

  • Yoo, Soon-Duck;Kim, Jung-Ihl
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.11 no.5
    • /
    • pp.113-130
    • /
    • 2011
  • Due to the development of information and communication technology, the global influence on politics, economics, society, and culture has grown. A major example of this impact on the economic sector is the growth of e-commerce, which increases both the speed and efficiency of businesses. In light of these new developments, businesses need to shift away from the misconception that information overwhelms to embrace the enhanced competitiveness that e-commerce provides. However, concern about fraudulent transactions through e-commerce is pertinent because of the loss in both critical revenue and consumer confidence in open markets. Current solutions for fraudulent transactions include real-time monitoring and processing, payment pending, and confirmation through SMS, E-mail, and other wired means. Our research focuses on the management of Fraud Detection Systems (FDS) to safeguard online electronic payment systems. With effective implementation of our research we hope to foster an honorable online trading culture and protect consumers. Future comparative research in domestic and abroad markets would provide further insight into preventing fraudulent transactions.

Estimation of Optimal Empirical Equations based on Sediments of Ageing Reservoir Estimated Using Autonomous Navigation USV (자율항법 무인측량선을 이용하여 산정된 노후저수지의 퇴사량 기준 최적경험식 산정)

  • Won, Chang-Hee;Yoon, HyeonCheol;kim, Won-Beom
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.21 no.3
    • /
    • pp.1-9
    • /
    • 2020
  • Acritical function of a nation is to protect its people's lives and properties from natural disasters such as a drought. A drought affects many aspects of human life, including social, economic, and industrial activities. Approximately 75.7% of reservoirs in Korea are over 50 years old.Sedimentation over the years may have caused a situation where storage capacity of the reservoirs is no longer sufficient and compliant with the original reservoir specifications. This study analyzes storage capacities for ten aged reservoirs using the autonomous navigation USV. It compares these capacities with sediment estimated by conventional empirical equations. Comparisons were made to the original specifications for the reservoirs.Storage capacity of six reservoirs decreased in a range between 16.2%-55.3% and storage capacity of 4 reservoirs increased in a range between 1.5%-380.2%. This data was compared to data derived from estimating sediment by empirical equations. Yoon's equation(1982) appeared more accurate than Sur's equation(1988) in Uhlinzi and Yongpo reservoirs, and Sur's equation(1988), however, appeared more accurate than Yoon's equation in Daegok, Ugok2 and Ochi reservoirs. The significant ranges of sedimentation shown in this study suggest that it is worth continuously surveying reservoirs to ensure their efficient management and operation.

A Study on the Establishment of desirable Model for Licensed Private Investigation Service System (공인탐정제도의 올바른 모델설정에 관한 연구)

  • Lee, Sang-Hun
    • Korean Security Journal
    • /
    • no.20
    • /
    • pp.249-270
    • /
    • 2009
  • There have been great demands for various private searches and collecting information activities. but in korea it is still banned to supply private investigation service and to use the term 'private investigation'. So establishment of desirable model for private investigation service system is essential factor in strategic approaching for privatization of policing. In most developed countries private investigation service system is generally permitted and various methods to solve the side effects of that are considered. It is necessary to revise more the Security Business Law to introduce private investigation service system so that the dispute on determining how to do and what to do. It looks like that police agrees with the introduction of the private investigation service system because this could be an option when it comes to the job that its members can take after retirement and because this system helpful their own work. Actually Korea government have tried to prepare the law enactment of the private investigation service system since 1999 but have been failed. This study focuses on implementing the suitable system for private investigation service in Korea, which includes the consideration of the logical validity of the introduction by comparing with other foreign private investigation service system. We should make research and effort to cope with such as a partial amendment about the problem and the side effect that can be happened in a beginning stage of system trial.

  • PDF

A study on invention.intellectual property education content reflection status and needs analysis in secondary vocational education (중등단계 직업교육에서의 발명.지식재산 교육내용 반영 실태 및 요구 분석 연구)

  • Lee, Byung-Wook;Lee, Chan-Joo;Lee, Sang-Hyun
    • 대한공업교육학회지
    • /
    • v.39 no.2
    • /
    • pp.1-18
    • /
    • 2014
  • This study took existing invention intellectual property related textbooks being utilized in secondary vocational education, analyzed the formation status of 'key learning elements' reflection ratio and drew optimum key learning elements formation ratio by invention intellectual property education content required in secondary vocational education in the future. For this, the study task was set up as 'what kind and how much of invention intellectual property key learning elements are in the invention intellectual property textbook education content now and what is the desirable ratio of each key learning elements in the future'. To resolve this task, 3 specialists analyzed the invention intellectual property education content reflection status and optimum reflection ratio by invention intellectual property education content required in the future is suggested by Delphi survey. The results of this study are as following. First, the result of analysis on invention intellectual property key learning elements included in the invention patent recognition books being utilized in secondary vocational education was that the books included all key learning elements; however, some textbooks have the trend of concentrating in D area (problem-solving activities). Second, the result of analysis on the reflection ratio by invention intellectual property education content area in the invention patent recognition books being utilized in secondary vocational education was that there was the trend in most textbooks that they concentrate in intellectual property creation area; while some textbooks deal with intellectual property protection area and intellectual property utilization area. Regarding by achievement type, knowledge area was main in all textbooks. Meanwhile, function area is dealt in invention patent basic, invention and problem-solving and design textbooks. Attitude area is not dealt or is dealt insufficiently in most textbooks. Third, the optimum reflection ratio of invention intellectual property education key learning elements required in secondary vocational education in the future as obtained by specialists' delphi survey was that it is necessary to decrease D (problem-solving activities) 17.7% area, E(invention fusion knowledge) 2.9% area, K(patent application) 6.9% and L(patent information investigation) area 9.6%. Regarding the optimum reflection ratio of invention intellectual property education content, it is suggested that the invention literacy area 3.1%, intellectual property creation area 4.5% and intellectual property protection area 10.6% would be decreased; while intellectual property utilization area 17.7% would be increased. Regarding optimum reflection ratio of achievement type, it is suggested that knowledge area 52% would be decreased; while function area 32.3% and attitude area 19.6% would be increased.

History of Guard System during the Period of Military Rule in the Goryeo Dynasty (고려 무신집권기 호위제도의 경호학적 고찰)

  • Lee, Sung-Jin;Cho, Sung-Jin
    • Korean Security Journal
    • /
    • no.34
    • /
    • pp.233-258
    • /
    • 2013
  • In the early days of the Goryeo Dynasty, the royal guard was comprised of the central regular army in the 2-gun-6-wi system, and Nasungeomgun was in charge of the security inside the palace. However, the military system became disorganized during the period of military rule and the royal guard had to rely on military subjects. The military officials suppressed the civil ministers centering on Jungbang, the guarding organization close to the King to incapacitate the royal authority and control the state affairs. When the rule of the three leaders of the military rule became short-lived and Dae-seung Gyeong is raised to the ruler, he organized a do-or-die squad comprised of a hundred and more people for his personal safety, and this became the first dobang. Dobang was disassembled after Dae-seung Gyeong died of disease, but under the rule of Chung-heon Choe, Dae-seung Gyeong's dobang was revived and reinforced into 'Yukbeon Dobang' to provide the ruler with personal protection and intensify the ruling system, and it was quite a large organization with more refined system. Yukbeon Dobang was expanded and reinforced into Naeoedobang under the rule of Woo Choe, the son of Chung-heon Choe, and it was enhanced even more into Dobang Samsipyukbeon System under the rule of the grandson, Hang Choe. Dobang can be considered as the guard organization in modern sense, and it collected information and surveyed the area where guarding is required and house troops that belonged to Naedobang eliminated the risks that may follow afterwards to make assurance doubly sure for guarding. The Choe's regime established Mabyeolcho as a private guard organization in addition to dobang, and this formed the cavalry and infantry units with dobang. Yabyeolcho organized by Woo Choe in the reign of King Gojong was divided into Joabyeolcho and Ubyeolcho, and later Sineuigun was integrated with them to form Sambyeolcho. Originally, Yabyeolcho was established under the rule of Woo Choe to prevent crime in the evening, but after Sineuigun was organized with the ones who were captured by Mongolian army but escaped, in other words when Sambyeolcho was organized, the organization displayed much broader influence by covering military and police affairs as well as punishment and imprisonment. The guarding organization during the Period of Military Rule in the Goryeo Dynasty did not have strict distinction between official guard and personal guard. The private guard in modern days which is the equivalent of personal guard is characterized by its commerciality, however, house troops and the members of dobang did not seem to pursued profit. The guard organization during the period of military rule started from dobang which was organized for personal safety but gradually developed publicness through the participation of civil ministers and expansion, and later it played the pivotal role for social security serving official purpose up to the level where the distinction between official and private activities was blurred during the period of Sambyeolcho.

  • PDF