• Title/Summary/Keyword: 통제 네트워크

Search Result 450, Processing Time 0.04 seconds

Maintaining Professional Dignity in the Age of Social Media (소셜미디어 시대에서 의료전문직으로서의 품위 유지)

  • KIM, Claire Junga;BHAN, Yoo Wha
    • Korean Journal of Medical Ethics
    • /
    • v.21 no.4
    • /
    • pp.316-329
    • /
    • 2018
  • Although the use of social media by doctors raises important issues concerning medical professionalism, the relevant professional bodies in South Korea have failed to issue clear guidelines on social media usage. The Korean Medical Association's newly revised ethics guidelines do require members to maintain dignity while using social media, but the idea of "maintaining dignity" is far from clear, and its premodern connotation prevents it from being reliably used in professional codes of conduct. The authors of this article examine the concept of maintaining dignity and conclude that once it is clarified and redefined it can and should be used as a viable ethical standard in a variety of contexts, including the use of social media. Social media's unpredictability and uncontrollability, and the blurred distinction between professional/public and personal/private can be a threat to medical professionalism. In order to deal with this threat, the concept of dignity is important. We present three examples in which the dignity of medical professionals is undermined and explain why these jeopardize public trust. We conclude that in order to maintain public trust the Korean Medical Association should provide more detailed guidelines on the use of social media by its members.

Construction of an Audio Steganography Botnet Based on Telegram Messenger (텔레그램 메신저 기반의 오디오 스테가노그래피 봇넷 구축)

  • Jeon, Jin;Cho, Youngho
    • Journal of Internet Computing and Services
    • /
    • v.23 no.5
    • /
    • pp.127-134
    • /
    • 2022
  • Steganography is a hidden technique in which secret messages are hidden in various multimedia files, and it is widely exploited for cyber crime and attacks because it is very difficult for third parties other than senders and receivers to identify the presence of hidden information in communication messages. Botnet typically consists of botmasters, bots, and C&C (Command & Control) servers, and is a botmasters-controlled network with various structures such as centralized, distributed (P2P), and hybrid. Recently, in order to enhance the concealment of botnets, research on Stego Botnet, which uses SNS platforms instead of C&C servers and performs C&C communication by applying steganography techniques, has been actively conducted, but image or video media-oriented stego botnet techniques have been studied. On the other hand, audio files such as various sound sources and recording files are also actively shared on SNS, so research on stego botnet based on audio steganography is needed. Therefore, in this study, we present the results of comparative analysis on hidden capacity by file type and tool through experiments, using a stego botnet that performs C&C hidden communication using audio files as a cover medium in Telegram Messenger.

A Study on Constructing a RMF Optimized for Korean National Defense for Weapon System Development (무기체계 개발을 위한 한국형 국방 RMF 구축 방안 연구)

  • Jung keun Ahn;Kwangsoo Cho;Han-jin Jeong;Ji-hun Jeong;Seung-joo Kim
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.33 no.5
    • /
    • pp.827-846
    • /
    • 2023
  • Recently, various information technologies such as network communication and sensors have begun to be integrated into weapon systems that were previously operated in stand-alone. This helps the operators of the weapon system to make quick and accurate decisions, thereby allowing for effective operation of the weapon system. However, as the involvement of the cyber domain in weapon systems increases, it is expected that the potential for damage from cyber attacks will also increase. To develop a secure weapon system, it is necessary to implement built-in security, which helps considering security from the requirement stage of the software development process. The U.S. Department of Defense is implementing the Risk Management Framework Assessment and Authorization (RMF A&A) process, along with the introduction of the concept of cybersecurity, for the evaluation and acquisition of weapon systems. Similarly, South Korea is also continuously making efforts to implement the Korea Risk Management Framework (K-RMF). However, so far, there are no cases where K-RMF has been applied from the development stage, and most of the data and documents related to the U.S. RMF A&A are not disclosed for confidentiality reasons. In this study, we propose the method for inferring the composition of the K-RMF based on systematic threat analysis method and the publicly released documents and data related to RMF. Furthermore, we demonstrate the effectiveness of our inferring method by applying it to the naval battleship system.

Proposal for the 『Army TIGER Cyber Defense System』 Installation capable of responding to future enemy cyber attack (미래 사이버위협에 대응 가능한 『Army TIGER 사이버방호체계』 구축을 위한 제언)

  • Byeong-jun Park;Cheol-jung Kim
    • Journal of Internet Computing and Services
    • /
    • v.25 no.1
    • /
    • pp.157-166
    • /
    • 2024
  • The Army TIGER System, which is being deployed to implement a future combat system, is expected to bring innovative changes to the army's combat methods and comabt execution capability such as mobility, networking and intelligence. To this end, the Army will introduce various systems using drones, robots, unmanned vehicles, AI(Artificial Intelligence), etc. and utilize them in combat. The use of various unmanned vehicles and AI is expected to result in the introduction of equipment with new technologies into the army and an increase in various types of transmitted information, i.e. data. However, currently in the military, there is an acceleration in research and combat experimentations on warfigthing options using Army TIGER forces system for specific functions. On the other hand, the current reality is that research on cyber threats measures targeting information systems related to the increasing number of unmanned systems, data production, and transmission from unmanned systems, as well as the establishment of cloud centers and AI command and control center driven by the new force systems, is not being pursued. Accordingly this paper analyzes the structure and characteristics of the Army TIGER force integration system and makes suggestions for necessity of building, available cyber defense solutions and Army TIGER integrated cyber protections system that can respond to cyber threats in the future.

Perspectives on Glutaminase Inhibitors as Metabolic Anti-cancer Agents (Glutamine 대사항암제의 개발과 전망)

  • Ho-Yeon Jeon;Chae-Ryeong Seo;Jaeho Bae;Soon-Cheol Ahn
    • Journal of Life Science
    • /
    • v.34 no.10
    • /
    • pp.744-754
    • /
    • 2024
  • Cancer cells exhibit a unique metabolic process for uncontrolled cell division, providing bioenergy and intermediates, which are significantly different from normal cells. Here an aerobic glycolysis converts most of the pyruvate produced from glucose into lactate and inefficiently produced ATP. Cancer cells counter their lack of energy through glutamine metabolism, together with glucose. Glutamine is the most abundant amino acid in the blood and is used for the synthesis of amino acids, nucleotides, and lipids, as well as bioenergy through glutaminolysis. Cancer cells rely on glutamine rather than normal cells, showing more than half of the tricarboxylic acid cycle metabolites derived from glutamine, called glutamine addiction. Oncogenes c-Myc also regulates the expression of various genes involved in glutamine metabolism and promotes the absorption of glutamine. Whether glutaminase (GLS) causes or inhibits tumors is controversial. However, GLS1 is a promising treatment target due to its higher carcinogenic incidence, whereas GLS2 is known to act as a tumor suppressor. The 4th-generation metabolic anti-cancer therapy, which has been actively investigated since the mid-2010s, is based on a complex and sophisticated network of cancer metabolites. These drugs directly regulate the energy metabolism of cancer cells to maximize anti-cancer effects without side effects. GLS is a crucial enzyme for cancer metabolism and tumor progression that catalyzes the first stage in the process of glutaminolysis. The development of anti-cancer drugs targeting GLS enzymes has emerged as a promising strategy.

A Study on the Influence of Entrepreneurship and Start-Up Competency on Entrepreneurial Satisfaction: Focusing on the Moderating Effect of Flow Experience (창업가정신, 창업역량이 창업만족도에 미치는 영향에 관한 연구: 플로우(Flow)경험의 조절효과를 중심으로)

  • Lee, Sang Hwa;Ha, Kyu Soo
    • Asia-Pacific Journal of Business Venturing and Entrepreneurship
    • /
    • v.10 no.5
    • /
    • pp.137-150
    • /
    • 2015
  • This study investigated the influence of Entrepreneurship, Start-up Competency on Entrepreneurial Satisfaction and the moderating effect of Flow experience. The goal of this investigation is to empirically prove that despite the benefits of educational and financial support, mentoring and consulting which selected applicants received as a part of supporting business for start-up companies provided by national and local government and public organizations, there is a gap between individual entrepreneurs' satisfaction after actual foundation of the company. For the purpose of this investigation, data was collected through a survey with 320 entrepreneurs who were beneficiaries of government's supporting business for start-up companies and have founded their companies less than 5 years ago. For entrepreneurship variables, three factors of innovativeness, proactiveness and risk-taking were reviewed, and also reviewed the three variables network capability, market orientation and marketing capacity as Start-up competency. The collected data was used to perform a multiple regression analysis, and the moderating effect of flow experience was analysed using moderated regression analysis. The result of analysis shows that innovativeness, proactiveness and risk-taking of entrepreneurship positively affected the entrepreneurial satisfaction, and network capability, market orientation and marketing capability also positively affected the entrepreneurial satisfaction. As a result of analysing the moderating effect of flow experience, it appeared that there is a positive moderating effect between entrepreneurship, start-up competency, and the entrepreneurial satisfaction. This result concludes that evaluation items of entrepreneurship and start-up competency as applicant selecting criteria in supporting business for start-up companies, are valid. It is also concluded that start-up supports such as education, funds and consulting are also important, but it is necessary to make changes such as construction of start-up ecosystem and reinforcement of networking support, so that entrepreneurs can have the flow experience themselves in the process after founding a company.

  • PDF

The Trend of Aviation Terrorism in the 4th Industrial Revolution Period and the Development Direction for Domestic Counter Terrorism of Aviation (제4차 산업혁명 시대의 항공 테러리즘 양상 및 국내 항공테러 대응체계 발전방향)

  • Hwang, Ho-Won;Kim, Seung-Woo
    • The Korean Journal of Air & Space Law and Policy
    • /
    • v.32 no.2
    • /
    • pp.155-188
    • /
    • 2017
  • On the one hand, the 4th Industrial Revolution provides a positive opportunity to build a new civilization paradigm for mankind. However, on the other hand, due to the 4th Industrial Revolution, artificial intelligence such as 'Goggle Alpha Go' revolutionized and even the human ability was replaced with a 'Silicon Chip' as the opportunity to communicate decreases, the existence of human beings is weakened. And there is a growing concern that the number of violent crimes, such as psychopath, which hunts humans as games, will increase. Moreover, recent international terrorism is being developed in a form similar to 'Psychopathic Violent-Crime' that indiscriminately attacks innocent people. So, the probability that terrorist organizations abuse the positive effects provided by the Fourth Industrial Revolution as means of terrorism is increasing. Therefore, the paradigm of aviation terrorism is expected to change in a way that attacks airport facilities and users rather than aircraft. Because airport facilities are crowded, and psychopathic terrorists are easily accessible. From this point of view, our counter terrorism system of aviation has many weak points in various aspects such as: (1) limitations of counter-terrorism center (2) inefficient on-site command and control system (3) separated organization for aviation security consultation (4) dispersed information collection function in government (5) vulnerable to cyber attack (6) lack of international cooperation network for aviation terrorism. Consequently, it is necessary to improve the domestic counter terrorism system of aviation so as to preemptively respond to the international terrorism. This study propose the following measures to improve the aviation security system by (1) create 'Aviation Special Judicial Police' (2) revise the anti-terrorism law and aviation security law (3) Strengthening the ability respond to terrorism in cyberspace (4) building an international cooperation network for aviation terrorism.

  • PDF

A study on security independent behavior in social game using expanded health belief model (건강신념모델을 확장한 소셜게임(Social Game) 보안의지행동에 관한 연구)

  • Ahn, Ho-Jeong;Kim, Sung-Jun;Kwon, Do-Soon
    • Management & Information Systems Review
    • /
    • v.35 no.2
    • /
    • pp.99-118
    • /
    • 2016
  • With the development of Internet and popularization of smartphones over recent years, social network services are experiencing rapid growth. On top of this, smartphone gaming market is showing a rapid growth and the use of mobile social games is on the significant rise. The occurrence of game data manipulation targeting these services and personal information leakage is highlighting the importance of social gaming security. This study is intended to propose development plans effective and efficient in social game services by figuring out factors putting effects on security dependent behavior of social game users in Korea and carrying out a practical study on the casual relationship between factors influencing security dependent behavior through recognized behavioral control and attitudes for privacy infringement of these factors. To do this, proposed was a study model in which the HBM(Health Belief Model) allowing the social game user to influence security dependent behavior was expanded and applied as a major variable. To verify the study model of this study practically, a survey was conducted among university students in Seoul-based K University and S University who had experienced using social game services. According to the study findings, firstly, the perceived seriousness turned out to provide positive influence to trust. But, the perceived seriousness turned out not to put positive effects on self-efficacy. Secondly, the perceived probability turned out not to put positive effects on self-efficacy and trust. Thirdly, the perceived gain turned out to put positive effects on self-efficacy and trust. Fourthly, the perceived disorder turned out not to put positive effects on self-efficacy and trust. Fifthly, self-efficacy turned out to put positive effects on trust. But, self-efficacy turned out not to put positive effects on security dependent behavior. Sixthly, trust turned out not to put positive effects on security dependent behavior. This study is intended to make a strategic proposal so that social game users can raise awareness of their level of security perception and security willingness through this.

  • PDF

The Relationship of Covert Narcissism, Sense of Alienation, and Self-Esteem with SNS Addiction Proneness in Middle School Students (중학생의 SNS중독 경향성에 있어 내현적 자기애와 소외감, 자아존중감의 관계)

  • Cho, So Yeon;Jung, Joowon
    • Journal of Korean Home Economics Education Association
    • /
    • v.29 no.3
    • /
    • pp.125-140
    • /
    • 2017
  • The purpose of this study was to investigate the relationship of covert narcissism and the sense of alienation with SNS addiction proneness and the influence of them on SNS addiction proneness in order to find a way to conduct an intervention for the SNS addiction proneness of middle school students, and verify the mediating effect of self-esteem on the relationship between covert narcissism, the sense of alienation, and SNS addiction proneness. For this purpose, data were collected online from the first to third grade middle school students who had the experience of using SNS within the past one week, and finally, the data of a total of 341 participants were used for analysis. First, as a result of the analysis of the correlation between covert narcissism, the sense of alienation, self-esteem and SNS addiction proneness, covert narcissism and the sense of alienation showed a significant positive correlation with SNS addiction proneness. On the other hand, there was a significant negative correlation between self-esteem and SNS addiction proneness. Second, the investigation of the effects of covert narcissism, alienation, and self-esteem on SNS addiction proneness showed that covert narcissism, the sense of alienation, and self-esteem had a significant effect on the SNS addiction proneness. The higher the levels of covert narcissism and the sense of alienation, the higher the level of SNS addiction proneness. On the other hand, the higher the level of self-esteem, the lower the level of SNS addiction proneness. Third, the mediating effect of self-esteem was verified for the relationship of covert narcissism and the sense of alienation with SNS addiction proneness. Although covert narcissism and the sense of alienation may directly affect SNS addiction proneness, it was found that they had a significant effect on the SNS addiction proneness through self-esteem as a mediating variable. In other words, it was found that as the levels of the covert narcissism and the sense of alienation were increased, the level of the self-esteem was lowered, which led to a higher level of SNS addiction proneness. In order to form a proper network culture for adolescents, education on appropriate use of SNS that can be put into practice in everyday life should be conducted, and healthy and desirable SNS culture should be created. In addition, systematic education and management should be provided so that students can develop the ability to control and regulate themselves.

The Characteristics and Performances of Manufacturing SMEs that Utilize Public Information Support Infrastructure (공공 정보지원 인프라 활용한 제조 중소기업의 특징과 성과에 관한 연구)

  • Kim, Keun-Hwan;Kwon, Taehoon;Jun, Seung-pyo
    • Journal of Intelligence and Information Systems
    • /
    • v.25 no.4
    • /
    • pp.1-33
    • /
    • 2019
  • The small and medium sized enterprises (hereinafter SMEs) are already at a competitive disadvantaged when compared to large companies with more abundant resources. Manufacturing SMEs not only need a lot of information needed for new product development for sustainable growth and survival, but also seek networking to overcome the limitations of resources, but they are faced with limitations due to their size limitations. In a new era in which connectivity increases the complexity and uncertainty of the business environment, SMEs are increasingly urged to find information and solve networking problems. In order to solve these problems, the government funded research institutes plays an important role and duty to solve the information asymmetry problem of SMEs. The purpose of this study is to identify the differentiating characteristics of SMEs that utilize the public information support infrastructure provided by SMEs to enhance the innovation capacity of SMEs, and how they contribute to corporate performance. We argue that we need an infrastructure for providing information support to SMEs as part of this effort to strengthen of the role of government funded institutions; in this study, we specifically identify the target of such a policy and furthermore empirically demonstrate the effects of such policy-based efforts. Our goal is to help establish the strategies for building the information supporting infrastructure. To achieve this purpose, we first classified the characteristics of SMEs that have been found to utilize the information supporting infrastructure provided by government funded institutions. This allows us to verify whether selection bias appears in the analyzed group, which helps us clarify the interpretative limits of our study results. Next, we performed mediator and moderator effect analysis for multiple variables to analyze the process through which the use of information supporting infrastructure led to an improvement in external networking capabilities and resulted in enhancing product competitiveness. This analysis helps identify the key factors we should focus on when offering indirect support to SMEs through the information supporting infrastructure, which in turn helps us more efficiently manage research related to SME supporting policies implemented by government funded institutions. The results of this study showed the following. First, SMEs that used the information supporting infrastructure were found to have a significant difference in size in comparison to domestic R&D SMEs, but on the other hand, there was no significant difference in the cluster analysis that considered various variables. Based on these findings, we confirmed that SMEs that use the information supporting infrastructure are superior in size, and had a relatively higher distribution of companies that transact to a greater degree with large companies, when compared to the SMEs composing the general group of SMEs. Also, we found that companies that already receive support from the information infrastructure have a high concentration of companies that need collaboration with government funded institution. Secondly, among the SMEs that use the information supporting infrastructure, we found that increasing external networking capabilities contributed to enhancing product competitiveness, and while this was no the effect of direct assistance, we also found that indirect contributions were made by increasing the open marketing capabilities: in other words, this was the result of an indirect-only mediator effect. Also, the number of times the company received additional support in this process through mentoring related to information utilization was found to have a mediated moderator effect on improving external networking capabilities and in turn strengthening product competitiveness. The results of this study provide several insights that will help establish policies. KISTI's information support infrastructure may lead to the conclusion that marketing is already well underway, but it intentionally supports groups that enable to achieve good performance. As a result, the government should provide clear priorities whether to support the companies in the underdevelopment or to aid better performance. Through our research, we have identified how public information infrastructure contributes to product competitiveness. Here, we can draw some policy implications. First, the public information support infrastructure should have the capability to enhance the ability to interact with or to find the expert that provides required information. Second, if the utilization of public information support (online) infrastructure is effective, it is not necessary to continuously provide informational mentoring, which is a parallel offline support. Rather, offline support such as mentoring should be used as an appropriate device for abnormal symptom monitoring. Third, it is required that SMEs should improve their ability to utilize, because the effect of enhancing networking capacity through public information support infrastructure and enhancing product competitiveness through such infrastructure appears in most types of companies rather than in specific SMEs.