• Title/Summary/Keyword: Emerging Security

Search Result 363, Processing Time 0.02 seconds

East Asian Maritime Security: Naval Power vs. Normative Power (동아시아 해양안보 : 해군력인가 해양법인가?)

  • Koo, Min-Gyo
    • Strategy21
    • /
    • s.40
    • /
    • pp.115-130
    • /
    • 2016
  • The security environment surrounding the East Asian seas is rapidly changing due to the naval arms race among coastal states. The arms race is likely to worsen the security dilemma of the countries involved, thus increasing the chances for armed conflicts. It is too early to tell how the contemporary naval arms race in the region will evolve. But, for sure, the level of uncertainty is increasingly becoming high and intense. At the same time, there is emerging a legal warfare or lawfare among the rival countries. In particular, the United States and China have been involved in a serious debate about the nature and scope of the right of innocent passage and freedom of navigation in other countries' maritime zones. In collaboration with its regional allies, the United States has also put normative pressures on China with its excessive claims in the South China Sea. The latest arbitral tribunal case between the Philippines and China illustrates the point. With both arms race and normative competition in play, the future of East Asian maritime security will remain very complex and uncertain.

An Access Control Method considering Semantic Context for Privacy-preserving (개인정보 보호를 위한 의미적 상황을 반영하는 접근제어 방식)

  • Kang, Woo-Jun
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.15 no.1
    • /
    • pp.1-14
    • /
    • 2015
  • To conform to new emerging computing paradigm, various researches and challenges are being done. New information technologies make easy to access and acquire information in various ways. In other side, however, it also makes illegal access more powerful and various threat to system security. In this paper, we suggest a new extended access control method that make it possible to conform to security policies enforcement even with discrepancy between policy based constraints rules and query based constraints rules, based on their semantic information. New method is to derive security policy rules using context tree structure and to control the exceed granting of privileges through the degree of the semantic discrepancy. In addition, we illustrate prototype system architecture and make performance comparison with existing access control methods.

A Study of Carbon Dioxide Emissions due to the Performance Degradation Factors of An Inner Network (내부 네트워크의 성능저하요인에 따른 이산화탄소 배출에 관한 연구)

  • Jeon, Jeon-Hoon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.36 no.11B
    • /
    • pp.1315-1322
    • /
    • 2011
  • Recently, The Problem of Global Warming around the world, is emerging as a very serious environmental problems, and as a way to fix it 'Green IT' is becoming an Issue. In these situations the evolution of network technologies with a various attacks, it appears, add the different security devices and systems are deployed. But, Deployment methods such a network, the performance and security of the internal network will affect on the greater and it will be increase Carbon Dioxide emissions. Therefore, In this paper, it will be to analyze Carbon Dioxide Emissions due to the Performance Degradation Factors of An Inner Network. and In a future, This paper is expected to serve as a valuable Information for the Network Performance and Security improvements and to reduce Carbon Emissions in the Field of IT.

An Empirical Study on Individual and Social Commerce Factors Impacting Shopping Value and Intention to Repurchase in Social Commerce and Moderating Effects of Perceived Security (소셜커머스의 쇼핑 가치와 재구매의도에 영향을 미치는 개인 및 소셜커머스 특성과 지각된 보안의 조절효과에 대한 연구)

  • Kim, Sanghyun;Park, HyunSun
    • Journal of Information Technology Services
    • /
    • v.12 no.2
    • /
    • pp.31-53
    • /
    • 2013
  • Web 2.0 has affected existing e-commerce and created a new business model of e-commerce, known as social commerce. Social commerce is a subset of e-commerce using social network services and is emerging as an important platform due to increased popularity of social networking services. This study focuses on analyzing the factors that influence the shopping value and intention to repurchase of social commerce users. Based on prior researches, we develop a research model, including individual characteristics of social commerce users (Collectivism, Price Sensitivity, Impulse Buying) and social commerce characteristics (Cost saving, Product Variety, Shopping Convenience). Furthermore, this study proposed the moderating effect of Perceived Security and the relationship between shopping value and intention to repurchase. To empirically validate, the data were collected from 220 social commerce users. The results indicated that individual characteristics (collectivism, price sensitivity, impulse buying) were positively related to hedonic shopping value. In addition, social commerce characteristics (cost saving, shopping convenience) were positively related to utilitarian value. The shopping value(hedonic and utilitarian) had a significant influence on intention to repurchase. The moderating effects of perceived security also was significant. Lastly, the implications for theory and practice are discussed.

Gender, Momism and National Security in American POW Fictions of the Korean War (한국전쟁 포로소설과 젠더, 모성주의, 국가안보)

  • Shim, Kyungseok
    • Journal of English Language & Literature
    • /
    • v.58 no.2
    • /
    • pp.327-345
    • /
    • 2012
  • This paper explores how gender, sexuality, momism and national security are intertwined in the POW fictions of the Korean War, revealing the blurred demarcation line of the private and the public during the Cold War era. Works such as Night and Valley of Fire reveal the weakened manhood of the soldiers who were brainwashed or easily succumbed to the enemy during their imprisonment. The novels commonly attribute their weakness to materialism and spiritual corruption prevalent in the society, in addition to mass media including TV. Moreover, a social critic like Phillip Wily provokes the polemical idea of "Momism" which was ardently circulated among some male circles. In Manchurian Candidate, momism is integrated into incest and homosexuality, epitomized by Raymond and his mother. The novel illustrates how momism can be dangerous to national security and devastate the growth of manhood. Mrs. Iselin, a masculinized middle-aged woman, becomes a 'monster' whose overweening desire for power overrides any maternal concern for her son. Such 'monstrosity' exposes the danger of a woman who can castrate a man and manipulate a society. To a certain extent, the same tendency can be found in Turncoat and Night. Both novels reveal how the love of mother brings detrimental impact on boys who become prey to the communist's brainwashing in the POW camps. In short, the POW novels betray society's patriarchal concerns with women's emerging power threatening its ideology.

STB Virtualization based Enhanced IPTV User Authentication System (셋톱박스 가상화를 통한 향상된 IPTV 사용자 인증 시스템)

  • Go, Woong;Kwak, Jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.21 no.4
    • /
    • pp.137-147
    • /
    • 2011
  • Because of the convergence between Internet and broadcast communication, users are able to use multimedia contents anytime. In addition, with the change of existing one-way service to two-way service, the provider can offer efficient and useful broadcast communication. However, As multimedia contents is provided by STB, it can validate only end-node STB. Thus, this method is limiting possibilities of individual service. Also, providers' STB are different, so problem of compatibility is emerging as an issue. Therefore, in this paper we proposed STB virtualization based enhanced IPTV user authentication system to improve individual authentication and compatibility of services.

A Study on the Correlation between Atypical Form Factor-based Smartphones and Display-dependent Authentication Methods (비정형 폼 팩터 기반 스마트폰과 디스플레이 의존형 사용자 인증기법의 상관관계 연구)

  • Choi, Dongmin
    • Journal of Korea Multimedia Society
    • /
    • v.24 no.8
    • /
    • pp.1076-1089
    • /
    • 2021
  • Among the currently used knowledge-based authentication methods for smartphones, text and graphic-based authentication methods, such as PIN and pattern methods, use a display unit and a touch function of the display unit for input/output of secret information. Recently released smartphone form factors are trying to transform into various forms, away from the conventional bar and slate types because of the material change of the display unit used in the existing smartphone and the increased flexibility of the display unit. However, as mentioned in the study of D. Choi [1], the structural change of the display unit may directly or indirectly affect the authentication method using the display unit as the main input/output device for confidential information, resulting in unexpected security vulnerabilities. In this paper, we analyze the security vulnerabilities of the current mobile user authentication methods that is applied atypical form factor. According to the analysis results, it seems that the existing display-dependent mobile user authentication methods do not consider emerging security threats at all. Furthermore, it is easily affected by changes in the form factor of smartphones. Finally, we propose countermeasures for security vulnerabilities expected when applying conventional authentication methods to atypical form factor-based smartphones.

Rationalization of Network Segregation for Continuity of Financial Services Following COVID-19

  • Choi, Manyong;Kwak, Jin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.11
    • /
    • pp.4163-4183
    • /
    • 2021
  • As measures for protecting users and ensuring security of electronic financial transactions, such as online banking, financial institutions in South Korea have implemented network segregation policies. However, a revision of such domain-centered standardized network segregation policies has been increasingly requested because of: 1) increased demand for remote work due to changes resulting from COVID-19 pandemic; and 2) the difficulty of applying new technologies of fintech companies based on information and communications technologies (ICTs) such as cloud services. Therefore, in this study, problems of the remote work environment arising from the network segregation policy currently applied to the financial sector in South Korea and those from the application of new ICTs such as fintech technology have been investigated. In addition, internal network protection policies of foreign financial sectors, such as those of the United States, United Kingdom, European Union, and Russia, and internal network protection policies of non-financial sectors, such as control systems, have been analyzed. As measures for the effective improvement of the current network segregation policy, we propose a policy change from domain-based to data-centric network segregation. Furthermore, to resolve threats of hacking at remote work, recently emerging as a global problem due to COVID-19 pandemic, a standard model for remote work system development applicable to financial companies and a reinforced terminal security model are presented, and an alternative control method applicable when network segregation is not applied is proposed.

A Study on Applications of Healthcare & Medicine Information Protection for Cloud-Based Precision Medicine (클라우드 기반 안전한 정밀의료 실현을 위한 보건의료정보 보호 적용 방안에 관한 연구)

  • Dong-Won Kim
    • Convergence Security Journal
    • /
    • v.22 no.3
    • /
    • pp.69-77
    • /
    • 2022
  • Globally, the medical field is growing very fast with technology development and convergence with ICT technology, and Precision Medicine using personal health information, genetic information, and clinical information is growing into a next-generation medical industry. Since Precision Medicine deals with individual health and life, the issues of personal information protection and health and medical information protection are emerging.Accordingly, this paper presents security improvements by domestic and foreign standards, laws, and systems in the cloud and medical field, and proposes a plan to protect healthcare and medicine information protection for safe Precision Medicine.

Trust based Mutual Authentication Mechanism for Cloud Computing

  • Mandeeep Kaur;Prachi Garg
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.12
    • /
    • pp.81-90
    • /
    • 2023
  • Cloud computing is an emerging business model popularized during the last few years by the IT industry. Providing "Everything as a Service" has shifted many organizations to choose cloud-based services. However, some companies still fear shifting their data to the cloud due to issues related to the security and privacy. The paper suggests a novel Trust based Mutual Authentication Mechanism using Secret P-box based Mutual Authentication Mechanism (TbMAM-SPb) on the criticality of information. It uses a particular passcodes from one of the secret P-box to act as challenge to one party. The response is another passcode from other P-box. The mechanism is designed in a way that the response given by a party to a challenge is itself a new challenge for the other party. Access to data is provided after ensuring certain number of correct challenge-responses. The complexity can be dynamically updated on basis of criticality of the information and trust factor between the two parties. The communication is encrypted and time-stamped to avoid interceptions and reuse. Overall, it is good authentication mechanism without the use of expensive devices and participation of a trusted third party.