• Title/Summary/Keyword: Full security

Search Result 298, Processing Time 0.026 seconds

Part-time Work in Sweden: The Coexistence in Tension of Flexibility and Gender Equality (스웨덴의 시간제근로: 유연성과 성평등의 긴장 속 공존)

  • Kim, Young-Mi
    • Korean Journal of Labor Studies
    • /
    • v.17 no.1
    • /
    • pp.297-323
    • /
    • 2011
  • Part-time jobs in Sweden are highly feminized yet are in fair conditions in terms of job security, earnings, and collective representation. Three points are considered to be important to understand why part-time work in Sweden carries such positive characteristics. First, the part-time work in Sweden is widely spread not as a result of employers' need for labor flexibilization but as means to enhance the work-life balance, a value pursued within a broader social policy package to change the breadwinner model. Second, discrimination against part-time workers is restrained in Sweden because the boundary between part-time and full-time is not conspicuous. Most of part-time jobs are occupied by regular workers who exert the right to part-time work, hence may go back to the full-time status any time. Third, the regulation on overtime work of part-time workers as well as full-time workers is strong. It is largely agreed among researchers that part-time work contributed greatly to an increase of female employment rate in Sweden. Since the 1970s, the increased availability of part-time jobs induced married women who used to be economically inactive to the labor market and maintained them to be economically active throughout the child rearing period. From the gender perspective, one may still raise issues regarding part-time work in Sweden such as persistent feminization and strong occupational sex segregation. However, the observed trend shows that the part-time work in Sweden has functioned more as a stepping stone to the full-time work for women than as a women's trap.

The Examination and Development Plan of Maritime Policing Act ("해양경비법" 검토와 발전방안)

  • Roh, Ho-Rae
    • Korean Security Journal
    • /
    • no.32
    • /
    • pp.95-122
    • /
    • 2012
  • The ocean in the 21st century is getting emphasized as a treasury of natural resources and a growth engine for the nation. And nations around the world have entered into the hyper-competition to take the initiative for those marine resources. Under the situation, the Korea Coast Guard is devoting itself with full force to protecting maritime sovereignty, ensuring maritime safety and security and preserving the marine environment. Purpose of this study is to analyze Maritime Policing Act of 2012 and their problems and to suggest improvement measures. Objectives of Maritime Policing Act of 2012 is national Defence, policing for maritime security, protection of marine natural resources and marine facility in territorial waters and exclusive economic zone(EEZ) of Korea. Limits of Maritime Policing Act of 2012 are as follows. First, As organization related rules in Maritime Policing Act of 2012 are not enough, Maritime police agency Act should be revised and enacted in order to cope with future administrative demands and legal ground. Second, Article 22 penal regulation is more severe than regulations of another Act. Third, Article 14 should be made improvement for pre-prevention through the pre-report and the establishment of prohibition boundary in maritime demonstration.

  • PDF

Energy Efficient Distributed Intrusion Detection Architecture using mHEED on Sensor Networks (센서 네트워크에서 mHEED를 이용한 에너지 효율적인 분산 침입탐지 구조)

  • Kim, Mi-Hui;Kim, Ji-Sun;Chae, Ki-Joon
    • The KIPS Transactions:PartC
    • /
    • v.16C no.2
    • /
    • pp.151-164
    • /
    • 2009
  • The importance of sensor networks as a base of ubiquitous computing realization is being highlighted, and espicially the security is recognized as an important research isuue, because of their characteristics.Several efforts are underway to provide security services in sensor networks, but most of them are preventive approaches based on cryptography. However, sensor nodes are extremely vulnerable to capture or key compromise. To ensure the security of the network, it is critical to develop security Intrusion Detection System (IDS) that can survive malicious attacks from "insiders" who have access to keying materials or the full control of some nodes, taking their charateristics into consideration. In this perper, we design a distributed and adaptive IDS architecture on sensor networks, respecting both of energy efficiency and IDS efficiency. Utilizing a modified HEED algorithm, a clustering algorithm, distributed IDS nodes (dIDS) are selected according to node's residual energy and degree. Then the monitoring results of dIDSswith detection codes are transferred to dIDSs in next round, in order to perform consecutive and integrated IDS process and urgent report are sent through high priority messages. With the simulation we show that the superiorities of our architecture in the the efficiency, overhead, and detection capability view, in comparison with a recent existent research, adaptive IDS.

The Relative Influence of Juvenile Delinquency Theories Using Korean Children and Youth Panel Data (청소년 비행이론의 상대적인 영향력 검증: 아동·청소년 패널자료를 중심으로)

  • Hwang, Sung-Hyun
    • Korean Security Journal
    • /
    • no.44
    • /
    • pp.225-250
    • /
    • 2015
  • The purpose of this study is to explore the relative influences of juvenile delinquency using variables from Hirschi's social bonding theory, Agnew's general strain theory, Gottfredson and Hirschi's self-control theory, and Akers' social learning theory. The data derived from a sample of 2,018 high school students taken from National Youth Policy Institute in 2013. Multiple OLS regression analysis indicated that social learning theory has the greatest impact on dependent variables than other theories. The results of regression analyses also explore the notion that without the social bond, general strain, and self-control variables, there is very little loss of explained variance when these variables are removed from the full equation. However, when the social learning factors are eliminated from the full equation, the change in $R^2$ is dramatic. This result supported the idea that social learning variables had the strongest effect on the juvenile delinquency of Korean adolescents. The most important implication of this study is that it is the first study to test four major theoretical models for juvenile delinquency in Korea. It also makes a number of important contributions toward the further utilization of social learning in investigating juvenile delinquency for Korean high school students.

  • PDF

A Chosen Plaintext Linear Attack On Block Cipher Cipher CIKS-1 (CIKS-1 블록 암호에 대한 선택 평문 선형 공격)

  • 이창훈;홍득조;이성재;이상진;양형진;임종인
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.13 no.1
    • /
    • pp.47-57
    • /
    • 2003
  • In this paper, we firstly evaluate the resistance of the reduced 5-round version of the block cipher CIKS-1 against linear cryptanalysis(LC) and show that we can attack full-round CIKS-1 with \ulcorner56-bit key through the canonical extension of our attack. A feature of the CIKS-1 is the use of both Data-Dependent permutations(DDP) and internal key scheduling which consist in data dependent transformation of the round subkeys. Taking into accout the structure of CIKS-1 we investigate linear approximation. That is, we consider 16 linear approximations with p=3/4 for 16 parallel modulo $2^2$ additions to construct one-round linear approximation and derive one-round linear approximation with the probability P=1/2+$2^{-17}$ by Piling-up lemma. Then we present 3-round linear approximation with 1/2+$2^{-17}$ using this one-round approximation and attack the reduced 5-round CIKS-1 with 64-bit block by LC. In conclusion we present that our attack requires $2^{38}$chosen plaintexts with a probability of success of 99.9% and about $2^{67-7}$encryption times to recover the last round key.(But, for the full-round CIKS-1, our attack requires about $2^{166}$encryption times)

A Study on the Decryption Method for Volume Encryption and Backup Applications (볼륨 암호화 및 백업 응용프로그램에 대한 복호화 방안 연구)

  • Gwui-eun Park;Min-jeong Lee;Soo-jin Kang;Gi-yoon Kim;Jong-sung Kim
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.33 no.3
    • /
    • pp.511-525
    • /
    • 2023
  • As awareness of personal data protection increases, various Full Disk Encryption (FDE)-based applications are being developed that real-time encryption or use virtual drive volumes to protect data on user's PC. FDE-based applications encrypt and protect the volume containing user's data. However, as disk encryption technology advances, some users are abusing FDE-based applications to encrypt evidence associated with criminal activities, which makes difficulties in digital forensic investigations. Thus, it is necessary to analyze the encryption process used in FDE-based applications and decrypt the encrypted data. In this paper, we analyze Cryptomator and Norton Ghost, which provide volume encryption and backup functions. We analyze the encrypted data structure and encryption process to classify the main data of each application and identify the encryption algorithm used for data decryption. The encryption algorithms of these applications are recently emergin gor customized encryption algorithms which are analyzed to decrypt data. User password is essential to generate a data encryption key used for decryption, and a password acquisition method is suggested using the function of each application. This supplemented the limitations of password investigation, and identifies user data by decrypting encrypted data based on the acquired password.

Certificate Revocation Scheme based on the Blockchain for Vehicular Communications

  • Kim, Hyun-Gon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.25 no.7
    • /
    • pp.93-101
    • /
    • 2020
  • Regional CRL(certificate revocation list) in vehicular communications is to partition Full CRL into several small CRLs according to geographic location to keep the size of individual CRLs with smaller. However, since a Regional CRL includes vehicle's revoked certificates within its administrative region, it has to know vehicle' location. For this, how to know vehicle' location effectively corresponding to every region represents a major challenge. This paper proposes a Regional CRL scheme which is envisioned to achieve vehicle's location and to make regional CRLs according to vehicles current location efficiently. The scheme is based on the short-lived pseudonyms defined by WAVE standard. It also acquires issued pseudonyms, vehicle's id and region information whenever a vehicle initiates pseudonyms refill after that, utilizes them to create and distribute the Regional CRL. To keep location privacy-preserving for vehicles, the scheme uses the blockchain technology in the network. The analysis results show that it reduces CRL size and database query time for finding revoked certificates sharply in the vehicle's on-board unit.

Analysis of Autonomous Driving Vehicle and Korea's Competitiveness Strategy (자율주행차 현황분석과 한국의 경쟁력 확보 전략)

  • Yang, Eun-ji;Kang, Su-jin;Kwon, So-ei;Kim, Da-yeon;Kim, Ji-won;Lee, Yu-jeong;Hwang, Hye-jeong;Chang, Young-hyun
    • The Journal of the Convergence on Culture Technology
    • /
    • v.3 no.2
    • /
    • pp.49-54
    • /
    • 2017
  • In Korea, partial self-driving feature is added on Genesis G80, Tivoli 2017, and others, and full implementation is under evaluation. Tesla already completed test for full self-driving car, Tesla Model 'X'. Further adoption of self-driving car in market will bring benefits to the elderly and disabled, meanwhile traffic accident will be decreased. However, related regulations for traffic accident with autonomous car including ethical responsibility is not fully established yet. In addition, security and privacy issue of self-driving cars should be improved as well. In this paper, domestic researches and analysis status on autonomous car will be summarized, and proper activation model will be proposed for the previously described issues.

Voluntary Choice of Part-time Work and Job Satisfaction (시간제근로에서 자발성과 일자리 만족)

  • Sung, Jaimie;Ahn, Joyup
    • Journal of Labour Economics
    • /
    • v.30 no.1
    • /
    • pp.109-137
    • /
    • 2007
  • One of the key features of the Korean labor market is that, even though the central axis of employment has shifted from manufacturing sector to service sector, the ratio of part-time work is very low. Its major reasons are low wage rate, insufficient fringe benefits including social insurance, and deficient job security, even though part-time work has positive characteristics. This study examines whether part-time work would be a decent one and an alternative to full-time work by answering two questions: one is who chooses part-time work and another is whether part-time work is satisfactory. Analyses of 3,971 wage workers in the 8th wave of the Korea Labor and Income Panel Survey reveal that, as expected, part-time work is prevalent among the young, married women, and the old supporting the results from previous studies and that choosing part-time work on one's initiatives has a significant positive effect on job satisfaction for women while it is not for men. Form the result, it can be concluded that part-time work can be an appropriate alternative for full-time work if one chooses it voluntarily.

  • PDF

An Application of Elasto-Plastic Model to Overhanging Geosynthetic-Reinforced Soil Structure (역경사형 토목섬유 보강토 구조물에 탄소성 모델의 적용)

  • Kim, Eun-Ra;Iizuka, Atsushi;Kim, You-Seong
    • Journal of the Korean Geosynthetics Society
    • /
    • v.3 no.4
    • /
    • pp.3-12
    • /
    • 2004
  • In this paper, a mechanism of the soil structure reinforced by geosynthetics is discussed. The reinforcing mechanism is interpreted an effect arising from the reinforcement works so as to prevent the dilative deformation (negative dilatancy) of soil under shearing. A full-scale in-situ model test was carried out in Kanazawa of Japan(1994) and in the laboratory test the strength and the characteristics of deformation conducting a constant volume shear test are examined. The parameters needed in the FEM are also applied by using the experimental data. The elasto-plastic finite element simulation is carried out, and the results are quantitatively compared with that of experiment. As a results, it is known that the theoretical predictions could be explained effectively the experimental results which are obtained by a full-scale in-situ model test.

  • PDF