• Title/Summary/Keyword: Human Security

Search Result 1,205, Processing Time 0.031 seconds

Combining Encryption and Preservation in Information Security to Secure Sending a Message

  • Nooh, Sameer
    • International Journal of Computer Science & Network Security
    • /
    • 제22권4호
    • /
    • pp.285-291
    • /
    • 2022
  • With the growing exchange of data between individuals and institutions through various electronic communication, valuable data protection is in high demand to ensure that it is not hacked and that privacy is protected. Many security techniques, such as encryption and steganography, have emerged to prevent security breaches. The purpose of this research is to integrate cryptographic and steganography techniques to secure text message sending. The Rijndael algorithm was used to encrypt the text message, and the Least Significant Bit algorithm was also used to hide the encrypted message in a color image. Experiments on the suggested method have proven that it can improve the security of sent messages due to the human eye's inability to identify the original image from the image after it has been covered, as well as the encryption of the message using a password.

시설경비조직의 전략적 인적자원관리가 조직문화 및 조직시민행동에 미치는 영향 (Influence of Strategic Human Resource Management of on Organizational Culture and Organizational Citizenship Behavior of Private Facility Security Guards)

  • 강민완;김효준
    • 한국콘텐츠학회논문지
    • /
    • 제11권4호
    • /
    • pp.389-403
    • /
    • 2011
  • 이 연구의 목적은 시설경비조직의 전략적 인적자원관리가 조직문화 및 조직시민행동에 미치는 영향을 규명하는데 있다. 이 연구는 2010년 6월 서울소재 4개소 민간경비회사의 시설경비원을 모집단으로 설정한 후 판단표집법을 이용하여 최종분석에 이용된 사례 수는 총 343명을 추출하였다. 설문지의 신뢰도는 Cronbach's ${\alpha}$값이 .691이상으로 나타났다. 결론은 다음과 같다. 첫째, 시설경비조직의 전략적 인적자원관리는 조직문화에 영향을 미친다. 즉, 교육훈련, 보상, 요원화, 경력개발이 활성화되면, 위계적, 개발적, 합의적, 합리적 문화는 촉진된다. 둘째, 시설경비조직의 전략적 인적자원관리는 조직시민행동에 영향을 미친다. 즉, 교육훈련, 요원화, 경력개발이 활성화 되면, 배려 이타주의, 참여적, 양심적, 신사적 행동은 촉진된다. 반면, 적절한 보상이 이루어지지 않았을 경우 배려 이타주의, 참여적 행동은 감소한다. 셋째, 시설경비조직의 조직문화는 조직시민행동에 영향을 미친다. 즉, 위계적, 개발적, 합의적, 합리적 문화가 형성 되면, 배려 이타주의, 참여적, 양심적, 신사적 행동은 촉진된다.

Study on Emerging Security Threats and National Response

  • Il Soo Bae;Hee Tae Jeong
    • International Journal of Advanced Culture Technology
    • /
    • 제11권4호
    • /
    • pp.34-41
    • /
    • 2023
  • The purpose of this paper is to consider the expansion of non-traditional security threats and the national-level response to the emergence of emerging security threats in ultra-uncertain VUCA situations. As a major research method for better analysis, the theoretical approach was referred to papers published in books and academic journals, and technical and current affairs data were studied through the Internet and literature research. The instability and uncertainty of the international order and security environment in the 21st century brought about a change in the security paradigm. Human security emerged as the protection target of security was expanded to individual humans, and emerging security was emerging as the security area expanded. Emerging security threatsthat have different characteristicsfrom traditionalsecurity threats are expressed in various ways, such as cyber threats, new infectious disease threats, terrorist threats, and abnormal climate threats. First, the policy and strategic response to respond to emerging security threats is integrated national crisis management based on artificial intelligence applying the concept of Foresight. Second, it is to establish network-based national crisis management smart governance. Third, it is to maintain the agile resilience of the concept of Agilience. Fourth, an integrated response system that integrates national power elements and national defense elements should be established.

금융보안 리스크 기반의 IT도급 정책 연구 (A Study on IT Outsourcing Policy Based on Operational Risks of Financial Industries)

  • 최창래;윤장호;이경호
    • 정보보호학회논문지
    • /
    • 제24권4호
    • /
    • pp.681-694
    • /
    • 2014
  • 2011년 대형 금융 사고가 연달아 발생하자 정부는 인력, 조직, 예산을 포함한 전자금융감독 규정 전면 개정을 발표했다. 규정에 주요 내용은 전자금융거래법 대상 기업들은 전체 직원의 5%를 IT인력으로 채용하고, IT인력의 5%는 보안인력으로, 또 IT예산의 7%는 정보보호 예산으로 편성하게 하는 내용이었다. 본 연구는 전자금융감독 규정 전면 개정에 따른 금융보안 리스크 기반의 IT도급 정책 결정 방안에 대해 연구하였다. 외주인력 문제를 해결하기 위한 정책 결정 Flow를 제공하고 IT 업무 분류 시 프로그램 품질 향상을 위한 개선 방안과 사례 연구를 통해 외주 인력의 효율적 운영정책을 제시하고자 한다.

클라우드 환경에서 보안 가시성 확보를 위한 자동화된 패킷 분류 및 처리기법 (Near Realtime Packet Classification & Handling Mechanism for Visualized Security Management in Cloud Environments)

  • 안명호;류미현
    • 한국정보통신학회:학술대회논문집
    • /
    • 한국정보통신학회 2014년도 추계학술대회
    • /
    • pp.331-337
    • /
    • 2014
  • 컴퓨팅 패러다임이 클라우드 컴퓨팅으로 변화됨에 따라 보안 이슈가 더욱 더 중요하게 되었다. 컴퓨팅 플랫폼 서비스 제공자들은 Firewall, Identity Management 등을 제공하지만 클라우드 컴퓨팅 인프라는 사용자가 맘대로 제어하거나 새로운 장치들을 부착하여 사용할 수 없기 때문에 비교적 보안에 취약한 것이 사실이다. 이런 환경에서는 사용자 스스로 보안을 대비해야 하기 때문에 직관적인 방법으로 전체 네트워크 트래픽 상황을 가시적으로 조망할 수 있는 기법이 필요하다. 이를 위해서는 네트워크 패킷을 실시간으로 저장하고, 저장된 데이터를 준 실시간으로 분류할 수 있는 기술이 요구된다. 네트워크 패킷 분류에서 중요한 사항은 패킷 분류를 비지도 방식으로 사람의 개입 없이도 판단 기준을 지능적으로 생성하고 이를 통해 패킷을 스스로 판별할 수 있는 기술개발이 필요하다. 또한, 이를 위해서 Naive-Bayesian Classifier, Packet Chunking 등의 방법들을 활용해 사용자 개입없이 분류에 필요한 시그니쳐(Signature)를 탐색하고 이를 학습해 스스로 자동화된 패킷 분류를 실현할 수 있는 방안을 제시한다.

  • PDF

Remote Control of Autonomous Robots via Internet

  • Sugisaka, Masanori;Johari, Mohd Rizon M
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 제어로봇시스템학회 2004년도 ICCAS
    • /
    • pp.24-27
    • /
    • 2004
  • This paper describes the method how to control an autonomous robot remotely using Internet. The autonomous robot that has an artificial brain is called "Tarou". (1) It is able to move along the line on the floor based on processing the image data obtained from two CCD cameras. (2) It is able to understand dialogs between human being and it and is able to take actions such as turn right and lefts, go forward 1m and go backward 0.5m, etc. (3) It is able to recognize patterns of objects. (4) It is able to recognize human faces. (5) It is able to communicate human being and to speak according to contents written in the program. We show the techniques to control the autonomous robot "Tarou" remotely by personal computer and/or portable Phone via Internet. The techniques developed in our research could dramatically increase their performance for..the need of artificial life robot as the next generation robot and national homeland security needs.

  • PDF

Face Recognition Based on PCA on Wavelet Subband of Average-Half-Face

  • Satone, M.P.;Kharate, G.K.
    • Journal of Information Processing Systems
    • /
    • 제8권3호
    • /
    • pp.483-494
    • /
    • 2012
  • Many recent events, such as terrorist attacks, exposed defects in most sophisticated security systems. Therefore, it is necessary to improve security data systems based on the body or behavioral characteristics, often called biometrics. Together with the growing interest in the development of human and computer interface and biometric identification, human face recognition has become an active research area. Face recognition appears to offer several advantages over other biometric methods. Nowadays, Principal Component Analysis (PCA) has been widely adopted for the face recognition algorithm. Yet still, PCA has limitations such as poor discriminatory power and large computational load. This paper proposes a novel algorithm for face recognition using a mid band frequency component of partial information which is used for PCA representation. Because the human face has even symmetry, half of a face is sufficient for face recognition. This partial information saves storage and computation time. In comparison with the traditional use of PCA, the proposed method gives better recognition accuracy and discriminatory power. Furthermore, the proposed method reduces the computational load and storage significantly.

Digital Transformation Requirements at Saudi Universities from Faculty Members' Perspectives

  • Taha Mansor Khawaji
    • International Journal of Computer Science & Network Security
    • /
    • 제23권11호
    • /
    • pp.8-20
    • /
    • 2023
  • The current study aims to determine digital transformation (organizational, technical, and human resources) requirements at Saudi universities from Umm Al-Qura University faculty members' perspectives. The researcher used a quantitative approach based on the descriptive analytical design. To answer the questions of the study, the researcher used the questionnaire as a data collection tool. The questionnaire was sent electronically to faculty members working in colleges and institutes affiliated with Umm Al-Qura University in Makkah Al-Mukarramah, Saudi Arabia. The questionnaire consisted of the three dimensions of digital transformation: organizational; technical; and human resources requirements. The results showed that requirements related to human resources came first with an average of 2.25 then the organizational requirements with an average of 1.95, and in the last, technical requirements came with an average of 1.64. In addition, some suggestions were given by the participants (faculty members) related to the mechanism that could contribute to implementing digital transformation at Saudi universities. Likewise, at the end of the study, the researcher has given some suggestions related to the implementation of digital transformation requirements at Saudi universities.

Creation of Integrated of Industrial Security with the use of Modern Information Technology

  • Sattarov, Sh.B.;Adilov, F.T.;Ivanyan, A.I.
    • Journal of Multimedia Information System
    • /
    • 제2권3호
    • /
    • pp.281-286
    • /
    • 2015
  • This article considers Honeywell solutions in the branch of integration of subsystems of industrial safety and security for industrial enterprises with the creation of a unified Human-machine interface for centralized management and control of safety at the plant.

Cognitive Bias and Information Security Research: Research Trends and Opportunities

  • Park, Jongpil;Oh, Chang-Gyu
    • Asia pacific journal of information systems
    • /
    • 제26권2호
    • /
    • pp.290-298
    • /
    • 2016
  • Human cognition and decision-making related to information systems (IS) is a major area of interest in IS research. Among these areas, cognitive bias rooted in behavioral economics is gaining considerable attention from researchers. In the present study, we identify the role of cognitive biases and discuss how they shape the information security behavior. We also seek research opportunities to provide directions and implications for future research.