• Title/Summary/Keyword: IT Convergence personnel

Search Result 176, Processing Time 0.02 seconds

A study on improvement of legislation for the safety fishing operation of the coastal and offshore fishing vessels (연근해어선의 안전조업을 위한 법제 개선방안)

  • Seung-Hyun LEE;Yun-Cheol LEE
    • Journal of the Korean Society of Fisheries and Ocean Technology
    • /
    • v.59 no.2
    • /
    • pp.172-180
    • /
    • 2023
  • Although it is highly dependent on the production of coastal and offshore fishing, the Fishing Vessels Safety Fisheries Act was enacted in 2019 due to the continuous increase in marine accidents of coastal and offshore fishing vessels. However, the law is too focused on fishing and navigation in certain waters and does not contain accident-preventive content. Ministry of Oceans and Fisheries proposes a plan to revise the Fishing Boat Safety Fishing Act through legal comparison with Japan's Seafarers' Labor Sanitation Rules. It also proposes an amendment that includes the content of the Seafarers Act on post-accident action obligations. Under the Fishing Vessels Safety Fishing Act, the safety fishing education is implemented for specific people and adopts a method of delivery education after completing the education. The reason for this is that the educational requirements are not sufficient compared to the number of education personnel. Moreover, four hours of education are conducted once a year, which is not suitable for insufficient educational conditions. For efficient safety fishing education, improvement measures are proposed compared to education in the United States and the United Kingdom.

The Relationship between Sovereignty and Commander-in-Chief of the Armed Forces, Military administration & command (주권과 국군통수권의 관계 및 병정관계에 관한 연구)

  • Kim, Sung Woo
    • Convergence Security Journal
    • /
    • v.13 no.5
    • /
    • pp.67-75
    • /
    • 2013
  • South Korea suggest that the United States government should delay the date to hand over wartime operational control (OPCON). It is fixed on December 1, 2015. Typically the president's position as head of the executive authority is coming from the Commander-in-Chief of the Armed Forces. Now we should know the commander-in-chief of the nation's forces and the meaning of OPCON. The relationship between sovereignty and the commander-in-chief of the nation's forces is a little different. This is one of the efforts to enlarge the efficiency of Armed Forces. Of course, operational control is little control of the sovereign personnel, logistics, administration, discipline, organizing, training, etc. It does not control all matters. The current ROK Combined Forces Command itself is made with reference to the North Atlantic Treaty Organization(NATO). If we insist our own sovereignty is infringed because of OPCON, that claim is coated in irreparable damage to the national interest.

A Study on Quantitative Method of Certificate for Information Security Education Course in the Private Sector (민간부문 정보보호 교육과정의 정량적 인증방법에 관한 연구)

  • Kim, Joo-hee;Cho, Sung-woo;Yoo, Dong-young
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.26 no.2
    • /
    • pp.551-558
    • /
    • 2016
  • The recent convergence in ICT industry has created new businesses as well as other opportunities. However, it entails new convergence threat accompanied by security risks. Even though there are security professionals who are dealing with the situation, there is not enough human resource in risk management. Moreover, the amount of research that studies quality of education and training security personnel is not sufficient. This paper explores the curriculum of information security education in the private sector and reasons out fifteen standard curriculums in four professional fields categorized by job classification. In addition, it provides a weighted score table based on the evaluation indicator for the effective security education certificates in the private sector.

A Study on the Implementation Method of Artificial Intelligence Shipboard Combat System (인공지능 함정전투체계 구현 방안에 관한 연구)

  • Kwon, Pan Gum;Jang, Kyoung Sun;Kim, Seung Woo;Kim, Jun Young;Yun, Won Hyuk;Rhee, Kye Jin
    • Convergence Security Journal
    • /
    • v.20 no.2
    • /
    • pp.123-135
    • /
    • 2020
  • Since AlphaGo's Match in 2016, there has been a growing calls for artificial intelligence applications in various industries, and research related to it has been actively conducted. The same is true in the military field, and since there has been no weapon system with artificial intelligence so far, effort to implement it are posing a challenge. Meanwhile, AlphaGo Zero, which beat AlphaGo, showed that artificial intelligence's self-training data-based approach can lead to better results than the knowledge-based approach by humans. Taking this point into consideration, this paper proposes to apply Reinforcement Learning, which is the basis of AlphaGo Zero, to the Shipboard Combat System or Combat Management System. This is how an artificial intelligence application to the Shipboard Combat System or Combat Management System that allows the optimal tactical assist with a constant win rate to be recommended to the user, that is, the commanding officer and operation personnel. To this end, the definition of the combat performance of the system, the design plan for the Shipboard Combat System, the mapping with the real system, and the training system are presented to smoothly apply the current operations.

A Study on Improvement of Damage Impact Range Assessment for Field-Based Response Against Chemical Terrorism and Accidents (현장 중심의 화학테러·사고 대응을 위한 피해 영향 범위 평가 개선 방안 연구)

  • Lee, Deok-Jae;Song, Chang Geun
    • Journal of Convergence for Information Technology
    • /
    • v.10 no.8
    • /
    • pp.127-136
    • /
    • 2020
  • Chemical terrorism and accidents using chemicals are continuously occurring and attempted in and out of the country. In Korea, the National Institute of Chemical Safety affiliated with Ministry of Environment employs the CARIS(Ver. 2018) to assess the damage impact range for field-based response against chemical terrorism and accidents. However, the current version of CARIS can not consider the effects of closed space such as indoor and underground, so it is difficult to provide accurate evaluation results for damage impact range required for field response, on top of the limited information available. The limitations and directions for improvement were studied by comparing and reviewing the evaluation results of the damage impact range obtained by driving CARIS (Ver. 2018) and the domestic and foreign literature. Proposed improvements also included the direction of information provided to residents, including the need to build modeling for special points, such as underground, indoor, etc., and on-site response personnel. It is expected that through the continuous supplementation and correction of CARIS, chemical terrorism and accident response capability system will be advanced further.

A Leverage Strategy of the Cyber warfare Security Policy Based on systems Thinking (시스템 사고를 이용한 사이버전 보안 정책 레버리지 전략 연구)

  • Yang, Ho-Kyung;Cha, Hyun-Jong;Shin, Hyo-Young;Park, Ho-Kyun;Ryou, Hwang-Bin
    • Convergence Security Journal
    • /
    • v.13 no.4
    • /
    • pp.77-83
    • /
    • 2013
  • As the network composed of numerous sensor nodes, sensor network conducts the function of sensing the surrounding information by sensor and of the sensed information. The concept of the battlefield is also changing to one that includes not only physical spaces but all areas including the networks of the nation's key industries and military facilities, energy facilities, transportation, and communication networks. In light of the changing warfare in terms of how it is conducted and what form it takes, the Korea military has to seek ways to effectively respond to threats of cyber warfare. In the past, although partial strategies on cyber warfare were studied, no research was done through the overall system flow. In this paper, key variables related to cyber warfare security are classified into personnel, management, and technology. A simple model and an extended model are suggested for each area, and based on the technology area of the extended model, formal methods are used to verify the validity and a detailed response strategy is suggested according to the identified leverage.

Application of Verification & Validation for deepsea mining robot technology development (심해저 채광로봇 기술개발을 위한 Verification & Validation의 적용)

  • Sung, Ki-Young;Cho, Su-Gil;Oh, Jae-Won;Yeu, Tae-kyeong;Hong, Sup;Kim, Hyungwoo
    • Journal of the Korean Society of Industry Convergence
    • /
    • v.22 no.6
    • /
    • pp.689-702
    • /
    • 2019
  • This paper deals with the verification of the functions about mining robot, which is the system for developing deep seabed resources by applying V&V(verification and validation). In order to overcome water pressure of 500 bar and to travel on soft ground, and to operate in deep sea environment with bad conditions, it is necessary to develop a robot that can satisfy various deepsea conditions. A mining robot has been developed based on simulation based design and Multidisciplinary design optimization. In order to verify the developed robot, lab test and real sea test should be performed for various marine environment conditions. There are too many requirements to consider, such as space, time, cost, personnel, and environment to do performance test. So it is costly and time consuming for developing robot. In order to solve this problems, V&V technique was applied to mining robot. The stages of mining robot design, fabrication and commission were verified.

An Evaluation of the Efficiency of Information Protection Activities of Private Companies (기업의 정보보호활동의 효율성 평가)

  • Choi, Won-Nyeong;Kim, Woo-Je;Kook, Kwang-Ho
    • Convergence Security Journal
    • /
    • v.18 no.5_1
    • /
    • pp.25-32
    • /
    • 2018
  • Cyber hackings are increasing and becoming more intelligent. The government and private companies conduct various information protection activities by investing lots of money and employing security personnel to protect import ant assets and personal information. It is important to evaluate the efficiency of the information protection activities that cost lots of money and manpower. However, the studies on the efficiency of the information protection activities were mainly conducted for government agencies the information of which is more readily available. This study suggests a model that can evaluate the efficiency of the activities of information protection and information security certification of various private companies. Our model evaluates the efficiency of the information protection activities by applying AHP and DEA on the information that are publicly announced by the private companies. Our model identifies the DMUs that are efficiently operated and suggests the improvement policies for the DMU that are non-efficiently operated.

  • PDF

Design of Enterprise System Platform based on Spring Data JPA in Spring Framework Environment (스프링 프레임워크 환경에서 스프링 데이터 JPA기반의 엔터프라이즈 시스템 플랫폼의 설계)

  • Yoo, Jung-Sang;Lee, Myeong-Ho
    • Journal of Convergence for Information Technology
    • /
    • v.9 no.12
    • /
    • pp.39-46
    • /
    • 2019
  • The competition for standardization in the enterprise environment starts with the data tier of the back-end and the standard enterprise middle tier is being stabilized by standardization as it is accepted as the Spring Framework. In addition, with the advent of new devices in an increasingly rapid cycle, securing compatibility with web and mobile services has become an important competitive advantage for web service companies. However, companies are unable to secure competent technical personnel appropriate for the rapidly changing environment of the information generation, and the curriculum of educational universities does not reflect the demand of new competency-oriented curriculum. Therefore, in this study, in order to acquire competency-oriented skills required for such an enterprise system platform environment and to develop a curriculum, the system using Spring Data JPA in the Spring Framework environment was implemented through documenting for each analysis and design step. It aims to provide a reference model for the full stack competency-based curriculum and capstone design curriculum that can be applied immediately in the enterprise environment.

A Study on Improvement of Cyber Security Framework for Security Operations Center (보안관제 조직을 위한 사이버보안 프레임워크 개선에 관한 연구)

  • Cho, Changseob;Shin, Yongtae
    • Convergence Security Journal
    • /
    • v.19 no.1
    • /
    • pp.111-120
    • /
    • 2019
  • As cyber-attacks become more intelligent and sophisticated, the importance of Security Operations Center(SOC) has increased and the number of SOC has been increasing. In order to cope with cyber threats, institutions and organizations use a variety of cyber security standards to create business procedures. However, SOC often need to be improved in accordance with the SOC environment because they collaborate with managed security service specialists rather than their own personnel. The NIST cyber security framework, information security management system, and managed security service companies were compared and analyzed. As a result, it was found that the NIST CSF is a framework that is easy to apply to managed security service, The content was judged to be insufficient. Therefore, in this study, NIST CSF was used as a reference model to derive the management items required for SOC environment, and the necessity, importance and ease of each item were confirmed through an Delphi technique and an improved cyber security framework was proposed.