• Title/Summary/Keyword: Industrial Security Activities

Search Result 90, Processing Time 0.021 seconds

A Study on the Security Problems of Smart TV and Consumer's Purchase Intention (스마트TV의 보안 문제와 소비자의 구매의도에 관한 연구)

  • Cho, Sung-Phil;Lee, Gi-Hyouk
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.18 no.7
    • /
    • pp.382-393
    • /
    • 2017
  • Smart TV sareequipped with an operating system and combined with internet functionality. They can use various apps and contents, and provide personalized and interactive services. However, the Internet connectivity of smart TVs has several security vulnerabilities that can cause significant personal and social harm. Therefore, it is necessary to develop a smart TV with a higher level of security than is currently available. In this study, we analyze consumers' purchase intention for smart TVs with security reinforcement by applying the UTAUT2 model. The results are as follows. Firstly, it was found that performance expectancy, social influence, facilitating conditions and price value, as important variables under the existing UTAUT2 model, have significant effects on purchase intention. Secondly, effort expectancy did not have a positive impact on purchase intention. Thirdly, there was a moderating effect of gender on social influence. According to the results of this study, social influence has the most powerful effect on the purchase intention of smart TVs with security reinforcement. Therefore, in order to improve the purchase intention of smart TVs, it is necessary to expand the publicity activities designed to promote the necessity and importance of reinforcing the security of smart TVs and make them easier to use.

The Plans for Core Personnel Management to Prevent Industrial Technology Leakage (산업기술 유출방지를 위한 핵심인력 관리방안에 관한 연구)

  • Kim, Soon-Seok;Shin, Jae-Chul
    • Korean Security Journal
    • /
    • no.25
    • /
    • pp.109-130
    • /
    • 2010
  • As many countries in the world including the Republic of Korea have used all their national resources in the accelerating economic information warfare, illegal leakage of industrial technologies and information has increased rapidly. The costs required for damage prevention from 2007 to 2008 are estimated at approximately KRW 180 trillion which is expected to increase gradually in future. Because the tricks of leaking key technologies are also getting increasingly systematized, sophisticated and bigger, e.g., simple theft at the individual level or the conspiracy of all the staff taking part in the research activities, we should pay special attention to technology security in addition to technology development. While there are several factors affecting such the brain drain, they usually include personal, social, political and cultural factors, for instance, very heavy educational expenditure of children compared to relatively low pay, the speedy labor market circulation for experienced personnel, or political restrictions on researches. In this context, as part of efforts made to prevent the outflow of core personnel, individual companies and research institutes should establish systematically appropriate core personnel management systems for their own organizational or business goals and principles which are intented to ensure to give better treatment and benefit to core personnel and to exercise closer supervision over them. Furthermore, the conventional personnel management system should be radically and flexibly improved in the manner of encouraging the core personnel returning to the organization to combine their external experiences with practices, instead of penalizing them. At the same time, it is necessary to train and educate core personnel through mutual collaboration and in-house training facilities as well as external academic programs operated jointly at the level of the industry. Finally, as the issues concerning the outflow of core personnel are not just problems of relevant companies and other advanced countries have devoted their best efforts to secure their own key technologies at the national level, it is urgent for the industry and the competent authorities to cooperate closely.

  • PDF

Study for confidence security of certification of management system and validity examination (경영시스템 인증의 신뢰성 확보 및 유효성 심사에 관한 연구 -ISO 9001 인증을 중심으로-)

  • Lee, Eun-Sook;Kang, Kyung-Sik
    • Journal of the Korea Safety Management & Science
    • /
    • v.11 no.2
    • /
    • pp.127-135
    • /
    • 2009
  • In today's society it is often required to state objectively conformity of products (including services) to specified requirements. Conformity assessment bodies (CABs). can objectively state such conformity. These CABs perform conformity assessment activities that include certification, inspection, testing and calibration. A system to accredit CABs conformity assessment services should provide confidence to the purchaser and regulator. Certification of management system is one of means of providing assurance that the organization has implemented a system for the management of the relevant aspects of its activities, in line its policy.

An Exploratory Study on the Corporate Social Activities of Business (기업의 사회공헌에 관한 탐색적 연구)

  • Lim, Mong-Taek
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.29 no.4
    • /
    • pp.65-74
    • /
    • 2006
  • This research tried to grasp present condition of domestic corporation's society contribution activity and grope desirable direction of society contribution activity hereafter. As analysis result, establishment of the responsible department or human power in charge for society contribution activity is insufficient, and depend on contribution activity of simple donation than to administer program directly, result of contribution activity is not linked with corporation's purpose or result and practical use of network with similar organization for society contribution was proved by low. Desirable direction of domestic corporation society contribution activity is as following hereafter based on analysis result. First, corporation must put in good order inside system with an establishment of the responsible department for society contribution, security of human power in charge and introducing education program for training specialist. Second, corporation must select specific field with capacity that corporation is holding and improve result of society contribution activity as concentrated investment. Third, corporation must construct network with various similar groups and organizations including NPO/NGO and heighten consummativeness of society contribution activity through mutual interchange and cooperation.

An Application of Deep Clustering for Abnormal Vessel Trajectory Detection (딥 클러스터링을 이용한 비정상 선박 궤적 식별)

  • Park, Heon-Jei;Lee, Jun Woo;Kyung, Ji Hoon;Kim, Kyeongtaek
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.44 no.4
    • /
    • pp.169-176
    • /
    • 2021
  • Maritime monitoring requirements have been beyond human operators capabilities due to the broadness of the coverage area and the variety of monitoring activities, e.g. illegal migration, or security threats by foreign warships. Abnormal vessel movement can be defined as an unreasonable movement deviation from the usual trajectory, speed, or other traffic parameters. Detection of the abnormal vessel movement requires the operators not only to pay short-term attention but also to have long-term trajectory trace ability. Recent advances in deep learning have shown the potential of deep learning techniques to discover hidden and more complex relations that often lie in low dimensional latent spaces. In this paper, we propose a deep autoencoder-based clustering model for automatic detection of vessel movement anomaly to assist monitoring operators to take actions on the vessel for more investigation. We first generate gridded trajectory images by mapping the raw vessel trajectories into two dimensional matrix. Based on the gridded image input, we test the proposed model along with the other deep autoencoder-based models for the abnormal trajectory data generated through rotation and speed variation from normal trajectories. We show that the proposed model improves detection accuracy for the generated abnormal trajectories compared to the other models.

Economic Activities in Digital Platforms: Types, Natures, Risks, Policy Suggestions (플랫폼 경제활동에 대한 시론적 고찰: 유형, 특성, 예상위험, 정책대안을 중심으로)

  • Kim, Suyoung;Kang, Myungjoo;Ha, Eunsol
    • 한국사회정책
    • /
    • v.25 no.4
    • /
    • pp.199-231
    • /
    • 2018
  • The development of ICT has led to changes in the pattern and the meaning of work and requires restructuring of the existing social security system, which was established chiefly for the wage workers in the industrial economy. However, while economic activities within the digital platform markets are different from industrial labour, there is still a lack of discussion on what social problems platform workers can face and how to cope with them. As a comprehensive sketch of economic activities in platform economy, this study identifies the types of platform workers and analyses three characteristics of their economic activities - flexibility, virtuality, and connectivity. It then examines what social risks can be derived form the three characteristics. This research lastly suggests alternative social safety nets and policies to alleviates the social risks and problems that platform workers may face in the digital society.

Ubiquitous Sensor Network Application Strategy of Security Companies (시큐리티업체의 유비쿼터스 센서네트워크(USN) 응용전략)

  • Jang, Ye-Jin;An, Byeong-Su;Ju, Choul-Hyun
    • Korean Security Journal
    • /
    • no.21
    • /
    • pp.75-94
    • /
    • 2009
  • Since mechanical security systems are mostly composed of electronic, information and communication devices, they have effects in the aspects of overall social environment and crime-oriented environment. Also, the importance is increasing for wireless recognition of RFID and tracing function, which will be usefully utilized in controlling the incomings and outgoings of people/vehicles or allowance, surveillance and control. This is resulting from the increase in the care for the elderly according to the overall social environment, namely, the aging society, and the number of women entering, as well as the increase in the number of heinous crimes. The purpose of this study is to examine the theoretical considerations on ubiquitous sensor network and present a direction for securities companies for their development by focusing on the technological and application areas. To present strategies of response to a new environment for security companies, First, a diversification strategy is needed for security companies. The survival of only high level of security companies in accordance with the principle of liberal market competition will bring forth qualitative growth and competitiveness of security market. Second, active promotion by security companies is needed. It is no exaggeration to say that we are living in the modern society in the sea of advertisements and propaganda. The promotional activities that emphasize the areas of activity or importance of security need to be actively carried out using the mass media to change the aware of people regarding security companies, and they need to come up with a plan to simultaneously carry out the promotional activities that emphasize the public aspect of security by well utilizing the recent trend that the activities of security agents are being used as a topic in movies or TV dramas. Third, technically complementary establishment of ubiquitous sensor network and electronic tag is needed. Since they are used in mobile electronic tag services such as U-Home and U-Health Care, they are used throughout our lives by forming electronic tag environment within safe ubiquitous sensor network based on the existing privacy guideline for the support of mobile electronic tag terminal commercialization, reduction in communication and information usage costs, continuous technical development and strengthening of privacy protection, and the system of cooperation of academic-industrial-research needs to be established among the academic world and private research institutes for these parts.

  • PDF

A Case Study on the Process Improvement Using JIT Concept in a Company (제조업체에 있어서 JIT 개념을 활용한 공정개선 사례연구)

  • 권병우;이동형;김진수;임준묵
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.23 no.55
    • /
    • pp.43-50
    • /
    • 2000
  • Recently, the companies can't avoid the change toward the jobbing production from mass production because manufacturing types are changed from manufacturing-oriented to customer-oriented for the security of competitive power among the related companies. The jobbing production system usually has such problems as low productivity, high unit cost, much stocks, long manufacturing time and one-sided decision of delivery date compared with the mass production. In order to settle these problems in the jobbing production system, we introduced the JIT production system including 3 regulations & 6S activities and Kanban system etc. The effective operation of JIT production system makes the processes efficiently and reduces the unneeded stocks and maximizes the revenue of company.

  • PDF

C-Engineering Based Industry 4.0 Innovation Networks Sustainable Development

  • Omelyanenko, Vitaliy;Braslavska, Oksana;Biloshkurska, Nataliia;Biloshkurskyi, Mykola;Kliasen, Natalia;Omelyanenko, Olena
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.9
    • /
    • pp.267-274
    • /
    • 2021
  • The article deals with problems of innovation development on a network basis, which require effective mechanisms of innovation communications. In research the organizational aspects of ICT infrastructure development for innovation networks sustainable development based on cooperative marketing principles is considered. The proposed research idea is based on the idea that ICT implementation is based not only on the operational approach for innovation management as a factor of efficiency of internal communications, but also on knowledge economy and post-industrial economy trends. Therefore, the purpose of study is to develop an ICT model of innovation infrastructure to improve its effectiveness (strategic character) and efficiency (operative character) through increasing the efficiency of network communication interactions. Creation of information space and communication tools to support innovation network sustainable development and cooperation activities in research is proposed to be solved with the help of specialized ICT platform. It is shown, that ICT platform of innovation cooperation innovation network is important tool for common work of participants. ICT platform is considered as an integrated information system designed to automate business processes related to the sustainable development of innovation network, segment management and integration with HEI information systems and industrial cooperation. The main factors that determine the need to use a special ICT platform for innovation network cooperation were considered. The main issues of concurrent engineering (C-technology) application in high-technology industries and innovation cooperation for integrated product development were studied.

A Study on Development of Internal Information Leak Symptom Detection Model by Using Internal Information Leak Scenario & Data Analytics (내부정보 유출 시나리오와 Data Analytics 기법을 활용한 내부정보 유출징후 탐지 모형 개발에 관한 연구)

  • Park, Hyun-Chul;Park, Jin-Sang;Kim, Jungduk
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.5
    • /
    • pp.957-966
    • /
    • 2020
  • According to the recent statistics of the National Industrial Security Center, about 80% of the confidential leak are caused by former and current employees in the case of domestic confidential leak accidents. Most of the information leak incidents by these insiders are due to poor security management system and information leak detection technology. Blocking confidential leak of insiders is a very important issue in the corporate security sector, but many previous researches have focused on responding to intrusions by external threats rather than by insider threats. Therefore, in this research, we design an internal information leak scenario to effectively and efficiently detect various abnormalities occurring in the enterprise, analyze the key indicators of the leak symptoms derived from the scenarios by using data analytics and propose a model that accurately detects leak activities.