• Title/Summary/Keyword: Industrial Security Management

Search Result 588, Processing Time 0.034 seconds

Design of Image Tracking System Using Location Determination Technology (위치 측위 기술을 이용한 영상 추적 시스템 설계)

  • Kim, Bong-Hyun
    • Journal of Digital Convergence
    • /
    • v.14 no.11
    • /
    • pp.143-148
    • /
    • 2016
  • There is increasing concern about security as a need for increased safety in the information industry society. However, it does not meet the needs for safety including CCTV. Therefore, in this paper, we link the processing technology using the image information to the IPS system consisting of GPS and Beacon. It designed a conventional RFID tag attached discomfort and image tracking system is limited to complement the disadvantages identifiable area. To this end, we designed a smart device and the Internet of Things convergence system and a research to ensure the accuracy and reliability of the IPS of the access control system. Finally, by leveraging intelligent video information using a PTZ camera, and set the entrant management policies it was carried out to control the situation and control. Also, by designing the integrated video tracking system, an authentication server, visualization systems were designed to establish an efficient technique for analyzing the IPS entrant behavior patterns.

A Comparison Study of Korean and Japanese Cloud Service Certification Systems (한국과 일본의 클라우드 서비스 인증제도 비교연구)

  • Seo, Kwang-Kyu
    • Journal of Digital Convergence
    • /
    • v.11 no.11
    • /
    • pp.53-58
    • /
    • 2013
  • Due to the wide spread of the perception of cloud computing, the usage of cloud computing is increasing globally. Cloud computing is able to converge the various industrial domains based on ICT and it is more and more popular because it has a lot of benefits such as cost savings etc. in global economic recession. However, if cloud computing service is to achieve its potential, it is necessary to clearly understand the critical issues such as service security, performance and availability and so on from the perspectives of the providers and the consumers of the cloud service. In addition, customers focus on how to get and use the safe and reliable cloud service. In order to meet these problems, Korea cloud service certification system and Japanese ASP-SaaS-Cloud certification system were performed in each country. This paper aims at comparing and analyzing between them and describing the difference. Eventually, we propose the improvement strategy of Korea cloud service certification system based on the comparison results between them.

The Comparative Study of Software Optimal Release Time of Finite NHPP Model Considering Property of Nonlinear Intensity Function (비선형 강도함수 특성을 이용한 유한고장 NHPP모형에 근거한 소프트웨어 최적방출시기 비교 연구)

  • Kim, Kyung-Soo;Kim, Hee-Cheul
    • Journal of Digital Convergence
    • /
    • v.11 no.9
    • /
    • pp.159-166
    • /
    • 2013
  • In this paper, make a study decision problem called an optimal release policies after testing a software system in development phase and transfer it to the user. When correcting or modifying the software, finite failure non-homogeneous Poisson process model, presented and propose release policies of the life distribution, half-logistic property model which used to an area of reliability because of various shape and scale parameter. In this paper, discuss optimal software release policies which minimize a total average software cost of development and maintenance under the constraint of satisfying a software reliability requirement. In a numerical example, the parameters estimation using maximum likelihood estimation of failure time data, make out estimating software optimal release time. Software release time is used as prior information, potential security damages should be reduced.

Economic analysis of irrigation facilities for securing water for field crops

  • Hyung Jin Shin;Jae Young Lee;Jae Nam Lee;Han Na Lee;Sang Hyeon Park;Bum Soo Shin;Sang Sun Cha;Se Myung Kwon;Jung Il Seo;Chan Gi Park
    • Korean Journal of Agricultural Science
    • /
    • v.50 no.4
    • /
    • pp.785-798
    • /
    • 2023
  • Considering irrigation facilities are currently insufficient and drought vulnerability due to climate change is high, efficient measures are required to secure water supply for field crops. This study, therefore, calculated the water shortage to secure water for representative field crops. An economic analysis was further conducted by comparing the production income to the input cost for each method. Here, five distinct regions were selected to represent each crop-Cheongyang-gun for chili peppers, Yesan-gun for apples, Dangjin-si for cabbages, Seosan-si for garlic, and Goesan for beans. The regions with insufficient water supply were estimated by calculating the water requirements and the supplied water from public groundwater wells for each area. A comprehensive set of four scenarios was presented as a strategy to ensure water security and manage irrigation facilities. These scenarios comprised the maintenance of existing groundwater wells, the construction of new water storage tanks, the installation of additional groundwater wells, and the utilization of surface water. B/C (benefit/cost) analysis was conducted for each scenario. As a result, the construction of water storage tanks was selected as a facility and water management plan in Cheongyang-gun, Dangjin-si, and Seosan-si. The analysis additionally indicated the economic viability of installing surface water utilization facilities in Yesan-gun and developing water storage tanks and groundwater (aquifer) wells in Goesan-gun. The results of this study are considered to serve as foundation data that may be utilized in the selection of water management plans for drought-prone areas in the future.

Evaluating the Efficiency of Personal Information Protection Activities in a Private Company: Using Stochastic Frontier Analysis (개인정보처리자의 개인정보보호 활동 효율성 분석: 확률변경분석을 활용하여)

  • Jang, Chul-Ho;Cha, Yun-Ho;Yang, Hyo-Jin
    • Informatization Policy
    • /
    • v.28 no.4
    • /
    • pp.76-92
    • /
    • 2021
  • The value of personal information is increasing with the digital transformation of the 4th Industrial Revolution. The purpose of this study is to analyze the efficiency of personal information protection efforts of 2,000 private companies. It uses a stochastic frontier approach (SFA), a parametric estimation method that measures the absolute efficiency of protective activities. In particular, the personal information activity index is used as an output variable for efficiency analysis, with the personal information protection budget and number of personnel utilized as input variables. As a result of the analysis, efficiency is found to range from a minimum of 0.466 to a maximum of 0.949, and overall average efficiency is 0.818 (81.8%). The main causes of inefficiency include non-fulfillment of personal information management measures, lack of system for promoting personal information protection education, and non-fulfillment of obligations related to CCTV. Policy support is needed to implement safety measures and perform personal information encryption, especially customized support for small and medium-sized enterprises.

A Study on Analysis of Problems in Data Collection for Smart Farm Construction (스마트팜 구축을 위한 데이터수집의 문제점 분석 연구)

  • Kim Song Gang;Nam Ki Po
    • Convergence Security Journal
    • /
    • v.22 no.5
    • /
    • pp.69-80
    • /
    • 2022
  • Now that climate change and food resource security are becoming issues around the world, smart farms are emerging as an alternative to solve them. In addition, changes in the production environment in the primary industry are a major concern for people engaged in all primary industries (agriculture, livestock, fishery), and the resulting food shortage problem is an important problem that we all need to solve. In order to solve this problem, in the primary industry, efforts are made to solve the food shortage problem through productivity improvement by introducing smart farms using the 4th industrial revolution such as ICT and BT and IoT big data and artificial intelligence technologies. This is done through the public and private sectors.This paper intends to consider the minimum requirements for the smart farm data collection system for the development and utilization of smart farms, the establishment of a sustainable agricultural management system, the sequential system construction method, and the purposeful, efficient and usable data collection system. In particular, we analyze and improve the problems of the data collection system for building a Korean smart farm standard model, which is facing limitations, based on in-depth investigations in the field of livestock and livestock (pig farming) and analysis of various cases, to establish an efficient and usable big data collection system. The goal is to propose a method for collecting big data.

Analysis on the Perception of the Cyber Dysfunction in the Intelligent Information Society According to the Introduction of the Bright Internet Trust Network (Bright Internet 신뢰네트워크 도입에 따른 지능정보사회의 사이버 역기능 해소에 대한 인식 분석)

  • Gyoo Gun Lim;Jae Ik Ahn
    • Information Systems Review
    • /
    • v.22 no.3
    • /
    • pp.99-118
    • /
    • 2020
  • At present, our society is developing into the intelligent information society in the wave of the 4th industrial revolution, and this change will have the positive effect of innovating all industry fields. However, due to the duality of technology, there will be positive and negative effects. With intelligence, threats to cyber dysfunction such as hacking, terrorism, privacy infringement, and illegal content distribution will become more serious. Until now, the security system of the Internet has been a proactive security system, but in recent years, a proposal for a trust network, a preventive security system, has been introduced. Therefore, this study aims to analyze the possibility of resolving cyber dysfunction of intelligent information society about Bright Internet, one of trust network technologies. This study defines the cyber dysfunction of the intelligent information society and analyzes the perceptions of changes in the cyber dysfunction of the intelligent information society on the introduction of the five principles of the Bright Internet. The change of cyber dysfunction severity of the intelligent information society due to the introduction of the trust network is analyzed to reflect the technical and social demands. This work will guide the structure of the trust network and the direction of practical technological introduction and its influence.

Feed Resources for Animals in Asia: Issues, Strategies for Use, Intensification and Integration for Increased Productivity

  • Devendra, C.;Leng, R.A.
    • Asian-Australasian Journal of Animal Sciences
    • /
    • v.24 no.3
    • /
    • pp.303-321
    • /
    • 2011
  • The availability and efficient use of the feed resources in Asia are the primary drivers of performance to maximise productivity from animals. Feed security is fundamental to the management, extent of use, conservation and intensification for productivity enhancement. The awesome reality is that current supplies of animal proteins are inadequate to meet human requirements in the face of rapidly depleting resources: arable land, water, fossil fuels, nitrogenous and other fertilisers, and decreased supplies of cereal grains. The contribution of the ruminant sector lags well behind that of non-ruminant pigs and poultry. It is compelling therefore to shift priority for the development of ruminants (buffaloes, cattle, goats and sheep) in key agro-ecological zones (AEZs), making intensive use of the available biomass from the forage resources, crop residues, agro-industrial by-products (AIBP) and other non-conventional feed resources (NCFR). Definitions are given of successful and failed projects on feed resource use. These were used to analyse 12 case studies, which indicated the value of strong participatory efforts with farmers, empowerment, and the benefits from animals of productivity-enhancing technologies and integrated natural resource management (NRM). However, wider replication and scaling up were inadequate in project formulation, including systems methodologies that promoted technology adoption. There was overwhelming emphasis on component technology applications that were duplicated across countries, often wasteful, the results and relevance of which were not clear. Technology delivery via the traditional model of research-extension linkage was also inadequate, and needs to be expanded to participatory research-extension-farmer linkages to accelerate diffusion of technologies, wider adoption and impacts. Other major limitations concerned with feed resource use are failure to view this issue from a farming systems perspective, strong disciplinary bias, and poor links to real farm situations. It is suggested that improved efficiency in feed resource use and increased productivity from animals in the future needs to be cognisant of nine strategies. These include priorities for feed resource use; promoting intensive use of crop residues; intensification of integrated ruminant-oil palm systems and use of oil palm by-products; priority for urgent, wider technology application, adoption and scaling up; rigorous application of systems methodologies; development of adaptation and mitigation options for the effects of climate change on feed resources; strengthening research-extension-farmer linkages; development of year round feeding systems; and striving for sustainability of integrated farming systems. These strategies together form the challenges for the future.

A Study on the Personal and Social Acceptability of Personal Information Disclosure of COVID-19 Confirmed Patients (코로나19 확진자 개인정보 공개의 개인적, 사회적 수용성에 관한 연구)

  • Oh, Juyeon;Suh, Woojong
    • Journal of Digital Convergence
    • /
    • v.19 no.10
    • /
    • pp.49-61
    • /
    • 2021
  • In a disaster situation such as COVID-19, our society has experienced the spread of the damage due to confirmed patients who have a negative or uncooperative attitude toward the disclosure of personal information. Accordingly, this study aims to find a policy direction that can improve the awareness of the disclosure of personal information about confirmed COVID-19 patients. This study classified the concept of acceptability into personal and social acceptability, and statistically verified their relationship with influential factors. In this study, 594 cases of data collected through an online survey were used. The analysis results show that the greater the trust in the government's personal information management capability, the lower the perception of the risks associated with the disclosure of personal information, and the lower the awareness of the risk, the higher the personal and social acceptability of the personal information disclosure of COVID-19 confirmed patients. In addition, the greater the recognition of the utility of personal information disclosure, the higher the perception of personal and social acceptability of the personal information disclosure. It is expected that the analysis results and discussions of this study will be useful information for policy development to create a more mature social atmosphere to reduce the public's reluctance to disclose information not only in COVID-19 but also in new disaster situations in the future.

A Research in Applying Big Data and Artificial Intelligence on Defense Metadata using Multi Repository Meta-Data Management (MRMM) (국방 빅데이터/인공지능 활성화를 위한 다중메타데이터 저장소 관리시스템(MRMM) 기술 연구)

  • Shin, Philip Wootaek;Lee, Jinhee;Kim, Jeongwoo;Shin, Dongsun;Lee, Youngsang;Hwang, Seung Ho
    • Journal of Internet Computing and Services
    • /
    • v.21 no.1
    • /
    • pp.169-178
    • /
    • 2020
  • The reductions of troops/human resources, and improvement in combat power have made Korean Department of Defense actively adapt 4th Industrial Revolution technology (Artificial Intelligence, Big Data). The defense information system has been developed in various ways according to the task and the uniqueness of each military. In order to take full advantage of the 4th Industrial Revolution technology, it is necessary to improve the closed defense datamanagement system.However, the establishment and usage of data standards in all information systems for the utilization of defense big data and artificial intelligence has limitations due to security issues, business characteristics of each military, anddifficulty in standardizing large-scale systems. Based on the interworking requirements of each system, data sharing is limited through direct linkage through interoperability agreement between systems. In order to implement smart defense using the 4th Industrial Revolution technology, it is urgent to prepare a system that can share defense data and make good use of it. To technically support the defense, it is critical to develop Multi Repository Meta-Data Management (MRMM) that supports systematic standard management of defense data that manages enterprise standard and standard mapping for each system and promotes data interoperability through linkage between standards which obeys the Defense Interoperability Management Development Guidelines. We introduced MRMM, and implemented by using vocabulary similarity using machine learning and statistical approach. Based on MRMM, We expect to simplify the standardization integration of all military databases using artificial intelligence and bigdata. This will lead to huge reduction of defense budget while increasing combat power for implementing smart defense.