• Title/Summary/Keyword: Industrial Security Market

Search Result 130, Processing Time 0.02 seconds

Ubiquitous Sensor Network Application Strategy of Security Companies (시큐리티업체의 유비쿼터스 센서네트워크(USN) 응용전략)

  • Jang, Ye-Jin;An, Byeong-Su;Ju, Choul-Hyun
    • Korean Security Journal
    • /
    • no.21
    • /
    • pp.75-94
    • /
    • 2009
  • Since mechanical security systems are mostly composed of electronic, information and communication devices, they have effects in the aspects of overall social environment and crime-oriented environment. Also, the importance is increasing for wireless recognition of RFID and tracing function, which will be usefully utilized in controlling the incomings and outgoings of people/vehicles or allowance, surveillance and control. This is resulting from the increase in the care for the elderly according to the overall social environment, namely, the aging society, and the number of women entering, as well as the increase in the number of heinous crimes. The purpose of this study is to examine the theoretical considerations on ubiquitous sensor network and present a direction for securities companies for their development by focusing on the technological and application areas. To present strategies of response to a new environment for security companies, First, a diversification strategy is needed for security companies. The survival of only high level of security companies in accordance with the principle of liberal market competition will bring forth qualitative growth and competitiveness of security market. Second, active promotion by security companies is needed. It is no exaggeration to say that we are living in the modern society in the sea of advertisements and propaganda. The promotional activities that emphasize the areas of activity or importance of security need to be actively carried out using the mass media to change the aware of people regarding security companies, and they need to come up with a plan to simultaneously carry out the promotional activities that emphasize the public aspect of security by well utilizing the recent trend that the activities of security agents are being used as a topic in movies or TV dramas. Third, technically complementary establishment of ubiquitous sensor network and electronic tag is needed. Since they are used in mobile electronic tag services such as U-Home and U-Health Care, they are used throughout our lives by forming electronic tag environment within safe ubiquitous sensor network based on the existing privacy guideline for the support of mobile electronic tag terminal commercialization, reduction in communication and information usage costs, continuous technical development and strengthening of privacy protection, and the system of cooperation of academic-industrial-research needs to be established among the academic world and private research institutes for these parts.

  • PDF

A Study of TOM(Turn-of-the-Month) Effect in KOSDAQ Market (코스닥시장의 월바뀜(TOM)효과에 관한 연구)

  • Hong, Geon-Pyo;Im, In-Seob;Oh, Hyun-Tak
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.16 no.1
    • /
    • pp.308-316
    • /
    • 2015
  • The purpose of this study is to verify TOM(turn-of-the-month) effect in the Kosdaq market, and that to compare to TOM effect of KOSPI for supporting degree of identification and to find new features. For this study, as the study basis sample, we used the daily data of the KOSDAQ from January 1996 to December 2013 and verified the TOM effect through yearly, monthly, classification by event as financial crisis, different period of TOM in order to clarify the effect of the KOSPI and KOSDAQ. As a result, We find that the TOM effect in KOSDAQ is always present uniformly in yearly, monthly, event-specific, which unlike TOM period also in KOSPI and generally TOM effect in KOSDAQ market which has larger volatility was appeared more pronouncedly than KOSPI market, and particularly TOM effect of KOSDAQ was larger than that of KOSPI on financial crisis occasion. But TOM effect of KOSDAQ was less stable than KOSPI.

Enhancing Existing Products and Services Through the Discovery of Applicable Technology: Use of Patents and Trademarks (제품 및 서비스 개선을 위한 기술기회 발굴: 특허와 상표 데이터 활용)

  • Seoin Park;Jiho Lee;Seunghyun Lee;Janghyeok Yoon;Changho Son
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.46 no.4
    • /
    • pp.1-14
    • /
    • 2023
  • As markets and industries continue to evolve rapidly, technology opportunity discovery (TOD) has become critical to a firm's survival. From a common consensus that TOD based on a firm's capabilities is a valuable method for small and medium-sized enterprises (SMEs) and reduces the risk of failure in technology development, studies for TOD based on a firm's capabilities have been actively conducted. However, previous studies mainly focused on a firm's technological capabilities and rarely on business capabilities. Since discovered technologies can create market value when utilized in a firm's business, a firm's current business capabilities should be considered in discovering technology opportunities. In this context, this study proposes a TOD method that considers both a firm's business and technological capabilities. To this end, this study uses patent data, which represents the firm's technological capabilities, and trademark data, which represents the firm's business capabilities. The proposed method comprises four steps: 1) Constructing firm technology and business capability matrices using patent classification codes and trademark similarity group codes; 2) Transforming the capability matrices to preference matrices using the fuzzy function; 3) Identifying a target firm's candidate technology opportunities using the collaborative filtering algorithm; 4) Recommending technology opportunities using a portfolio map constructed based on technology similarity and applicability indices. A case study is conducted on a security firm to determine the validity of the proposed method. The proposed method can assist SMEs that face resource constraints in identifying technology opportunities. Further, it can be used by firms that do not possess patents since the proposed method uncovers technology opportunities based on business capabilities.

Revitalization plan for Korean's Venture Business (우리 나라 벤처기업의 활성화 방안)

  • Lee Kyoung-Oh
    • Management & Information Systems Review
    • /
    • v.7
    • /
    • pp.381-400
    • /
    • 2001
  • Our country has been encountered with severe economic depression since IMF loan(1997). Korean economic system should be reformed according to the globalization and the world industrial trends based on adavanced technologies and skills. Todays the venture business should be considered to be the alternative of recovering Korean economy and increasing highly estimated values. Generally speaking, the venture business is defined as a new business with high risk-high return with new technical entrepreneurship. This treatise suggests the activating alternatives of the venture business in Korea. These alternatives are suggested as follows. First, several measures to incruit excellent technicians are suggested. These measures includes incruitment of parttime technicians, application of cooperative program of education training unemployees, the stock option system, a stock-sharing plan for the employees, etc. Second, in the financial aspect, activation of the foundation investment company, activation of the COSDAQ market, strengthening of technology security are suggested. Third, in the technical development aspect, amplification of inauguration assistant center, construction of technology accumulative network, etc. These measures will contribute to the development of Korean economy and the welfare of Korean people.

  • PDF

A Study on the Industrial Revitalization through the Performance Analysis of the Korean Government's Cloud Policy in Service Consumer's Perspective (국내 클라우드 정책의 성과 분석을 통한 수요자 관점의 산업 활성화 연구)

  • Joe, Moon Jeung
    • Journal of Internet Computing and Services
    • /
    • v.21 no.1
    • /
    • pp.159-167
    • /
    • 2020
  • The Korean government has pursued various policies to revitalize the cloud industry since 2009. In particular, the government enacted the 'Cloud Computing and Privacy Security Act' for the first time in the world in 2015, creating institutions and support programs to boost the cloud industry. As a result, the volume of the cloud industry has increased significantly, and the number of companies and professionals have increased. In this paper, the researches analyzed the situation of Korean cloud market, usage of cloud computing in enterprises, effects and problems of cloud-enabled companies based on the industrial survey conducted from 2016 to 2019, In this study, the results showed concerns of security, uncertainty about cost savings, and IT capabilities of enterprises as problems in revitalizing the cloud industry. The researches also propose strategies, perception changes, and development processes for companies to resolve the problems.

Research on the decision factor in customer loyalty in securities companies : Focusing on reliability and customer satisfaction's moderating effects (증권회사의 지속적 사용의도 결정요인에 관한 연구 : 신뢰도 및 고객 만족도의 조절효과를 중심으로)

  • Lee, Han-Woo;Ha, Kyu-Soo
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.16 no.3
    • /
    • pp.1832-1843
    • /
    • 2015
  • Recently, since the "Capital Market Consolidation Act" has been effective in 2009, the competition among the securities companies in Korean security market has been fierce. Thus, securities business lately are needed by the market environmental requirements rapidly changed for various strategies. The purpose of this study was to identify the effect of corporate attribute, employee attribute, financial product attribute securities on customer satisfaction, trust with the firm, and usage intention. As the subjects I selected the customer of securities in Seoul in 2014 and conducted survey with questionnaires. Among total 400, I chose 378 as the valid sample by convenience sampling. For the data process, I used SPSS 20.0 I verified the perspective hypotheses after testing reliability and validity of fit by the data process. The results are as following. First, it was shown that the sub-factors of corporate attribute, employee attribute, financial product attribute in securities as ethics, innovation, size, kind, professionalism, ethics, profitability and diversity had significant effect on usage intention. Second, the study confirms that reliability and satisfaction influences customer loyalty as moderate variable. The industrial and academic significance of this study is that it may serve as a useful base date to understand customer behavior and draw new strategies in a financial management environment.

Development of Unmanned Aircraft in the Fourth Industrial Revolution (4차 산업혁명시대 우리나라 드론의 발전 방향)

  • Lee, Young Uk
    • Convergence Security Journal
    • /
    • v.18 no.5_2
    • /
    • pp.3-10
    • /
    • 2018
  • The drone is an unmanned aircraft that can be steered and controlled using radio waves on the ground, and the pilot moves unmanned without boarding. The history of the unmanned airplane began with military use, and the first unmanned aerial flight was the first successful flight of the 'Sperry Aerial Torpedo' drones built in the United States in 1917 with a bomb. With the development of unmanned aerial technology, the use of military drones has expanded to a wider field. Recently, the use of drones has been utilized in various fields such as agriculture, industry, logistics, broadcasting, and safety, and the scale of the market is also expanding. Although the drones are becoming indispensable to penetrate our lives, they can be used for bad purposes depending on the intended use of the user, but the risk factors are overlooked. Therefore, technical defects related to drones and accidents caused by operator's mistakes can not be completely prevented. However, privacy infringement, security leakage, and terrorism, which may be caused by illegal use of drones, It will not be inhibited and will accelerate.

  • PDF

A Design Communication System for Message Protection in Next Generation Wireless Network Environment (차세대 무선 네트워크 환경에서 메시지 보호를 위한 통신 시스템 설계)

  • Min, So-Yeon;Jin, Byung-Wook
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.16 no.7
    • /
    • pp.4884-4890
    • /
    • 2015
  • These days most of people possesses an average of one to two mobile devices in the world and a wireless network market is gradually expanding. Wi-Fi preference are increasing in accordance with the use growth of mobile devices. A number of areas such as public agencies, health care, education, learning, and content, manufacturing, retail create new values based on Wi-Fi, and the global network is built and provides complex services. However, There exist some attacks and vulnerabilities like wireless radio device identifier vulnerability, illegal use of network resources through the MAC forgery, wireless authentication key cracking, unauthorized AP / devices attack in the next generation radio network environment. In addition, advanced security technology research, such as authentication Advancement and high-speed secure connection is not nearly progress. Therefore, this paper designed a secure communication system for message protection in next-generation wireless network environments by device identification and, designing content classification and storage protocols. The proposed protocol analyzed safeties with respect to the occurring vulnerability and the securities by comparing and analyzing the existing password techniques in the existing wireless network environment. It is slower 0.72 times than existing cypher system, WPA2-PSK, but enforces the stability in security side.

A Study on Cryptography Scheme and Secure Protocol for Safety Secure Scheme Construction in 13.56Mhz RFID (13.56Mhz RFID 환경에서 안전한 보안 스킴 구축을 위한 암호 스킴 및 보안 프로토콜 연구)

  • Kang, Jung-Ho;Kim, Hyung-Joo;Lee, Jae-Sik;Park, Jae-Pyo;Jun, Moon-Seog
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.14 no.3
    • /
    • pp.1393-1401
    • /
    • 2013
  • What is RFID Microchip tag attached to an object, the reader recognizes technology collectively, through communication with the server to authenticate the object. A variety of RFID tags, 13.56Mhz bandwidth RFID card, ISO/IEC 14443 standards based on NXP's Mifare tag occupies 72.5% of the world market. Of the Mifare tags, low cost tag Mifare Classic tag provided in accordance with the limited hardware-based security operations, protocol leaked by a variety of attacks and key recovery vulnerability exists. Therefore, in this paper, Cryptography Scheme and Secure Protocol for Safety Secure Scheme Construction in 13.56Mhz RFID have been designed. The proposed security scheme that KS generated by various fixed values and non-fixed value, S-Box operated, values crossed between LFSR and S-Box is fully satisfied spoofing, replay attacks, such as vulnerability of existing security and general RFID secure requirement. Also, It is designed by considering the limited hardware computational capabilities and existing security schemes, so it could be suit to Mifare Classic now.

The assessment and political subject of Revised Security Industry Law (개정 경비업법의 평가와 정책과제)

  • Lee, Sang-Hun
    • Korean Security Journal
    • /
    • no.36
    • /
    • pp.349-386
    • /
    • 2013
  • This research analyzes and evaluates The Korean Security Industry Law(TKSIL) putting the regulation of the present government about the private security industry. It nowadays becomes the important axis of the police services offered in the aspect of 'the national life safety' in connection with 'the materialization of society which is safe from the crime'. TKSIL is one of the national administration strategies which Park Gun-hye government aims on supervision policy. After seeking out the core values of the private security industrial policy which sets up in order to approach the national life safety which Park Gun-hye government aims, we make some assessments of this revised security industry law systematically. Particularly all keynote of policy about the private security of the police tried to be confirmed and the desirable direction of policy tries to be presented as to the security industry law application and real operation. In the site of organized civil complaint, the revised security industry law was revised as the direction which intensifies the administrative regulation as to the partial regulation such as it established the reason of the introduction of the arrangement license system. And grounds for disqualification of security instructor and guard, and rules of punishment is intensified order to intercept previously illegal and violent act of the security company etc. However it has the feature that it accomplishes 'the law principle(principle of statute)' the substantial portion through the effort of them changing a lot the content for the form of the law when being the clauses of the fundamental human rights limit, although it has been prescribed in "the security industry law enforcement ordinance" or "the security industry law enforced regulation". The security industry law revised this time brought from the change of the sharp policy through the revision of 17 clauses or new establishment. It can divide into 4 categorizes. (1) strictness of punishment in the site of organized civil complaint (2) Intensification of throwing out for the violation person in the private security business market time-limitedly (3) Intensification of the legal guide supervision power of police (4) upstream of the capital, name tag attachment under compulsion and the limit about other equipment use etc. Essentially "the security industry law" cannot help regulating the national interference of the private security and regulation with this content. However as to this interference and regulation, the limit has to be possible within reasonable range. As the history proved, excessive regulation by the country is not only due to bring the distortion of the security system of nation but also provoke national social cost. It can't be disregards ever that it premises the harmony which appropriate as well as reasonable in the socio-economic dimension for drawing the best combination that all things which get the compulsory education, it limits the person providing the private security service to the corporation, or it limits to the certificate of qualification holder are the ultimate for 'the safety of the national life'.

  • PDF