• Title/Summary/Keyword: Organization code

Search Result 183, Processing Time 0.021 seconds

A Study on Cybersecurity Risk Assessment in Maritime Sector (해상분야 사이버보안 위험도 분석)

  • Yoo, Yun-Ja;Park, Han-Seon;Park, Hye-Ri;Park, Sang-Won
    • Proceedings of the Korean Institute of Navigation and Port Research Conference
    • /
    • 2019.11a
    • /
    • pp.134-136
    • /
    • 2019
  • The International Maritime Organization (IMO) issued 2017 Guidelines on maritime cyber risk management. In accordance with IMO's maritime cyber risk management guidelines, each flag State is required to comply with the Safety Management System (SMS) of the International Safety Management Code (ISM) that the cyber risks should be integrated and managed before the first annual audit following January 1, 2021. In this paper, to identify cyber security management targets and risk factors in the maritime sector and to conduct vulnerability analysis, we catagorized the cyber security sector in management, technical and physical sector in maritime sector based on the industry guidelines and international standards proposed by IMO. In addition, the Risk Matrix was used to conduct a qualitative risk assessment according to risk factors by cyber security sector.

  • PDF

Relative Importance Analysis on Technology Adoption Factors of RFID in SCM (SCM에서 무선인식 기술 수용 요인 별 상대적 중요도 분석)

  • Kim, Tae-Young;Choi, Jun-Seok
    • The Journal of the Korea Contents Association
    • /
    • v.7 no.6
    • /
    • pp.185-194
    • /
    • 2007
  • Today, there is in the world-wide cognition about RFID technology due to established standard, EPC(Electronic Product Code). RFID technology will have wide influence over various fields. Especially, RFID technology's advantages will have positive influence on logistics field. We can solve limited various problems presented in SCM by applying RFIB technology. We can have higher cantrol system, better benefits and actual decision information. Many organizations, however, still have hesitated now because RFID technology has not been validated and RFID technology is in early stage. Other problems are employee resistance against new technology and lack of academic empirical research on assimilation RFID technology for organization. Above reasons I mentioned make me study on analysis on assimilation RFID technology decision in SCM field. This study attempts to analyze the assimilation RFID technology factor from previous researches by using AHP. This outcomes of study will be helpful when we assimilate RFID technology in SCM fields.

Optimization of a microarray for fission yeast

  • Kim, Dong-Uk;Lee, Minho;Han, Sangjo;Nam, Miyoung;Lee, Sol;Lee, Jaewoong;Woo, Jihye;Kim, Dongsup;Hoe, Kwang-Lae
    • Genomics & Informatics
    • /
    • v.17 no.3
    • /
    • pp.28.1-28.9
    • /
    • 2019
  • Bar-code (tag) microarrays of yeast gene-deletion collections facilitate the systematic identification of genes required for growth in any condition of interest. Anti-sense strands of amplified bar-codes hybridize with ~10,000 (5,000 each for up-and down-tags) different kinds of sense-strand probes on an array. In this study, we optimized the hybridization processes of an array for fission yeast. Compared to the first version of the array (11 ㎛, 100K) consisting of three sectors with probe pairs (perfect match and mismatch), the second version (11 ㎛, 48K) could represent ~10,000 up-/ down-tags in quadruplicate along with 1,508 negative controls in quadruplicate and a single set of 1,000 unique negative controls at random dispersed positions without mismatch pairs. For PCR, the optimal annealing temperature (maximizing yield and minimizing extra bands) was 58℃ for both tags. Intriguingly, up-tags required 3× higher amounts of blocking oligonucleotides than down-tags. A 1:1 mix ratio between up- and down-tags was satisfactory. A lower temperature (25℃) was optimal for cultivation instead of a normal temperature (30℃) because of extra temperature-sensitive mutants in a subset of the deletion library. Activation of frozen pooled cells for >1 day showed better resolution of intensity than no activation. A tag intensity analysis showed that tag(s) of 4,316 of the 4,526 strains tested were represented at least once; 3,706 strains were represented by both tags, 4,072 strains by up-tags only, and 3,950 strains by down-tags only. The results indicate that this microarray will be a powerful analytical platform for elucidating currently unknown gene functions.

Measurement of Neutron Production Double-differential Cross-sections on Carbon Bombarded with 430 MeV/Nucleon Carbon Ions

  • Itashiki, Yutaro;Imahayashi, Youichi;Shigyo, Nobuhiro;Uozumi, Yusuke;Satoh, Daiki;Kajimoto, Tsuyoshi;Sanami, Toshiya;Koba, Yusuke;Matsufuji, Naruhiro
    • Journal of Radiation Protection and Research
    • /
    • v.41 no.4
    • /
    • pp.344-349
    • /
    • 2016
  • Background: Carbon ion therapy has achieved satisfactory results. However, patients have a risk to get a secondary cancer. In order to estimate the risk, it is essential to understand particle transportation and nuclear reactions in the patient's body. The particle transport Monte Carlo simulation code is a useful tool to understand them. Since the code validation for heavy ion incident reactions is not enough, the experimental data of the elementary reaction processes are needed. Materials and Methods: We measured neutron production double-differential cross-sections (DDXs) on a carbon bombarded with 430 MeV/nucleon carbon beam at PH2 beam line of HIMAC facility in NIRS. Neutrons produced in the target were measured with NE213 liquid organic scintillators located at six angles of 15, 30, 45, 60, 75, and $90^{\circ}$. Results and Discussion: Neutron production double-differential cross-sections for carbon bombarded with 430 MeV/nucleon carbon ions were measured by the time-of-flight method with NE213 liquid organic scintillators at six angles of 15, 30, 45, 60, 75, and $90^{\circ}$. The cross sections were obtained from 1 MeV to several hundred MeV. The experimental data were compared with calculated results obtained by Monte Carlo simulation codes PHITS, Geant4, and FLUKA. Conclusion: PHITS was able to reproduce neutron production for elementary processes of carbon-carbon reaction precisely the best of three codes.

A Study on the Modus Operandi of Smishing Crime for Public Safety (국민안전을 위한 스미싱 범죄수법분석)

  • Choi, Kwan;Kim, Minchi
    • Convergence Security Journal
    • /
    • v.16 no.3_2
    • /
    • pp.3-12
    • /
    • 2016
  • The purpose of this study is to analyse Modus Operandi of smishing. For the study, 87 cases of smishing crime reports and smishing experiences of victims were analysed and 10 police officers who investigates smishing crime were interviewed. The results indicated that smishing crime can be divided into the preparation stage and the implementation stage. In the preparation stage, two modus operandi patterns, collection of personal information and text message script composition, were identified. In the implementation stage, seven modus operandi patterns were identified: sending smishing text messages and installation of malicious mobile applications, leak personal information, sending personal information to smishing crime organization through online server, payment attempt using collected personal information, intercept authorization code, completion of payment using intercepted authorization code, and payment amount was delivered to victims. Further implications were discussed.

Differences in Appearance Management Behavior according to Occupational Characteristics and Demographic Characteristics of Workers (직장인의 직업특성 및 인구통계학적 특성에 따른 외모관리행동의 차이)

  • Yoo, Hee
    • Journal of the Korean Society of Costume
    • /
    • v.67 no.2
    • /
    • pp.17-35
    • /
    • 2017
  • The purpose of this study was to present empirically the factors in appearance management behavior, the differences in appearance management behavior according to various occupational characteristics and demographic characteristics, and the degree of efforts to manage appearance for workers. The questionnaire was administered to 1,056 male and female workers in 10 occupational categories in Korea. Data were analyzed using descriptive statistics, factor analysis, analyses of variance (ANOVA) and chi-square tests. The results of the study are as follows. First, the factors of workers' appearance management behavior consist of 'appearance management for decoration' and 'appearance management for a good feeling'. Workers perform appearance management behavior for a good feeling more than appearance management behavior for decoration. Second, there were statistically significant differences in the appearance management behaviors of the workers according to occupational categories, the size of the organization, the presence of the dress code in the workplace. Third, there were statistically significant differences in the management behaviors of workers by gender of demographic characteristics. Fourth, the largest number of monthly average expense for appearance management was 100,000~300,000 won (44.1%), and the largest number of daily average time for appearance management was 30 minutes~1 hour (45.5%). This study presents the tendency of appearance management behaviors according to the occupational characteristics and demographic characteristics of workers and helps the marketer in the appearance industry understand the target customer clearly.

Development of a Human Factors Investigation and Analysis Model for Use in Maritime Accidents: A Case Study of Collision Accident Investigation

  • Kim, Hong-Tae;Na, Seong
    • Journal of Navigation and Port Research
    • /
    • v.41 no.5
    • /
    • pp.303-318
    • /
    • 2017
  • In the shipping industry, it is well known that around 80 % or more of all marine accidents are caused fully or at least in part by human error. In this regard, the International Maritime Organization (IMO) stated that the study of human factors would be important for improving maritime safety. Consequently, the IMO adopted the Casualty Investigation Code, including guidelines to assist investigators in the implementation of the Code, to prevent similar accidents occurring again in the future. In this paper, a process of the human factors investigation is proposed to provide investigators with a guide for determining the occurrence sequence of marine accidents, to identify and classify human error-inducing underlying factors, and to develop safety actions that can manage the risk of marine accidents. Also, an application of these investigation procedures to a collision accident is provided as a case study This is done to verify the applicability of the proposed human factors investigation procedures. The proposed human factors investigation process provides a systematic approach and consists of 3 steps: 'Step 1: collect data & determine occurrence sequence' using the SHEL model and the cognitive process model; 'Step 2: identify and classify underlying human factors' using the Maritime-Human Factor Analysis and Classification System (M-HFACS) model; and 'Step 3: develop safety actions,' using the causal chains. The case study shows that the proposed human factors investigation process is capable of identifying the underlying factors and indeveloping safety actions to prevent similar accidents from occurring.

Real-Time Visualization of Web Usage Patterns and Anomalous Sessions (실시간 웹 사용 현황과 이상 행위에 대한 시각화)

  • 이병희;조상현;차성덕
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.14 no.4
    • /
    • pp.97-110
    • /
    • 2004
  • As modem web services become enormously complex, web attacks has become frequent and serious. Existing security solutions such as firewalls or signature-based intrusion detection systems are generally inadequate in securing web services, and analysis of raw web log data is simply impractical for most organizations. Visual display of "interpreted" web logs, with emphasis on anomalous web requests, is essential for an organization to efficiently track web usage patterns and detect possible web attacks. In this paper, we discuss various issues related to effective real-time visualization of web usage patterns and anomalies. We implemented a software tool named SAD (session anomaly detection) Viewer to satisfy such need and conducted an empirical study in which anomalous web traffics such as Misuse attacks, DoS attacks, Code-Red worms and Whisker scans were injected. Our study confirms that SAD Viewer is useful in assisting web security engineers to monitor web usage patterns in general and anomalous web sessions in particular.articular.

The Correlation between Block-coding Software Education and the Resilience of Elementary School Students (블록코딩 SW 교육과 초등학생의 회복탄력성의 관계)

  • Lee, Jaeho;Cha, Geunmin
    • Journal of Creative Information Culture
    • /
    • v.6 no.1
    • /
    • pp.31-40
    • /
    • 2020
  • The purpose of this study is to statistically analyze the correlation between block-coding software education and the resilience of elementary school students in order to research the significance of software education. In this study, 61 fourth grade students at an elementary school in Incheon were pre-tested for resilience. A block-coding education program from a nonprofit organization called code.org was used at the learner's level. 15 periods of classes and post-test were conducted to analyze the improvement of resilience. This study finds that control and positivity out of the three parts of resilience(control, positivity, sociality) of the students who took the block-coding classes improved statistically significantly as well as the overall score did too. This suggests that software education can foster not only students' computational thinking skills, but also their resilience, the power to live their lives positively and flexibly.

A Research on the Navigation of Northern Sea Route According to Safety of Vessel and Crews (선박 및 선원의 인명 안전을 고려한 북극해 항로 운항 연구)

  • Kim, Won-Ouk;Youn, Dae-Gwun;Park, Woe-Chul
    • Journal of the Korean Society of Marine Environment & Safety
    • /
    • v.21 no.1
    • /
    • pp.40-46
    • /
    • 2015
  • Arctic Ocean has rapidly melted due to global warming, by this, commercial ship has been operating through the area. Reason to develop the Northern Sea Route(NSR) even in extreme conditions, the distance than the existing route is shortened, which bring economic benefits. For these reason, the International Maritime Organization(IMO) established safety standards of the Arctic navigation(Polar Code) in order to ensure safe operation in the Northern Sea Route. In this study, it has been described ice types and safety standards of Artic vessel what officer needs to know for safe navigation on the Arctic Ocean. And It was verified by simulation the theoretical knowledge for the safe operation of the Arctic vessel. As a result, it was found that ship needs to reduce speed and analyze ice for safe operation before enter into the ice, it is necessary to enter at right angle to break ice safety and efficiently. Also according to the result of the simulation of navigation entering in ice channel(Lead), it was difficult to change course, it is believed that require emergency training for passing Vessel. In the future, It shall be analyzed precisely under various conditions of scenario.