• Title/Summary/Keyword: Physical security

Search Result 1,037, Processing Time 0.023 seconds

An Analysis of Effects of Travel Speed Using the Safety Facilities in the School Zones (어린이 보호구역내 교통안전시설이 구간통행속도에 미치는 효과 분석)

  • Lee, Ho-Won;Joo, Doo-Hwan;Hyun, Cheol-Seung;Kim, Dong-Hyo;Park, Boo-Hee;Lee, Choul-Ki
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.11 no.3
    • /
    • pp.124-132
    • /
    • 2012
  • There is high probability of children's traffic accidents. Because their physical, mental attribute are weak. Major part of the accidents happen during walking. Above all, jaywalking is the biggest traffic accident reason. Many traffic accidents take place on the road to school or near the home area. So Ministry of Public Administration and Security legislated children safeguard zone since 1995. But a study are inadequate the safety facilities on the effectiveness verification in the school zone. Therefore, this study aims to analyze the effectiveness of safety facilities. The vehicle speed is a direct correlation traffic accident. So in this study, the MOE(Measure of Effectiveness) is average travel speed in the school zone. The results shows that hump, rised pedestrian crossing has an effect.

An Analysis on the Status and Degree of Recognition for Smart Phone Syndrome of Undergraduate Students (대학생들의 스마트폰 증후군에 대한 인지정도 및 실태 분석)

  • Kim, Tae-Hee;Kang, Moon-Seol
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.18 no.4
    • /
    • pp.941-948
    • /
    • 2014
  • As smart phone became popular, a word smart phone syndrome is also commonly used among us. Its excessive uses cause adverse effects on daily lives such as mental and physical health education and individual relationships. This paper targeted to undergraduate students who are mostly using smart phones to analyze on their perception of smart phone syndrome and a reality of typical syndrome such as digital forgetfulness, smart phone addiction and dependence on Kakaotalk. It also suggested basic countermeasures for preventing smart phone syndrome. The perception on smart phone syndrome of undergraduate students using over the average 5 hours a day was resulted to be very low, and it is analyzed smart phone syndrome including digital forgetfulness, smart phone addiction and dependence on Kakaotalk is quite serious, so that proper countermeasures and the actions are required.

Secrecy Performance of Secure Amplify-and-Forward Transmission with Multi-Antenna Relay (다중 안테나 릴레이 기반의 Secure Amplifyand-Forward 전송 시스템의 보안 성능 분석)

  • Hwang, Kyu-Sung;Ju, MinChul
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.38A no.8
    • /
    • pp.733-738
    • /
    • 2013
  • In this paper, we consider a physical layer security of an amplify-and-forward (AF) transmission in a presence of an eavesdropper in a wiretap channel. The proposed wiretap channel consists of a source, a destination, a relay, and an eavesdropper. Specifically, we consider that the relay has multiple antennas to exploit a diversity gain and a receive/transmit antenna selection schemes are applied to maximize a signal-to-noise ratio. In a practical point of view, we focus on the practical scenario where the relay does not have any channel state information of the eavesdropper while performing an AF protocol at the relay. For a secrecy performance analysis, we analyze a secrecy outage probability of the proposed system in one-integral form and verify our analysis with the computer-based simulation.

Personal Information Protection by Privacy Impact Assessment in Information System Audit (정보시스템 감리에서 개인정보 영향평가를 통한 개인정보 보호)

  • Kim, Hee-Wan;Ryu, Jae-Sung;Kim, Dong-Soo
    • The Journal of the Korea Contents Association
    • /
    • v.11 no.3
    • /
    • pp.84-99
    • /
    • 2011
  • As the integrated and large-scale information is extended due to an advanced information system, a possibility of leaking out privacy increases as the time passes by. As a result, the necessity of using a privacy impact assessment (PIA) is emphasized because it can analyze and minimize the element of invasion of privacy. However, an essential audit for personal information protection is not fulfilled because most of the information system audit supervises over physical, managerial, and technical security items of system architecture area so that general items are the only things being checked. Consequently, this paper proposes that in order to minimize the invasion of personal information, the privacy impact assessment should be done. It also presents a procedure and method of personal information protection audit according to the result of the assessment. After applying the suggested method to two projects, it was confirmed that the improvements for protecting personal information were drawn from this paper.

Development of Composite Soil Quality Index Evaluation System based on Web GIS (Web GIS기반의 복합적 토양 질 평가 시스템 개발)

  • Sung, Yunsoo;Yang, Jae E;Kim, Sung Chul;Ryu, Jichul;Jang, Wonseok;Kum, Donghyuk;Lim, Kyoung Jae
    • Journal of Korean Society on Water Environment
    • /
    • v.31 no.6
    • /
    • pp.693-699
    • /
    • 2015
  • It has been known that torrential rainfall events have been occurring worldwide due to climate change. The accelerated soil erosion has caused negative impacts on water quality and ecosystem of receiving waterbodies. Since soil security issues have been arising in various areas of the world, intensive interests have been given to topsoil management in Korea. Thus in this study, Web GIS-based computing system of physical, chemical, and biological topsoil quality indices were developed. In this study, five soil quality maps at national scale and top soil erosion potential were prepared for evaluation of soil quality based on soil erosion potential. For this system, the open source Web GIS engine, OpenGeo, was used as core engine of the system. With this system, decision makers or related personnel in areas of soil erosion Best Management Practices (BMPs) would be able to find the most appropriate soil erosion BMPs based on soil erosion potential and soil quality at the area of interest. The Web GIS system would be efficiently used in decision making processes because of ease-of-use interface and scientific data used in this system. This Web GIS system would be efficiently used because this system could provide scientific knowledge to decision makers or stakeholders. Currently various BMP database are being built to be used as a decision support system in topsoil management and topsoil quality areas.

A Study on Visiting Caregiver's Perception of Elder Abuse (방문요양보호사의 노인학대에 대한 인식)

  • Oh, Chung-uk;Kang, Hye-kyung
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.17 no.4
    • /
    • pp.638-645
    • /
    • 2016
  • This study describes visiting caregivers' perceptions and reporting of elder abuse. From January 13 to February 10, 2014, data were collected from 249 visiting caregivers working at homes by using a structured questionnaire. The caregivers' perceptions of abuse were high overall. Physical abuse was the most common type, followed by financial, verbal, negligence, and emotional abuse. Most visitors recognized that it is important to require reporting for the prevention of elder abuse, but most of them had no experience with reporting abuse, and the agencies that they knew were mostly the police. A majority of the visiting caregivers had attended an elder abuse program and recognized the importance of such programs. The caregivers hoped that the programs would have specific examples of how to deal with elder abuse and family counseling methods, and other practical content for their work. Programs should focus on coping with individual cases, proper counseling methods, and awareness of elder abuse.

A study on the success factors of EDI information system: Focused on medical industry (EDI 정보 시스템의 성공 모형 도출: 의료 산업을 중심으로)

  • Jo, Hyeon;Kim, Soung-Hie;Lee, Seok-Kee
    • Journal of the Korean Data and Information Science Society
    • /
    • v.22 no.2
    • /
    • pp.323-333
    • /
    • 2011
  • Recently, Electronic Data Interchange (EDI) systems are widely used. Many organizations exchange the documents by using EDI, and EDI is used in various industries such as physical distribution, export and import business, custom, and medical care. However, there have been little attempt to empirically investigate the success factors of EDI system. In this paper, we identify the influencing factors which determine the success of typical information system and then suggest the additional factors characterized to the EDI system. Our research model, mainly based on the system success model, is tested by analyzing the empirical data acquired from the companies in the medical industry. As a result, the system quality, information quality, service quality, and the perceived sacrifice turned out to be significant to the success of EDI system while data security does not. The result of this research is likely to help providing useful guidelines for the successful EDI implementations.

A Study on Development of Attack System on the 2.4 GHz AES Wireless Keyboard (2.4 GHz AES 무선 키보드 공격 시스템 구축에 관한 연구)

  • Lee, Ji-Woo;Sim, Bo-Yeon;Park, Aesun;Han, Dong-Guk
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.42 no.1
    • /
    • pp.233-240
    • /
    • 2017
  • Due to a recent rise in use of a wireless keyboard and mouse, attacks which take user's input information or control user's computer remotely exploiting the physical vulnerability in the wireless communication have been reported. Especially, MouseJack, announced by Bastille Network, attacks 2.4 GHz wireless keyboards and mice through exploiting vulnerability of each manufacturer's receiver. Unlike other attacks that have been revealed, this allows to attack AES wireless keyboards. Nonetheless, there is only a brief overview of the attack but no detailed information on this attacking method. Therefore, in this paper we will analyze the Microsoft 2.4 GHz wireless mouse packet and propose a way to set the packet configuration for HID packet injection simulating a wireless mouse. We also develop a system with 2.4 GHz AES wireless keyboard HID packet injection using the proposed packet and demonstrate via experiment that HID packet injection is possible through the system we built.

Safety Management Network of Sports Facilities Abroad and System Status (해외의 스포츠시설 안전관리 네트워크 및 시스템 현황)

  • Kim, Il-Gwang;Kwon, Hei-Won;Choi, Jin-Ho
    • Journal of Digital Convergence
    • /
    • v.14 no.6
    • /
    • pp.547-562
    • /
    • 2016
  • The purpose of this research was to provide the information of mandatory regulation for Korean sports facilities and the preliminary data for building sport safety management manual through sports facilities abroad and system status. Futhermore, based on the information of sports facilities safety management, this research performed the benchmarking of each country sports facilities safety management system. As a result, in the U.S, Department of Homeland Security(DHS) leads effort to achieve a safe, secure, and resilient homeland. In Germany, law & regulations, sports facilities safety guideline and expert extension have been reviewed. Germany is more realistic and practical than other countries. In Australia, Major Hazard Facilities(MHF) is responsible for eliminating the risk of a major incident. Emergency Management System(EMS) should spontaneously respond when the alarm is raised as early detection and intervention are vital to ensuring that a small incident does not escalate to become a major disaster.

Biometrics System Technology Trends Based on Biosignal (생체신호 기반 바이오인식 시스템 기술 동향)

  • Choi, Gyu-Ho;Moon, Hae-Min;Pan, Sung-Bum
    • Journal of Digital Convergence
    • /
    • v.15 no.1
    • /
    • pp.381-391
    • /
    • 2017
  • Biometric technology is a technology for authenticating a user using the physical or behavioral features of the inherent characteristics of the individual. With the necessity and efficiency of the technology in the fields of finance, security, access control, medical welfare, inspection, and entertainment, the service range has been expanding. Biometrics using biometric information such as fingerprints and faces have been exposed to counterfeit and disguised threats and become a social problem. Recent studies using a bio-signal from the inside of the body other than the bio-information of the external body are being developed. This paper analyzes the recent research and technology of biometric systems using bio-signals, ECG, heart sounds, EEG, and EMG to present the skills needed for the development direction. In the future, utilizing the deep learning to build and analyze database to manage bio-signal based big data for the complex condition of individuals, biometrics technologies suitable for real time environment are expected to be researched.