• Title/Summary/Keyword: Policy Information Services

Search Result 1,616, Processing Time 0.03 seconds

A study on the security threat and security requirements for multi unmanned aerial vehicles (무인기 군집 비행 보안위협 및 보안요구사항 연구)

  • Kim, Mansik;Kang, Jungho;Jun, Moon-seog
    • Journal of Digital Convergence
    • /
    • v.15 no.8
    • /
    • pp.195-202
    • /
    • 2017
  • Unmanned Aerial Vehicles (UAV) have mostly been used for military purposes but with the progress in ICT and reduced manufacturing costs, they are increasingly used for various private services. UAVs are expected to carry out autonomous flying in the future. In order to carry out complex tasks, swarm flights are essential. Although the swarm flights has been researched a lot due to its different network and infrastructure from the existing UAV system, There are still not enough study on security threats and requirements for the secure swarm flights. In this paper, to solve these problems, UAV autonomous flight technology is defined based on US Army Corps of Engineers (USACE) and Air Force Research Laboratory (AFRL), and swarm flights and security threat about it are classified. And then we defined and compared security requirements according to security threats of each swarm flights so as to contribute to the development of secure UAC swarm flights in the future.

A Methodology for the Improvement of Accredited Digital Certificate Integrating FIDO Biometric Technology and TrustZone (FIDO 생체기술과 안전영역을 연계한 공인인증서 효율화 방법)

  • Cho, Hwa-Gun;Yang, Hae-Sool
    • Journal of Digital Convergence
    • /
    • v.15 no.8
    • /
    • pp.183-193
    • /
    • 2017
  • Digital accredited certificates issued under the Digital Signature Act provide essential functionalities for online service, so certificates are used for various services such as online banking, e-government. However, certificates can be stolen by hackers and users need to install separate software to use certificates. Recently FIDO, which aims to solve the problems of password-based authentication and the lack of interoperability between authentication methods, is used for biometric authentication and TrustZone, hardware-based secure environment, is used for safe smartphone usage. In this paper, the new service method is suggested which uses FIDO-based biometric authentication and stores certificates in TrustZone. This method can not only improve security and convenience but also be easily applied to the service because it uses built-in functionalities of new smartphones such as biometric sensors and TrustZone. It is expected that people can use certificates in a safe and convenient way with this method.

Switching Intention of Smart Appliance : A Perspective of the Push-Pull-Mooring Framework (스마트 가전의 전환의도에 영향을 미치는 요인에 관한 연구 : Push-Pull-Mooring의 관점)

  • Park, HyunSun;Kim, Sanghyun
    • Journal of Digital Convergence
    • /
    • v.16 no.2
    • /
    • pp.127-137
    • /
    • 2018
  • As the next generation technology, leading 4th industrial revolution has been progressed, the goods and services converged by the technology are being released in a market. The smart appliances among them attracts users' attentions as a key promising industry. Thus, this study investigates the factors that influence switching intention to smart appliances based on Push-Pull-Mooring framework. We collected 217 survey responses and formed structural equation modeling with AMOS 22.0. The results show that functional deprivation, money deprivation, alternative attractiveness had an effect on the switching intention to smart appliances. In addition, low switching cost is related to the relationship between external variables and switching intention. The results expect to provide useful information to the smart appliance-related companies.

Current Status and Factors Affecting Prenatal Care by Married Immigrant Women (결혼이민여성의 산전관리 실태와 영향요인)

  • Jang, In-Sun;Hwang, Na-Mi;Yoon, Mi-Sun;Park, Seung-Mi
    • Women's Health Nursing
    • /
    • v.16 no.4
    • /
    • pp.326-335
    • /
    • 2010
  • Purpose: The purpose of this study was to identify factors affecting prenatal care (PNC) by married immigrant women. Methods: This study was a secondary analysis of "Reproductive Health Status of Married Immigrant Women and Policy Directions in Korea" by the Korea Institute for Health & Social Affairs. The participants were 727 married immigrant women from Asia. Data were analysed using descriptive statistics, $x^2$ test and logistic regression with SPSS 14.0. Results: Of the 727 women interviewed, 91.7% visited prenatal clinic. However, first time for PNC was late and total number of PNC was lower (9.07) than the average of Korean women. Timing and number of PNC in rural area were later and fewer than those in urban area. PNC by these women was significantly lower in those who had lived in Korea longer and for those who the employed. However, PNC was significantly higher in those who attended health education during pregnancy and had not experienced premature delivery. Those who attended health education during pregnancy (OR=2.84, CI=1.49~5.40) or were unemployed (OR=0.51, CI=0.26~0.99) were more likely to have PNC. Conclusion: These findings illustrate the need to strengthen the public information and provide special services to their demands about PNC for married immigrant women.

A Study on the Failure Factors of Popular Use of International Domain Names (IDNs): Focusing on the International Standardization Process (다국어도메인의 대중화 실패 요인 탐색: 국제표준화 과정 분석을 통하여)

  • Lee, Jin-Rang
    • Informatization Policy
    • /
    • v.23 no.3
    • /
    • pp.43-63
    • /
    • 2016
  • This research analyzes the international standardization process by observing the international communication sources in order to understand the reason of its current poor use. Using the 'organizing theory' frame, we observe the initial discourse on the need of internationalized domain names in ICANN and the process of negotiation for technical choice of layers. Lastly, we take Korean domain names as a case study in order to understand the conflict and the cooperation of different stakeholders. We summarize the factors of failure of IDN as follows. First, the need of IDN in the beginning was raised around non-English speaking countries, in Asia and Middle East, with the discourse on 'digital divide solution and cultural value' ICANN rather pursues the 'technical stability of Internet Infrastructure', which made its standardization take as long as 10 years. As a result, a variety of standards and services are proposed in the marketplace, which engendered inefficient competition and domain name-related disputes such as cybersquatting, technical instability and confusion of users. In addition, the government agencies fail to present the appropriate policies adjusting multiple interests of different stakeholders.

Development and Evaluation of Core Collection Using Qualitative and Quantitative Trait Descriptor in Sesame (Sesamum indicum L.) Germplasm

  • Park, Jong-Hyun;Suresh, Sundan;Raveendar, Sebastin;Baek, Hyung-Jin;Kim, Chung-Kon;Lee, Sokyoung;Cho, Gyu-Taek;Ma, Kyung-Ho;Lee, Chul-Won;Chung, Jong-Wook
    • KOREAN JOURNAL OF CROP SCIENCE
    • /
    • v.60 no.1
    • /
    • pp.75-84
    • /
    • 2015
  • Sesame (Sesamum indicum L.) is one of the most important oilseed crops with high oil contents and rich nutrient value. The development of a core collection could facilitate easier access to sesame genetic resources for their use in crop improvement programs and simplify the genebank management. The present study was initiated to the development and evaluation of a core collection of sesame based on 5 qualitative and 10 quantitative trait descriptors on 2,751 sesame accessions. The accessions were different countries of origin. About 10.1 percent of accessions were selected by using the power core program to constitute a core collection consisting of 278 accessions. Mean comparisons using t-test, Nei's diversity index of 10 morphological descriptors and correlation coefficients among traits indicated that the existing genetic variation for these traits in the entire collection has been preserved in the core collection. The results from this study will provide effective information for future germplasm conservation and improvement programs in sesame.

Analyzing Korean Media Industry Trends and Competitive Strategies by Introducing Comprehensive Programming Channels (종합편성채널 도입에 따른 국내 미디어산업 변화 및 사업자 경쟁방안에 관한 연구)

  • Cho, Ji-Yeon;Song, Ju-Ho;Lee, Bong-Gyou
    • Journal of Internet Computing and Services
    • /
    • v.12 no.1
    • /
    • pp.39-53
    • /
    • 2011
  • Recently, a new media reform bill has passed through the National Assembly in Korea. The introduction of comprehensive programming channels that combine news and entertainment programs is expected to have a direct and indirect effect on the media related industry. And it affects not only existing traditional media operators, but also companies that consider entering the comprehensive programming business. This study analyzes the changes caused by the emergence of new businesses and identifies competitive strategies. Using Scenario Network Mapping (SNM) that is a scenario planning methodology for developing an industry network map in a complex environment. As a result of this study, the following competitive factors were identified: new business competitiveness, government policy and support, and content differentiation. This study has significance as an initial study on comprehensive programming channels strategies. It also provides implications to the government and the entrepreneur who is considering starting a comprehensive programming business.

An Assurance Mechanism of Intrusion Data for Making Digital Evidence in Digital Computing Environment (디지털 컴퓨팅 환경의 디지털 증거화를 위한 침해 데이터보증 메커니즘)

  • Jang, Eun-Gyeom
    • Journal of Internet Computing and Services
    • /
    • v.11 no.4
    • /
    • pp.129-141
    • /
    • 2010
  • In digital computing environment, for the mal functions in appliances and system errors, the unaccepted intrusion should be occurred. The evidence collecting technology uses the system which was damaged by intruders and that system is used as evidence materials in the court of justice. However the collected evidences are easily modified and damaged in the gathering evidence process, the evidence analysis process and in the court. That’s why we have to prove the evidence’s integrity to be valuably used in the court. In this paper, we propose a mechanism for securing the reliability and the integrity of digital evidence that can properly support the Computer Forensics. The proposed mechanism shares and manages the digital evidence through mutual authenticating the damaged system, evidence collecting system, evidence managing system and the court(TTP: Trusted Third Party) and provides a secure access control model to establish the secure evidence management policy which assures that the collected evidence has the corresponded legal effect.

The Design and Implementation of a Cleaning Algorithm using NAND-Type Flash Memory (NAND-플래시 메모리를 이용한 클리닝 알고리즘의 구현 및 설계)

  • Koo, Yong-Wan;Han, Dae-Man
    • Journal of Internet Computing and Services
    • /
    • v.7 no.6
    • /
    • pp.105-112
    • /
    • 2006
  • This paper be composed to file system by making a new i_node structure which can decrease Write frequency because this's can improved the file system efficiency if reduced Write operation frequency of flash memory in respect of file system, i-node is designed to realize Cleaning policy of data in order to perform Write operation. This paper suggest Cleaning Algorithm for Write operation through a new i_node structure. In addition, this paper have mode the oldest data cleaned and the most recent data maintained longest as a result of experiment that the recent applied program and data tend to be implemented again through the concept of regional and time space which appears automatically when applied program is implemented. Through experiment and realization of the Flash file system, this paper proved the efficiency of NAND-type flash file system which is required in on Embedded system.

  • PDF

The Vulnerability Analysis for Virtualization Environment Risk Model Management Systematization (가상화 환경 위험도 관리체계화를 위한 취약점 분석)

  • Park, Mi-Young;Seung, Hyen-Woo;Lim, Yang-Mi
    • Journal of Internet Computing and Services
    • /
    • v.14 no.3
    • /
    • pp.23-33
    • /
    • 2013
  • Recently in the field of IT, cloud computing technology has been deployed rapidly in the current society because of its flexibility, efficiency and cost savings features. However, cloud computing system has a big problem of vulnerability in security. In order to solve the vulnerability of cloud computing systems security in this study, impact types of virtual machine about the vulnerability were determined and the priorities were determined according to the risk evaluation of virtual machine's vulnerability. For analyzing the vulnerability, risk measurement standards about the vulnerability were defined based on CVSS2.0, which is an open frame work; and the risk measurement was systematized by scoring for relevant vulnerabilities. Vulnerability risk standards are considered to suggest fundamental characteristics of vulnerability and to provide the degree of risks and consequently to be applicable to technical guides to minimize the vulnerability. Additionally, suggested risk standard of vulnerability is meaningful as the study content itself and could be used in technology policy project which is to be conducted in the future.