• 제목/요약/키워드: Reputational Security

검색결과 5건 처리시간 0.018초

From Propaganda to Reputational Security: An Intellectual Journey around the role of media in international relations

  • Nicholas J. Cull
    • Journal of Public Diplomacy
    • /
    • 제3권1호
    • /
    • pp.37-56
    • /
    • 2023
  • In this invited essay Nicholas J. Cull considers his career journey exploring the intersection of media and foreign policy, beginning with his first contact with ideas of propaganda and political communication. It continues with exposure to the historical study of propaganda and international relations at the University of Leeds, charting influences and key ideas. His thesis/first book research on Britain's attempt to draw the United States into World War Two before Pearl Harbor emphasized effective approaches to political communication other than the hard sell. Britain's wartime approach prefigured approaches of the United States Information Agency during the Cold War which became Cull's second major research project. Cull discusses the evolution of his work during the expansion of the public diplomacy field in the years following 9/11. Milestones include his articulation of a five-element description of public diplomacy with an emphasis on listening, and a more recent repositioning of Soft Power as Reputational Security, which goes beyond the usual emphasis on accentuating the positives of a nation's culture and values, to call for the active elimination of unattractive realities.

Design and Load Map of the Next Generation Convergence Security Framework for Advanced Persistent Threat Attacks

  • Lee, Moongoo
    • IEIE Transactions on Smart Processing and Computing
    • /
    • 제3권2호
    • /
    • pp.65-73
    • /
    • 2014
  • An overall responding security-centered framework is necessary required for infringement accidents, failures, and cyber threats. On the other hand, the correspondence structures of existing administrative, technical, physical security have weakness in a system responding to complex attacks because each step is performed independently. This study will recognize all internal and external users as a potentially threatening element. To perform connectivity analysis regarding an action, an intelligent convergence security framework and road map is suggested. A suggested convergence security framework was constructed to be independent of an automatic framework, such as the conventional single solution for the priority defense system of APT of the latest attack type, which makes continuous reputational attacks to achieve its goals. This study suggested the next generation convergence security framework to have preemptive responses, possibly against an APT attack, consisting of the following five hierarchical layers: domain security, domain connection, action visibility, action control, and convergence correspondence. In the domain, the connection layer suggests a security instruction and direction in the domains of administrative, physical and technical security. The domain security layer has consistency of status information among the security domain. A visibility layer of an intelligent attack action consists of data gathering, comparison and decision cycle. The action control layer is a layer that controls the visibility action. Finally, the convergence corresponding layer suggests a corresponding system of before and after an APT attack. The administrative security domain had a security design based on organization, rule, process, and paper information. The physical security domain is designed to separate into a control layer and facility according to the threats of the control impossible and control possible. Each domain action executes visible and control steps, and is designed to have flexibility regarding security environmental changes. In this study, the framework to address an APT attack and load map will be used as an infrastructure corresponding to the next generation security.

온라인 거래 장애 방지를 위한 SQL 성능 기반 IT 응용프로그램 변경관리 프로세스 연구 (A Study on SQL Performance-Based IT Application Change Management Process to Prevent Failures of Online Transactions)

  • 김정환;고무성;이경호
    • 정보보호학회논문지
    • /
    • 제24권5호
    • /
    • pp.817-838
    • /
    • 2014
  • 금융기관 및 통신사 등 대량의 데이터를 다루는 회사에서 테스트환경은 구축 비용문제로 인한 스토리지 용량의 한계 및 중요정보 컬럼의 변환 등으로 운영환경과 항상 동일한 것은 아니다. 따라서, 이러한 테스트환경과 운영환경이 동일하지 않아 발생하는 SQL 성능저하는 예상치 못한 거래장애로까지 연결되어 기업의 금전적 손실 및 고객민원, 신뢰도 하락을 발생시키는 중요 원인이 되고 있다. 그동안 SQL과 관련한 성능연구는 DBMS Optimizer와 관련한 튜닝연구 중심으로 이루어져, 이러한 문제에 대해서는 다루어지지 않았다. 따라서, 본 논문에서는 테스트환경과 운영환경의 차이로 발생하는 SQL의 성능저하에 따른 온라인 거래장애 방지를 위해 개선된 SQL 성능 기반의 IT 응용프로그램 변경관리 프로세스를 제시하여 그 효과성을 검증한다.

선박보안교육: 선원의 보안인식과 보안성과에 미치는 영향 평가 (Maritime Security Training: Evaluation of the Impact on Seafarers' Security Awareness and Security Performance)

  • ;조소현
    • 해양환경안전학회지
    • /
    • 제25권2호
    • /
    • pp.201-211
    • /
    • 2019
  • 선박의 안전과 보안의 유지는 공급망의 각 단계에서 화물운송 및 여객의 인명 안전을 보장하는데 중추적인 역할을 한다. ISPS Code는 선원과 선박을 보안 위협으로부터 보호하기 위해 SOLAS 협약에 채택되었고, STCW 2010 마닐라 개정에 따라 선원은 반드시 보안 교육을 이수해야 한다. 효과적인 선원의 교육과 훈련은 선박의 보안 관련한 위험을 최소화하기 위한 적절한 이행활동의 수준을 보장하는데 중요하다. 이 연구의 목적은 선원들이 이수한 보안교육과 선원의 보안인식 및 선박의 보안성과 사이의 관계를 실증 분석하는데 있다. 연구 결과에 따르면 (1) 선박 보안 교육을 이수한 선원들은 선박 보안에 대한 인식이 높고 (2) 이러한 보안 교육 및 보안 인식은 선박의 보안성과에 긍정적 영향을 미치며, (3) 보안 인식은 보안 교육과 보안성과 관계에서 매개 효과가 있는 것으로 분석되었다. 따라서 보안 교육과 훈련은 선원의 보안인식과 보안성과에 중요한 영향을 미치며, 이는 결과적으로 해운산업에서 보다 경제적 운영적 및 이미지 측면에서 주요 이점으로 해석될 수 있을 것이다.

When Disease Defines a Place: Batavia in British Diplomatic and Military Narratives, 1775-1850

  • Keck, Stephen
    • 수완나부미
    • /
    • 제14권2호
    • /
    • pp.117-148
    • /
    • 2022
  • The full impact of COVID-19 has yet to be felt: while it may not define the new decade, it is clear that its immediate significance was to test many of the basic operating assumptions and procedures of global civilization. Even as vaccines are developed and utilized and even as it is possible to see the beginning of the end of COVID-19 as a discrete historical event, it remains unclear as to its ultimate importance. That said, it is evident that the academic exploration of Southeast Asia will also be affected by both the global and regional experiences of the pandemic. "Breakthroughs of Area Studies and ASEAN in the Era of Homo Untact" promises to help reconceptualize the study of the region by highlighting the importance of redefined spatial relationships and new potentially depersonalized modes of communication. This paper acknowledges these issues by suggesting that the transformations caused by the pandemic should motivate scholars to raise new questions about how to understand humanity-particularly as it is defined by societies, nations and regions. Given that COVID-19 (and the response to it) has altered many of the fundamental rhythms of globalized regions, there is sufficient warrant for re-examining both the ways in which disease, health and their related spaces affect the perceptions of Southeast Asia. To achieve "breakthroughs" into the investigation of the region, it makes sense to have another glance at the ways in which the discourses about diseases and health may have helped to inscribe definitions of Southeast Asia-or, at the very least, the nations, societies and peoples who live within it. In order to at least consider these larger issues, the discussion will concentrate on a formative moment in the conceptualization of Southeast Asia-British engagement with the region in the late 18th and early 19th centuries. To that end three themes will be highlighted: (1) the role that British diplomatic and military narratives played in establishing the information priorities required for the construction of colonial knowledge; (2) the importance not only of "colonial knowledge" but information making in its own right; (3) in anticipation of the use of big data, the manner in which manufactured information (related to space and disease) could function in shaping early British perceptions of Southeast Asia-particularly in Batavia and Java. This discussion will suggest that rather than see social distancing or increased communication as the greatest outcome of COVID-19, instead it will be the use of data-that is, big, aggregated biometric data which have not only shaped responses to the pandemic, but remain likely to produce the reconceptualization of both information and knowledge about the region in a way that will be at least as great as that which took place to meet the needs of the "New Imperialism." Furthermore, the definition and articulation of Southeast Asia has often reflected political and security considerations. Yet, the experience of COVID-19 could prove that data and security are now fused into a set of interests critical to policy-makers. Given that the pandemic should accelerate many existing trends, it might be foreseen these developments will herald the triumph of homo indicina: an epistemic condition whereby the human subject has become a kind of index for its harvestable data. If so, the "breakthroughs" for those who study Southeast Asia will follow in due course.