• Title/Summary/Keyword: Security Importance

Search Result 1,147, Processing Time 0.03 seconds

Counter-Terrorism Policy of Mongolia: Raising Awareness on Terrorism (몽골의 대테러 정책: 테러인식 제고)

  • Urangoo, Khash-Erdene;Lee, Ju-Lak
    • Korean Security Journal
    • /
    • no.60
    • /
    • pp.155-173
    • /
    • 2019
  • This study touches upon the challenges of globalization, in which terrorism is one of the most brutal forms of criminal violence targeting innocent people. No country is immune from terrorist attacks, and no person is immune from becoming a victim. Interest in this topic is increasing as terrorism, in all its forms and manifestations, in its scale and intensity, and in its inhumanity and cruelty, is now becoming one of the most acute and pressing problems of global importance. Legal regulations passed in Mongolia in 2004 have established a structure to prevent and detect terrorist threats. However, the country's anti-terrorism policy should be improved with respect to its global counter-terrorism strategy. Because Mongolia is a comparatively safe country in the region, the people do not consider terrorism to be a real threat. This study aims to suggest methods to quickly raise awareness and create a security culture to improve Mongolia's long-term terrorism prevention policy. In particular, the authors review Mongolia's anti-terrorism policy, focusing on legal regulations, and suggest education methods to raise terrorism awareness for the public as a primary preventive measure. The study also presents a comparative analysis and a summary conclusion by examining international legal acts, conventions on new manifestations of terrorism, the foundations of laws and regulations of Mongolia, and related research on terrorism.

Current Trends in the U.S. Cybersecurity Laws (미국 사이버보안법의 최근 동향 - 「사이버보안 정보공유법」을 중심으로 하여 -)

  • Yang, Chun-Soo;Jee, Yu-Mi
    • Journal of Legislation Research
    • /
    • no.54
    • /
    • pp.155-192
    • /
    • 2018
  • As the 'hyper-connected society' has emerged through the 'Fourth Industrial Revolution, public interests as well as social dangers have increased. Above all, the risk of infringement of information, including confidential personal information, is dramatically increasing. As the hyper-connected society has been realized, even if only one of the internet devices is hacked, there would be a danger that the ripple effect of such a hacking spreads to the whole network. Therefore, the necessity and importance of information security, including cybersecurity, has been increasing. In other words, the stability of cyberspace and internet space is becoming more important. As a result, the Korean government is seeking to build a legal system related to information security, which would be able to cope with the information infringement problem in the hyper-connected society. However, it seems that the government is still struggling with the direction of building such a legal system. In this context, a comparative review examining the legal systems of advanced foreign countries will provide meaningful implications as to what kinds of legal policies we should devise and implement for information security. In particular, the U.S. legislative act that actively responds to the cybersecurity violations is worthy of reference. For this reason, this article systematically analyzes the current status of the U.S. cybersecurity laws. Especially, this article focuses on the "Cybersecurity Information Sharing Act of 2015"(hereinafter "CISA"), that was recently enacted by the U.S. congress. The CISA prescribes the systemic and detailed information-sharing between national and private entities. The CISA, that actively promotes information-sharing, is full of suggestions for us, in that information-sharing is an effective way to properly realize information security in today's hyper-connected society.

The Relationship between Financial Mydata Service Characteristics and Intention to Use: The Moderating Effects of Innovativeness and Technology Security (금융 마이데이터 서비스 특성과 수용의도의 관계: 개인혁신성과 기술적 보안성의 조절효과)

  • Changyong Sohn;Hyunsun Park;Sanghyun Kim
    • Knowledge Management Research
    • /
    • v.23 no.4
    • /
    • pp.133-157
    • /
    • 2022
  • As data becomes a new core resource with high attention, MyData service is spreading to various fields such as finance, medical care, and the public sector. However, research on the behavior of MyData service users is insufficient. Therefore, this study aims to empirically examine the effect of MyData service traits on value perception and acceptable behavior particularly in the financial sector where MyData service is most active. To this end, this study proposed a research model based on the literature. 295 survey responses were collected from individuals and analyzed using AMOS 26.0 for hypothesis testing. As a result of the analysis, it was found that self-information control, financial convenience, and personalized service had a significant effect on perceived value, and that perceived value had a significant effect on the intention to accept MyData service. Furthermore, this study examined the role of personal innovation and technological security in the relationship between variables by suggesting them as moderators. Results show that individual innovation was found to strengthen the relationship between two variables(self-information control and personalized service) and perceived value. Also, technological security was shown to strengthen the relationship between perceived value and intention to accept financial MyData services. The findings are expected to provide useful information to understand the factors affecting the acceptance of financial MyData service users and to understand the importance of individual innovation levels and technological security.

The Empirical Analysis of Factors Affecting the Intention of College Students to Use Generative AI Services (대학생의 생성형 AI 서비스 이용의도에 영향을 미치는 요인에 대한 실증분석)

  • Chang, Soo-jin;Chung, Byoung-gyu
    • Journal of Venture Innovation
    • /
    • v.6 no.4
    • /
    • pp.153-170
    • /
    • 2023
  • Generative AI services, including ChatGPT, were becoming increasingly active. This study aimed to empirically analyze the factors that promoted and hindered the diffusion of such services from a consumer perspective. Accordingly, a research model was developed based on the Value-based Adoption Model (VAM) framework, addressing both benefit and sacrifice factors. Benefits identified included usefulness and enjoyment, while sacrifices were security and hallucination. The study analyzed how these factors affected the intention to use generative AI services. A survey was conducted among college students for empirical analysis, and 200 valid responses were analyzed. The analysis utilized structural equation modeling with AMOS 24. The empirical results showed that usefulness and enjoyment had a significant positive impact on perceived value, while security and hallucination had a significant negative impact. The order of influence on perceived value was usefulness, hallucination, security, and then enjoyment. Perceived value had a significant positive impact on usage intention. Moreover, perceived value was found to mediate the relationship between usefulness, enjoyment, security, hallucination, and the intention to use generative AI services. These findings expanded the research horizon academically by validating the effectiveness of generative AI services based on existing models and demonstrated the continued importance of usefulness in a practical context.

A Study on the Crime Prevention Design and Consumer Perception (CPTED) of Multi-Family Housing in China (중국 공동주택의 범죄 예방을 위한 디자인과 소비자의 인식에 관한 연구)

  • Kong, De Xin;Lee, Dong Hun;Park, Hae Rim
    • Journal of Service Research and Studies
    • /
    • v.14 no.1
    • /
    • pp.63-76
    • /
    • 2024
  • Multi-family housing plays a crucial role as a living and experiencing space, and its environment has a direct impact on the well-being and stability of its residents. Therefore, Crime Prevention Design (CPTED) for multi-family housing is of utmost importance. However, crime-related data in China is not disclosed to the public because of its specificity, making it difficult for researchers to conduct further in-depth studies based on accurate crime data. As a result, the establishment and application of CPTED theory in terms of crime prevention is limited and delayed. This study aims to explore three aspects of CPTED in multi-family housing as perceived by home-buying consumers. It investigated consumer perception of the CPTED, the importance of each element and ways to increase awareness of CPTED in multifamily housing in order to effectively improve multifamily crime prevention design principles and further enhance public safety. This study examined the current state and future trends of CPTED in China by analyzing relevant research reports and literature, aiming to gain insights into the crime prevention awareness of Chinese homeowners. In addition, a survey was conducted on Chinese consumers to unravel the importance of CPTED and increase awareness of its various elements in multifamily-family. This study used a Likert scale and SPSS reliability analysis to determine the cognitive status of multi-family CPTED, the importance of each element, and proposed an improvement plan based on the analysis results. As this study was limited by the difficulty of implementation and the lack of validation of its practical effectiveness, it is recommended that future research needs to validate the effectiveness of crime prevention designs and produce more practical results. Furthermore, it is crucial to utilize this study to inform the implementation of security solutions that are tailored to the unique characteristics of each district. Additionally, it is important to offer guidance on how to enhance community safety by increasing residents' awareness of security through education and information dissemination. The author hopes that the representative multi-family CPTED awareness, the importance of each element, and plans for improvement shall be summarized from this study, and provide foundational data for the future development of CPTED based on the Chinese region.

A Study on Introduction and Administration Strategy of AEO Program : main examples and its implications for Korea Customs Service (관세법상 "수출입안전관리 우수공인업체"(AEO) 제도의 효율적인 운용 방안에 관한 연구)

  • Nam, Phung-Woo;Ahn, Jae-Jin
    • THE INTERNATIONAL COMMERCE & LAW REVIEW
    • /
    • v.39
    • /
    • pp.313-344
    • /
    • 2008
  • The role of Customs Service has changed significantly in recent times, and what may represent core business for one administration may fall outside the sphere of responsibility of another. This is reflective of the changing environment in which customs authorities operate, and the corresponding changes in government priorities. Since the terrorist attacks on the United States in 2001, customs administrations around the world have been developing AEO programs in which they grant AEO status to operators who are well-compliant with the supply chain security standards. These programs also provide such operators with trade facilitation measures under the customs procedures, acknowledging the importance of ensuring secure and facilitated trade. Thus, this paper analysed leading countries's AEO program regime focused on the two fold : (1)provide an overview and present a implication of its AEO program ; (2)offer an appropriate proposal to Korea Customs Service's new program.

  • PDF

An Effective Information Visualization Technique for Intrusion Detection: Hyperbolic View Intrusion Visualizer

  • Jeong, Yun-Seok;Myung, Ro-Hae
    • Journal of the Ergonomics Society of Korea
    • /
    • v.30 no.2
    • /
    • pp.319-330
    • /
    • 2011
  • In computer forensics investigation, the investigators collect, protect, analyze and interpret massive amount of data which were used in cyber crime. However, due to its huge amount of information, it takes a great deal of time and errors often result even when they use forensics investigation tool in the process. The information visualization techniques will greatly help to improve the information processing ability of human when they deal with the overwhelming amount of data and have to find out significant information in it. The importance of Intrusion Detection System(IDS) among network forensics is being emphasized in computer forensics. In this study, we apply the information visualization techniques which are proposed to be a great help to IDS and carry out the usability test to find out the most effective information visualization techniques for IDS.

A Study on the Recognition for Food Caused by Broadcasting, through Big Data Analysis - Based on the incident of Giant Castella

  • Cho, Myunggeun;Oh, Jungjoo;Jung, Hyun;Lee, Hwansoo
    • Agribusiness and Information Management
    • /
    • v.9 no.1
    • /
    • pp.23-36
    • /
    • 2017
  • The incidents of garbage dumplings in 2004 and the report on giant castella are the examples that shows how big the influence of broadcasting on the industry is. There were discussions on the importance of securing the objectivity of broadcasting, however, the existing related researches have lacked the analysis of actual proof for the influence of broadcasting contents, and as that of the law and system was confined to theoretical arguments, there were not enough suggestions for realistic alternatives. In this paper, we will examine the influence of broadcasting contents on the food industry through an analysis of actual proof, and propose alternatives in terms of the law and policy for securing the objectivity and fairness of broadcasting, to solve this problem.

Regime Type and Its Impact on the Identity Crisis of Arab Maghreb Union

  • Eziou, Hassan
    • Korea and Global Affairs
    • /
    • v.2 no.2
    • /
    • pp.131-156
    • /
    • 2018
  • This paper is mainly an attempt to approach and rethink regionalism and regional organizations, as a new political phenomenon of our modern world politics, by focusing on the way regime types influence the identity building of Maghreb Arab Unionregional organization in North Africa. The focus of this paper will be on the importance of domestic politics as a non-conventional way of studying regionalism. And unlike many studies of regionalism, generally emphasized by realists and liberalists that focus either on security or economy as an outcome of the old regionalism paradigm, this paper will emphasize domestic politics as a guiding line to understand the regional one.

The Current Status and the Prospects of Wind Energy (풍력발전기술의 현황과 전망)

  • Jang, Moon-Seok;Bang, Hyung-Joon
    • Journal of Environmental Science International
    • /
    • v.18 no.8
    • /
    • pp.933-940
    • /
    • 2009
  • Recently, wind power generation is an emerging industry expanding its market rapidly thanks to the increasing need to solve the scarcity of fossil fuels and the risk of potential global warming. Wind power generation has shown to be an effective response plan to global warming, showing the most price competitiveness among the renewable energy sources by its higher efficiency. Therefore wind energy has attracted considerable attention as the industrial growth drive for the next generation. Considering Korea's high dependence of overseas energy resources, the importance of wind power is growing as the most effective alternative energy source to ensure energy security as well as becoming a key strategic industry for exports. In this study, the social and economic effects of the wind power industry is discussed and the current status and the future prospects of the wind energy market is also examined.