• Title/Summary/Keyword: Security Investments

Search Result 81, Processing Time 0.019 seconds

Rainfed Areas and Animal Agriculture in Asia: The Wanting Agenda for Transforming Productivity Growth and Rural Poverty

  • Devendra, C.
    • Asian-Australasian Journal of Animal Sciences
    • /
    • v.25 no.1
    • /
    • pp.122-142
    • /
    • 2012
  • The importance of rainfed areas and animal agriculture on productivity enhancement and food security for economic rural growth in Asia is discussed in the context of opportunities for increasing potential contribution from them. The extent of the rainfed area of about 223 million hectares and the biophysical attributes are described. They have been variously referred to inter alia as fragile, marginal, dry, waste, problem, threatened, range, less favoured, low potential lands, forests and woodlands, including lowlands and uplands. Of these, the terms less favoured areas (LFAs), and low or high potential are quite widely used. The LFAs are characterised by four key features: i) very variable biophysical elements, notably poor soil quality, rainfall, length of growing season and dry periods, ii) extreme poverty and very poor people who continuously face hunger and vulnerability, iii) presence of large populations of ruminant animals (buffaloes, cattle, goats and sheep), and iv) have had minimum development attention and an unfinished wanting agenda. The rainfed humid/sub-humid areas found mainly in South East Asia (99 million ha), and arid/semi-arid tropical systems found in South Asia (116 million ha) are priority agro-ecological zones (AEZs). In India for example, the ecosystem occupies 68% of the total cultivated area and supports 40% of the human and 65% of the livestock populations. The area also produces 4% of food requirements. The biophysical and typical household characteristics, agricultural diversification, patterns of mixed farming and cropping systems are also described. Concerning animals, their role and economic importance, relevance of ownership, nomadic movements, and more importantly their potential value as the entry point for the development of LFAs is discussed. Two examples of demonstrated success concern increasing buffalo production for milk and their expanded use in semi-arid AEZs in India, and the integration of cattle and goats with oil palm in Malaysia. Revitalised development of the LFAs is justified by the demand for agricultural land to meet human needs e.g. housing, recreation and industrialisation; use of arable land to expand crop production to ceiling levels; increasing and very high animal densities; increased urbanisation and pressure on the use of available land; growing environmental concerns of very intensive crop production e.g. acidification and salinisation with rice cultivation; and human health risks due to expanding peri-urban poultry and pig production. The strategies for promoting productivity growth will require concerted R and D on improved use of LFAs, application of systems perspectives for technology delivery, increased investments, a policy framework and improved farmer-researcher-extension linkages. These challenges and their resolution in rainfed areas can forcefully impact on increased productivity, improved livelihoods and human welfare, and environmental sustainability in the future.

The Study of Protective Solution and People in Technology Outflow about SMEs (중소기업 기술유출 및 기술인력 방지제도에 관한 연구)

  • Chung, Jason
    • International Commerce and Information Review
    • /
    • v.17 no.3
    • /
    • pp.133-152
    • /
    • 2015
  • Cause of the technology leakage and trade secrets can be leaked to the lack of infrastructure, lack of coping skills of SMEs. In addition, small businesses can avoid technology outflow and re-experience the same half of the damage, even when the external leak developed after the fact and does not demonstrate such technology leakage time for the technology and situation which did not take any action, security, infrastructure investments difficult, work-related knowledge, lack of security, trade secret protection dedicated staff, inadequate legal and institutional measures have been identified as such complaints to date. For subcontracting, etc. mid-sized transactions, hinder the growth of SMEs, SME cross-technology leakage to the increase in unfair practices, including useful, and this has been accompanied by growth-based business-to-business it weakened.

  • PDF

The Improvement on Proposal Evaluation System of National Defense Core Technology R&D Projects (국방핵심기술 연구개발과제의 선정평가 개선 연구)

  • Kim, Chan-Soo;Cho, Kyu-Kab
    • Journal of Technology Innovation
    • /
    • v.15 no.2
    • /
    • pp.123-152
    • /
    • 2007
  • The striking characteristic of the contemporary global security environment is that the nature of threats has become diverse and complex. For example, transnational and non-military threats including terrorism and proliferation of weapon of mass destruction has increased. In this security environment, Advanced countries funnel their investments for defense budgets into the assurance of key force capability and R&D of cutting-edge core technologies, in consideration of future battlefield environments so as to get an edge on not only defense science and technology but also intelligence capabilities. As shown by past practices of the korea's defense acquisition, the ministry of national defense has tried to enhance its force capabilities in the short-term by purchasing foreign weapon systems rather than by investing in domestic R&D. Accordingly, the technological gaps between the korea and advanced countries were widened due to both insufficient investment in development of domestic technologies and avoidance of technological transfer by advanced countries. Thus, for the effective execution of the R&D budget and the successful performance of the projects, the importance of selection, management and evaluation of the R&D projects is emphasized. So, The objective of this study is that the analysis of the proposal-selection evaluation system for the realization of the successful defense core technology R&D projects. This study focused on the improvement of the proposal-selection evaluation model which can be applicable to the national defense core R&D projects. Using the improved proposal-selection evaluation system, we propose a model to enhance the reliability of the national defense core technology R&D project evaluation system.

  • PDF

A Study on Methods to Increase the Efficiency of Natural Disaster Early Warning Systems (자연재해 예·경보시스템의 효율성 제고방안에 관한 연구)

  • Seo, Jung Pyo;Cho, Won Cheol
    • Journal of Korean Society of Disaster and Security
    • /
    • v.6 no.1
    • /
    • pp.19-27
    • /
    • 2013
  • Damage on assets and lives caused by natural disasters can be minimized by the provision of early warning information and preventive activities. In this sense, the importance of a disaster early warning system continues to increase. This study specifies the kinds of early warning systems depending on the type of natural disasters such as typhoon, flood and heavy snow. The mechanism for information transmission and status of early warning operations are analyzed. Through this analysis, the urgent need to establish a national integrated early warning transmission system is emphasized. In addition, this study offers methods to prevent unnecessary overlapping of investments by establishing an organic mechanism among individual early warning systems. Based on the standardization of disaster-related information, this study also provides methods to improve the efficiency of disaster early warning systems by organizing a permanent team for handling the systematic management and operation of the system.

A Study on Measures for Strengthening Cybersecurity through Analysis of Cyberattack Response (사이버공격 대응 분석을 통한 사이버안보 강화 방안 연구)

  • Yoon, Oh Jun;Bae, Kwang Yong;Kim, Jae Hong;Seo, Hyung Jun;Shin, Yong Tae
    • Convergence Security Journal
    • /
    • v.15 no.4
    • /
    • pp.65-72
    • /
    • 2015
  • Recent cyberthreats are emerging as big issues that need to be addressed to both developed countries and South Korea. Our government has implemented and established comprehensive measures whenever major incidents were happened. It is still insufficient, even though the national and social level of cybersecurity are improved with continuous investments and efforts to strengthen the country than in the past. Comprehensive measures have been exposed to limit the effectiveness because they are focused on short-term measures. In this paper, we try to analyze the problems of incidents and assess the implementation process of establishing comprehensive measures in order to suggest ways ultimately to improve the country's overall level of cybersecurity.

On Efficient Implementation of the Regeneration Projects for the Zones Vulnerable to Natural Disasters (자연재해위험지구 정비사업의 효율적인 추진방안 연구)

  • Kim, Seonguen;Cho, Woncheol;Lee, Taeshik;Shim, Jaehyun
    • Journal of Korean Society of societal Security
    • /
    • v.1 no.1
    • /
    • pp.45-51
    • /
    • 2008
  • The purpose of this study is to suggest some effective ways to implement the regeneration projects for the zones vulnerable to natural disasters which have been delayed due to shortage of the financial resources, and thereby complete the disaster prevention projects as early as possible and thus secure the financial resources for the projects continuously. For this purpose, the researcher reviewed the statutory grounds and designation procedures or the zones vulnerable to natural disasters, and thereupon, examined and analyzed the regeneration projects being implemented in Gyeonggi-do in view of contents by zone, history of damages, annual investment plans and financial resources for investments. In addition, the researcher examined the criteria for reserve of the disaster management fund and its uses and investigated the fund sources and expenditures and thereby, addressed the problems of the statutory reserve and suggested their solutions. All in all, the researcher suggested that the disaster management fund should be invested in regeneration projects for the zones vulnerable to natural disasters in order to remove the disaster risks earlier and that the uses of the fund should be adequately deregulated with a reserve fund ceiling system to secure the financial resources for the disaster prevention projects continuously.

  • PDF

Differential Privacy Technology Resistant to the Model Inversion Attack in AI Environments (AI 환경에서 모델 전도 공격에 안전한 차분 프라이버시 기술)

  • Park, Cheollhee;Hong, Dowon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.3
    • /
    • pp.589-598
    • /
    • 2019
  • The amount of digital data a is explosively growing, and these data have large potential values. Countries and companies are creating various added values from vast amounts of data, and are making a lot of investments in data analysis techniques. The privacy problem that occurs in data analysis is a major factor that hinders data utilization. Recently, as privacy violation attacks on neural network models have been proposed. researches on artificial neural network technology that preserves privacy is required. Therefore, various privacy preserving artificial neural network technologies have been studied in the field of differential privacy that ensures strict privacy. However, there are problems that the balance between the accuracy of the neural network model and the privacy budget is not appropriate. In this paper, we study differential privacy techniques that preserve the performance of a model within a given privacy budget and is resistant to model inversion attacks. Also, we analyze the resistance of model inversion attack according to privacy preservation strength.

A Study on the Determinants of Personal Information Protection Activities: With a Focus on Personal Information Managers (개인정보보호 활동 결정요인 연구: 개인정보처리자를 중심으로)

  • Jang, Chul-Ho;Cha, Yun-Ho
    • Informatization Policy
    • /
    • v.28 no.1
    • /
    • pp.64-76
    • /
    • 2021
  • The purposes of this study are to identify factors that affect personal information protection activities from the perspective of personal information managers and explore ways of promoting such activities. The main factors examined by threat and response assessments were selected based on the protection motivation theory, and the effects of each factor were analyzed using a multinomial logit model. The analysis results show that small-scale personal information managers need to be provided with both educational support to enhance their awareness and technical support, such as protection inspection tools, to help them carry out their own personal information protection activities. Personal information managers larger than a certain size also require tax support, including tax cuts, to support their budgets for and investments in personal information protection activities. In addition, they need professional education that emphasizes practice.

The Mechanism of the Investment Resources Involvement in Order to Introduce Innovations at Enterprises in the Conditions of Digitalization

  • Karpenko, Oksana;Bonyar, Svitlana;Tytykalo, Volodymyr;Belianska, Yuliia;Savchenko, Serhii
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.11
    • /
    • pp.81-88
    • /
    • 2021
  • The presented scientific research substantiates the principles of the mechanism of the investment resources involvement in order to introduce innovations at enterprises in the context of digitalization using a resource-functional approach. The importance of attracting investment resources, which contributes to the modernization of production systems, the creation of a stable economic field of development of economic entities, is justified. The expediency of application of the resource-functional approach on research of the mechanism of attraction of investment resources for introduction of innovations at the enterprises in the conditions of digitalization is proved. The investment process is presented in the form of a chain of interdependent processes which include: attraction of investment resources, investments, increase of investment value, profit. It is proved that the mechanism of attracting investment resources for the introduction of innovations in enterprises in the context of digitalization cannot be considered in isolation from the process, due to the fact that the mechanism is aimed at performing specific functions. The functions of the mechanism include management, complex, coordination, monitoring, performance and control functions. Functions of the mechanism of attraction of investment resources for introduction of innovations at the enterprises in the conditions of digitalization are caused by the purposes of attraction of investment resources for innovative development; the presence of an objective nature; relative independence and homogeneity; implementation of functions in the process of investing in innovative activities of the enterprise.

The Effect on the IS Role Stress on the IS Compliance Intention Through IS Self-determination: Focusing on the Moderation of Person-organization Fit (정보보안 역할 스트레스가 자기 결정성을 통해 준수 의도에 미치는 영향: 개인조직 적합성의 조절 효과)

  • Hwang, In-Ho
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.17 no.2
    • /
    • pp.375-386
    • /
    • 2022
  • As information asset protection is recognized as an important management factor for organizations, organizations are increasing their investments in information security(IS) policies and technologies. However, strict application of IS may cause non-compliance behavior through IS stress on employees of the organization. Accordingly, this study suggests a mechanism by which employee stress affects IS compliance intentions through self-determination, and a method to reinforce IS compliance intentions through person-organization fit. We conducted an online survey of employees working at companies that adopted IS policies and tested hypotheses using 475 samples. First, as a result of analyzing the main effects of applying the structural equation model, role stress affected IS compliance intention through self-determination. Second, as a result of analyzing the moderating effect of applying Process 3.1, personal organization fit strengthened the relationship between self-determination and IS compliance intention. The research suggests a direction for achieving internal IS goals by confirming the influence of IS stress and behavioral causes of employees.