• Title/Summary/Keyword: Security Measure

Search Result 580, Processing Time 0.025 seconds

Awareness and Application of Internet of Things in Universities Libraries in Kwara State, Nigeria

  • Saliu Abdulfatai
    • International Journal of Knowledge Content Development & Technology
    • /
    • v.14 no.4
    • /
    • pp.65-84
    • /
    • 2024
  • The study was conducted on the awareness and application of internet of things in universities libraries in Kwara State, Nigeria. the study formulated used four research questions and used eighty five (85) samples as the population using total enumerative sampling techniques. A survey method was used in undertaking the study, in which answers were sought on the level of awareness of the internet of things in universities libraries in Kwara State, the extent of application of the internet of things in universities libraries in Kwara State, the benefit of internet of things in universities libraries in Kwara State, the challenges faced in the application of internet of things in universities libraries in Kwara State. The data collected from the study were analyzed using frequency tables and percentage. The study discovered that there the students are aware of the internet of things in universities libraries in Kwara State and the benefit of internet of a things include: Device in the IoT platforms are heterogeneous and are based on different hardware platforms and networks, It gives the high level of interoperability and interconnectivity, IoT platform has sensors which detect or measure any changes in the environment to generate data that can report on their status or even interact with the environment, IoT comes with the combination of algorithms and computation, software & hardware that makes it smart and Anything can be interconnected with the global information and communication infrastructure and the study identified data interpretation problem, Lack of skilled and specialized workers, Cost and Challenges in online security as well as Software complexity are major challenges faced in the application of internet of things in universities libraries in Kwara State. In conclusion the study made some recommendations which include that: Future libraries should be equipped with new technologies and networking devices as soon as possible. As this will be essential for users and librarians to have sufficient knowledge about IOT technologies.

Research Trend Analysis Using Bibliographic Information and Citations of Cloud Computing Articles: Application of Social Network Analysis (클라우드 컴퓨팅 관련 논문의 서지정보 및 인용정보를 활용한 연구 동향 분석: 사회 네트워크 분석의 활용)

  • Kim, Dongsung;Kim, Jongwoo
    • Journal of Intelligence and Information Systems
    • /
    • v.20 no.1
    • /
    • pp.195-211
    • /
    • 2014
  • Cloud computing services provide IT resources as services on demand. This is considered a key concept, which will lead a shift from an ownership-based paradigm to a new pay-for-use paradigm, which can reduce the fixed cost for IT resources, and improve flexibility and scalability. As IT services, cloud services have evolved from early similar computing concepts such as network computing, utility computing, server-based computing, and grid computing. So research into cloud computing is highly related to and combined with various relevant computing research areas. To seek promising research issues and topics in cloud computing, it is necessary to understand the research trends in cloud computing more comprehensively. In this study, we collect bibliographic information and citation information for cloud computing related research papers published in major international journals from 1994 to 2012, and analyzes macroscopic trends and network changes to citation relationships among papers and the co-occurrence relationships of key words by utilizing social network analysis measures. Through the analysis, we can identify the relationships and connections among research topics in cloud computing related areas, and highlight new potential research topics. In addition, we visualize dynamic changes of research topics relating to cloud computing using a proposed cloud computing "research trend map." A research trend map visualizes positions of research topics in two-dimensional space. Frequencies of key words (X-axis) and the rates of increase in the degree centrality of key words (Y-axis) are used as the two dimensions of the research trend map. Based on the values of the two dimensions, the two dimensional space of a research map is divided into four areas: maturation, growth, promising, and decline. An area with high keyword frequency, but low rates of increase of degree centrality is defined as a mature technology area; the area where both keyword frequency and the increase rate of degree centrality are high is defined as a growth technology area; the area where the keyword frequency is low, but the rate of increase in the degree centrality is high is defined as a promising technology area; and the area where both keyword frequency and the rate of degree centrality are low is defined as a declining technology area. Based on this method, cloud computing research trend maps make it possible to easily grasp the main research trends in cloud computing, and to explain the evolution of research topics. According to the results of an analysis of citation relationships, research papers on security, distributed processing, and optical networking for cloud computing are on the top based on the page-rank measure. From the analysis of key words in research papers, cloud computing and grid computing showed high centrality in 2009, and key words dealing with main elemental technologies such as data outsourcing, error detection methods, and infrastructure construction showed high centrality in 2010~2011. In 2012, security, virtualization, and resource management showed high centrality. Moreover, it was found that the interest in the technical issues of cloud computing increases gradually. From annual cloud computing research trend maps, it was verified that security is located in the promising area, virtualization has moved from the promising area to the growth area, and grid computing and distributed system has moved to the declining area. The study results indicate that distributed systems and grid computing received a lot of attention as similar computing paradigms in the early stage of cloud computing research. The early stage of cloud computing was a period focused on understanding and investigating cloud computing as an emergent technology, linking to relevant established computing concepts. After the early stage, security and virtualization technologies became main issues in cloud computing, which is reflected in the movement of security and virtualization technologies from the promising area to the growth area in the cloud computing research trend maps. Moreover, this study revealed that current research in cloud computing has rapidly transferred from a focus on technical issues to for a focus on application issues, such as SLAs (Service Level Agreements).

A Light-Weight RFID Distance Bounding Protocol (경량 RFID 경계 결정 프로토콜)

  • Ahn, Hae-Soon;Bu, Ki-Dong;Yoon, Eun-Jun;Nam, In-Gil
    • The KIPS Transactions:PartC
    • /
    • v.17C no.4
    • /
    • pp.307-314
    • /
    • 2010
  • Recently, it is proved that contactless smart-card based RFID tags, which is used for proximity authentication, are vulnerable to relay attacks with various location-based attacks such as distance fraud, mafia fraud and terrorist fraud attacks. Moreover, distance bounding protocols have been researched to prevent these relay attacks that can measure the message transmitted round-trip time between the reader and the tag. In 2005, Hancke and Kuhn first proposed an RFID distance bounding protocol based on secure hash function. However, the Hancke-Kuhn protocol cannot completely prevent the relay attacks because an adversary has (3/4)$^n$ attack success probability. Thus, this paper proposes a new distance-bounding protocol for light-weight RFID systems that can reduce to (5/8)$^n$ for the adversary's attack success probability. As a result, the proposed protocol not only can provide high-space efficient based on a secure hash function and XOR operation, but also can provide strong security against the relay attacks because the adversary's attack success probability is optimized to (5/8)$^n$.

Nuclear-First Politics of Kim Jung Un Regime and South Korea's Deterrence Strategy (김정은 정권의 선핵(先核) 정치와 한국의 억제전략)

  • Kim, Tae Woo
    • Strategy21
    • /
    • s.39
    • /
    • pp.5-46
    • /
    • 2016
  • North Korea's 4th nuclear test on Jan. 6 and following developments once again awakened the world into seriousness of the nuclear matters on the Korean peninsula. On March 2, UNSC adopted Resolution 2270 which is complemented by Seoul government's measures such as withdrawal from the Gaesung Industrial Complex (Feb. 9) and announcement of unilateral sanction (March 8). Seoul government also strongly urged the international community to strangle North Korea's 'financial resources.' The U.S., Japan, China, and other countries have issued unilateral sanctions to complement the UNSC measure. South Korea and the U.S. conducted their annual joint military drill (Resolve-Foal Eagle) in the largest-ever scale. North Korea, however, responded with demonstration of its nuclear capabilities and announcement of de facto 'nuclear-first' politics. North Korea test-fired a variety of delivery vehicles, threatened nuclear strikes against South Korea and the U.S., and declared itself as an 'invincible nuclear power armed with hydrogen bombs' at the 7th Workers 'Party Congress held in May, 2016. Considering the circumstantial evidences, the North's 4th nuclear test may have been a successful boosted fission bomb test. North Korea, and, if allowed to go on with its nuclear programs, will become a nuclear power armed with more than 50 nuclear weapons including hydrogen bombs. The North is already conducting nuclear blackmail strategy towards South Korea, and must be developing 'nuclear use' strategies. Accordingly, the most pressing challenge for the international community is to bring the North to 'real dialogue for denuclearization through powerful and consistent sanctions. Of course, China's cooperation is the key to success. In this situation, South Korea has urgent challenges on diplomacy and security fronts. A diplomatic challenge is how to lead China, which had shown dual attitudes between 'pressure and connivance' towards the North's nuclear matters pursuant to its military relations with the U.S, to participate in the sanctions consistently. A military one is how to offset the 'nuclear shadow effects' engendered by the North's nuclear blackmail and prevent its purposeful and non-purposeful use of nuclear weapons. Though South Korea's Ministry of Defense is currently spending a large portion of defense finance on preemption (kill-chain) and missile defense, they pose 'high cost and low efficiency' problems. For a 'low cost and high efficiency' of deterrence, South Korea needs to switch to a 'retaliation-centered' deterrence strategy. Though South Korea's response to the North's nuclear threat can theoretically be boiled down into dialogue, sanction and deterrence, now is the time to concentrate on strong sanction and determined deterrence since they are an inevitable mandatory course to destroy the North' nuclear-first delusion and bring it to a 'real denuclearization dialogue.'

Analysis for External Cost of Nuclear Power Focusing on Additional Safety and Accident Risk Costs (추가안전대책비용, 사고위험대응비용의 외부비용을 반영한 원전비용 추정 연구)

  • Kim, Yoon Kyung;Cho, Sung-Jin
    • Environmental and Resource Economics Review
    • /
    • v.22 no.2
    • /
    • pp.367-391
    • /
    • 2013
  • After the Fukushima nuclear accident, the external costs of generating electricity from nuclear power plants such as additional safety compliance costs and possible accident risk action costs have gained increasing attention from the public, policy-makers and politicians. Consequently, estimates of the external costs of nuclear power are very deliberate issue that is at the center of the controversy in Korea. In this paper, we try to calculate the external costs associated with the safety of the nuclear power plants, particularly focusing on additional safety compliance costs and possible accident risk action costs. To estimate the possible accident risk action costs, we adopt the damages expectation approach that is very similar way from the external cost calculation of Japanese government after the Fukushima accident. In addition, to estimate additional safety compliance costs, we apply the levelized cost of generation method. Furthermore, we perform the sensitivity analysis to examine how much these social costs increase the electricity price rate. Estimation results of the additional security measure cost is 0.53Won/kWh ~ 0.80Won/kWh depending on the capacity factor, giving little change on the nuclear power generation cost. The estimates of possible accident risk action costs could be in the wide range depending on the different damages of the nuclear power accident, probability of the severe nuclear power accident and the capacity factor. The preliminary results show that it is 0.0025Won/kWh ~ 26.4188Won/kWh. After including those two external costs on the generation cost of a nuclear power plant, increasing rate of electricity price is 0.001%~10.0563% under the capacity factor from 70% to 90%. This paper tries to examine the external costs of nuclear power plants, so as to include it into the generation cost and the electricity price. This paper suggests one of the methodologies that we might internalize the nuclear power generations' external cost, including it into the internal generation cost.

A Study on the Influence of the Expectation and Perceived Performance of the Online Science & Technology Information Service Quality on User Satisfaction and Royalty (온라인 과학기술정보 서비스 품질에 대한 기대수준과 성과에 대한 지각수준이 이용자 만족도와 충성도에 미치는 영향)

  • Kim, Wan-Jong;Kim, Hye-Sun;Hyun, Mi-Hwan
    • Journal of the Korean Society for information Management
    • /
    • v.30 no.3
    • /
    • pp.207-228
    • /
    • 2013
  • The purpose of this study is to reveal the influence of the expectation and perceived performance of the online science & technology information service quality on user satisfaction and royalty. To achieve this goal, we use the NDSLQual model to measure the quality of NDSL service. The results were as follows: First, among seven expectation factors, four factors (reliability, convenience, system usability and information quality) had a positive effect on the user satisfaction. Second, while service recovery had a negative effect on the royalty, the other six factors (reliability, convenience, system usability, responsiveness, security and information quality) had a positive effect on the royalty. Third, among seven perceived performance factors, three factors (reliability, convenience and information quality) had a positive effect on the user satisfaction. Fourth, among seven perceived performance factors, three factors (reliability, convenience and information quality) had a positive effect on the royalty. As a result, information quality, reliability and convenience of the expectation and perceived performance are common factors influencing user satisfaction and royalty.

The Emotional Intelligence Effects on Foreign LCs' Self-Efficacy and Job Stress (외국계 생명보험 설계사의 감성지능이 직무스트레스에 미치는 영향 : 자기효능감의 매개효과를 중심으로)

  • Jung, Kwang-Jin;Park, Sang-Beom
    • The Journal of Industrial Distribution & Business
    • /
    • v.9 no.5
    • /
    • pp.93-104
    • /
    • 2018
  • Purpose - This study is to investigate the relationship among emotional intelligence, self-efficacy and job stress of foreign life insurance consultants focusing on the mediating effect of self-efficacy. Regarding job security, in general foreign life insurance companies in Korea have more severe working conditions in terms of required contract performance. For foreign life insurance consultants, they are assumed to need higher level of emotional intelligence and self efficacy to meet the conditions. In this study, focus is cast on these aspects. Research design, data, and methodology - Basically the research is conducted upon questionnaires responded by foreign life insurance consultants. That is, data are collected from 255 sample of insurance consultants who work for a foreign owned life insurance company. The Questionnaire measure the level of emotional intelligence, self-efficacy and job stress of insurance consultants. The data are analyzed using pearson's correlation coefficient and hierarchical multiple regression, descriptive statistics, t-test, ANOVA, Durbin-Watson test. Results - The general characteristics of respondents are gender, age, marital status, education level, income monthly, career length, change jobs no, working day per week, call no. per week, meeting no. with client per week, contract regularity, contract no. per month and cancellation contract per year. The mean of emotional intelligence is 2.63, self-efficacy is 3.44 and job stress is 2.20. Emotional intelligence is composed with mean value of self emotion appraisal(3.93), other's emotion appraisal(3.78), regulation of emotion(3.29) and use of emotion(3.52). The mean of self efficacy is composed with mean value of self-confidence(3.41), self-regulated efficacy(3.59) and preference task difficulty(3.30). The job stress is composed with mean value of job requirement(2.61), lack of job autonomy(1.99), conflict of personal relations(1.99), job instability(2.38), organizational system(2.19) and inappropriate compensation(2.07). There is a significant positive correlation between emotional intelligence and self-efficacy. The emotional intelligence and self-efficacy are significantly negative correlation with job stress. The self-efficacy is showed a mediating variable between emotional intelligence and job stress. Conclusions - To decrease job stress level, foreign life insurance company should find the factors to improve the emotional intelligence and self-efficacy of life insurance consultants, and develop appropriate plans using a mediating role of self- efficacy between emotional intelligence and job stress.

A Study of Political Use of Naval Power in Solving International Conflicts (설득이론을 통한 해군력의 정치적 사용에 관한 고찰)

  • Yang, Jung-Seung
    • Strategy21
    • /
    • s.30
    • /
    • pp.236-262
    • /
    • 2012
  • Morgenthau claims that in international relations, there are the economic, political, and military powers that enable a nation to achieve its political and diplomatic goals. This paper explores the possibility of resolving international conflicts with naval power. First, the theoretical and historical perspective, naval power was used as a final resort to force a nation's political or diplomatic objective on an enemy nation when negotiations failed, and this was done through the physical and psychological destruction of the enemy by naval power. But as the use of military power has decreased because of the invention of the nuclear weapon, the existence of a large and capable navy deterrent has become one of the most useful military options among a nation's diplomatic measures. In other words, he focused on the political usefulness of naval power as a deterrent and coercive diplomatic tool for persuading other nations to acquiesce, rather than using naval power and actual military action as a final resort. The reason for this is that compared to army and air force, navy's flexibility, continuity, and the ability to deter are greater. The navy provides excellent accessibility through its wide mobility on the sea, and it has been shown through research that the navy possesses a political usefulness that facilitates the solution of conflicts through presence, naval intervention, and naval blockade. On the other hand, among the factors that could improve the influence of the navy are alliance relations, a reliable and powerful navy, carrots and sticks that it would have to deal with in the case of successful or unsuccessful negotiations, and support from international opinion. On this paper I introduce E.N.Luttwak's naval suasion theory. By the his theory, there are two mode of naval suasion. One is latent naval suasion the other is active suasion. Latent suasion there are deterrent mode and supportive mode. Active naval suasion there are coercive mode and supportive mode. Coercive mode has positive and negative. The limitations of naval suasion have been identified as follows. First, because the objective of the use of naval power is persuading enemy nations, the results are unpredictable. Second, the leaders of all countries possess limited understanding on the complexities of naval power and therefore lack understanding of the usefulness of naval power when choosing options. Third, in case of failure through naval suasion, prestige and reputation of a nation can be damaged. Finally, the following are additional possible research topic. First, a research on the decision making process of choosing naval power as a measure to resolve conflicts is needed. Lastly, research on the size of the navy and types of ships required for efficient naval suasion is needed. Today's world requires cooperative security regime so that middle class navy also requires political use of naval power in solving international conflicts. Therefore, additional research on this topic is needed.

  • PDF

Pull-out Test of Steel Pipe Pile Reinforced with Hollow Steel Plate Shear Connectors (유공강판 전단연결재로 보강된 강관말뚝 머리의 인발실험)

  • Lee, Kyoung-Hun
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.17 no.12
    • /
    • pp.285-291
    • /
    • 2016
  • The purpose of this study was to evaluate the structural capacity of steel pipe pile specimens reinforced with hollow steel plate shear connectors by pull-out test. Compressive strength testing of concrete was conducted and yield forces, tensile strengths and elongation ratios of re-bars and hollow steel plate were investigated. A 2,000kN capacity UTM was used for the pull-out test with 0.01mm/sec velocity by displacement control method. Strain gauges were installed at the center of re-bars and hollow steel plates and LVDTs were also installed to measure the relative displacement between the loading plate and in-filled concrete pile specimens. The yield forces of the steel pipe pile specimens reinforced with hollow steel plate shear connectors were increased 1.44-fold and 1.53-fold compared to that of a control specimen, respectively. Limited state forces of steel pipe pile specimens reinforced with hollow steel plate shear connectors were increased 1.23-fold and 1.29-fold compared to that of a control specimen, respectively. Yield state displacement and limited state displacement of steel pipe pile specimens reinforced with hollow steel plate shear connector were decreased 0.61-fold and 0.42-fold compared to that of a control specimen, respectively.

A Proposal for User Experience Design for Domestic Bicycle Rider whom going Long Distance Trip -Focusing on App - (국내 장거리 자전거 여행자를 위한 사용자 경험 디자인 제안 -자전거 행복나눔 애플리케이션을 중심으로-)

  • Yun, Byung-Hun;Kim, Seung-In
    • Journal of Digital Convergence
    • /
    • v.16 no.4
    • /
    • pp.299-306
    • /
    • 2018
  • This study is to measure traveling experience of bike riders whom going long distance trip. Bike paths and bike riding are crucial element for modern people's life style. At the same time, a bicycle trail is being developed by the National Bicycled-Oriented Chair Plan, which was established in 2009 by the National Bike Policy Master Plan. 13 million bike riders in Korea is keep on trying the long distance bike trip and its number is increasing every year. Accordingly, the Ministry of Public Administration and Security decides to promote the convenience of riders by developing bicycle app for long distance rider. The study attempted to assess usability of this app with 39 bike applications whom currently using the bike application. Afterwards, the researchers tests 11 hypotheses through in-depth interviews of six activated members. In sum, Bicycle travelers should be provided with bike trail guidance based on theme section skill, provided in-time speed distance related information, communicated with other bike riders, given tips for bike supplies and maintenance, and provided English language service. The study hopes to help find a customized service for bike travelers.