• Title/Summary/Keyword: Security Measures

Search Result 1,147, Processing Time 0.027 seconds

Sentiment Analysis of Airline Satisfaction Using Social Big Data: A Pre- and Post-COVID-19 Comparison

  • Ju-Yang Lee;Phil-Sik Jang
    • Journal of the Korea Society of Computer and Information
    • /
    • v.29 no.6
    • /
    • pp.201-209
    • /
    • 2024
  • The COVID-19 pandemic has significantly impacted the aviation industry, leading to worldwide changes in travel restrictions and security measures. This study analyzes 59,818 reviews of 147 airlines from the SKYTRAX website between 2016 and 2023 to understand the changes in airline service satisfaction before and after the pandemic. Using sentiment analysis, the study compares overall satisfaction, review sentiment, and attributes influencing satisfaction. The results show a statistically significant (p<0.001) decrease in overall satisfaction post-COVID-19, with reduced positive sentiment and increased negative sentiment for all airline selection attributes, except cabin and in-flight services. Flight operation services had the most significant impact on overall satisfaction during both periods. This quantitative analysis of global major airlines' satisfaction attributes before and after COVID-19 contributes to enhancing future service satisfaction in the airline industry.

Economic analysis of irrigation facilities for securing water for field crops

  • Hyung Jin Shin;Jae Young Lee;Jae Nam Lee;Han Na Lee;Sang Hyeon Park;Bum Soo Shin;Sang Sun Cha;Se Myung Kwon;Jung Il Seo;Chan Gi Park
    • Korean Journal of Agricultural Science
    • /
    • v.50 no.4
    • /
    • pp.785-798
    • /
    • 2023
  • Considering irrigation facilities are currently insufficient and drought vulnerability due to climate change is high, efficient measures are required to secure water supply for field crops. This study, therefore, calculated the water shortage to secure water for representative field crops. An economic analysis was further conducted by comparing the production income to the input cost for each method. Here, five distinct regions were selected to represent each crop-Cheongyang-gun for chili peppers, Yesan-gun for apples, Dangjin-si for cabbages, Seosan-si for garlic, and Goesan for beans. The regions with insufficient water supply were estimated by calculating the water requirements and the supplied water from public groundwater wells for each area. A comprehensive set of four scenarios was presented as a strategy to ensure water security and manage irrigation facilities. These scenarios comprised the maintenance of existing groundwater wells, the construction of new water storage tanks, the installation of additional groundwater wells, and the utilization of surface water. B/C (benefit/cost) analysis was conducted for each scenario. As a result, the construction of water storage tanks was selected as a facility and water management plan in Cheongyang-gun, Dangjin-si, and Seosan-si. The analysis additionally indicated the economic viability of installing surface water utilization facilities in Yesan-gun and developing water storage tanks and groundwater (aquifer) wells in Goesan-gun. The results of this study are considered to serve as foundation data that may be utilized in the selection of water management plans for drought-prone areas in the future.

Montgomery Multiplier with Very Regular Behavior

  • Yoo-Jin Baek
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.16 no.1
    • /
    • pp.17-28
    • /
    • 2024
  • As listed as one of the most important requirements for Post-Quantum Cryptography standardization process by National Institute of Standards and Technology, the resistance to various side-channel attacks is considered very critical in deploying cryptosystems in practice. In fact, cryptosystems can easily be broken by side-channel attacks, even though they are considered to be secure in the mathematical point of view. The timing attack(TA) and the simple power analysis attack(SPA) are such side-channel attack methods which can reveal sensitive information by analyzing the timing behavior or the power consumption pattern of cryptographic operations. Thus, appropriate measures against such attacks must carefully be considered in the early stage of cryptosystem's implementation process. The Montgomery multiplier is a commonly used and classical gadget in implementing big-number-based cryptosystems including RSA and ECC. And, as recently proposed as an alternative of building blocks for implementing post quantum cryptography such as lattice-based cryptography, the big-number multiplier including the Montgomery multiplier still plays a role in modern cryptography. However, in spite of its effectiveness and wide-adoption, the multiplier is known to be vulnerable to TA and SPA. And this paper proposes a new countermeasure for the Montgomery multiplier against TA and SPA. Briefly speaking, the new measure first represents a multiplication operand without 0 digits, so the resulting multiplication operation behaves in a very regular manner. Also, the new algorithm removes the extra final reduction (which is intrinsic to the modular multiplication) to make the resulting multiplier more timing-independent. Consequently, the resulting multiplier operates in constant time so that it totally removes any TA and SPA vulnerabilities. Since the proposed method can process multi bits at a time, implementers can also trade-off the performance with the resource usage to get desirable implementation characteristics.

Factors Influencing the Discomfort of Chewing in the Elderly : Use of the 8th national health and nutrition survey (장·노년층의 저작불편감에 영향을 주는 요인 : 제8기 국민건강영양조사 이용)

  • Ho-Jin Jeong
    • Journal of The Korean Society of Integrative Medicine
    • /
    • v.12 no.2
    • /
    • pp.25-32
    • /
    • 2024
  • Purpose: This study utilizes big data from the 8th (2021) National Health and Nutrition Examination Survey to determine first, the relationship between chewing discomfort in the elderly and some systemic diseases and second, whether oral diseases and oral health problems are related to systemic diseases. Since this may have an impact, we aim to provide basic data to facilitate the expansion and emphasize the importance of integrated health management education. Methods: Original data from the 8th (2021) National Health and Nutrition Survey, conducted by the Korea Centers for Disease Control and Prevention, were analyzed using SPSS Version 21.0 (IBM). A complex sample frequency analysis was conducted to confirm the general and health-related characteristics of the study subjects, and a complex sample cross-analysis was conducted to determine chewing discomfort according to both general and health-related characteristics. Complex sample multiple logistic regression analysis was conducted to determine the effect on chewing discomfort. Results: In order to analyze the factors that affect chewing discomfort, the general characteristics that showed significant differences in chewing discomfort were adjusted for age, personal income, education level, basic livelihood security, high blood pressure, subjective health status, and subjective oral health. It was found that the condition had a statistically significant effect on chewing discomfort. Conclusion: The findings of this study demonstrate that high blood pressure, subjective health status, and subjective oral health status affect chewing discomfort; hence, measures such as developing and operating programs to improve national oral health are needed. We hope that our study will be used as basic data for research into chewing discomfort and systemic diseases in the elderly.

Research on digital evidence-based countermeasure depending on the type of small and medium-sized enterprises technology leakage accident (중소기업 기술유출사고 유형에 따른 디지털증거기반 대응방안 연구)

  • Jaeyun Wang;Hangbae Chang
    • Journal of Platform Technology
    • /
    • v.12 no.1
    • /
    • pp.67-76
    • /
    • 2024
  • Small and medium-sized enterprises play a fundamental role in the foundation of our country's industry and economy, and most technological innovations occur in small and medium-sized enterprises rather than large corporations. Technology development and innovation are the only way for small and medium-sized enterprises to survive in a fiercely competitive environment, so they focus on it, but interest and investment in technology protection tend to be stingy. As a result, industrial technology leakage accidents occur frequently, and it is difficult to meet improvement measures. When a leak occurs, digital evidence is required to prove criminal activity, but problems such as digital evidence being damaged or deleted due to management loopholes often occur. Therefore, through this study, we aim to design a digital evidence-based countermeasure depending on the type of technology leak accident. We will classify the types of technology leak incidents that actually occurred and study ways to secure digital evidence in the security environment of small and medium-sized businesses that operate internal information leak prevention solutions.

  • PDF

A Study of Detainees' Perceptions of the Detention Facilities of the Police Station and their Operation (경찰서 유치장 시설 및 운영에 관한 유치인의 인식연구)

  • Jung, Woo-Yeoul;Park, Dong-Kyun;Kim, Do-Kyun
    • Korean Security Journal
    • /
    • no.13
    • /
    • pp.423-449
    • /
    • 2007
  • This research is to investigate the detention facilities of police stations and their real operations through the perceptions of detainees at police station cells and to present the policy suggestions for them. To fulfill the research, a questionnaire was made out on the basis of 'the Regulation on Detention and Escort for Suspects'. 'the Regulation on a Standard Plan for Detention Facilities' and 'the Regulation on the Lowest Standard to Treat Detainees' ; and detainees at 23 police station cells under the jurisdiction of Kyungbuk Local Police Agency were asked to answer it. Policy suggestions following from the result of the investigation of detainees' perceptions of the detention facilities of the police stations are as follows; Firstly, the structure of police station cells should be arranged in straight lines in order to take their human rights into consideration and more detention facilities are needed to be built in order to separate male, female, handicapped and juvenile inmates. Secondly, shower rooms and washrooms outside the cells should always be open to detainees whenever they need to be used. Thirdly, any detention facilities deficient in fire fighting equipment should have exit doors installed as soon as possible in case of an emergency and provide sufficient fire extinguishers considering the number of detainees and the size of the facilities. Fourthly, the detention facilities should have sufficient windows for ventilation and take necessary measures to obtain natural lighting instead of electric lighting. Fifthly, air conditioners should be equipped properly taking account of the number of detainees and the dimensions of the facilities. Policy suggestions according to the result of the investigation of detainees' perceptions of the operation of detention facilities of police stations are as follows; Firstly, the problem of operating the detention facilities must deal with worn-out facilities and measures to secure the budget should be taken as soon as possible. Secondly, considering that most detained suspects have difficulties in livelihood, daily necessaries must be issued to them. Thirdly, personal belongings deposited by inmates must be properly managed with the same documentation throughout the police station detention facilities. The number of female guards to take exclusive charge of the physical checkups and processing of female detainees should be increased. Also the facilities for handicapped detainees must be expanded, improved and managed properly. Fourthly, except for handcuffs and ropes to bind detainees in the detention facilities, helmets to prevent self-harm must be withdrawn. The budget to improve the quality of meal issued by the government must be urgently secured and the price of private food sent to detainees must be readjusted to be in line with the consumer price. Health and medical care and sanitation for detainees must be substantial, and also sunbathing and outdoor exercises should be allowed to detainees.

  • PDF

"Legal Study on Boundary between Airspace and Outer Space" (영공(領空)과 우주공간(宇宙空間)의 한계(限界)에 관한 법적(法的) 고찰(考察))

  • Choi, Wan-Sik
    • The Korean Journal of Air & Space Law and Policy
    • /
    • v.2
    • /
    • pp.31-67
    • /
    • 1990
  • One of the first issues which arose in the evolution of air law was the determination of the vertical limits of airspace over private property. In 1959 the UN in its Ad Hoc Committee on the Peaceful Uses of Outer Space, started to give attention to the question of the meaning of the term "outer space". Discussions in the United Nations regarding the delimitation issue were often divided between those in favour of a functional approach ("functionalists"), and those seeking the delineation of a boundary ("spatialists"). The functionalists, backed initially by both major space powers, which viewed any boundary as possibly restricting their access to space(Whether for peaceful or military purposes), won the first rounds, starting with the 1959 Report of the Ad Hoc Committee on the Peaceful Uses of Outer Space which did not consider that the topic called for priority consideration. In 1966, however, the spatialists, were able to place the issue on the agenda of the Outer Sapce Committee pursuant to Resolution 2222 (xxx1). However, the spatialists were not able to present a common position since there existed a variety of propositions for delineation of a boundary. Over the years, the funtionalists have seemed to be losing ground. As the element of location is a decisive factor for the choice of the legal regime to be applied, a purely functional approach to the regulation of activities in the space above the Earth does not offer a solution. It is therefore to be welcomed that there is clear evidence of a growing recognition of the defect inherent to such an approach and that a spatial approach to the problem is gaining support both by a growing number of States as well as by publicists. The search for a solution of the problem of demarcating the two different legal regimes governing the space above the Earth has undoubtedly been facilitated, and a number of countries, among them Argentina, Belgium, France, Italy and Mexico have already advocated the acceptance of the lower boundary of outer space at a height of 100km. The adoption of the principle of sovereignty at that height does not mean that States would not be allowed to take protective measures against space activities above that height which constitute a threat to their security. A parallel can be drawn with the defence of the State's security on the high seas. Measures taken by States in their own protection on the high seas outside the territorial waters-provided that they are proportionate to the danger-are not considered to infringe the principle of international law. The most important issue in this context relates to the problem of a right of passage for space craft through foreign air space in order to reach outer space. In the reports to former ILA Conferences an explanation was given of the reasons why no customary rule of freedom of passage for aircraft through foreign territorial air space could as yet be said to exist. It was suggested, however, that though the essential elements for the creation of a rule of customary international law allowing such passage were still lacking, developments apperaed to point to a steady growth of a feeling of necessity for such a rule. A definite treaty solution of the demarcation problem would require further study which should be carried out by the UN Outer Space Committee in close co-operation with other interested international organizations, including ICAO. If a limit between air space and outer space were established, air space would automatically come under the regime of the Chicago Convention alone. The use of the word "recognize" in Art. I of chicago convention is an acknowledgement of sovereignty over airspace existing as a general principle of law, the binding force of which exists independently of the Convention. Further it is important to note that the Aricle recognizes this sovereignty, as existing for every state, holding it immaterial whether the state is or is not a contracting state. The functional criteria having been created by reference to either the nature of activity or the nature of the space object, the next hurdle would be to provide methods of verification. With regard to the question of international verification the establishment of an International Satelite Monitoring Agency is required. The path towards the successful delimitation of outer space from territorial space is doubtless narrow and stony but the establishment of a precise legal framework, consonant with the basic principles of international law, for the future activities of states in outer space will, it is still believed, remove a source of potentially dangerous conflicts between states, and furthermore afford some safeguard of the rights and interests of non-space powers which otherwise are likely to be eroded by incipient customs based on at present almost complete freedom of action of the space powers.

  • PDF

Efficient Utilization of Private Resources for the National Defense - Focused on maintenance, supply, transportation, training & education - (국방분야 민간자원의 효율적 활용방안 - 정비, 보급, 수송, 교육훈련분야를 중심으로 -)

  • Park, Kyun-Yong
    • Journal of National Security and Military Science
    • /
    • s.9
    • /
    • pp.313-340
    • /
    • 2011
  • The National Defense Reformation bill of "National Defense Reformation 2020" which have been constantly disputed and reformed by the government went through various levels of complementary measures after the North Korean sinking on the Republic of Korea (ROK) Naval Vessel "Cheonan". The final outcome of this reform is also known as the 307 Plan and this was announced on the 8th March. The reformed National Defense Reformation is to reduce the number of units and military personnel under the military structure reformation. However, in order for us to undertake successful National Defense Reformation, the use of privatized civilian resources are essential. Therefore according to this theory, the ROK Ministry of National Defense (MND) have selected the usage of privatized resources as one of the main core agenda for the National Defense Reformation management procedures, and under this agenda the MND plans to further expand the usage of private Especially the MND plans to minimize the personnel resources applied in non-combat areas and in turn use these supplemented personnel with optimization. In order to do this, the MND have initiated necessary appropriate analysis over the whole national defense section by understanding various projects and acquisition requests required by each militaries and civilian research institutions. However for efficient management of privatized civilian resources, first of all, those possible efficient private resources which can achieve optimization will need to be identified, and secondly continuous systematic reinforcements will need to be made in private resource usage legislations. Furthermore, we would need to consider the possibility of labor disputes because of privatization expansion. Therefore, full legal and systematic complementary measures are required in all possible issue arising areas which can affect the combat readiness posture. There is another problem of huge increase in operational expenses as reduction of standby forces are only reducing the number of soldiers and filling these numbers with more cost expensive commissioned officers. However, to overcome this problem, we would need to reduce the number of positions available for active officers and fill these positions with military reserve personnel who previously had working experiences with the related positions (thereby guaranteeing active officers re-employment after completing active service). This would in tum maintain the standards of combat readiness posture and reduce necessary financial budgets which may newly arise. The area of maintenance, supply, transportation, training & education duties which are highly efficient when using privatized resources, will need to be transformed from military management based to civilian management based system. For maintenance, this can be processed by integrating National Maintenance Support System. In order for us to undertake this procedure, we would need to develop maintenance units which are possible to be privatized and this will in turn reduce the military personnel executing job duties, improve service quality and prevent duplicate investments etc. For supply area, we will need to establish Integrated Military Logistics Center in-connection with national and civilian logistics system. This will in turn reduce the logistics time frame as well as required personnel and equipments. In terms of transportation, we will need to further expand the renting and leasing system. This will need to be executed by integrating the National Defense Transportation Information System which will in turn reduce the required personnel and financial budgets. Finally for training and education, retired military personnel can be employed as training instructors and at the military academy, further expansion in the number of civilian professors can be employed in-connection with National Defense Reformation. In other words, more active privatized civilian resources will need to be managed and used for National Defense Reformation.

  • PDF

A Study on improvement of traffic accident safety index for Uljugun, Ulsan (교통사고 안전지수 등급 향상방안 연구_울산광역시 울주군 중심으로)

  • Kim, Yong Moon;Kang, Seong Kyung;Lee, Young Jai
    • Journal of Korean Society of Disaster and Security
    • /
    • v.10 no.2
    • /
    • pp.7-19
    • /
    • 2017
  • Recently, the incidence of disasters and safety incidents is increasing rapidly, and the interest and demands of the people are increasing. In particular, traffic accidents in Korea are decreasing due to the continuous efforts of the government and the local governments, but still higher than the OECD average. In response to such demands of the times, the 'Regional Safety Index', a numerical value that quantifies the level of safety of each local government, is being publicized every year to awaken public awareness. The Regional Safety Index covers seven categories of accidents (traffic accidents, crimes, suicide, infectious diseases, fire, safety accidents, and natural disasters) in local governments. But, this study focuses on the traffic accident area and analyzed. The target local government is Ulju county of Ulsan Metropolitan City. Based on the traffic accident statistical data of Ulju county, the analysis of the traffic accidents and vulnerable points were analyzed. Among them, 3 key improvement districts were selected and 15 vulnerable branches were selected for each key improvement district. Next, we prepared measures for improvement of each accident vulnerable site through analysis of geographic information through traffic data related to traffic accidents and interview with related organizations. In addition, the improvement measures are divided into the structural infrastructure improvement, the institutional improvement, and the traffic safety culture movement from the viewpoint of traffic accident prevention. Finally, the implications of this study are to clarify the duties and roles of the relevant departments in the municipality, based on the implementation schedule of the improvement projects for the prevention of traffic accidents and the budget plan. In addition, it is very important that the participating agencies involved in traffic accidents and the private sector participate in the project.

A Study on the Change of Cyber Attacks in North Korea (북한의 사이버 공격 변화 양상에 대한 연구)

  • Chanyoung Park;Hyeonsik Kim
    • The Journal of the Convergence on Culture Technology
    • /
    • v.10 no.4
    • /
    • pp.175-181
    • /
    • 2024
  • The U.N. Security Council's North Korea Sanctions Committee estimated that the amount of North Korea's cyberattacks on virtual asset-related companies from 2017 to 2023 was about 4 trillion won. North Korea's cyberattacks have secured funds through cryptocurrency hacking as it has been restricted from securing foreign currency due to economic sanctions by the international community, and it also shows the form of technology theft against defense companies, and illegal assets are being used to maintain the Kim Jong-un regime and develop nuclear and missile development. When North Korea conducted its sixth nuclear test on September 3, 2017, and declared the completion of its national nuclear armament following the launch of an intercontinental ballistic missile on November 29 of the same year, the U.N. imposed sanctions on North Korea, which are considered the strongest economic sanctions in history. In these difficult economic situations, North Korea tried to overcome the crisis through cyberattacks, but as a result of analyzing the changes through the North's cyber attack cases, the strategic goal from the first period from 2009 to 2016 was to verify and show off North Korea's cyber capabilities through the neutralization of the national network and the takeover of information, and was seen as an intention to create social chaos in South Korea. When foreign currency earnings were limited due to sanctions against North Korea in 2016, the second stage seized virtual currency and secured funds to maintain the Kim Jong-un regime and advance nuclear and missile development. The third stage is a technology hacking of domestic and foreign defense companies, focusing on taking over key technologies to achieve the five strategic weapons tasks proposed by Chairman Kim Jong-un at the 8th Party Congress in 2021. At the national level, security measures for private companies as well as state agencies should be established against North Korea's cyberattacks, and measures for legal systems, technical problems, and budgets related to science are urgently needed. It is also necessary to establish a system and manpower to respond to the ever-developing cyberattacks by focusing on cultivating and securing professional manpower such as white hackers.