• Title/Summary/Keyword: Security Mechanisms

Search Result 393, Processing Time 0.029 seconds

The Effect of Alliance on Maritime Territorial Disputes: A Case of the Aegean Sea Dispute Between Greece and Türkiye (해양영토분쟁에서 동맹의 영향: 그리스와 튀르키예 에게해 분쟁 사례)

  • Hwang, Won-June
    • Maritime Security
    • /
    • v.6 no.1
    • /
    • pp.137-161
    • /
    • 2023
  • This paper explores the limited role of alliances in preventing maritime territorial disputes among member states, using the ongoing conflict between Greece and Türkiye, two NATO allies, as a case study. Drawing on Institutionalist theory, we seek to explain the mechanisms that have contributed to the failure of the alliance to prevent this dispute, despite constant cooperation and transparency. Unlike land disputes, maritime territorial disputes are complex and multi-layered, with fluid boundaries that can change with climate or natural resource availability. Moreover, the lack of constant surveillance creates ambiguity about territorial encroachment thresholds. These factors have exacerbated the dispute between Greece and Türkiye, drawing other NATO members into the conflict and undermining the strength of the alliance. This paper concludes by providing policy implications for the Republic of Korea in its own potential maritime disputes, and contributes to the broader literature on the role of alliances in preventing territorial disputes.

  • PDF

A Study on China's Intention to Switching to Shared Bike Platforms: Mechanisms of Trust and Distrust

  • Wenlong Lu;Yung Ho Suh;Sae Bom Lee
    • Journal of the Korea Society of Computer and Information
    • /
    • v.28 no.7
    • /
    • pp.179-187
    • /
    • 2023
  • Consumer trust plays a crucial role in the development of the sharing economy. This study primarily focuses on the factors influencing consumer trust and examines the case of ofo, a former leader in China's bike-sharing industry. This paper analyzes the decline in consumer trust in ofo, which can be attributed to internal management issues and the near-bankruptcy situation. The "difficulty in refunds" issue faced by ofo since December 2018 has been growing continuously, and this study explores the factors influencing trust and distrust in this context. By considering product factors (quality), platform factors (payment security, privacy protection, reputation), and social factors (social norms, government regulation) as independent variables, the study analyzes the factors affecting consumer trust. The analysis results revealed that as consumers' distrust towards shared bikes increases, their switching intention also increases. The company's reputation and social norms were found to influence both trust and distrust, while government regulation was found to influence trust. The research findings provide insights relevant to sharing economy platforms and offer guidance for future studies.

A Research Survey on the Characteristics of Burglaries: Focused on How to Utilize Private Security (침입절도 특성에 관한 조사연구: 민간경비 활용방안을 중심으로)

  • Kim, Dae-Kwon
    • Korean Security Journal
    • /
    • no.22
    • /
    • pp.15-35
    • /
    • 2010
  • A larceny means stealing others' properties, as one of crime types most closely connected with common people. Along with fraud, it is the mostly common property crime; in particular, the largest number of people are exposed to a burglary. This study aims to find the schemes to utilize private guards according to the characteristics of burglary. To do so, a questionnaire survey was conducted into an actual condition of official statistics of burglary and into the criminals of burglary, with a view to understanding the behavioral characteristics of burglary and suggesting defense mechanisms to prevent the crime. Burglary is not just a major crime to be dealt with by public guards like the police but also one to be handled increasingly more by private guards. It is why this study intends to identify how to utilize private guards in preventing the crime. Investigations were made into 208 burglars, who were inmates of 10 correctional institutions (prisons or detention houses) across the country. It is found that only about 24% of burglars committed the crime through rational choice, about 60.7% were feared of their arrest at the time of their crime, and a very high percentage (69.9%) of them were assured of their successful crime. Burglaries usually happened at night, mostly in a summer day when everybody goes away from home for vacation. Primarily, the crimes took place in a private house of urban residential quarters. What burglars considered mostly for target selection includes 'profitability,' followed by 'surveillance' and 'risk.' Most (42%) of them committed the crime for the first time ever. Generally, they were not inclined to commit the crime while under the influence of alcohol or drug, which might prevent them from making reasonable decisions. 73.9% of the criminals said that they committed the crime singly without any accomplices.

  • PDF

Counter-Piracy Cooperation to Strengthen New Southern Policy's "Peace": An Analysis of ROK and ASEAN's Counter-Piracy Practices (신남방정책의 "평화"를 강화하기 위한 해적행위 대응 협력: 한국과 아세안의 해적행위 대응 관행 분석)

  • Boo, Yerin;Kim, Sujin;Yeo, Mathew Jie Sheng
    • Maritime Security
    • /
    • v.3 no.1
    • /
    • pp.141-185
    • /
    • 2021
  • The growing U.S.-China rivalry has placed the countries of Southeast Asia in exceedingly precarious positions. The Republic of Korea (ROK) likewise has been tasked with the challenge of "navigating the waters" between deepening geopolitical divides. It is in this context that the "New Southern Policy" (hereafter NSP) has become a key word in Korea's foreign policy circles. Through NSP, ROK aims to diversify its economic and security interests by strengthening ties with its southern partners, focusing on three key areas (termed as the "3 Ps"): People, Prosperity, and Peace. At the same time, the NSP seeks cooperation with other key diplomatic agendas such as the U.S.'s "Free and Open Indo-Pacific," rendering it crucial for the overall stability of the region. Considering such strategic significance, deeper analysis of the policy is more timely than ever. A brief assessment of the policy's outcome so far, however, reveals that relatively, the "Peace" pillar has been insufficient in achieving satisfactory outcomes. Here, this paper asks the question of: 1) How can the "Peace" pillar of South Korea's New Southern Policy be strengthened? Based on an analysis on the causes of the "Peace" pillar's weakness, this paper identifies counter-piracy cooperation as a solution. This paper then proceeds to answer the next question of: 2) How can ROK and ASEAN cooperate on counter-piracy, and how can these efforts be integrated into ROK's NSP? To answer the above question, this paper conducts in-depth case studies on ASEAN's and ROK's approaches to counter-piracy and identifies specific mechanisms of cooperation. In Chapter I, the paper begins with an overview of the NSP's strategic significance and an evaluation of its "Peace" pillar. Chapter II conducts a literature review on the causes of, and prescriptions for, the weakness of the "Peace" pillar. The paper then justifies why counter-piracy may be a solution. Chapter III examines ASEAN's and ROK's approaches to counter-piracy. By analyzing the general framework and each region's cases, the paper displays the strengths and weaknesses of each region's piracy responses. Based on this analysis, Chapter IV suggests ways to incorporate counter-piracy cooperation into the "Peace" pillar of the NSP. This research bears significance in that it identifies a specific area of cooperation (counter-piracy) to strengthen the "Peace" pillar of ROK's NSP. Such identification is based on a comprehensive study into the two parties' past and current experience in counter-piracy, making it contextual in nature. Furthermore, the study suggests practical mechanisms of cooperation, and considers ways of incorporation into the existing framework of NSP. This approach differs from existing literature that failed to generate case-specific, policy-oriented solutions. The COVID-19 pandemic has exacerbated piracy issues and deepened geopolitical divides. Turbulent seas such as these call for careful navigation. When it comes to promoting "peace," the key lies in combating the pirates that sail those very waters.

  • PDF

Data Mining Approaches for DDoS Attack Detection (분산 서비스거부 공격 탐지를 위한 데이터 마이닝 기법)

  • Kim, Mi-Hui;Na, Hyun-Jung;Chae, Ki-Joon;Bang, Hyo-Chan;Na, Jung-Chan
    • Journal of KIISE:Information Networking
    • /
    • v.32 no.3
    • /
    • pp.279-290
    • /
    • 2005
  • Recently, as the serious damage caused by DDoS attacks increases, the rapid detection and the proper response mechanisms are urgent. However, existing security mechanisms do not effectively defend against these attacks, or the defense capability of some mechanisms is only limited to specific DDoS attacks. In this paper, we propose a detection architecture against DDoS attack using data mining technology that can classify the latest types of DDoS attack, and can detect the modification of existing attacks as well as the novel attacks. This architecture consists of a Misuse Detection Module modeling to classify the existing attacks, and an Anomaly Detection Module modeling to detect the novel attacks. And it utilizes the off-line generated models in order to detect the DDoS attack using the real-time traffic. We gathered the NetFlow data generated at an access router of our network in order to model the real network traffic and test it. The NetFlow provides the useful flow-based statistical information without tremendous preprocessing. Also, we mounted the well-known DDoS attack tools to gather the attack traffic. And then, our experimental results show that our approach can provide the outstanding performance against existing attacks, and provide the possibility of detection against the novel attack.

Homeland Security Management: A Critical Review of Civil Protection Mechanism in Korea (국가안전관리: 한국의 시민보호(위기재난관리) 체계에 관한 비판적 고찰)

  • Kim, Hak-Kyong
    • Korean Security Journal
    • /
    • no.26
    • /
    • pp.121-144
    • /
    • 2011
  • The Framework Act on the Management of Disasters and Safety 2004(FAMDS) currently underpins Korean civil protection system, and under this FAMDS, Korean civil protection establishes a three-tiered government structure for dealing with crises and disasters: central government, provincial & metropolitan government, and local government tiers. In particular, the concept of Integrated Emergency Management(IEM) emphasizes that emergency response organizations should work and act together to respond to crises and disasters effectively, based on the coordination and cooperation model, not the command and control model. In tune with this trend, civil protection matters are, first, dealt with by local responders at the local level without direct involvement of central or federal government in the UK or USA. In other words, central government intervention is usually implemented in the UK and the USA, only when the scale or complexity of a civil protection issue is so vast, and thus requires a degree of central government coordination and support, resting on the severity and impact of the event. In contrast, it appears that civil protection mechanism in Korea has adopted a rigid centralized system within the command and control model, and for this reason, central government can easily interfere with regional or local command and control arrangements; there is a high level of central government decision-making remote from a local area. The principle of subsidiarity tends to be ignored. Under these circumstances, it is questionable whether such top-down arrangements of civil protection in Korea can manage uncertainty, unfamiliarity and unexpectedness in the age of Risk Society and Post-modern society, where interactive complexity is increasingly growing. In this context, the study argues that Korean civil protection system should move towards the decentralized model, based on coordination and cooperation between responding organizations, loosening the command and control structure, as with the UK or the USA emergency management arrangements. For this argument, the study basically explores mechanisms of civil protection arrangements in Korea under current legislation, and then finally attempts to make theoretical suggestions for the future of the Korean civil protection system.

  • PDF

Medical Information Dynamic Access System in Smart Mobile Environments (스마트 모바일 환경에서 의료정보 동적접근 시스템)

  • Jeong, Chang Won;Kim, Woo Hong;Yoon, Kwon Ha;Joo, Su Chong
    • Journal of Internet Computing and Services
    • /
    • v.16 no.1
    • /
    • pp.47-55
    • /
    • 2015
  • Recently, the environment of a hospital information system is a trend to combine various SMART technologies. Accordingly, various smart devices, such as a smart phone, Tablet PC is utilized in the medical information system. Also, these environments consist of various applications executing on heterogeneous sensors, devices, systems and networks. In these hospital information system environment, applying a security service by traditional access control method cause a problems. Most of the existing security system uses the access control list structure. It is only permitted access defined by an access control matrix such as client name, service object method name. The major problem with the static approach cannot quickly adapt to changed situations. Hence, we needs to new security mechanisms which provides more flexible and can be easily adapted to various environments with very different security requirements. In addition, for addressing the changing of service medical treatment of the patient, the researching is needed. In this paper, we suggest a dynamic approach to medical information systems in smart mobile environments. We focus on how to access medical information systems according to dynamic access control methods based on the existence of the hospital's information system environments. The physical environments consist of a mobile x-ray imaging devices, dedicated mobile/general smart devices, PACS, EMR server and authorization server. The software environment was developed based on the .Net Framework for synchronization and monitoring services based on mobile X-ray imaging equipment Windows7 OS. And dedicated a smart device application, we implemented a dynamic access services through JSP and Java SDK is based on the Android OS. PACS and mobile X-ray image devices in hospital, medical information between the dedicated smart devices are based on the DICOM medical image standard information. In addition, EMR information is based on H7. In order to providing dynamic access control service, we classify the context of the patients according to conditions of bio-information such as oxygen saturation, heart rate, BP and body temperature etc. It shows event trace diagrams which divided into two parts like general situation, emergency situation. And, we designed the dynamic approach of the medical care information by authentication method. The authentication Information are contained ID/PWD, the roles, position and working hours, emergency certification codes for emergency patients. General situations of dynamic access control method may have access to medical information by the value of the authentication information. In the case of an emergency, was to have access to medical information by an emergency code, without the authentication information. And, we constructed the medical information integration database scheme that is consist medical information, patient, medical staff and medical image information according to medical information standards.y Finally, we show the usefulness of the dynamic access application service based on the smart devices for execution results of the proposed system according to patient contexts such as general and emergency situation. Especially, the proposed systems are providing effective medical information services with smart devices in emergency situation by dynamic access control methods. As results, we expect the proposed systems to be useful for u-hospital information systems and services.

What Can Koreans Learn from the Dutch Experiences in Reforming the Health Insurance System? (한국의료보험제도(韓國醫療保險制度)의 개혁필요성(改革必要性)과 네덜란드의 경험(經驗)이 주는 교훈(敎訓))

  • Kwon, Soon-won;Sunwoo, Duk
    • KDI Journal of Economic Policy
    • /
    • v.12 no.3
    • /
    • pp.47-69
    • /
    • 1990
  • The measures taken to reform the Dutch health insurance system hold valuable lessons for countries such as Korea, where there has been increased concern regarding the efficiency and effectiveness of the health services provided. The growing literature on comparative health insurance policies suggests that nations can learn from each other. In addition, Korean policymakers have shown great interest in the health insurance systems of foreign countries, particularly in Japan. The development of Korea's health insurance scheme during the past 12 years has made a significant contribution to the increased accessibility of health care services. Although the insurance coverage is universal, the health insurance system today in Korea is by no means a product of systematic and planned efforts. Moreover, it lacks due considerations of insured's needs as well as the long-term objectives of the social security health care system. There are growing gaps in premium burdens and benefits between the rural health insurance program and the employee's health insurance programs. Furthermore, the regional health insurance program is experiencing financial difficulties in spite of the fact that the amount of the government subsidy has been sharply increased in recent years. Under the present payment method solely based on the fee-for-service schedule, both consumers and providers are encouraged to utilize and prescribe more services. The combination of the utilization-inducing reimbursement system and continuous pushes for expanding health insurance has played a crucial role in raising the country's medical bills. Current trends in Korea's health care sector and those anticipated in the near future necessitate changes in the structure and funding of health care. As indicated in the above, there are various shortcomings in this context, the health policy authority in Korea can draw valuable lessons from the Dutch experiences in reforming their health insurance system. The main elements of the Dutch reform measures are a restructuring of the insurance system and a greater role for market forces in the health care system. On this basis a new system will be created which reflects the social nature of health care while at the same time containing sufficient mechanisms to allow the health care sector to operate in a cost-effective and efficient manner.

  • PDF

Humic Acid Confers HIGH-AFFINITY K+ TRANSPORTER 1-Mediated Salinity Stress Tolerance in Arabidopsis

  • Khaleda, Laila;Park, Hee Jin;Yun, Dae-Jin;Jeon, Jong-Rok;Kim, Min Gab;Cha, Joon-Yung;Kim, Woe-Yeon
    • Molecules and Cells
    • /
    • v.40 no.12
    • /
    • pp.966-975
    • /
    • 2017
  • Excessive salt disrupts intracellular ion homeostasis and inhibits plant growth, which poses a serious threat to global food security. Plants have adapted various strategies to survive in unfavorable saline soil conditions. Here, we show that humic acid (HA) is a good soil amendment that can be used to help overcome salinity stress because it markedly reduces the adverse effects of salinity on Arabidopsis thaliana seedlings. To identify the molecular mechanisms of HA-induced salt stress tolerance in Arabidopsis, we examined possible roles of a sodium influx transporter HIGH-AFFINITY $K^+$ TRANSPORTER 1 (HKT1). Salt-induced root growth inhibition in HKT1 overexpressor transgenic plants (HKT1-OX) was rescued by application of HA, but not in wild-type and other plants. Moreover, salt-induced degradation of HKT1 protein was blocked by HA treatment. In addition, the application of HA to HKT1-OX seedlings led to increased distribution of $Na^+$ in roots up to the elongation zone and caused the reabsorption of $Na^+$ by xylem and parenchyma cells. Both the influx of the secondary messenger calcium and its cytosolic release appear to function in the destabilization of HKT1 protein under salt stress. Taken together, these results suggest that HA could be applied to the field to enhance plant growth and salt stress tolerance via post-transcriptional control of the HKT1 transporter gene under saline conditions.

Physiology, genomics and molecular approaches for lmproving abiotic stress tolerance in rice and impacts on poor farmers

  • Ismail, Abdelbagi M.;Kumar, Arivnd;Singh, R.K.;Dixit, Shalabh;Henry, Amelia;Singh, Uma S.
    • Proceedings of the Korean Society of Crop Science Conference
    • /
    • 2017.06a
    • /
    • pp.7-7
    • /
    • 2017
  • Unfavorable weather and soil conditions reduce rice yield and land and water productivity, aggravating existing encounters of poverty and food insecurity. These conditions are foreseen to worsen with climate change and with the unceasing irrational human practices that progressively debilitate productivity despite global appeals for more food. Our understanding of plant responses to abiotic stresses is advancing and is complex, involving numerous critical processes - each controlled by several genetic factors. Knowledge of the physiological and molecular mechanisms involved in signaling, response and adaptation, and in some cases the genes involved, is advancing. Moreover, the genetic diversity being unveiled within cultivated rice and its wild relatives is providing ample resources for trait and gene discovery, and this is being scouted for rice improvement using modern genomics and molecular tools. Development of stress tolerant varieties is now being fast-tracked through the use of DNA markers and advanced breeding strategies. Large numbers of drought, submergence and salt tolerant varieties were commercialized over recent years in South and Southeast Asia and more recently in Africa. These varieties are making significant changes in less favorable areas, transforming lives of smallholder farmers - progress considered incredulous in the past. The stress tolerant varieties are providing assurance to farmers to invest in better management of their crops and the ability to adjust their cropping systems for even higher productivity and more income, sparking changes analogous to that of the first green revolution, which previously benefited only favorable irrigated and rainfed areas. New breeding tools using markers for multiple stresses made it possible to develop more resilient, higher yielding varieties to replace the aging and obsolete varieties still dominating these areas. Varieties with multiple stress tolerances are now becoming available, providing even better security for farmers and lessening their production risks even in areas affected by complex and overlapping stresses. The progress made in these less favorable areas triggered numerous favorable changes at the national and regional levels in several countries in Asia, including adjusting breeding and dissemination strategies to accelerate outreach and enabling changes at higher policy levels, creating a positive environment for faster progress. Exploiting the potential of these less productive areas for food production is inevitable, to meet the escalating global needs for more food and sustained production systems, at times when national resources are shrinking while demand for food is mounting. However, the success in these areas requires concerted efforts to make use of existing genetic resources for crop improvement and establishing effective evaluation networks, seed production systems, and seed delivery systems to ensure faster outreach and transformation.

  • PDF