• Title/Summary/Keyword: Security Planning

Search Result 465, Processing Time 0.022 seconds

Smart-City Development Management: Goals and Instruments

  • KALENYUK, Iryna;TSYMBAL, Liudmyla;UNINETS, Iryna
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.1
    • /
    • pp.324-330
    • /
    • 2022
  • At the present stage of the world economic development, a new economic system is being formed, in which non-economic values, in particular environmental and social parameters, have become widespread. A new vision of economic activity is being formed, which acquires the qualities of Smart-economy. The purpose of this paper is reveal the features of managing the development of smart cities as specific entities of the Smart-economy. New functions of economic entities are formed within the framework of the Smart-economy concept, while their role and weight in the localities' activity or formation have changed. Determining that the key trends in the Smart-economy development are such as digitalization, greening, socialization, institutionalization, and urbanization, this is necessary to note that all these trends are most active in the formation of urban ecosystems. These trends are determined by the general population growth and the urban population growth, which requires considerable attention to planning each city's development itself. Such planning could ensure the comfort of living for all its inhabitants, quality, safe, and modern life. The Smart-city's key elements and the intellectualized approach implementation planes to the decision of these or those tasks are definedIt is determined that a new ecosystem of governance is being formed.

Difficulties in ERP integration in Umm Al Qura University: A Case Study

  • Abdullah A H Alzahrani
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.4
    • /
    • pp.35-43
    • /
    • 2024
  • The development and integration of Enterprise Resource Planning (ERP) systems have consistently attracted attention from software engineering researchers. Many studies have examined the factors that influence successful ERP integration, while others have focused on introducing integration models that address issues and challenges that affect the successful integration of ERP. However, it is crucial to recognize that the key player in successful integration is the individual involved. This paper aims to investigate how individuals based on departmental attachments and experiences have viewed the factors that affected the success of ERP integration. A case study was conducted at one large organization namely Umm Al Qura University, Saudi Arabia. Five departments were involved namely: Financial management, purchasing management, warehouse management, human resources management, and the Deanship of Information Technology. The results of 78 participants were collected and analyzed. Furthermore, it was different how individuals from different departments involved in the ERP integration viewed the factors that affected the success of integration. In addition, it was noticed that individuals with different experiences have various views on the factors. Moreover, it was evident that departmental attachments and individual experience might play a role in the successful integration of ERP.

A Study on the Improvement Plan for Enhancing Utilization of Defense Critical Technologies (국방 핵심기술 활용성 증대를 위한 개선 방안 연구)

  • Cho, Il-Ryun;Kim, Chan-Soo;Noh, Sang-Woo
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.19 no.6
    • /
    • pp.120-125
    • /
    • 2018
  • Various security threats, such as North Korea's nuclear tests and intercontinental ballistic missile developments, are becoming issues. Considering the current security situation in South Korea, proper selection of weapons and efficient defense acquisition systems are essential. In this paper, we conduct a survey and analysis of the defense core technology necessary for the development of weapons systems, and review whether current defense research and development is carried out efficiently. A theoretical study was conducted on ways to enhance the linkage between defense core technology and weapons systems development. As a result of the study, the necessity for development of weapons systems and the linking of defense core technology planning with the need for institutional improvement in enhanced utilization of defense core technology were derived. We propose a method for a long-term weapons systems concept plan that integrates defense core technology planning with forces planning and pre-project research programs to improve planning efficiency.

An Exploratory Study on the "Trust" Operational Scheme for Income Security and Asset Management for People with Developmental Disabilities in Adulthood (성인기 발달장애인의 소득보장과 재산관리를 위한 「신탁」 운영방안에 대한 탐색적 연구)

  • Kim, Seong-Cheon;Kang, Ji-Hyun
    • 재활복지
    • /
    • v.21 no.2
    • /
    • pp.29-62
    • /
    • 2017
  • The purpose of this study is to find out the main operational scheme of the "financial planning" and "the trust" for people with developmental disabilities as a means of property protecting and managing for them. The results are as follows; Regarding to "Financial planning", it is necessary to establish a measure to meet the financial needs for people with developmental disabilities in future plan; Issues to be taken care of in the point of financial planning include plan for the maintenance and use of property for their independent life; and public and private resources and support for the disabled. Obstacles are lack of national awareness of the financial planning for the disabled. In relation to the contents of the "trust" of people with developmental disabilities, the principles of operation are assuring universality, publicness, stability, self-decision making, and individuality; operating system is a mixture of public and private; subjects of target are people with developmental disabilities with no parents or caring family as well as income. The required support is a supervisory system for the secure management of asset to entrusted institutions; the decision support system for people with developmental disabilities; maintaining the qualification of government receipt of public assistance for those who do not redeem up to a certain amount of personal property utilizing the trust system.

Cyber KillChain Based Security Policy Utilizing Hash for Internet of Things (해시를 활용한 사이버킬체인 기반의 사물인터넷 보안 정책)

  • Jeong, So-Won;Choi, Yu-Rim;Lee, Il-Gu
    • Journal of Digital Convergence
    • /
    • v.16 no.9
    • /
    • pp.179-185
    • /
    • 2018
  • Technology of Internet of Things (IoT) which is receiving the spotlight recently as a new growth engine of Information Communications Technology (ICT) industry in the $4^{th}$ Industrial Revolution needs trustworthiness beyond simple technology of security. IoT devices should consider trustworthiness from planning and design of IoTs so that everyone who develop, evaluate and use the device can measure and trust its security. Increased number of IoTs and long lifetime result in the increased securituy vulnerability due to the difficulty of software patch and update. In this paper, we investigated security and scalability issues of current IoT devices through research of the technical, political and industrial trend of IoT. In order to overcome the limitations, we propose an automatic verification of software integrity utilizing and a political solution to apply cyber killchain based security mechanism using hash which is an element technology of blockchain to solve these problems.

Design Plan of Secure IoT System based Common Criteria (CC 기반의 안전한 IoT 시스템 설계 방안)

  • Kim, Ju-Hun;Jung, Hyun-Mi;Cho, Han-Jin
    • Journal of the Korea Convergence Society
    • /
    • v.8 no.10
    • /
    • pp.61-66
    • /
    • 2017
  • Recently, IoT technology is rapidly developing with the keyword "Anytime, Anywhere, Convenient". In addition, security problems in IoT systems are exploding and the damage is increasing as well. In this paper, we propose a method to develop IoT system safely by using internationally recognized CC evaluation in ICT by identifying the standardization and security technology development status defining IoT system security requirements. For this purpose, IoT system and service security aspects are analyzed. Based on this, it is possible to design the security functional requirements and to demonstrate the rationale of the security objective through the correspondence relation, and it is possible to design the protection profile for the IoT system. This is a sufficient basis for the development methodology to be presented in this paper because it is used as a means of referring to the set of security requirements of administrators, developers, and users.

Improvements of Legal System for Security Enhancement of Korean National Assembly' Attending System (국회 방청제도의 보안강화를 위한 법·제도 개선방안)

  • Choi, Kwan;Kim, Minchi
    • Convergence Security Journal
    • /
    • v.17 no.1
    • /
    • pp.81-88
    • /
    • 2017
  • The purpose of this study is to analyze any hinderance factors for successful attending system of Korean National Assembly and to provide improvement plans of legal systems to ensure security of National Assembly. First, the conceptualization and functions of Korean National Assembly attending system were discussed and related regulations and laws were also examined. Second, hinderance factors, such as sharp increase in 1) illegal behaviors, 2) bring in prohibited items, and 3) possibility of National Assembly terror, for successful attending systems were analysed. Third, improvements of legal system for security enhancement of National Assembly Attending System were discussed: 1) new legislation for providing National Assembly's security officers with special judicial police power is needed to deal with criminal behaviors and to protect human rights, and 2) legal reforms are required to provide right to command to National Assembly's Security Planning Office rather than National Assembly security office under Seoul Metropolitan Police Agency in order to unify commanding system.

A Study on the Characteristic Analysis of Housing Complex planning by Regional Characteristic (지역성을 고려한 주거단지계획의 특성분석을 위한 사래연구 -대구광역시 'U 대회 선수촌 단지'를 중심으로 -)

  • Seo Ji-Eun;Park Eui-Jeong
    • Journal of the Korean housing association
    • /
    • v.17 no.3
    • /
    • pp.31-40
    • /
    • 2006
  • The purpose of this study is to grasp the present state of a outdoor space planning and to analysis plan characteristics in based on regional characteristics in Housing complex plan. The analysis result of this study is as follows : first, we know that the right of regional characteristics is appearing variously every research workers. also an analysis about regional characteristics that should be considered in housing complex plan was insufficient. Second, regional characteristics can be classified into 5 factors. These are classified as a context of location, city link, life atmosphere, needs of locals and creation of image. Third, it has originality against other housing complex to graft items connected with 'U contest' on outdoor space planning. Also, it has affirmatively effected on image of Buk-gu and recognition of Dong beyn-dong and Seo beyn-dong. It is get out of the uniform design by a planning based on land and surrounding environment in arrangement and forms. Also residents have the satisfaction and pride in arrangement considering the climate of a region and security of the green space.

A Study on Priority Decision Method of Required Capability for North West Islands (서북도서에 대한 요구능력 우선순위 결정방법에 관한 연구)

  • Jang, Dong Mo;Lim, Gye Hwan
    • Convergence Security Journal
    • /
    • v.13 no.5
    • /
    • pp.45-56
    • /
    • 2013
  • In order to prepare against the unpredictable provocation of nK on NWI, instead of the threat based force enhancement, sufficient capability based force planning is required in consideration to enemy capability, operations environment, and technological development. This thesis proposes a method on how to prioritize the required capabilities of NWI during the process of identifying capabilities and investing on the decided acquisition assets. Ambiguity in deciding the priority is eliminated and detailed planning is possible through instituting relationship of organization, operation and capability, and by designating weight based on the above relationship. This method identify the various operations and required capabilities, classify the order of priority clearly for NWI, when compare to other method of priority decision. Although capability based force planning requires more assets and faces limitations due to budget, this method will provide and efficient decision making procedure through precise prioritization.

Impacts of Wind Power Integration on Generation Dispatch in Power Systems

  • Lyu, Jae-Kun;Heo, Jae-Haeng;Kim, Mun-Kyeom;Park, Jong-Keun
    • Journal of Electrical Engineering and Technology
    • /
    • v.8 no.3
    • /
    • pp.453-463
    • /
    • 2013
  • The probabilistic nature of renewable energy, especially wind energy, increases the needs for new forms of planning and operating with electrical power. This paper presents a novel approach for determining the short-term generation schedule for optimal operations of wind energy-integrated power systems. The proposed probabilistic security-constrained optimal power flow (P-SCOPF) considers dispatch, network, and security constraints in pre- and post-contingency states. The method considers two sources of uncertainty: power demand and wind speed. The power demand is assumed to follow a normal distribution, while the correlated wind speed is modeled by the Weibull distribution. A Monte Carlo simulation is used to choose input variables of power demand and wind speed from their probability distribution functions. Then, P-SCOPF can be applied to the input variables. This approach was tested on a modified IEEE 30-bus system with two wind farms. The results show that the proposed approach provides information on power system economics, security, and environmental parameters to enable better decision-making by system operators.