• 제목/요약/키워드: Security Practice

검색결과 374건 처리시간 0.025초

An Approach for Security Problems in Visual Surveillance Systems by Combining Multiple Sensors and Obstacle Detection

  • Teng, Zhu;Liu, Feng;Zhang, Baopeng;Kang, Dong-Joong
    • Journal of Electrical Engineering and Technology
    • /
    • 제10권3호
    • /
    • pp.1284-1292
    • /
    • 2015
  • As visual surveillance systems become more and more common in human lives, approaches based on these systems to solve security problems in practice are boosted, especially in railway applications. In this paper, we first propose a robust snag detection algorithm and then present a railway security system by using a combination of multiple sensors and the vision based snag detection algorithm. The system aims safety at several repeatedly occurred situations including slope protection, inspection of the falling-object from bridges, and the detection of snags and foreign objects on the rail. Experiments demonstrate that the snag detection is relatively robust and the system could guarantee the security of the railway through these real-time protections and detections.

생존성을 위한 소프트웨어 재활기법의 모델 (A Model of Software Rejuvenation for Survivability)

  • 킨 미미 아웅;박종서
    • 한국정보처리학회:학술대회논문집
    • /
    • 한국정보처리학회 2003년도 춘계학술발표논문집 (하)
    • /
    • pp.1965-1968
    • /
    • 2003
  • The importance of Security measures by means of Physical Security, Network Security and Online/Internet Security. Lack of security is one of the primary obstacles in fielding many technologies in both commercial and DoD networks. Moreover, Internet censorship may be growing and is becoming increasingly sophisticated. In this paper, we will evaluate the Practice to Policy to Theory Approach for survivability by means of software rejuvenation models. These models would be assessed the effectiveness of proactive fault management in operational software systems and determined optimal times to perform rejuvenation.

  • PDF

A Study on the Factors Affecting the Establishment of Personal Information Management Systems (PIMS)

  • Seo, Young-Soo;Lee, Seong-Il;Hwang, K.T.
    • Journal of Information Technology Applications and Management
    • /
    • 제19권3호
    • /
    • pp.31-47
    • /
    • 2012
  • As the dependence on information is increasing, the protection of personal information (PI) becomes a critical issue for the organizations, causing not only financial loss but also negative impacts on corporate images and reputations. To date, academic research in this area is scarce. This study analyzes the factors affecting the establishment and/or implementation of Personal Information Management System (PIMS) and provides direction for the practice. In this study, we assume that PIMS is one of the new technology adopted by organizations, and Unified Theory of Acceptance and Use of Technology (UTAUT) model is selected as a base model for the study. Using structural equation modeling technique, both measurement and structural models are validated, and hypotheses are tested. Major findings of the study include (1) the major driver of the organizations attempting to adopt PIMS seems to be the improvement of the business outcomes, (2) organizational capability and resource are important in the establishment of PIMS, and (3) the perceived difficulty of the establishment of PIMS is not affecting the intention to adopt PIMS. Since the importance of personal information security is high, establishment of PIMS is becoming one of the critical issues in the organizations. The establishment of PIMS should be encouraged to strengthen the competitiveness of businesses and to enhance the security level of the entire nation. It is expected that this study may contribute to developing plans and policies for establishment of PIMS in practice, and to providing a foundation for further research in this area.

식품보장의 개념과 측정 (The Concept and Measurement of Food Security)

  • 김기랑;김미경;신영전
    • Journal of Preventive Medicine and Public Health
    • /
    • 제41권6호
    • /
    • pp.387-396
    • /
    • 2008
  • Objectives : During the past two decades, food deprivation and hunger have been recognized to be not just the concerns of only underdeveloped or developing countries, but as problems for many affluent Western nations as well Many countries have made numerous efforts to define and measure the extent of these problems. Based on these efforts, the theory and practice of food security studies has significantly evolved during the last decades. Thus, this study aims to provide a comprehensive review of the concept and measurement of food security Methods and results : In this review, we introduce the definition and background of food security, we describe the impact of food insecurity on nutrition and health, we provide its measurements and operational instruments and we discuss its applications and implications. Some practical information for the use of the food security index in South Korea is also presented. Conclusions : Food security is an essential element in achieving a good nutritional and health status and it has an influence to reduce poverty The information about the current understanding of food security can help scientists, policy makers and program practitioners conduct research and maintain outreach programs that address the issues of poverty and the promotion of food security.

Digital Tourism Security System for Nepal

  • Shrestha, Deepanjal;Wenan, Tan;Khadka, Adesh;Jeong, Seung Ryul
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제14권11호
    • /
    • pp.4331-4354
    • /
    • 2020
  • Nepal is a sensitive and disaster-prone country where safety and security risk are of high concern for travelers. Digital technologies can play a vital role in addressing safety and security issues in the country. This research work proposes a Digital tourism security system design for addressing the safety and security issues in tourism industry of Nepal. The study uses Design science research methodology to identify artifacts, interactions, information flow and dependencies between them which are then mapped with existing prevalent technology to provide design solutions. Data is obtained from interview of tourist and experts as a primary source and technical documents/draft, software documentations, surveys as secondary source. Generalized information model, Use cases model, Network architecture model, Layered taxonomy model and Digital tourism technology reference model are the outcomes of the study. The work is very important as it talks specifically about implementation and integration of digital technologies in tourism security governance at federal, provincial, municipal and rural level. The research supplements as a knowledge document for design and implementation of digital tourism security system in practice. As there is very less work on digital systems in tourism security of Nepal, this work is a pioneer and first of its kind.

장애인의 건강관심도, 건강실천행위 그리고 건강수준간의 구조분석 (Structural Relationships among Health Concern, Health Practice and Health Status of the Disabled)

  • 천병렬;감신;예민해;강윤식;김건엽;손재희;이영숙;박기수
    • Journal of Preventive Medicine and Public Health
    • /
    • 제32권3호
    • /
    • pp.276-288
    • /
    • 1999
  • Objectives: This study was performed to determine the relationships among health concern, health practice and health status of the disabled. Methods: A self-administered questionnaire survey was carried out for 1,662 disabled persons in Taegu city from April to July, 1997. Results: Health concern had a significant and positive relationship with health practice(p<0.05) and health practice also had a significant and positive relationship with self-rated health status(p<0.05) in men and women. To determine the structural model of the Health concern, health practice, health status and sociodemographic variables, the covariance structural analysis was used. In men, age, economic status, medical security type, educational level and type of disability had significant direct effects on Health concern(T>2.0). Educational level and type of disability had significant direct effects on health practice(T>2.0). And Economic status, medical security type and job status had significant direct effects on health status(T>2.0). In women, economic status and educational level had significant direct effects on Health concern(T>2.0). However there was no variable which had a significant direct effect on health practice. Job status had a significant direct effect or health status(T>2.0). In men and women, health practice was significantly increased with increasing health concern and the more health practice, the higher health status(T>2.0). Conclusions: It is recommended that the institutional approach which improve the economic status of the disabled with understanding their behavior and attitude should be established to increase health status, in addition, the health policy for encouraging the disabled, such as health education, consulting and health promotion program, should be done.

  • PDF

The Effect of Security Information Sharing and Disruptive Technology on Patient Dissatisfaction in Saudi Health Care Services During Covid-19 Pandemic

  • Beyari, Hasan;Hejazi, Mohammed;Alrusaini, Othman
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제16권10호
    • /
    • pp.3313-3332
    • /
    • 2022
  • This study is an investigation into the factors affecting patient dissatisfaction among Saudi hospitals. The selected factors considered for analysis are security of information sharing, operational practices, disruptive technologies, and the ease of use of EHR patient information management systems. From the literature review section, it was clear that hardly any other studies have embraced these concepts in one as was intended by this study. The theories that the study heavily draws from are the service dominant logic and the feature integration theory. The study surveyed 350 respondents from three large major hospitals in three different metropolitan cities in the Kingdom of Saudi Arabia. This sample came from members of the three hospitals that were willing to participate in the study. The number 350 represents those that successfully completed the online questionnaire or the limited physical questionnaires in time. The study employed the structural equation modelling technique to analyze the associations. Findings suggested that security of information sharing had a significant direct effect on patient satisfaction. Operational practice positively mediated the effect of security of information sharing on patient dissatisfaction. However, ease of use failed to significant impact this association. The study concluded that to improve patient satisfaction, Saudi hospitals must work on their systems to reinforce them against the active threats on the privacy of patients' data by leveraging disruptive technology. They should also improve their operational practices by embracing quality management techniques relevant to the healthcare sector.

기업의 정보보안 투자에 시장이 어떻게 반응하는지에 대한 탐색적 연구 (How does the Stock Market Reacts to Information Security Investment of Firms in Korea : An Exploratory Study)

  • 박재영;정우진;김범수
    • 한국IT서비스학회지
    • /
    • 제17권1호
    • /
    • pp.33-45
    • /
    • 2018
  • Recently, many South Korean firms have suffered financial losses and damaged corporate images from the data breaches. Accordingly, a firm should manage their IT assets securely through an information security investment. However, the difficulty of measuring the return on an information security investment is one of the critical obstacles for firms in making such investment decisions. There have been a number of studies on the effect of IT investment so far, but there are few researches on information security investment. In this paper, based on a sample of 76 investment announcements of firms whose stocks are publicly traded in the South Korea's stock market between 2001 and 2017, we examines the market reaction to information security investment by using event study methodology. The results of the main effects indicate that self-developed is significantly related to cumulative average abnormal returns (CAARs), while no significant effect was observed for discloser, investment characteristics and firm characteristics. In addition, we find that the market reacts more favorably to the news announced by the subject of investment than the vendor, in case of investments with commercial exploitation. One of main contributions in our study is that it has revealed the factors affecting the market reaction to announcement of information security investment. It is also expected that, in practice, corporate executives will be able to help make an information security investment decision.

사이버보안 전문인력 획득을 위한 사이버보안 훈련생에 특화된 훈련성과 측정 모델에 관한 연구 (A Study on the Model of Training Performance Measurement Specialized to Cyber Security Trainee for Cyber Security Professionals Acquisition)

  • 김기훈;엄정호
    • 디지털산업정보학회논문지
    • /
    • 제12권4호
    • /
    • pp.59-69
    • /
    • 2016
  • We proposed a specialized model of performance measurement to measure the training performance of the trainees in cyber practical training. Cyber security professionals are cultivating their expertise, skills, and competencies through cyber practical training in specialized education and training institutions. The our proposed process of trainee evaluation is consisted of an evaluation component discovery, evaluation item selection, evaluation index catalog, ratings and criteria decision, and calculation formula. The trainee evaluation is consisted of a formative evaluation during the training and an overall evaluation after finished training. Formative evaluation includes progress evaluation and participation evaluation, and overall evaluation includes practice evaluation and learning evaluation. The evaluation is weighted according to the importance of evaluation type. Because it is evaluated actual skills and abilities, competencies are assigned a high weight, while knowledge and attitudes are assigned a low weight. If cyber security trainees are evaluated by the proposed evaluation model, cyber security professionals can be cultivated by each skill and knowledge level and can be deployed by importance of security task.

환각성 약물범죄와 경호안전상의 대응방안 (Measures against Security Safety and Hallucinogenic Drug Crimes)

  • 전경수
    • 시큐리티연구
    • /
    • 제2호
    • /
    • pp.211-226
    • /
    • 1999
  • Troublesome problems are being caused by hallucinogenic drugs which come not only from illegal narcotics but also from unprohibited general drug-kinds such as cough-remedy agents of textromerupan, namely, Lamina, Rubi-king and the likes. Abuse and misuse of narcotics permeated into and threatens mental health of socially-known peoples, actor, actress, talents and businessmen as well. This study especially dealt with problems related with Mesampetamin, Rurajaepam, Texstrometropan and Karisofrodol which affects mental behaviour, and considered counter-measures through analysis and developed appropriate system of goods circulation for guidance to be complied by the medicine professionalists. The guidance sought here is recommended to the government ministries for further enforcement of crack-down of the drug crimes. Arquesa in method is recommend as a method of identifying behaviors and facial expressions of abusers and misusers of narcotics at the spot in place. This study is directed to curtailing hallucinogenic drugs use for absolute preventive security by detecting out black dealers of narcotics supplying to the abusers and misusers. There is a need of special education program to cut off the flow of narcotics or drugs crimes into official security force as well as private security personnel. This study introduced a priority and emphasis of real augmentation to theory and practice of the modern scientific security which can protect the mental health of the guarded persons as well especially in the light of security safety curriculum at the school.

  • PDF