• Title/Summary/Keyword: Security Regulation

Search Result 317, Processing Time 0.022 seconds

Chemical signalling within the rumen microbiome

  • Katie Lawther;Fernanda Godoy Santos;Linda B Oyama;Sharon A Huws
    • Animal Bioscience
    • /
    • v.37 no.2_spc
    • /
    • pp.337-345
    • /
    • 2024
  • Ruminants possess a specialized four-compartment forestomach, consisting of the reticulum, rumen, omasum, and abomasum. The rumen, the primary fermentative chamber, harbours a dynamic ecosystem comprising bacteria, protozoa, fungi, archaea, and bacteriophages. These microorganisms engage in diverse ecological interactions within the rumen microbiome, primarily benefiting the host animal by deriving energy from plant material breakdown. These interactions encompass symbiosis, such as mutualism and commensalism, as well as parasitism, predation, and competition. These ecological interactions are dependent on many factors, including the production of diverse molecules, such as those involved in quorum sensing (QS). QS is a density-dependent signalling mechanism involving the release of autoinducer (AIs) compounds, when cell density increases AIs bind to receptors causing the altered expression of certain genes. These AIs are classified as mainly being N-acyl-homoserine lactones (AHL; commonly used by Gram-negative bacteria) or autoinducer-2 based systems (AI-2; used by Gram-positive and Gram-negative bacteria); although other less common AI systems exist. Most of our understanding of QS at a gene-level comes from pure culture in vitro studies using bacterial pathogens, with much being unknown on a commensal bacterial and ecosystem level, especially in the context of the rumen microbiome. A small number of studies have explored QS in the rumen using 'omic' technologies, revealing a prevalence of AI-2 QS systems among rumen bacteria. Nevertheless, the implications of these signalling systems on gene regulation, rumen ecology, and ruminant characteristics are largely uncharted territory. Metatranscriptome data tracking the colonization of perennial ryegrass by rumen microbes suggest that these chemicals may influence transitions in bacterial diversity during colonization. The likelihood of undiscovered chemicals within the rumen microbial arsenal is high, with the identified chemicals representing only the tip of the iceberg. A comprehensive grasp of rumen microbial chemical signalling is crucial for addressing the challenges of food security and climate targets.

A Methodology for Integrating Security into the Automotive Development Process (자동차 개발 프로세스에서의 보안 내재화 방법론)

  • Jeong, Seungyeon;Kang, Sooyoung;Kim, Seungjoo
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.9 no.12
    • /
    • pp.387-402
    • /
    • 2020
  • Conventional automotive development has mainly focused on ensuring correctness and safety and security has been relatively neglected. However, as the number of automotive hacking cases has increased due to the increased Internet connectivity of automobiles, international organizations such as the United Nations Economic Commission for Europe(UNECE) are preparing cybersecurity regulations to ensure security for automotive development. As with other IT products, automotive cybersecurity regulation also emphasize the concept of "Security by Design", which considers security from the beginning of development. In particular, since automotive development has a long lifecycle and complex supply chain, it is very difficult to change the architecture after development, and thus Security by Design is much more important than existing IT products. The problem, however, is that no specific methodology for Security by Design has been proposed on automotive development process. This paper, therefore, proposes a specific methodology for Security by Design on Automotive development. Through this methodology, automotive manufacturers can simultaneously consider aspects of functional safety, and security in automotive development process, and will also be able to respond to the upcoming certification of UNECE automotive cybersecurity regulations.

Factors Affecting the Security Ability of Port Logistics Organization Members (항만물류조직구성원들의 보안능력에 영향을 미치는 요인)

  • Kang, Da-Yeon
    • Journal of Navigation and Port Research
    • /
    • v.43 no.3
    • /
    • pp.179-185
    • /
    • 2019
  • Currently, despite having active movements related to port logistics security, there is lack of awareness, education, and security systems related to port technology. Before implementing port logistics security, a mutual authentication agreement should be reached through the establishment of an integrated network that can share port logistics security information in real time. In order to achieve port competitiveness and strengthen logistics service, establishment of national strategy for logistics security is necessary. However, there is an urgent need to raise the security consciousness among the port logistics organization members and enhance the information security ability which is a crucial feature of the port logistics organization. Therefore, the objective of this study is to analyze the factors affecting the information security capacity of port logistics organization members. Even though the analysis rejected the hypothesis that security regulations affect security awareness, the security activities and security awareness were significantly correlated. It also has a positive impact on the relationship between security norms and security abilities, and security awareness and security abilities.

The Improvement of Security Certification System for Smart Car (스마트 자동차 보안 인증제도 개선방안)

  • Soon Beom Kwon;Seon Yeong Choi;Hwan Soo Lee
    • Journal of Information Technology Services
    • /
    • v.22 no.3
    • /
    • pp.49-63
    • /
    • 2023
  • The inclusion of software and wireless communication devices in vehicles has raised concerns regarding automobile security. In its response, UNECE WP.29 implemented the first-ever international standard for automotive cyber security in June 2020. Yet, the existing disparity between national standards for automotive certification systems and 「UN Regulation No. 155」 has caused confusion among auto makers. This discrepancy not only jeopardizes the security of domestic vehicles but also poses challenges to the seamless import and export of automobiles. Hence, there is a need to enhance the automotive cyber security certification system; however, there is a dearth of scholarly discourse on this topic. Consequently, this study presents a proposal for enhancing the domestic automotive cyber security certification system. In view of this, existing legal frameworks such as the 「Motor Vehicle Management Act」 and the 「Self-Driving Vehicle Act」 were reviewed, along with domestic and international automotive certification systems. The recommendations for improvement, derived from the findings, encompass institutional, legal, and operational aspects. This study is highly significant as it examines both domestic and international automotive certification systems in an area where there is a lack of academic discussion.

Insights from the Compulsory Licensing and the Approved Contractor Scheme of the UK Private Security (영국의 민간경비 의무적 자격증 및 인증계약자 제도에 관한 연구)

  • Lee, Seong-Ki;Kim, Hak-Kyong
    • Korean Security Journal
    • /
    • no.30
    • /
    • pp.85-115
    • /
    • 2012
  • The private security industry has expanded in proportion to economic developments throughout the world, largely because the existing security services provided by the government do not satisfy demands of various economic entities and people in the society for better security service. Therefore, it would not be unfair to say that security services by private sectors are decided by its quality, price, and customers' needs. A refined management system, however, is essential to assess qualification of security companies and their service quality, given the nature of public goods of security service. Despite the steady growth of private security industry in Korea, however, it has been continuously criticized that its security management system for better qualification of security guards, training, and private security companies have not been fully updated enough to guarantee good quality. This paper aims to gain insights to effective policy formation in the Korean private security industry, through reviewing the licensing system of private security guards and the Approved Contractor Scheme (hereinafter the ACS) in the UK- that has on one hand systematically regulated private security industry, but on other hand has enforced public-private cooperation by laying significant stress on autonomy of private security companies. The distinctive characteristic of the UK policy for the private security is that the Security Industry Authority (hereinafter the SIA), an independent authority, is leading development of the private security industry of the UK through specialized private security regulation and enhanced service quality. In addition, the UK is developing quality of security service with transparent financial management and recruitment of good quality security guards by adopting not only substantially specified regulations and standards, but the voluntary ACS system. Moreover, the SIA analyzes customers' demands for security service specializing the policy for private security through conducting a variety of surveys. With the analysis of the UK private security system, this paper suggests that the Korean government change from a non-specialized private security regulation system by the National Police Agency to an independently specialized private security authority like the SIA and adopt the compulsory licensing and the ACS system of the UK.

  • PDF

A Study on the Digital Material Disposal Order System (디지털자료 파기 명령 집행절차에 대한 연구)

  • Kim, Tae-Sung;Lee, Sang-Jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.27 no.4
    • /
    • pp.863-872
    • /
    • 2017
  • Digital material transferred to the court for litigation shall be disposed by the procedure in the court records management regulations and the digital material collected by the investigator in order to prove the suspect's allegation shall be disposed by the Supreme Public Prosecutor's Regulation No.876(digital material's regulation of collection, examine and management). the court ordered the disposal of digital material that is the subject of litigation based on the related laws when criminal lawsuits and civil lawsuits are finalized. however, there is no specific procedure to enforce the disposal order of the court, and the enforcement order stipulates that the enforcement agent is not a professional officer who has proven expertise but a related public official. there is a problem in the enforcement of digital material that the court ordered to disposal because it is not specified. therefore, this is paper proposes a procedure for effectively enforcing the court's order to revoke digital material.

The Influences of the Important Perception on Food Hygiene to Kitchen Employee's Performance in Hotel Banquet (호텔 연회 주방 종사원의 식품위생 중요도 인식이 수행도에 미치는 영향)

  • Kim, Ju-Myong;Kim, Auk-Ran;Jun, Heo
    • Culinary science and hospitality research
    • /
    • v.13 no.1 s.32
    • /
    • pp.75-86
    • /
    • 2007
  • This study was carried out to find out the effect of food hygiene awareness on kitchen employees' performance in the banquet cuisine of five-star hotels in Seoul. 279 kitchen employees were asked to fill out the questionnaire, and the collected data were analyzed by SPSS package(version 11.0). First, results of analysis on food hygiene showed that there were four factors, each respectively named as, food security regulations, food storage, period of circulation of food, and food safekeeping. Second, after analyzing each item in whole according to each of the factors, the average degree of priority on food hygiene in general was 4.52. Results according to each of the elements showed that food security regulations(4.56) and period of circulation of food(4.55) were considered as a priority. After analyzing the difference between the degree of priority and degree of performance according to each of the factors, it was found out that the latter was significantly lower than the former in all factors. Third, after analyzing the difference of food hygiene priority in accordance with general characteristics, statistically significant difference was only shown in education(F=3.308, p<0.05) and class(F=4.418, p<0.01). Fourth, after analyzing the difference of food hygiene performance in accordance with general characteristics, the only significant difference was found in food security regulation of education(F=4.418, p<0.01) and food security regulation of class(F=3.859, p<0.01). Fifth, after analyzing the effect of cook's awareness of priority on food hygiene on the degree of performance, it was found out that the awareness of priority on food hygiene had a positive effect(+) on the degree of performance. Therefore, we can conclude that as kitchen employees recognize the priority on the food hygiene better, their degree of performance was higher.

  • PDF

A Study on Cloud Computing for Financial Sector limited to Processing System of Non-Critical Information: Policy Suggestion based on US and UK's approach (비중요 정보처리시스템으로 한정된 국내 금융권 클라우드 시장 활성화를 위한 제안: 영미 사례를 중심으로)

  • Do, Hye-Ji;Kim, In-Seok
    • The Journal of Society for e-Business Studies
    • /
    • v.22 no.4
    • /
    • pp.39-51
    • /
    • 2017
  • In October 2016, the NFSA (National Financial Supervisory Authorities) revised the network separation clause of the Regulation on Supervision of Electronic Financial Activities in order to promote the Cloud Computing implementation in the financial sectors. The new regulation, however, limits the Cloud Computing usage to non-critical information and its processing system. Financial institutions that provide customer data analysis and personalized services based on personal data regard current revision as unchanged as before. The implementation of Cloud Computing has greatly contributed to cost reduction, business innovation and is an essential requirement in ever-changing information communication technology environment. To guarantee both security and reliability of the implementation of the Cloud Computing in financial sectors, a considerable amount of research and debate needs to be done. This paper examines current Cloud Computing policies in the Korean financial sector and the challenges associated with it. Finally, the paper identifies policy suggestions based on both European Union and United States' approach as they have successfully introduced Cloud Computing Services for their financial sectors.

The role and policy direction of food science and technology for food security of korea (식량안보를 위한 식품과학기술의 역할과 정책방향)

  • Lee, Cherl-Ho
    • Food Science and Industry
    • /
    • v.49 no.4
    • /
    • pp.3-18
    • /
    • 2016
  • The status of Korean food security was analyzed by considering world food situation and food self-sufficiency of Korea, and the hurdles to be solved by science and technology were highlighted. The role of food science and technology in preparing for future food crisis was reviewed in four categories: application of modern biotechnology to increase food production, use of irradiation technology for food storage, food processing technology for rice utilization in particular, and improving food safety regulation system for waste reduction.

GDPR Compliant Blockchain Based Access Control(GCBAC) (GDPR 준수 가능한 블록체인 기반 접근제어 시스템)

  • Lim, Joon Ho;Chun, Ji Young;Noh, Geontae;Jeong, Ik Rae
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.6
    • /
    • pp.981-997
    • /
    • 2020
  • Blockchain technology can provide a high level security based on a decentralized distributed ledger and consensus-based structure. In order to increase the utilization of blockchain technology, it is necessary to find a way to use it in fields that require personal data processing such as health care and e-commerce. To achieve this goal, the blockchain based system should be able to comply with data privacy regulations represented by European Union(EU)'s GDPR(General Data Protection Regulation). However, because of the properties of the blockchain like the immutability and decentralized recorded data, it is difficult to technically implement the requirements of the existing privacy regulations on the blockchain. In this paper, we propose a multi-chain based access control system that can guarantee the rights of the personal data subject required by GDPR by utilizing Chameleon Hash and Attribute Based Encryption (ABE). Finally, we will show through security analysis that our system can handle personal data while maintaining confidentiality and integrity.