• Title/Summary/Keyword: Security Strategies

Search Result 620, Processing Time 0.027 seconds

An Analysis of Impacts of Climate Change on Rice Damage Occurrence by Insect Pests and Disease (기후변화가 벼 병해충 피해면적 발생에 미치는 영향분석)

  • Jeong, Hak-Kyun;Kim, Chang-Gil;Moon, Dong-Hyun
    • Korean Journal of Environmental Agriculture
    • /
    • v.33 no.1
    • /
    • pp.52-56
    • /
    • 2014
  • BACKGROUND: It is known that impacts of climate change on damage occurrence by insect pests and diseases are increasing. The negative effects of climate change on production will threaten our food security. It is needed that on the basis of analysis of the impacts, proper strategies in response to climate change are developed. METHODS AND RESULTS: The objective of this paper is to estimate impacts of climate change on rice damage occurrence by insect pests and diseases, using the panal model which analyzes both cross-section data and time series data. The result of an analysis on impacts of climate change on rice damage occurrence by pest insect and disease showed that the damage occurrence by Rice leaf roller and Rice water weevil increased if temperature increased, and damage occurrence by Stripe, Sheath blight, and Leaf Blast increased if precipitation(or amount of sunshine) increased(or decreased). CONCLUSION: Adaptation strategies, supplying weather forecasting information by region, developing systematical strategies for prevention of damage occurrence by pest insect and disease, analyzing the factors of damage occurrence by unexpected pest insect and disease, enforcing international cooperation for prevention of damage occurrence are needed to minimize the impacts of damage occurrence on rice production.

Service Distribution Strategy Development for MICE in Nakhon Si Thammarat Province, Thailand

  • Pannapa KHIAWNOI;Sor sirichai NAKUDOM
    • Journal of Distribution Science
    • /
    • v.22 no.2
    • /
    • pp.63-69
    • /
    • 2024
  • Purpose: This study analyses the Service Development Strategy for MICE in Nakhon Si Thammarat Province, Thailand aim to 1) Investigate the current and desirable conditions of the service businesses in order to support the MICE 2) Undertake a SWOT analysis of service businesses with regard to supporting the MICE 3) Analyze service business distribution strategies development to support the MICE in Nakhon Si Thammarat Province. Research design, data and methodology: This study divided into 2 phases: Phase 1 involved qualitative research to study the process of service businesses in their support of the MICE. Phase 2 involved research and development with regard to the development of innovative service business development strategies to support the MICE. Results: The article showed that company executives and related parties understand the meaning of service business management to support the MICE to consist of 8 indicators: quality of meeting venues, access to meeting venues, meeting infrastructure, government support, additional activities in addition to meetings, the image and reputation of the city, MICE personnel, and security. Conclusions: Strategies for developing service business innovations to support the MICE consist of a proactive strategy, a preventive strategy, and a remedial strategy together with defensive strategies.

Bayesian Game Theoretic Model for Evasive AI Malware Detection in IoT

  • Jun-Won Ho
    • International journal of advanced smart convergence
    • /
    • v.13 no.3
    • /
    • pp.41-47
    • /
    • 2024
  • In this paper, we deal with a game theoretic problem to explore interactions between evasive Artificial Intelligence (AI) malware and detectors in Internet of Things (IoT). Evasive AI malware is defined as malware having capability of eluding detection by exploiting artificial intelligence such as machine learning and deep leaning. Detectors are defined as IoT devices participating in detection of evasive AI malware in IoT. They can be separated into two groups such that one group of detectors can be armed with detection capability powered by AI, the other group cannot be armed with it. Evasive AI malware can take three strategies of Non-attack, Non-AI attack, AI attack. To cope with these strategies of evasive AI malware, detector can adopt three strategies of Non-defense, Non-AI defense, AI defense. We formulate a Bayesian game theoretic model with these strategies employed by evasive AI malware and detector. We derive pure strategy Bayesian Nash Equilibria in a single stage game from the formulated Bayesian game theoretic model. Our devised work is useful in the sense that it can be used as a basic game theoretic model for developing AI malware detection schemes.

A Study on Secure Data Access Control in Mobile Cloud Environment (모바일 클라우드 환경에서 안전한 데이터 접근 제어에 관한 연구)

  • Kim, Si-Jung;Yeo, Sang-Soo
    • Journal of Digital Convergence
    • /
    • v.11 no.2
    • /
    • pp.317-322
    • /
    • 2013
  • Mobile cloud environment is recently becoming popular due to Internet access through various environments. Driven by computer performance improvement and service development, the demand for mobile cloud is increasing and accordingly the damage is on the rise. Therefore, it needs to conduct a study on problems of security necessary in large database that occurs in mobile cloud services. Although various security solutions limiting database access, security strategies about new user environments should be analyzed. This study analyzes weakness of safe data access through database management in mobile cloud environment and examines security requirements for safe data management. In addition, this study looks into threatening factors of security in cloud services and then draws security requirements about safer access control. A study on system application and evaluation of security requirements about access control is required.

An Vulnerability Analysis and Countermeasures for Security in Outdoor Risk Management System based on IoT Technology

  • Jee, Sung-Hyun
    • Journal of the Korea Society of Computer and Information
    • /
    • v.25 no.7
    • /
    • pp.85-92
    • /
    • 2020
  • Following the development of Internet of Things (IoT) technology, the scope of application of IoT technology is expanding to industrial safety areas that detect and prevent possible risks in outdoor environments in advance, away from improving the convenience of living in indoor environments. Although this expansion of IoT service provides many advantages, it also causes security problems such as data leakage and modulation, so research on security response strategies is being actively carried out. In this paper, the IoT-based road construction risk management system in outdoor environment is proposed as a research subject. As a result of investigating the security vulnerabilities of the low-power wide-area (LPWA, BLE) communication protocol applied to the research targets, the security vulnerabilities were identified in terms of confidentiality, integrity, and availability, which are the three major elements of information security, and countermeasures for each vulnerability were proposed. This study is meaningful in investigating and analyzing possible vulnerabilities in the operation of the IoT-based risk management system and proposing practical security guidelines for each vulnerability.

Developing the Assessment Method for Information Security Levels (정보보호 수준평가 방법 개선에 관한 연구)

  • Oh, Nam-Seok;Han, Young-Soon;Eom, Chan-Wang;Oh, Kyeong-Seok;Lee, Bong-Gyou
    • The Journal of Society for e-Business Studies
    • /
    • v.16 no.2
    • /
    • pp.159-169
    • /
    • 2011
  • In order for agencies and companies at the IT service industry to check as well as to upgrade the current status of their information security programs, this paper suggests the assessment method for information security levels. The study developed 12 assessment fields and 54 assessment items derived from domestic and foreign cases including SP800-26, SP800-53, ISMS, and ISO27001. It categorized 54 assessment items into 5 levels for determining information security levels. Also, the study presents 7 strategies for performing their efficient evaluations. The proposed method and process in this paper can be useful guidelines for improving the national information security level.

A Study on Establishing of the Future Development Strategy for National Cyber Terror Response (국가 사이버테러대응 미래 발전전략 수립에 관한 연구)

  • Kim, MinSu;Yang, Jeongmo
    • Convergence Security Journal
    • /
    • v.20 no.1
    • /
    • pp.15-24
    • /
    • 2020
  • Cyber terror and cyberwarfare are no longer virtual, but real, and as an actual security situation, it is necessary to have new understanding through expanding the concept of war to neutralize not only the other country's military command system, but also the country's main functions such as telecommunications, energy, finance, and transport systems, and it also needs to establish the future development strategy of cyber terror response at the national level. Through analysis of cyberwarfare trends in each country and current status of cyberwarfare in Korea, it will systematically explore the demand of new policy based on laws and systems, including the strategies of cyber security technology development, industry promotion, and manpower training and existing information protection policies. through this, it effectively manages a sustainable national crisis, and it suggests to establish a future strategy for the medium and long term cyber security that can effectively and actively respond to cyberwarfare.

Analysis of trends in information security using LDA topic modeling

  • Se Young Yuk;Hyun-Jong Cha;Ah Reum Kang
    • Journal of the Korea Society of Computer and Information
    • /
    • v.29 no.7
    • /
    • pp.99-107
    • /
    • 2024
  • In an environment where computer-related technologies are rapidly changing, cyber threats continue to emerge as they are advanced and diversified along with new technologies. Therefore, in this study, we would like to collect security-related news articles, conduct LDA topic modeling, and examine trends. To that end, news articles from January 2020 to August 2023 were collected and major topics were derived through LDA analysis. After that, the flow by topic was grasped and the main origin was analyzed. The analysis results show that ransomware attacks in 2021 and hacking of virtual asset exchanges in 2023 are major issues in the recent security sector. This allows you to check trends in security issues and see what research should be focused on in the future. It is also expected to be able to recognize the latest threats and support appropriate response strategies, contributing to the development of effective security measures.

The Strategy and Prospects of CPTED for Sustainable Urban Development (지속 가능한(Sustainable) 도시발전을 위한 방범환경설계(CPTED)의 전략과 향후 과제)

  • Park, Hyeon-Ho;Kim, Young-Jea
    • Korean Security Journal
    • /
    • no.17
    • /
    • pp.173-193
    • /
    • 2008
  • This paper discusses how the strategies for crime prevention are interrelated to sustainable urban development. The sustainable urban development for healthy and safe cities implies regulations or legal, lawful control to reduce fear of crime and prevent substantial threats to health and safety of individual persons as well as of the community. City planners attempt to apply to the strategies for crime prevention their perception of what the sustainable urban development should be with respect to urban environment. Many planners have studied on the possibility of reduction in fear of crime and actual crimes through environmental improvement. The results of their preliminary studies provide specific suggestions to reduce crimes and fear of crime by application of CPTED. This study proposes alternatives in policy necessary for CPTED, which is one of the strategies for crime prevention, to take its place as a useful strategy for making the urban societies safe and sustainable.

  • PDF

Information and Analytical Support of Anti-Corruption Policy

  • Novak, Anatolii;Bashtannyk, Vitalii;Parkhomenko-Kutsevil, Oksana;Kuybida, Vasyl;Kobyzhcha, Nataliia
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.3
    • /
    • pp.134-140
    • /
    • 2021
  • The development of technology speeds up the process of obtaining information and its analysis to track the level of corruption in different countries and develop countermeasures. This study examines the role of information and analytical support of anti-corruption policy as a tool for government accountability and analysis, evaluation, combating corruption in Eastern Europe. The purpose of the article is to identify the components of the information-analytical system that help reduce the level of corruption. The research methodology is based on a qualitative content analysis of the functioning of information and analytical systems of Ukraine used by anti-corruption bodies. A quantitative analysis of the CPI score was conducted, according to Transparency International, to identify the effectiveness of anti-corruption policies in developing countries. The results show similar trends in countries developing on the effect of the use of information and analytical systems in the implementation of anti-corruption policies, strategies and measures. The strategy to combat corruption mainly involves increasing the independence and powers of anti-corruption bodies. Therefore, the development of information and analytical support is aimed at automating the processes of pre-trial investigations and criminal proceedings, information protection. As a tool for accountability, information and analytical systems may be ineffective due to the abuse of power by higher anti-corruption bodies due to political pressure from elite structures. Restrictions on political will are a major problem for the effectiveness of anti-corruption policies.