• Title/Summary/Keyword: Security Strategies

Search Result 620, Processing Time 0.024 seconds

The Strategies of the Acquisition and Use of Scientific and Technological Information of the Former USSR (구소련(舊蘇聯) 과학기술(科學技術) 정보의 수집 및 활용전략(活用戰略))

  • Kwack, Dong-Chul
    • Journal of Information Management
    • /
    • v.24 no.2
    • /
    • pp.1-18
    • /
    • 1993
  • It is just two years that our country drived forward the project acquiring and using the scientific and technological information of the former USSR. The activities acquiring information are necessary to stir up the scientific and technological cooperation with the former USSR. But it is impossible for any man or institution to accomplish the activities acquiring the scientific and technological information of the former USSR, on the whole, considering political and economic confusion, perfect security policy, and 6,000 research institutes in the former USSR and so on. Thus the support of specialists and budgets should be realized in the national level, along with taking a proper step on mutual cooperation between the related institutions.

  • PDF

Integrated Management Systems - Theoretical and Practical Implications

  • Eriksson, Henrik;Hansson, Jonas
    • International Journal of Quality Innovation
    • /
    • v.7 no.2
    • /
    • pp.69-82
    • /
    • 2006
  • Organisations worldwide strive to develop their management systems for business functions, ranging from quality and environment to safety, information security and social responsibility. During the latest decade a considerable amount of these efforts has been concentrated on introducing and applying standards such as the ISO 9001 and ISO 14001. The need for Integrated Management Systems (IMS) often arises as a result of decisions to implement Environmental Management System (EMS) and/or an occupational health and safety management system in addition to a Quality Management System (QMS). At the end of 2003, approximately 3200 organisations in Sweden had an ISO 9001 certificate, and approximately 3400 organisations had a certificate based on an EMS. Dealing with separate management systems and ensuring that they align with the organisation's strategies and goals, has proved difficult. Owing to the large number of organisations certified according to multiple types of systems, an increasing number of organisations are establishing IMS. There are examples of companies, which chose to integrate EMS and QMS into a co-ordinated implementation approach, and although sparse, the research within this area indicates potential benefits of using an integrated approach. This paper presents both a theoretical and an empirical investigation with the aim to elucidate problems related to the integration of management systems. Furthermore, the paper will present recommendations for succeeding in such integrations and, hence, contributing to an increased understanding on how IMSs should be designed and implemented.

A Study on the Preservation Policy for Maintaining the Integrity of Digital Contents (디지털 콘텐츠의 무결성 유지를 위한 장기적인 보존 정책에 관한 연구)

  • Jung, Young-Mi;Yoon, Hwa-Mook;Kim, Jeong-Taek
    • Journal of Information Management
    • /
    • v.41 no.4
    • /
    • pp.205-226
    • /
    • 2010
  • Assuring that the integrity of digital contents is reliably maintained is an important component of long-term digital preservation. The purpose of this study was to examine and analysis the best practices of digital preservation policy and provide the basis theory for establishing a preservation policy for maintaining the integrity of digital contents. In order to achieve the purpose of the study, we examined the digital archiving practices for maintaining the integrity of digital contents. Especially, we focused on the storage media and file formats, the media and format conversion, disaster prevention and recovery, management and handling, inspection and monitoring, and security policies.

Optimization of Destroyer Deployment for Effectively Detecting an SLBM based on a Two-Person Zero-Sum Game (2인 제로섬 게임 기반의 효과적인 SLBM 탐지를 위한 구축함 배치 최적화)

  • Lee, Jinho
    • Journal of the Korea Society for Simulation
    • /
    • v.27 no.1
    • /
    • pp.39-49
    • /
    • 2018
  • An SLBM (submarine-launched ballistic missile) seriously threatens the national security due to its stealthiness that makes it difficult to detect in advance. We consider a destroyer deployment optimization problem for effectively detecting an SLBM. An optimization model is based on the two-person zero-sum game in which an adversary determines the firing and arriving places with an appropriate trajectory that provides a low detection probability, and we establish a destroyer deployment plan that guarantees the possibly highest detection probability. The proposed two-person zero-sum game model can be solved with the corresponding linear programming model, and we perform computational studies with a randomly generated area and scenario and show the optimal mixed strategies for both the players in the game.

The Relationship Between Financial Literacy and Public Awareness on Combating the Threat of Cybercrime in Malaysia

  • ISA, Mohd Yaziz Bin Mohd;IBRAHIM, Wan Nora Binti Wan;MOHAMED, Zulkifflee
    • The Journal of Industrial Distribution & Business
    • /
    • v.12 no.12
    • /
    • pp.1-10
    • /
    • 2021
  • Purpose: Cyber criminals have affected various markets and the banking system has encountered various kinds of cyberattacks. The purpose of this study is to analyze cybercrime that is an emerging threat and investigate the significant contribution of financial literacy and public awareness on cybercrimes. To understand the security issues and the need for corrective steps, the techniques and strategies used by cyber fraudsters in obtaining unauthorized access and use the financial information for purpose of fraud need to be understood. Research design, data and methodology: A sample of 123 banks employees from 12 commercial banks in Malaysia was surveyed. This study differs from previous studies as it surveyed the employees' awareness, and this approach fills in the gap in existing literature. Results: The financial literacy and public awareness have positive impact on organizational performance effectiveness to combat threat of cybercrime. Some recommendations are also proposed from research findings, for banking industry and government regulations. Conclusion: The present study focuses on banking sector so its findings cannot be generalized to other sectors. Linking these topics has created a new study in combating threat of cybercrimes generally, and specifically in Malaysia. The present study enhances the understanding of customers' role to combat the impact of cybercrimes on performances of banking industry.

Strategy Design to Protect Personal Information on Fake News based on Bigdata and Artificial Intelligence

  • Kang, Jangmook;Lee, Sangwon
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.11 no.2
    • /
    • pp.59-66
    • /
    • 2019
  • The emergence of new IT technologies and convergence industries, such as artificial intelligence, bigdata and the Internet of Things, is another chance for South Korea, which has established itself as one of the world's top IT powerhouses. On the other hand, however, privacy concerns that may arise in the process of using such technologies raise the task of harmonizing the development of new industries and the protection of personal information at the same time. In response, the government clearly presented the criteria for deidentifiable measures of personal information and the scope of use of deidentifiable information needed to ensure that bigdata can be safely utilized within the framework of the current Personal Information Protection Act. It strives to promote corporate investment and industrial development by removing them and to ensure that the protection of the people's personal information and human rights is not neglected. This study discusses the strategy of deidentifying personal information protection based on the analysis of fake news. Using the strategies derived from this study, it is assumed that deidentification information that is appropriate for deidentification measures is not personal information and can therefore be used for analysis of big data. By doing so, deidentification information can be safely utilized and managed through administrative and technical safeguards to prevent re-identification, considering the possibility of re-identification due to technology development and data growth.

Bayesian Rules Based Optimal Defense Strategies for Clustered WSNs

  • Zhou, Weiwei;Yu, Bin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.12
    • /
    • pp.5819-5840
    • /
    • 2018
  • Considering the topology of hierarchical tree structure, each cluster in WSNs is faced with various attacks launched by malicious nodes, which include network eavesdropping, channel interference and data tampering. The existing intrusion detection algorithm does not take into consideration the resource constraints of cluster heads and sensor nodes. Due to application requirements, sensor nodes in WSNs are deployed with approximately uncorrelated security weights. In our study, a novel and versatile intrusion detection system (IDS) for the optimal defense strategy is primarily introduced. Given the flexibility that wireless communication provides, it is unreasonable to expect malicious nodes will demonstrate a fixed behavior over time. Instead, malicious nodes can dynamically update the attack strategy in response to the IDS in each game stage. Thus, a multi-stage intrusion detection game (MIDG) based on Bayesian rules is proposed. In order to formulate the solution of MIDG, an in-depth analysis on the Bayesian equilibrium is performed iteratively. Depending on the MIDG theoretical analysis, the optimal behaviors of rational attackers and defenders are derived and calculated accurately. The numerical experimental results validate the effectiveness and robustness of the proposed scheme.

Intelligent Piracy Site Detection Technique with High Accuracy

  • Kim, Eui-Jin;Kwak, Jin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.1
    • /
    • pp.285-301
    • /
    • 2021
  • Recently, with the diversification of media services and the development of smart devices, users have more opportunities to use digital content, such as movies, dramas, and music; consequently, the size of the copyright market expands simultaneously. However, there are piracy sites that generate revenue by illegal use of copyrighted works. This has led to losses for copyright holders, and the scale of copyrighted works infringed due to the ever-increasing number of piracy sites has increased. To prevent this, government agencies respond to copyright infringement by monitoring piracy sites using online monitoring and countermeasure strategies for infringement. However, the detection and blocking process consumes a significant amount of time when compared to the rate of generating new piracy sites. Hence, online monitoring is less effective. Additionally, given that piracy sites are sophisticated and refined in the same way as legitimate sites, it is necessary to accurately distinguish and block a site that is involved in copyright infringement. Therefore, in this study, we analyze features of piracy sites and based on this analysis, we propose an intelligent detection technique for piracy sites that automatically classifies and detects whether a site is involved in infringement.

Overview and Prospects of Patient Centered-Smart Hospitals (환자중심 스마트병원의 개요와 전망)

  • Park, Hyunyoung;Cho, Yong Jin
    • Journal of Digital Convergence
    • /
    • v.19 no.7
    • /
    • pp.419-426
    • /
    • 2021
  • With the development of the information and communication technology, the smart hospital has become a new trend in a healthcare industry. This study reviewed the concept, key technologies, applications, and future challenges of a smart hospital, and the user-centered strategies for designing a smart hospital. In smart hospitals, digitally enabled clinical staff will be able to produce better patient outcomes by delivering a more integrated patient-centered care with an efficient manner in connected facilities systems. However, to promote a successful patient-centered smart hospital environment in the future, various obstacles regarding cost, technology, security, and standards should be overcome. It is also necessary for patients and medical personnel to be involved as service users.

The Study on the Efficiency of Smart Learning in the COVID-19

  • Kim, Seong-Kyu;Lee, Mi-Jung;Jang, Eun-Sill;Lee, Young-Eun
    • Journal of Multimedia Information System
    • /
    • v.9 no.1
    • /
    • pp.51-60
    • /
    • 2022
  • This paper raised the need to examine how the online education environment triggered by COVID-19 and the smart learning environment can be established in consideration of the improvement of education and learning through learning analysis. Many studies are being conducted in Korea, and the Ministry of Education is continuously striving to build a smart school by promoting strategies for promoting smart education on the way to a talent powerhouse. Nevertheless, there is no unified definition of smart learning, and it can be seen as customized (individualized) learning using smart devices. However, most of the discussions on the construction of smart schools so far have limitations in that they are limited to physical spaces. Accordingly, the opinions of teachers and learners were not sufficiently reflected in the establishment of the facility. This study intends to study smart learning in various departments. In addition, the subjects students in charge of the co-researcher of this study were analyzed. The total number of subjects was 951, and 434 responded to this study survey. In addition, students were well accepting the online environment, and in the future, regardless of COVID-19, research will be presented to improve mutual communication between professors and students in smart learning.