• Title/Summary/Keyword: Security and Safety

Search Result 2,168, Processing Time 0.025 seconds

A Study on the Maritime Police Authority of Korea Coast Guard on the High Seas of International Law (국제법상 공해에서의 우리나라 해양경찰권에 관한 연구)

  • Son, Yeong-Tae
    • The Journal of the Korea Contents Association
    • /
    • v.19 no.2
    • /
    • pp.121-134
    • /
    • 2019
  • The areas be affected maritime police authority of the Republic of Korea, are largely classified as inland waters, territorial waters, exclusive economic zone and continental shelf(hereinafter referred to as "domestic sea area") and high seas. Of these, the maritime police authority in domestic sea area follows a municipal law that accommodates the United Nations Convention on the Law of the Sea(UNCLOS). In addition, this Convention shall apply on the high seas. Meanwhile, on the high seas, foreign vessels other than domestic vessels are allowed to be subject to limited jurisdiction only for the anti-mankind criminal acts, such as piracy etc. this is in accordance with the principle of "Freedom of the high seas" and "maritime flag state," under this Convention. However, the illegal acts of foreign vessels that threaten the security of coastal states and the safety of ships on the high seas can cause many types of crimes other than anti-mankind criminal acts, and the jurisdiction of the coastal states exercised may lead to conflicts between countries. Therefore, this article would like to suggest a plan for institutional improvement to maintain international maritime order on the high seas and secure maritime police authority in coastal states.

Intrusion Situation Classification Model for Intelligent Intrusion Awareness (지능적인 침입 인지를 위한 침입 상황 분류 모델)

  • Hwang, Yoon-Cheol;Mun, Hyung-Jin
    • Journal of Convergence for Information Technology
    • /
    • v.9 no.3
    • /
    • pp.134-139
    • /
    • 2019
  • As the development of modern society progresses rapidly, the technologies of society as a whole are progressing and becoming more advanced. Especially in the field of security, more sophisticated and intelligent attacks are being created. Meanwhile, damaging situations are becoming several times larger than before Therefore, it is necessary to re-classify and enhance the existing classification system. It is required to minimize the intrusion damage by actively responding to intelligent intrusions by applying this classification scheme to currently operating intrusion detection systems. In this paper, we analyze the intrusion type caused by intelligent attack We propose a new classification scheme for intrusion situations to guarantee the service safety, reliability, and availability of the target system, We use this classification model to lay the foundations for the design and implementation of a smart intrusion cognitive system capable of early detection of intrusion, the damages caused by intrusion, and more collections active response.

Proposal of Safe PIN Input Method on VR (VR 상에서의 안전한 PIN 입력 방법 제안)

  • Kim, Hyun-jun;Kwon, Hyeok-dong;Kwon, Yong-bin;Seo, Hwa-jeong
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.23 no.5
    • /
    • pp.622-629
    • /
    • 2019
  • VR(Virtual Reality), which provides realistic services in virtual reality, provides a similar experience using a Head Mounted Display(HMD) device. When the HMD device is worn, it can not recognize the surrounding environment and it is easy to analyze the input pattern of the user with the Shoulder Surfing Attack(SSA) when entering the Personal Identification Number(PIN). In this paper, we propose a method to safeguard the user's password even if the hacker analyzes the input pattern while maintaining the user's convenience. For the first time, we implemented a new type of virtual keypad that deviates from the existing rectangle shape according to the VR characteristics and implemented the lock object for intuitive interaction with the user. In addition, a smart glove using the same sensor as the existing input devices of the VR and a PIN input method suitable for the rotary type are implemented and the safety of the SSA is verified through experiments.

The Problem of Space Debris and the Environmental Protection in Outer Space Law (우주폐기물과 지구 및 우주환경의 보호)

  • Lee, Young Jin
    • The Korean Journal of Air & Space Law and Policy
    • /
    • v.29 no.2
    • /
    • pp.205-237
    • /
    • 2014
  • Last 50 years there were a lot of space subjects launched by space activities of many states and these activities also had created tremendous, significant space debris contaminating the environment of outer space. The large number of space debris which are surrounding the earth have the serious possibilities of destroying a satellite or causing huge threat to the space vehicles. For example, Chinese anti-satellite missile test was conducted by China on January 11, 2007. As a consequence a Chinese weather satellite was destroyed by a kinetic kill vehicle traveling with a speed of 8 km/s in the opposite direction. Anti-satellite missile tests like this,contribute to the formation of enormous orbital space debris which can remain in orbit for many years and could interfere with future space activity (Kessler Syndrome). The test is the largest recorded creation of space debris in history with at least 2,317 pieces of trackable size (golf ball size and larger) and an estimated 150,000 debris particles and more. Several nations responded negatively to the test and highlighted the serious consequences of engaging in the militarization of space. The timing and occasion aroused the suspicion of its demonstration of anti-satellite (ASAT) capabilities following the Chinese test of an ASAT system in 2007 destroying a satellite but creating significant space debris. Therefore this breakup seemed to serve as a momentum of the UN Space Debris Mitigation Guidelines and the background of the EU initiatives for the International Code of Conduct for Outer Space Activities. The UN Space Debris Mitigation Guidelines thus adopted contain many technical elements that all the States involved in the outer space activities are expected to observe to produce least space debris from the moment of design of their launchers and satellites until the end of satellite life. Although the norms are on the voluntary basis which is normal in the current international space law environment where any attempt to formulate binding international rules has to face opposition and sometimes unnecessary screening from many corners of numerous countries. Nevertheless, because of common concerns of space-faring countries, the Guidelines could be adopted smoothly and are believed faithfully followed by most countries. It is a rare success story of international cooperation in the area of outer space. The EU has proposed an International Code of Conduct for Outer Space Activities as a transparency and confidence-building measure. It is designed to enhance the safety, security and sustainability of activities in outer space. The purpose of the Code to reduce the space debris, to allow exchange of the information on the space activities, and to protect the space objects through safety and security. Of the space issues, the space debris reduction and the space traffic management require some urgent attention. But the current legal instruments of the outer space do not have any binding rules to be applied thereto despite the incresing activities on the outer space. We need to start somewhere sometime soon before it's too late with the chaotic situation. In this article, with a view point of this problem, focused on the the Chinese test of an ASAT system in 2007 destroying a satellite but creating significant space debris and tried to analyse the issues of space debris reduction.

A Study on the Crime Prevention Design and Consumer Perception (CPTED) of Multi-Family Housing in China (중국 공동주택의 범죄 예방을 위한 디자인과 소비자의 인식에 관한 연구)

  • Kong, De Xin;Lee, Dong Hun;Park, Hae Rim
    • Journal of Service Research and Studies
    • /
    • v.14 no.1
    • /
    • pp.63-76
    • /
    • 2024
  • Multi-family housing plays a crucial role as a living and experiencing space, and its environment has a direct impact on the well-being and stability of its residents. Therefore, Crime Prevention Design (CPTED) for multi-family housing is of utmost importance. However, crime-related data in China is not disclosed to the public because of its specificity, making it difficult for researchers to conduct further in-depth studies based on accurate crime data. As a result, the establishment and application of CPTED theory in terms of crime prevention is limited and delayed. This study aims to explore three aspects of CPTED in multi-family housing as perceived by home-buying consumers. It investigated consumer perception of the CPTED, the importance of each element and ways to increase awareness of CPTED in multifamily housing in order to effectively improve multifamily crime prevention design principles and further enhance public safety. This study examined the current state and future trends of CPTED in China by analyzing relevant research reports and literature, aiming to gain insights into the crime prevention awareness of Chinese homeowners. In addition, a survey was conducted on Chinese consumers to unravel the importance of CPTED and increase awareness of its various elements in multifamily-family. This study used a Likert scale and SPSS reliability analysis to determine the cognitive status of multi-family CPTED, the importance of each element, and proposed an improvement plan based on the analysis results. As this study was limited by the difficulty of implementation and the lack of validation of its practical effectiveness, it is recommended that future research needs to validate the effectiveness of crime prevention designs and produce more practical results. Furthermore, it is crucial to utilize this study to inform the implementation of security solutions that are tailored to the unique characteristics of each district. Additionally, it is important to offer guidance on how to enhance community safety by increasing residents' awareness of security through education and information dissemination. The author hopes that the representative multi-family CPTED awareness, the importance of each element, and plans for improvement shall be summarized from this study, and provide foundational data for the future development of CPTED based on the Chinese region.

Analysis on Complex Disaster Information Contents for Building Disaster Map of Coastal Cities (연안도시 재해지도 작성을 위한 복합재해정보 콘텐츠 분석)

  • KIM, Jung-Ok;KIM, Ji-Young;LEE, Won-Hee
    • Journal of the Korean Association of Geographic Information Studies
    • /
    • v.19 no.3
    • /
    • pp.43-60
    • /
    • 2016
  • Coastal cities need disaster planning that accounts for the complex causes of environmental disasters such as high tides or tsunamis generated by typhoons, and of river or lowland flooding caused by heavy rains, etc. The elements of the disaster map were initially defined using a Geographic Information System (GIS) to allow for efficient information management. Complex disaster information elements were thus established in this study to create a disaster map of coastal cities. The range of information required for coastal cities includes the type of disaster, evacuation methods, available sheltering facilities, and learning content. These informational elements are intended to build on spatial information based on data available from the Ministry of Public Safety and Security as well as local governments.

An Efficient MANET Routing Protocol for the Drone Delivery Communication Network System (드론 택배 통신망시스템을 위한 효율적인 MANET 라우팅 프로토콜)

  • Jo, Jun-Mo
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.10 no.9
    • /
    • pp.973-978
    • /
    • 2015
  • The drone delivery service as a new important business is emerging worldwide. American DHL parcel service is already running the delivery business using drones, and the Google, Amazon, and china's Alibaba, Baidu are also preparing for the same business. However, there are some problems in security and safety since the heavy parcels flies over the people walking down streets, so many things must be considered. The problems can be solved by communicating among drones to avoid collision. Therefore, the efficient network performance is essential, and to resolve the problem, in this paper, an efficient routing protocol is suggested by the Opnet simulator. The drone intercommunication network of MANET is designed and simulated for the efficient routing protocol.

Study on Maritime Policemen's Cognition about Proper Manpower Distribution: Focused on Workers of South Regional Headquarters, Korea Coast Guard (적정인력 배분에 관한 해양경찰관들의 인식도 조사 연구: 남해지방해양경찰청 소속 근무자들을 중심으로)

  • Kim, Sang-Goo
    • Journal of Navigation and Port Research
    • /
    • v.36 no.10
    • /
    • pp.925-931
    • /
    • 2012
  • The purpose of this study: firstly, investigate cognition of affiliated members about manpower distribution of the South Regional Headquarters Korea Coast Guard(SRH-KCG) and danweis. Secondly, seek ways to reasonable manpower distribution of SRH-KCG and danweis. And this study's research subjects are five coast guards(Busan coast guard, Tongyeong coast guard, Yeosu coast guard, Jeju coast guard, Seogwipo coast guard) belonged to SRH-KCG. The results of this study: firstly, 56.7% of affiliated members approved the need to organizational diagnosis. Secondly, must manpower loading in order of Busan coast guard Tongyeong coast guard Jeju coast guard. Thirdly, must manpower loading in order of maritime safety division the security division criminal investigation divition.

An IDE based Hierarchical Node Authentication Protocol for Secure Data Transmission in WSN Environment (WSN 환경에서 안전한 데이터 전달을 위한 IDE 기반의 계층적 노드인증 프로토콜)

  • Cho, Young-Bok;Lee, Sang-Ho
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.37 no.3B
    • /
    • pp.149-157
    • /
    • 2012
  • In WSN environment, the sensor nodes collect sensed data, and transmit data to the BS. BS is difficult to trust the data from unauthenticated nodes. Therefore, many papers have been proposed about the node authentication and the safety of data. In the AM-E paper, data is delivered after node authentication. In this time, the sensor nodes are directly communicated to BS the AREQ/AREP message for authentication. Therefore, the sensor nodes consume more energy for authentication. Also, noes communicate directly with the BS for authentication will have problem due to the limited energy of nodes. In this paper, the same security with AM-E is supported, Furthermore, to minimize the energy consumption, IDE based hierarchical node authentication protocol is proposed. Compared with AM-E, the number of alive nodes is increased about 39%. Thus, the entire network life time is extended and energy efficiency is improved.

The Comparative Study on the Perception of Business Activities about Disaster Preparedness between Korea and Japan (한국과 일본 기업의 재난 대비활동 인식 비교 연구)

  • Kwon, YungTaek;Yoon, MyungO;Choi, HeeCheon
    • Journal of the Society of Disaster Information
    • /
    • v.9 no.4
    • /
    • pp.383-391
    • /
    • 2013
  • This study surveyed the perception differences of business activities about disaster preparedness between Korea and Japan's companies. In Korea, the perception of disaster risk, existence of disaster plan, emergency support to staffs, and support willingness to local society are much lower than Japan's responses. But, Korean companies' planning rate about staffs' refuge and their returning to companies are higher than Japans'. The reason is seemed to be resulted from Korean 'civil defense' codes that define the composition of 'civil defense corps'. Japan has very highly specific guidelines and has continuous improvements about disaster preparedness plan. It seemed that these differences are resulted form the difference of both governments' perception about importance of business part in disaster preparedness.