• Title/Summary/Keyword: Security design

Search Result 3,411, Processing Time 0.028 seconds

European Experience in Implementing Innovative Educational Technologies in the Field of Culture and the Arts: Current Problems and Vectors of Development

  • Kdyrova, I.O.;Grynyshyna, M.O.;Yur, M.V.;Osadcha, O.A.;Varyvonchyk, A.
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.5
    • /
    • pp.39-48
    • /
    • 2022
  • The main purpose of the work is to analyze modern innovative educational practices in the field of culture and art and their effectiveness in the context of the spread of digitalization trends. The study used general scientific theoretical methods of analysis, synthesis, analogy, comparative, induction, deduction, reductionism, and a number of others, allowing you to fully understand the pattern of modern modernization processes in a long historical development and demonstrate how the rejection of the negativity of progress allows talented artists to realize their own potential. The study established the advantages and disadvantages of involving innovative technologies in the educational process on the example of European experience and outlined possible ways of implementing digitalization processes in Ukrainian institutions of higher education, formulated the main difficulties encountered by teachers and students in the use of technological innovation in the pandemic. The rapid development of digital technologies has had a great impact on the sphere of culture and art, both visual, scenic, and musical in all processes: creation, reproduction, perception, learning, etc. In the field of art education, there is a synthesis of creative practices with digital technologies. In terms of music education, these processes at the present stage are provided with digital tools of specially developed software (music programs for composition and typing of musical text, recording, and correction of sound, for quality listening to the whole work or its fragments) for training programs used in institutional education and non-institutional learning as a means of independent mastering of the theory and practice of music-making, as well as other programs and technical tools without which contemporary art cannot be imagined. In modern stage education, the involvement of video technologies, means of remote communication, allowing realtime adjustment of the educational process, is actualized. In the sphere of fine arts, there is a transformation of communicative forms of interaction between the teacher and students, which in the conditions of the pandemic are of two-way communication with the help of information and communication technologies. At this stage, there is an intensification of transformation processes in the educational industry in the areas of culture and art.

Damage Evaluation of Adjacent Structures for Detonation of Hydrogen Storage Facilities (수소저장시설의 폭발에 대한 인접 구조물의 손상도 평가)

  • Jinwon Shin
    • Journal of Korean Society of Disaster and Security
    • /
    • v.16 no.1
    • /
    • pp.61-70
    • /
    • 2023
  • This study presents an analytical study of investigating the effect of shock waves generated by the hydrogen detonation and damage to structures for the safety evaluation of hydrogen storage facilities against detonation. Blast scenarios were established considering the volume of the hydrogen storage facility of 10 L to 50,000 L, states of charge (SOC) of 50% and 100%, and initial pressures of 50 MPa and 100 MPa. The equivalent TNT weight for hydrgen detonation was determined considering the mechanical and chemical energies of hydrogen. A hydrogen detonation model for the converted equivalent TNT weight was made using design equations that improved the Kingery-Bulmash design chart of UFC 3-340-02. The hydrogen detonation model was validated for overpressure and impulse in comparison to the past experimental results associated with the detonation of hydrogen tank. A parametric study based on the blast scenarios was performed using the validated hydrogen detonation model, and design charts for overpressure and impulse according to the standoff distance from the center of charge was provided. Further, design charts of the three-stage structural damage and standoff distance of adjacent structures according to the level of overpressure and impact were proposed using the overpressure and impulse charts and pressure-impulse diagrams.

Smart IoT Service Users' Compliance with Personal Information Protection Behavior: An Empirical Study on the Message Design Features to Induce Installation of Software Updates (스마트 IoT 서비스 사용자의 개인정보 보호 행동 준수: 소프트웨어 업데이트 유도를 위한 메세지 디자인 특성에 관한 실증 연구)

  • Lee, Ho-Jin;Kim, Hyung-Jin;Lee, Ho-Geun
    • Informatization Policy
    • /
    • v.31 no.2
    • /
    • pp.82-104
    • /
    • 2024
  • Smart home services are growing rapidly as the development of the Internet of Things (IoT) opens the era of the so-called "Connected Living." Although personal information leaks through smart home cameras are increasing, however, users-while concerned-tend to take passive measures to protect their personal information. This study theoretically explained and verified how to design effective software update notification messages for smart home cameras to ensure that users comply with the recommended security behavior (i.e., update installation). In a survey experiment participated in by 120 actual users, the effectiveness of both emotional appeals (i.e., security breach warning images for fear appeals) and rational appeals (i.e., loss-framed messages emphasizing the negative consequences of not installing the updates) were confirmed. The results of this study provide theoretical interpretations and practical guidelines on the message design features that are effective for threat appraisals (i.e., severity, vulnerability) of smart home camera users and their protection motivation.

Design of Comprehensive Security Vulnerability Analysis System through Efficient Inspection Method according to Necessity of Upgrading System Vulnerability (시스템 취약점 개선의 필요성에 따른 효율적인 점검 방법을 통한 종합 보안 취약성 분석 시스템 설계)

  • Min, So-Yeon;Jung, Chan-Suk;Lee, Kwang-Hyong;Cho, Eun-Sook;Yoon, Tae-Bok;You, Seung-Ho
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.18 no.7
    • /
    • pp.1-8
    • /
    • 2017
  • As the IT environment becomes more sophisticated, various threats and their associated serious risks are increasing. Threats such as DDoS attacks, malware, worms, and APT attacks can be a very serious risk to enterprises and must be efficiently managed in a timely manner. Therefore, the government has designated the important system as the main information communication infrastructure in consideration of the impact on the national security and the economic society according to the 'Information and Communication Infrastructure Protection Act', which, in particular, protects the main information communication infrastructure from cyber infringement. In addition, it conducts management supervision such as analysis and evaluation of vulnerability, establishment of protection measures, implementation of protection measures, and distribution of technology guides. Even now, security consulting is proceeding on the basis of 'Guidance for Evaluation of Technical Vulnerability Analysis of Major IT Infrastructure Facilities'. There are neglected inspection items in the applied items, and the vulnerability of APT attack, malicious code, and risk are present issues that are neglected. In order to eliminate the actual security risk, the security manager has arranged the inspection and ordered the special company. In other words, it is difficult to check against current hacking or vulnerability through current system vulnerability checking method. In this paper, we propose an efficient method for extracting diagnostic data regarding the necessity of upgrading system vulnerability check, a check item that does not reflect recent trends, a technical check case for latest intrusion technique, a related study on security threats and requirements. Based on this, we investigate the security vulnerability management system and vulnerability list of domestic and foreign countries, propose effective security vulnerability management system, and propose further study to improve overseas vulnerability diagnosis items so that they can be related to domestic vulnerability items.

Landscape Design of KangWon Provincial Police Agency (강원도 지방경찰청 조경설계)

  • 이시영;김신원
    • Journal of the Korean Institute of Landscape Architecture
    • /
    • v.30 no.2
    • /
    • pp.79-87
    • /
    • 2002
  • This landscape design proposal was presented to a design competition for the KangWon Province Police Agency(KPA). The site, about 27,711 $m^2$, is located at 293-4 Udu-dong, Chunchun, KangWon-Do. Design objectives of the KPA were to build a symbolic place which fall community members with pride, to elevate an identity and status of the KPA by creating a landscape correspondent to the concept of the building design, to provide community residents with a space to enjoy cultural and social activities, and to make environment friendly space. The main concept was developed by one of characteristics of the traditional spatial structure of Korea known as an, 'Open and Closed spatial structure.'By re-interpreting the traditional spatial structure and applying it to the site, the design met the various desires of the KPA. The site is primarily segmented into 6 sub spaces; entrance space Podori plaza, symbolic court, police billeting area, sports area, and rear rest area. The entrance space, Podori plaza, and symbolic court on the south-west part of the site represent the publicity of the site as the concept of ″open space.″ On the contrary, considering the specialty of police affairs, the north-east part of the site, which contains the police billeting area and rest area, were designed to maintain security by using the concept of ″closed space.″ To express an identity of the KPA, 'Podori', a police mascot, the plaza was designed and is suppose to function as the hub of the community. In the front section of the plaza, a symmetrical planting pattern, centering the strong axis, was introduced to strengthen its symbolic meaning. Traditional window frames such as the pattern of 'Pisal-jige'and 'Umulsal-jige' were used for the paving system which is applied as the environment friendly design. Site facilities and furnitrue were placed at every important spot in order to connect various spaces organically. As these well-tied spaces properly shared their function, spatial sequence and management would be promoted. The entire space was designed to allow free access of handicapped people. This proposal is meant to create a new image of KangWon province and to enhance the way of inhabitants' think about their community.

A Study on the Awareness of the Middle Aged for the Digital home System and Well-being Apartment Design Elements (디지털홈 시스템과 웰빙아파트 계획요소에 대한 중년층 의식 연구)

  • Cho, Sung-Heui;Lee, Tae-Kyung
    • Journal of the Korean housing association
    • /
    • v.18 no.2
    • /
    • pp.93-103
    • /
    • 2007
  • This study examined the awareness of the middle aged about the digital home system and well-being apartment design elements in order to suggest the design guidelines for planning of the elderly housing environment. By literature review, the concept and characteristics of the digital home system and well-being Apartment design elements were summarized the degree of satisfaction and preference of middle aged for these characteristics were investigated and analyzed. For this study, a questionnaire survey of 156 housewives living in apartment complex of Busan was carried out. The results of this study are as follows: The middle aged were generally short of recognition for digital skill and service, and also they showed positive evaluations to a few useful items of digital home system. These items belong under safety security system and interior environment control system and provided for convenient & comfortable life. Accordingly, satisfied digital home system can apply basic design element for housing for elderly. Whereas, the middle-aged were not satisfied with housework help system and cultural life system because items of these systems were not various and complicate to us. So, for the improvement of not satisfied digital home system, we needed development of digital contents and marketing & management for high accessibility and easy useability. The middle aged will concern about health & environment friendly continuously and become to stay long in their housing as the characteristics of elderly. So, It is necessary to be considered well-being apartment design elements of health & environment friendly very actively and lastingly in elderly housing environment design. Also, the awareness of middle aged for digital home system and well-being apartment design elements varied according to the background characteristics. This suggests housing environment for elderly life is considered differently as various background characteristics of middle aged.

Design Self-Organization Routing Protocol for supporting Data Security in Healthcare Sensor Network (헬스케어 센서 네트워크에서 데이터 보안을 지원한 자기구성 라우팅 프로토콜 설계)

  • Nam, Jin-Woo;Chung, Yeong-Jee
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2008.05a
    • /
    • pp.517-520
    • /
    • 2008
  • Wireless sensor network supporting healthcare environment should provide customized service in accordance with context information such as continuous location change and status information for people or movable object. In addition, we should consider data transmission guarantees a person's bio information and privacy security provided through sensor network. In this paper analyzes LEACH protocol which guarantees the dynamic self-configuration, energy efficiency through configuration of inter-node hierarchical cluster between nodes and key distribution protocol used for security for data transmission between nodes. Based on this analysis result, we suggested self-configuration routing protocol supporting node mobility which is weakness of the existing LEACH protocol and data transmission method by applying key-pool pre-distribution method whose memory consumption is low, cluster unit public key method to sensor node.

  • PDF

Design and Implementation of XML based Global Peer-to-Peer Engine (XML기반 전역 Peer-to-Peer 엔진 설계 및 구현)

  • Kwon Tae-suk;Lee Il-su;Lee Sung-young
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.29 no.1B
    • /
    • pp.73-85
    • /
    • 2004
  • SIn this paper, we introduce our experience for designing and implementing new concept of a global XML-based Peer-to-Peer (P2P) engine to support various P2P applications, and interconnection among PC, Web and mobile computing environments. The proposed P2P engine can support to heterogeneous data exchanges and web interconnection by facilitating with the text-base XML while message exchange are necessary. It is also to provide multi-level security functions as well as to apply different types of security algorithms. The system consist of four modules; a message dispatcher to scheduling and filtering the message, a SecureNet to providing security services and data transmission, a Discovery Manager to constructing peer-to-peer networking, and a Repository Manager to processing data management including XML documents. As a feasibility test, we implement various P2P services such as chatting as a communication service, white-board as an authoring tool set during collaborative working, and a file system as a file sharing service. We also compared the proposed system to a Gnutella in order to measure performance of the systems.

Study on the categorization of modus operandi and tools used in domestic burglary (건축물 침입에 이용되는 침입수법 및 도구의 유형화 연구)

  • Park, Hyeon-Ho;Cho, Joon-Tag
    • Korean Security Journal
    • /
    • no.40
    • /
    • pp.57-86
    • /
    • 2014
  • As the revision of Building Code including applying crime prevention design to buildings passed recently and target hardening ought to be evidence-based, we studied the Modus Operandi (MO) and intrusion tools of domestic burglary to earn basic data for improvement of crime prevention hardware in the future. To be specific, we reviewed related academic literature and police official statistics of domestic burglary critically and interviewed detectives in charge of burglary to specify and categorize MO and tools. We can derive some implications from research findings, including improvement of the statistical system for the MO of burglary, active sharing of the MO of burglary among the criminal justice agencies and related industries and experts. Also, crime prevention advice and education for the local residents focused on MO of burglary can be recommended. Based on this research, to enhance the level of community safety significantly, performance tests of crime prevention hardware such as security doors and windows etc. and the study on related certification system should be vitalized.

  • PDF

Design and Implementation of A Context-Aware Authentication Security Service Based on u-Hospital Environments (u-병원 환경 기반에서 상황인식 인증 보안 서비스 설계 및 구현)

  • Jeong, Chang-Won;Choi, Jae-Hyeong;Joo, Su-Chong
    • Journal of Internet Computing and Services
    • /
    • v.13 no.2
    • /
    • pp.51-57
    • /
    • 2012
  • The warming up of the recent competition in the smart phone industry followed by rapid increase of open platforms and app stores have led the mobile terminals to adopt the general purpose operating system. The mobile device utilizing this OS is vulnerable to mobile malignant code which is highly transferable. As a result, the scale of mobile attack and harm increase. However, compared to the malicious code and virus which keep increasing, the elements for security to prevent are insufficient. Therefore, this paper describe about the Context Aware Service that eliminates the potentially risky elements on the smart phone service, which could threaten the usability of the service including invasion of personal information. The proposed system prevents from disclosure of personal information by giving the procedure of information, and realizes the service that is able to change the sequence of identifying the users' information to prepare for emergency.