• Title/Summary/Keyword: information security system

Search Result 6,591, Processing Time 0.034 seconds

The Media's Agenda Setting on the Nuclear Test of North Korea (북한 핵실험 이슈에 대한 언론의 의제구성)

  • Lee, Wan-Soo;Son, Young-Jun
    • Korean journal of communication and information
    • /
    • v.56
    • /
    • pp.175-193
    • /
    • 2011
  • This study explored how South Korean newspapers covered North Korea's second nuclear test in May of 2009. Findings show that South Korean newspapers mostly reported North Korea's nuclear experiment in relatively negative tones. Their coverage mainly focused on the influences of nuclear threat from the North on the military, political and economic areas in South Korea. However, the media's agenda settings and frames were not similar in terms of each paper's political and ideological inclination. Whereas the progressive papers, such as the Hankyoreh and the Kyunghyang Shinmun, recognized that the current nuclear issue in Korean peninsula is getting worse because of South Korea's rigorous pressure on North Korea, the conservative papers, such as the Chosun Ilbo and the Donga Ilbo, see that the deadlock between North and South mainly comes from the system malfunction of North Korea. To prevent the current impasse, the left-side papers emphasized to develop the six-party talk in dealing with North Korean issue, while the right-wing papers paid attentions to the West's sanctions on North Korea and ensuring national security.

  • PDF

Discovery of Market Convergence Opportunity Combining Text Mining and Social Network Analysis: Evidence from Large-Scale Product Databases (B2B 전자상거래 정보를 활용한 시장 융합 기회 발굴 방법론)

  • Kim, Ji-Eun;Hyun, Yoonjin;Choi, Yun-Jeong
    • Journal of Intelligence and Information Systems
    • /
    • v.22 no.4
    • /
    • pp.87-107
    • /
    • 2016
  • Understanding market convergence has became essential for small and mid-size enterprises. Identifying convergence items among heterogeneous markets could lead to product innovation and successful market introduction. Previous researches have two limitations. First, traditional researches focusing on patent databases are suitable for detecting technology convergence, however, they have failed to recognize market demands. Second, most researches concentrate on identifying the relationship between existing products or technology. This study presents a platform to identify the opportunity of market convergence by using product databases from a global B2B marketplace. We also attempt to identify convergence opportunity in different industries by applying Structural Hole theory. This paper shows the mechanisms for market convergence: attributes extraction of products and services using text mining and association analysis among attributes, and network analysis based on structural hole. In order to discover market demand, we analyzed 240,002 e-catalog from January 2013 to July 2016.

A Storage and Computation Efficient RFID Distance Bounding Protocol (저장 공간 및 연산 효율적인 RFID 경계 결정 프로토콜)

  • Ahn, Hae-Soon;Yoon, Eun-Jun;Bu, Ki-Dong;Nam, In-Gil
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.35 no.9B
    • /
    • pp.1350-1359
    • /
    • 2010
  • Recently many researchers have been proved that general RFID system for proximity authentication is vulnerable to various location-based relay attacks such as distance fraud, mafia fraud and terrorist fraud attacks. The distance-bounding protocol is used to prevent the relay attacks by measuring the round trip time of single challenge-response bit. In 2008, Munilla and Peinado proposed an improved distance-bounding protocol applying void-challenge technique based on Hancke-Kuhn's protocol. Compare with Hancke-Kuhn's protocol, Munilla and Peinado's protocol is more secure because the success probability of an adversary has (5/8)n. However, Munilla and Peinado's protocol is inefficient for low-cost passive RFID tags because it requires large storage space and many hash function computations. Thus, this paper proposes a new RFID distance-bounding protocol for low-cost passive RFID tags that can be reduced the storage space and hash function computations. As a result, the proposed distance-bounding protocol not only can provide both storage space efficiency and computational efficiency, but also can provide strong security against the relay attacks because the adversary's success probability can be reduced by $(5/8)^n$.

A Tag Flow-Driven Deployment Simulator for Developing RFID Applications (RFID 애플리케이션 개발을 위한 태그 흐름기반 배치 시뮬레이터)

  • Moon, Mi-Kyeong
    • The KIPS Transactions:PartD
    • /
    • v.17D no.2
    • /
    • pp.157-166
    • /
    • 2010
  • More recently, RFID (Radio Frequency Identification) systems have begun to find greater use in various industrial fields. The use of RFID system in these application domains has been promoted by efforts to develop the RFID tags which are low in cost, small in size, and high in performance. The RFID applications enable the real-time capture and update of RFID tag information, while simultaneously allowing business process change through real-time alerting and alarms. These be developed to monitor person or objects with RFID tags in a place and to provide visibility and traceability of the seamless flows of RFID tags. In this time, the RFID readers should be placed in diverse locations, the RFID flows between these readers can be tested based on various scenarios. However, due to the high cost of RFID readers, it may be difficult to prepare the similar environment equipped with RFID read/write devices. In this paper, we propose a simulator to allow RFID application testing without installing physical devices. It can model the RFID deployment environment, place various RFID readers and sensors on this model, and move the RFID tags through the business processes. This simulator can improve the software development productivity by accurately testing RFID middleware and applications. In addition, when data security cannot be ensured by any fault, it can decide where the problem is occurred between RFID hardware and middleware.

A Fast String Matching Scheme without using Buffer for Linux Netfilter based Internet Worm Detection (리눅스 넷필터 기반의 인터넷 웜 탐지에서 버퍼를 이용하지 않는 빠른 스트링 매칭 방법)

  • Kwak, Hu-Keun;Chung, Kyu-Sik
    • The KIPS Transactions:PartC
    • /
    • v.13C no.7 s.110
    • /
    • pp.821-830
    • /
    • 2006
  • As internet worms are spread out worldwide, the detection and filtering of worms becomes one of hot issues in the internet security. As one of implementation methods to detect worms, the Linux Netfilter kernel module can be used. Its basic operation for worm detection is a string matching where coming packet(s) on the network is/are compared with predefined worm signatures(patterns). A worm can appear in a packet or in two (or more) succeeding packets where some part of worm is in the first packet and its remaining part is in its succeeding packet(s). Assuming that the maximum length of a worm pattern is less than 1024 bytes, we need to perform a string matching up to two succeeding packets of 2048 bytes. To do so, Linux Netfilter keeps the previous packet in buffer and performs matching with a combined 2048 byte string of the buffered packet and current packet. As the number of concurrent connections to be handled in the worm detection system increases, the total size of buffer (memory) increases and string matching speed becomes low In this paper, to reduce the memory buffer size and get higher speed of string matching, we propose a string matching scheme without using buffer. The proposed scheme keeps the partial matching result of the previous packet with signatures and has no buffering for previous packet. The partial matching information is used to detect a worm in the two succeeding packets. We implemented the proposed scheme by modifying the Linux Netfilter. Then we compared the modified Linux Netfilter module with the original Linux Netfilter module. Experimental results show that the proposed scheme has 25% lower memory usage and 54% higher speed compared to the original scheme.

A Study on Issues and Improvements Plan for National Safety Assessment (국가안전대진단의 문제점과 개선방안)

  • Shin, Jae-Hun;Kim, Sang-Woon
    • Journal of the Society of Disaster Information
    • /
    • v.14 no.3
    • /
    • pp.334-342
    • /
    • 2018
  • Purpose: The purpose of this study is to examine and improve the issues related to National Safety Inspection currently operation and reform the system for response to various disasters. Method: For the completion, this study established theoretical background using materials related to National Safety Inspection and identified the issues using the open statistical data for National Safety Inspection to suggest the improvement plans. Results: National Safety Inspection has been operating a complete large-scale inspection on risk factors in cooperation with the central government, local governments, and citizens since 2015 to remove various disaster factors neglected in people's daily lives. Operation of National Safety Inspection had positive influence in preventing major disasters. However, inefficient activity is pointed out due to issues related to cooperation with other institutes, limitation for citizen's positional role, and superficial inspection. Conclution: To solve this issue, this study proposed strengthening of communication activity with disaster institutes, strengthening of efficiency through citizen participation by type, and actualization of checklist used in National Safety Inspection.

A Study on the Improvement of the Safety and Safe Living Standards of Apartment Houses through AHP Analysis (AHP 분석을 통한 공동주택 안전 및 안심생활 수준 향상에 관한 연구)

  • Ji, Yung il;Shin, Seung Ha;Choi, Byong Jeong
    • Journal of the Society of Disaster Information
    • /
    • v.17 no.2
    • /
    • pp.289-305
    • /
    • 2021
  • Purpose: The purpose of this study is to check the importance of higher level, sub higher level and lower alternative factor and the factor for relieved life and also check the comprehensive priority in executed "Safety and relieved life level improvement of apartment house residents by AHP analysis". Method: The safety management evaluation elements and alternatives have been arranged as hierarchical structure based on the preceding studies and the advice of experts for the maintenance and system of apartment house in this study. Study model is used for the survey of pair wise comparison composition targeting experts and AHP analysis method is used for alternative plan ranking, etc. Result: The response result of survey secured the consistency and it is confirmed that safety inspection for apartment house electricity facility is most important for higher level, safety inspection, detailed inspection and diagnosis evaluation are most important for sub higher level and plumbing equipments is most important for alternatives based on the analysis result of relative weight comparison for sub higher level and alternatives for final goal attainment of the study. Conclusion: Plumbing equipments, crime prevention safety and electrical safety are shown as top priority alternatives when observe it with expert manager's point of view for apartment house. It shows that securing the importance of living safety accident and deciding the level of relieved life can be improved are the alternatives of pre-prevention and management strengthening.

Modern Pentathlon's Sports Spirit and A Study on Leader's Ethical Exploration

  • Han, Doryung
    • Journal of the Korea Society of Computer and Information
    • /
    • v.26 no.3
    • /
    • pp.119-126
    • /
    • 2021
  • The modern pentathlon is an exercise in which people and people compete, as well as exercise without equipment, exercise using equipment, and exercise with animals, and it is an exercise that includes static and dynamic exercise. The ethical issues of modern pentathlon athletes are also related to the poor environment and economic reasons, and the athlete's ethical awareness, attitude, and spirit have a great influence on the athlete's mental environment. In this study, the direction of improvement of ethical problems, which are different as important issues in modern sports, was examined, and qualitative research methods were applied to explore the sports spirit and ethics of the modern pentathlon. Correct sports should not deviate from the intended purpose of the exercise or cause or force the athlete to suffer physical or mental pain. In sports, compensatoryism can be a direct cause of improved performance or record-breaking, but sometimes it can also cause distorted athletes. Air doping has ethical issues that can cause controversy over the health or fairness of athletes, mental and physical damage to athletes, and harm. Responsibilities and ethical issues of athletes who take prohibited substances or leaders or supervisors who neglect or encourage them should be treated as very important matters. In the sports field, the reward system that is subordinate to the athlete's or leader's performance is related to the athlete's or leader's livelihood. For a fair and just game progression, it is necessary to break away from the development of athletes who are only focused on performance. The problem of Unethical issues must be overcome by emphasizing the restoration of ethics that are reasonably recognized in ideology and logic.

An Analysis on Limited Warfare through the Falkland Islands Dispute (포클랜드제도 분쟁을 통한 제한전 분석)

  • Yang, Seong-sil;Lee, Hee-wan;Shin, Jin
    • Maritime Security
    • /
    • v.3 no.1
    • /
    • pp.211-235
    • /
    • 2021
  • As a result of the Falkland Islands War from April 2 to June 14, 1982, Britain overcame severe economic depression and reclaimed the glory of the former British Empire by winning the war. On the other hand, Argentina was greatly affected by the collapse of a military dictatorship and the birth of a democratic government. This study suggests strategies for responding to maritime disputes that may occur in Dokdo Island in the future by applying "DIME on PMESII" to the Falkland Islands dispute. In particular, the study analyzes how DIME (diplomacy, information, military, and economy) capabilities have an effect as a means of the total national power of a country that effectively controls the disputed territory. Based on the results of this study, the response strategies related to the Dokdo maritime dispute are as follows. First, effective control over the disputed territory should be effectively maintained and strengthened like in Britain. This strategy inspires patriotism, supports the government during warfare, secures a just cause for war, and gains international support. Second, 'DIME on PMESII' was effective in modern warfare by focusing our DIME capabilities on the weaknesses of the other country's PMESII system. That is, wars are not won simply by the conflict of armed forces but by a nation's overall national strength, such as diplomatic, information, and economic capabilities. Third, appropriate strategies for neighboring countries are needed to overcome the possibility of limited warfare in the sea through preparations for Dokdo maritime disputes in the future.

  • PDF

Counting and Localizing Occupants using IR-UWB Radar and Machine Learning

  • Ji, Geonwoo;Lee, Changwon;Yun, Jaeseok
    • Journal of the Korea Society of Computer and Information
    • /
    • v.27 no.5
    • /
    • pp.1-9
    • /
    • 2022
  • Localization systems can be used with various circumstances like measuring population movement and rescue technology, even in security technology (like infiltration detection system). Vision sensors such as camera often used for localization is susceptible with light and temperature, and can cause invasion of privacy. In this paper, we used ultra-wideband radar technology (which is not limited by aforementioned problems) and machine learning techniques to measure the number and location of occupants in other indoor spaces behind the wall. We used four different algorithms and compared their results, including extremely randomized tree for four different situations; detect the number of occupants in a classroom, split the classroom into 28 locations and check the position of occupant, select one out of the 28 locations, divide it into 16 fine-grained locations, and check the position of occupant, and checking the positions of two occupants (existing in different locations). Overall, four algorithms showed good results and we verified that detecting the number and location of occupants are possible with high accuracy using machine learning. Also we have considered the possibility of service expansion using the oneM2M standard platform and expect to develop more service and products if this technology is used in various fields.