• 제목/요약/키워드: security requirement

검색결과 393건 처리시간 0.025초

The Emotional Intelligence Effects on Foreign LCs' Self-Efficacy and Job Stress (외국계 생명보험 설계사의 감성지능이 직무스트레스에 미치는 영향 : 자기효능감의 매개효과를 중심으로)

  • Jung, Kwang-Jin;Park, Sang-Beom
    • The Journal of Industrial Distribution & Business
    • /
    • 제9권5호
    • /
    • pp.93-104
    • /
    • 2018
  • Purpose - This study is to investigate the relationship among emotional intelligence, self-efficacy and job stress of foreign life insurance consultants focusing on the mediating effect of self-efficacy. Regarding job security, in general foreign life insurance companies in Korea have more severe working conditions in terms of required contract performance. For foreign life insurance consultants, they are assumed to need higher level of emotional intelligence and self efficacy to meet the conditions. In this study, focus is cast on these aspects. Research design, data, and methodology - Basically the research is conducted upon questionnaires responded by foreign life insurance consultants. That is, data are collected from 255 sample of insurance consultants who work for a foreign owned life insurance company. The Questionnaire measure the level of emotional intelligence, self-efficacy and job stress of insurance consultants. The data are analyzed using pearson's correlation coefficient and hierarchical multiple regression, descriptive statistics, t-test, ANOVA, Durbin-Watson test. Results - The general characteristics of respondents are gender, age, marital status, education level, income monthly, career length, change jobs no, working day per week, call no. per week, meeting no. with client per week, contract regularity, contract no. per month and cancellation contract per year. The mean of emotional intelligence is 2.63, self-efficacy is 3.44 and job stress is 2.20. Emotional intelligence is composed with mean value of self emotion appraisal(3.93), other's emotion appraisal(3.78), regulation of emotion(3.29) and use of emotion(3.52). The mean of self efficacy is composed with mean value of self-confidence(3.41), self-regulated efficacy(3.59) and preference task difficulty(3.30). The job stress is composed with mean value of job requirement(2.61), lack of job autonomy(1.99), conflict of personal relations(1.99), job instability(2.38), organizational system(2.19) and inappropriate compensation(2.07). There is a significant positive correlation between emotional intelligence and self-efficacy. The emotional intelligence and self-efficacy are significantly negative correlation with job stress. The self-efficacy is showed a mediating variable between emotional intelligence and job stress. Conclusions - To decrease job stress level, foreign life insurance company should find the factors to improve the emotional intelligence and self-efficacy of life insurance consultants, and develop appropriate plans using a mediating role of self- efficacy between emotional intelligence and job stress.

Adaptive Blind Watermarking Technique by Biased-Shift of Quantizer (양자화기의 편의이동에 의한 적응적인 블라인드 워터마킹 기술)

  • Seo Young-Ho;Choi Hyun-Joon;Choi Soon-Young;Lee Chang-Yeul;Kim Dong-Wook
    • Journal of the Institute of Electronics Engineers of Korea SP
    • /
    • 제42권2호
    • /
    • pp.49-58
    • /
    • 2005
  • In this paper, we proposed a blind watermarking algerian to use characteristics of a scalar quantizer which is the recommended in the JPEG2000 and JPEG. The proposed algorithm shifts a quantization index according to the value of each watermark bit to prevent losing the watermark information during the compression by quantization. Therefore, the watermark is embedded during the process of quantization, not an additional process for watermarking, and is adaptively applied as a assigned quantizer according application areas. Before embedding process, a LFSR(Linear feedback shift register) rearranged the watermark for the security of the watermark itself and in the embedding process, a LFSR is used to hide the watermarking positions. Therefore the embedded watermark can he extracted by only the owner who knows the initial value of LFSR without the original image. The visual recognizable pattern such as a binary image was used as the watermark. The experimental results showed that the proposed algerian satisfies the robustness and imperceptibility corresponding to the major requirement of watermarking. The results showed the largest error rate to be $5.7\%$ for attack. The experimental result which compares the proposed algorithm with the Mohamed algorithm showed that the proposed algorithm was better than it, exactly $4\~5$ times for the attacks of JPEG and JPEG2000.

The Revision Trend of UNCITRAL Model Law on International Commercial Arbitration (국제상사중재에 관한 UNCITRAL 모델법의 개정동향)

  • Lee, Kang-Bin
    • Journal of Arbitration Studies
    • /
    • 제16권3호
    • /
    • pp.53-89
    • /
    • 2006
  • At its thirty-second session(Vienna, 17 May-4 June 1999), the UNCITRAL decided that the priority items for the Working Group(Arbitration and Conciliation) should include enforceability of interim measures and the requirement of written (on for the arbitration agreement. The Working Group, at its forty-third session(Vienna, 3-7 October 2005), it had undertaken a detailed review of the text of the revised article 17 of UNCTTRAL Model Law on International Commercial Arbitration, and it had resumed discussions on a draft model legislative provision revising article 7, paragraph (2) of UNCITRAL Model Law. The purpose of this paper is to make research on the contents and issues of the draft legislative provisions on interim measures and preliminary orders, and on the form of arbitration agreement which the Working Group discussed and adopted at its forth-fourth session(New York, 23-27 January 2006). The draft legislative provisions on interim measures and preliminary orders are composed of the following provisions : Article 17-power of arbitral tribunal to order interim measures; article 17 bis-conditions for granting interim measures; article 17 ter-applications for preliminary orders and conditions for granting preliminary orders; article 17 quater-specific regime for preliminary orders; article 17 quinquies- modification, suspension, termination; article 17 sexies-provision of security; article 17 septies-disclosure; article 17 octies-costs and damages; article 17 novies recognition and enforcements; article 17 decies-grounds for refusing recognition or enforcement; article 17 undecies-court-ordered interim measures. There are the following issues in the draft legislative provisions on interim measures and preliminary orders : form of issuance of an interim measures in article 17(2); conditions for granting interim measures in article 17 bis; purpose, function and legal regime of preliminary orders in article 17 ter; obligation of arbitral tribunal to give notice, and non-enforceability of preliminary orders in article 17 quater; burden of proof, interplay between article 17 decies and article 34, and decision on the recognition and enforcement of the interim measures in article 17 decies; placement of article 17 undecies; amendment of scope exception of application in article 1(2). The draft legislative provisions on the form of arbitration agreement are composed of the following provisions : article 7(1) definition of arbitration agreement; article 7(2) arbitration agreement in writing; article 7(3) arbitration agreement if its terms(content) are (is) recorded in any form; article 7(4) arbitration agreement by an electronic communication; article 7(5) arbitration agreement in an exchange of statements of claim and defence; article 7(6) reference to any document containing an arbitration clause. There are the following issues in the draft legislative provisions on the form of arbitration agreement : arbitration agreement in writing in article 7(2); terms or contents of arbitration agreement in article 7(3); arbitration agreement by electronic communication in article 7(4); existence of arbitration agreement in article 7(5); reference to any document containing an arbitration clause in article 7(6); the alternative proposal on article 7; amendment to article 35(2).

  • PDF

Code for Unplanned Encounters at Sea(CUES): Its Limitation and Recommendations for Improvement (해상에서의 우발적 조우 시 신호 규칙(CUES)의 제한점과 개선을 위한 제언)

  • Oh, Dongkeon
    • Strategy21
    • /
    • 통권44호
    • /
    • pp.323-351
    • /
    • 2018
  • Adopted in Western Pacific Naval Symposium(WPNS) 2014, Code for Unplanned Encounters at Sea(CUES) has been the most valuable output of WPNS history. Written and suggested by Australian Navy in 1999, the goal of CUES is to decrease the possibility of the naval conflict by establishing the code among international navies in the Western Pacific region. Facing many oppositions and requirement of People's Liberation Army Navy(PLAN) in WPNS 2012 and 2013, but it finally adopted in WPNS 2014, with many changes in detailed provisions. From then, navies in the Western Pacific region have followed CUES to prevent maritime conflicts in the region, CUES, however, sometimes does not work correctly. Contents of CUES is the mixture of the parts of Multinational Maritime Tactical Signal and Maneuvering Book(MTP) and International Regulations for Preventing Collision at Sea 1972(CORLEGs). There are means of radio communications such as frequency and signals, instructions for maneuvering and so on. Thus, it is not a new document for the U.S. Navy and its allies, but it requires training to implicate at sea for navies other than U.S. allies, like PLAN. Lots of provisions in CUES were changed because of the opposition of PLAN, and CUES has many shortcomings and practical limitations. First, since CUES is non-legally binding, and there are no methods to force the naval assets on the sea to follow. Second, CUES is only applied to naval assets; naval ships - warships, naval auxiliaries, and submarines - and naval aircraft. Third, the geographical scope in CUES is not clear. Fourth, there is no provision for submerged submarines. Finally, CUES has no time-based framework or roadmap for training. In this regard, there would be six recommendations for improvement. First, CUES should be reviewed by WPNS or other international institutions, while keeping non-binding status so that WPNS could send signals to the navies which do not answer CUES on the sea. Second, the participation of Maritime Law Enforcements(MLEs) such as coast guard is inevitable. Third, navies would use full text of MTP rather than current CUES, which extracts some parts of MTP. Fourth, CUES needs provisions with respect to submerged submarines, which recognizes as offensive weapons themselves. Fifth, the geographic scope of CUES should be clear. Since there are some countries in which claim that a rock with a concrete structure is their territory, CUES should be applied on every sea including EEZ and territorial seas. Finally, the detailed training plan is required to implicate CUES at sea. Rim of the Pacific (RIMPAC) is a good exercise to train CUES, because almost all WPNS member countries except six countries are participating in RIMPAC. CUES is a meaningful document not only for navies but also for nation-states in the region. To prevent escalation of conflict in the region, potentially caused by an unplanned collision at sea, CUES should be applied more strictly. CUES will continue to be in subsequent WPNS and therefore continue to improve in the effectiveness as both an operational and diplomatic agreement.

Derivation of Anti-Tamper System Requirements Based on CMVP Standard for Technology Protection of Weapon Systems (무기 시스템의 기술 보호를 위한 CMVP 표준 기반의 Anti-Tamper 시스템 요구사항 도출)

  • Lee, Min-Woo;Lee, Jae-Chon
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • 제20권4호
    • /
    • pp.470-478
    • /
    • 2019
  • As the growth of the domestic defense industry is remarkable regarding technology level and export size, technology protection is necessary. Particularly, there is a need to apply anti-tamper measures to prevent critical technologies from illegally being taken out of weapon systems. However, there is no security protection strategy and system built yet in ROK. Precedent studies discussed the trend analysis and technical research for specific protective techniques, and the application of anti-tamper using limited procedures was provided. Recently, methods of how to select the technology for protection were studied based on risk management. Nonetheless, these studies cannot be associated with the acquisition process for the whole life-cycle, having difficulty with actual development and evaluation of the weapon systems. The objective of our study is to derive the system requirements of the weapon system for which anti-tamper measures have been determined to apply. Specifically, requirements items suitable for the development of anti-tamper weapon systems were derived based on ISO/IEC 19790, the CMVP standard for the development and verification of cryptographic modules. Also, its utilization in technical reviews and test & evaluations was presented. The usefulness of the research results was confirmed through inductive inference and comparative evaluation. The result can be expected to play a role in initiating extensive activities needed for technology protection of the weapon systems.

A study on Operation Rules of Korean Air Defence Identification Zone (한국 방공식별구역 운영규칙에 관한 고찰)

  • Kwon, Jong-Pil;Lee, Yeong H.
    • The Korean Journal of Air & Space Law and Policy
    • /
    • 제32권2호
    • /
    • pp.189-217
    • /
    • 2017
  • Declaration of Air Defense and Identification Zones started with the United States in 1950, which was followed by declaration of KADIZ by the Republic of Korea in 1951. Initial ADIZ were solely linked with air defense missions, but their roles have changed as nations around the globe manifested a tendency to expand their influence over maritime resources and rights. In particular, China declared ADIZ over the East China Sea in October 2013 and forced all passing aircraft to submit flight plan to ATC or military authority, saying failure of submission will be followed by armed engagement. China announced it would declare another zone over the South China Sea despite the ongoing conflict in the area, clearly showing ADIZ's direct connection with territorial claim and EEZ and that it serves as a zone within which a nation can execute its rights. The expanded KADIZ, which was expanded in Dec 15, 2013 in response to Chinese actions, overlaps with the Chinese ADIZ over the East China Sea and the Japanese ADIZ. The overlapping zone is an airspace over waters where not only the Republic of Korea but also of China and Japan argue to be covering their continental shelf and EEZ. Military conventions were signed to prevent contingencies among the neighboring nations while conducting identifications in KADIZ, including the overlapping zone. If such military conventions and practice of air defense identification continue to be respected among states, it is under the process of turning into a regional customary law, although ADIZ is not yet recognized by international law or customary law. Moreover, identification within ADIZ is carried out by military authorities of states, and misguided customary procedures may cause serious negative consequences for national security since it may negatively impact neighboring countries in marking the maritime border, which calls for formulation of operation rules that account for other state activities and military talks among regional stake holders. Legal frameworks need to be in place to guarantee freedom of flights over international seas which UN Maritime Law protects, and laws regarding military aircraft operation need to be supplemented to not make it a requirement to submit flight plan if the aircraft does not invade sovereign airspace. Organizational instructions that require approval of Chairman of Joint Chiefs of Staff for entrance and exit of ADIZ for military aircraft need to be amended to change the authority to Minister of National Defense or be promoted to a law to be applicable for commercial aircraft. Moreover, in regards to operation and management of ADIZ, transfer of authority should be prohibited to account for its evolution into a regional customary law in South East Asia. In particular, since ADIZ is set over EEZ, military conventions that yield authority related to national security should never be condoned. Among Korea, China, Japan and Russia, there are military conventions that discuss operation and management of ADIZ in place or under negotiation, meaning that ADIZ is becoming a regional customary law in North East Asia region.

  • PDF

A Study on Fast Iris Detection for Iris Recognition in Mobile Phone (휴대폰에서의 홍채인식을 위한 고속 홍채검출에 관한 연구)

  • Park Hyun-Ae;Park Kang-Ryoung
    • Journal of the Institute of Electronics Engineers of Korea SP
    • /
    • 제43권2호
    • /
    • pp.19-29
    • /
    • 2006
  • As the security of personal information is becoming more important in mobile phones, we are starting to apply iris recognition technology to these devices. In conventional iris recognition, magnified iris images are required. For that, it has been necessary to use large magnified zoom & focus lens camera to capture images, but due to the requirement about low size and cost of mobile phones, the zoom & focus lens are difficult to be used. However, with rapid developments and multimedia convergence trends in mobile phones, more and more companies have built mega-pixel cameras into their mobile phones. These devices make it possible to capture a magnified iris image without zoom & focus lens. Although facial images are captured far away from the user using a mega-pixel camera, the captured iris region possesses sufficient pixel information for iris recognition. However, in this case, the eye region should be detected for accurate iris recognition in facial images. So, we propose a new fast iris detection method, which is appropriate for mobile phones based on corneal specular reflection. To detect specular reflection robustly, we propose the theoretical background of estimating the size and brightness of specular reflection based on eye, camera and illuminator models. In addition, we use the successive On/Off scheme of the illuminator to detect the optical/motion blurring and sunlight effect on input image. Experimental results show that total processing time(detecting iris region) is on average 65ms on a Samsung SCH-S2300 (with 150MHz ARM 9 CPU) mobile phone. The rate of correct iris detection is 99% (about indoor images) and 98.5% (about outdoor images).

An Intelligent Intrusion Detection Model Based on Support Vector Machines and the Classification Threshold Optimization for Considering the Asymmetric Error Cost (비대칭 오류비용을 고려한 분류기준값 최적화와 SVM에 기반한 지능형 침입탐지모형)

  • Lee, Hyeon-Uk;Ahn, Hyun-Chul
    • Journal of Intelligence and Information Systems
    • /
    • 제17권4호
    • /
    • pp.157-173
    • /
    • 2011
  • As the Internet use explodes recently, the malicious attacks and hacking for a system connected to network occur frequently. This means the fatal damage can be caused by these intrusions in the government agency, public office, and company operating various systems. For such reasons, there are growing interests and demand about the intrusion detection systems (IDS)-the security systems for detecting, identifying and responding to unauthorized or abnormal activities appropriately. The intrusion detection models that have been applied in conventional IDS are generally designed by modeling the experts' implicit knowledge on the network intrusions or the hackers' abnormal behaviors. These kinds of intrusion detection models perform well under the normal situations. However, they show poor performance when they meet a new or unknown pattern of the network attacks. For this reason, several recent studies try to adopt various artificial intelligence techniques, which can proactively respond to the unknown threats. Especially, artificial neural networks (ANNs) have popularly been applied in the prior studies because of its superior prediction accuracy. However, ANNs have some intrinsic limitations such as the risk of overfitting, the requirement of the large sample size, and the lack of understanding the prediction process (i.e. black box theory). As a result, the most recent studies on IDS have started to adopt support vector machine (SVM), the classification technique that is more stable and powerful compared to ANNs. SVM is known as a relatively high predictive power and generalization capability. Under this background, this study proposes a novel intelligent intrusion detection model that uses SVM as the classification model in order to improve the predictive ability of IDS. Also, our model is designed to consider the asymmetric error cost by optimizing the classification threshold. Generally, there are two common forms of errors in intrusion detection. The first error type is the False-Positive Error (FPE). In the case of FPE, the wrong judgment on it may result in the unnecessary fixation. The second error type is the False-Negative Error (FNE) that mainly misjudges the malware of the program as normal. Compared to FPE, FNE is more fatal. Thus, when considering total cost of misclassification in IDS, it is more reasonable to assign heavier weights on FNE rather than FPE. Therefore, we designed our proposed intrusion detection model to optimize the classification threshold in order to minimize the total misclassification cost. In this case, conventional SVM cannot be applied because it is designed to generate discrete output (i.e. a class). To resolve this problem, we used the revised SVM technique proposed by Platt(2000), which is able to generate the probability estimate. To validate the practical applicability of our model, we applied it to the real-world dataset for network intrusion detection. The experimental dataset was collected from the IDS sensor of an official institution in Korea from January to June 2010. We collected 15,000 log data in total, and selected 1,000 samples from them by using random sampling method. In addition, the SVM model was compared with the logistic regression (LOGIT), decision trees (DT), and ANN to confirm the superiority of the proposed model. LOGIT and DT was experimented using PASW Statistics v18.0, and ANN was experimented using Neuroshell 4.0. For SVM, LIBSVM v2.90-a freeware for training SVM classifier-was used. Empirical results showed that our proposed model based on SVM outperformed all the other comparative models in detecting network intrusions from the accuracy perspective. They also showed that our model reduced the total misclassification cost compared to the ANN-based intrusion detection model. As a result, it is expected that the intrusion detection model proposed in this paper would not only enhance the performance of IDS, but also lead to better management of FNE.

Adaptive Data Hiding Techniques for Secure Communication of Images (영상 보안통신을 위한 적응적인 데이터 은닉 기술)

  • 서영호;김수민;김동욱
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • 제29권5C호
    • /
    • pp.664-672
    • /
    • 2004
  • Widespread popularity of wireless data communication devices, coupled with the availability of higher bandwidths, has led to an increased user demand for content-rich media such as images and videos. Since such content often tends to be private, sensitive, or paid for, there exists a requirement for securing such communication. However, solutions that rely only on traditional compute-intensive security mechanisms are unsuitable for resource-constrained wireless and embedded devices. In this paper, we propose a selective partial image encryption scheme for image data hiding , which enables highly efficient secure communication of image data to and from resource constrained wireless devices. The encryption scheme is invoked during the image compression process, with the encryption being performed between the quantizer and the entropy coder stages. Three data selection schemes are proposed: subband selection, data bit selection and random selection. We show that these schemes make secure communication of images feasible for constrained embed-ded devices. In addition we demonstrate how these schemes can be dynamically configured to trade-off the amount of ded devices. In addition we demonstrate how these schemes can be dynamically configured to trade-off the amount of data hiding achieved with the computation requirements imposed on the wireless devices. Experiments conducted on over 500 test images reveal that, by using our techniques, the fraction of data to be encrypted with our scheme varies between 0.0244% and 0.39% of the original image size. The peak signal to noise ratios (PSNR) of the encrypted image were observed to vary between about 9.5㏈ to 7.5㏈. In addition, visual test indicate that our schemes are capable of providing a high degree of data hiding with much lower computational costs.

ATM Cell Encipherment Method using Rijndael Algorithm in Physical Layer (Rijndael 알고리즘을 이용한 물리 계층 ATM 셀 보안 기법)

  • Im Sung-Yeal;Chung Ki-Dong
    • The KIPS Transactions:PartC
    • /
    • 제13C권1호
    • /
    • pp.83-94
    • /
    • 2006
  • This paper describes ATM cell encipherment method using Rijndael Algorithm adopted as an AES(Advanced Encryption Standard) by NIST in 2001. ISO 9160 describes the requirement of physical layer data processing in encryption/decryption. For the description of ATM cell encipherment method, we implemented ATM data encipherment equipment which satisfies the requirements of ISO 9160, and verified the encipherment/decipherment processing at ATM STM-1 rate(155.52Mbps). The DES algorithm can process data in the block size of 64 bits and its key length is 64 bits, but the Rijndael algorithm can process data in the block size of 128 bits and the key length of 128, 192, or 256 bits selectively. So it is more flexible in high bit rate data processing and stronger in encription strength than DES. For tile real time encryption of high bit rate data stream. Rijndael algorithm was implemented in FPGA in this experiment. The boundary of serial UNI cell was detected by the CRC method, and in the case of user data cell the payload of 48 octets (384 bits) is converted in parallel and transferred to 3 Rijndael encipherment module in the block size of 128 bits individually. After completion of encryption, the header stored in buffer is attached to the enciphered payload and retransmitted in the format of cell. At the receiving end, the boundary of ceil is detected by the CRC method and the payload type is decided. n the payload type is the user data cell, the payload of the cell is transferred to the 3-Rijndael decryption module in the block sire of 128 bits for decryption of data. And in the case of maintenance cell, the payload is extracted without decryption processing.