• Title/Summary/Keyword: security rule

Search Result 286, Processing Time 0.027 seconds

The Effect of Complicit Management of Private Security Guard on Trust for Leader and Turnover Intention (민간경호·경비원의 갈등관리가 리더신뢰 및 이직의사에 미치는 영향)

  • Kim, Eunjung;Park, Youngman;Ko, Byunghyun
    • Journal of the Society of Disaster Information
    • /
    • v.7 no.2
    • /
    • pp.151-160
    • /
    • 2011
  • This study aims to suggest the method for an effective conflict management to private security workers by investigating the impact of complicit management that recognized by private security, guard on trust for leader and turnover intention according to the complicit management type of private security, guard. The subjects was sampled by using purposive sampling method after selecting security, guard who work in private guard company registered in the Police Department in Seoul in 2010. Respondents of this study was sampled a total of 250 people and collected the sample of 234 people, and the number of cases used in the final analysis was 210 people. The entered data was processed by using SPSSWIN 17.0 Version to apply factor analysis, reliability analysis, correlation analysis, and multiple regression analysis. The result of reliability analysis of the questionnaire was Cronbach's ${\alpha}$ value of 0.838~0.859. First, combination, compromise, and grace the sub factors of the conflict management of private security, guard affect on trust for leader. Second, compromise, grace, and rule the sub factors of the conflict management of private security, guard has a negative effect on turnover intention. Third, the trust to leader has a negative effect on turnover intention.

A Study on the Implications and Trends of Logistics Security Assurance Programs for International Trade Facilitation (국제물류보안 인증제도 동향 및 시사점에 관한 연구)

  • Ko, Hyun-Jeung
    • Journal of Korea Port Economic Association
    • /
    • v.27 no.2
    • /
    • pp.333-354
    • /
    • 2011
  • After the terrorist attack of 9/11 on the USA, the security concern to global trade has been raised. In particular, the USA has actively promoted a series of initiatives and rules such as CSI, 24 hour rule, C-TPAT, and so on in the area of logistics activities, which aimed to better protect the country against the potential terrorist threats. While implementing such schemes called as a multi-layed logistics security strategy, a large number of countries trading with USA are facing with the issues of additional time and costs for inspecting cargos in their logistics facilities. As a result, most countries all over the world have sought a way to minimize the impacts from such strategy. The Korea also is preparing the several security programs operated by various ministries, which are aiming to not only improve the efficiency of trade flows but also to ensure supply chain security. However, many companies are expressing the inefficiency of operating such programs. Thus, this paper analyzed several global supply chain security programs currently adopted by international organizations(ISO, WCO, and IMO) and major countries(USA, EU, and Singapore) and suggested a guideline for developing the national logistics security system.

A Design and Implementation of Access Control Mechanism based on the Integrated Information Model (통합 전보 모델을 이용한 접근제어 메커니즘 설계 및 구현)

  • Kang, Chang-Goo;Park, Jin-Ho;Choi, Yong-Rak
    • The Transactions of the Korea Information Processing Society
    • /
    • v.4 no.9
    • /
    • pp.2354-2365
    • /
    • 1997
  • This paper presents a design of an access control mechanism that can resolves the complicated problems of access control requirements in modern information communication applications. In this paper, we proposed an integrated information model which can satisfy the combined goals of confidentiality, integrity and availability of any resource. We defined an integrated information model from the view points of identity-based, rule-based and role-based policy and implemented six access control operations. The proposed integrated information model can protect to unauthorized access to any resource based on the multilevel security policies of security label, integrity level, role and ownership.

  • PDF

Image Encryption Scheme using Complemented MLCA and Special Chaos Map (여원 MLCA와 특수 혼돈 함수를 이용한 영상 암호화 기법)

  • Jeong, Hyun-Soo;Park, Kyu-Chil;Cho, Sung-Jin;Kim, Seok-Tae
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.15 no.5
    • /
    • pp.873-880
    • /
    • 2020
  • The proposed encryption algorithm strengthens its security by converting pixel-specific values and changing pixel positions. The state transition matrix created by Wolfram's rule creates a complemented CA sequence with the maximum length. Then, we convert the sequence into a 2D basis image and go through a XOR operation with the original image. The final encrypted image is created by shear stressing and rearranging. The image stability analysis verified that the proposed encryption method has high security.

The Validity Verification of Encrypted XML Document using the XML Schema (XML 스키마를 이용한 암호화된 XML 문서 유효성 검증)

  • Hong, Seong-Pyo;Lee, Joon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.7 no.5
    • /
    • pp.972-977
    • /
    • 2003
  • XML has weakness problems on document modulation and elimination of data Because of the XML gives priority to present data format, XML signature, XML encryption, or XML access control is provided to overcome those weakness problems. However, structured XML efficiency contravention problem occurred from XML encryption and absence of protection from DID attack are still remains unsolved. In this paper, we suggests the XML schema that satisfies both validity and encryption. The DTD is unnecessary because XML schema supports Well-Formed XML documents and include meta information. Also XML schema has possibility to generate each XML document dynamically and because of self efficiency investigator rule, it has an advantage on extendability of DID based encryption of XML documents.

A study on about a Exclusive Firewall for operation the efficient network security (효율적인 네트워크 보안운영을 위한 Exclusive Firewall 관한 연구)

  • Jeon, Jeong-Hoon;Jeon, Sang-Hoon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.12 no.2 s.46
    • /
    • pp.93-102
    • /
    • 2007
  • Firewall system is a security system for protect the network and is needed for constructing the trusted network. However, these firewall systems deteriorate the performance of whole network in about 60% because of Inefficiency policy establishment and unnecessary traffic occurrence. Therefore, there is a strong needs to establish the network performance elevation, efficient operation and reassignment of the firewall system. In this dissertation, we will analyze how each functionalities of the firewall system affect to the network performance via using a simulation result according to functionality of the firewall system and propose a exclusive firewall system for the efficient network operation.

  • PDF

A Fuzzy-based Network Intrusion Detection System Through sessionization (세션화 방식을 통한 퍼지기반 네트워크 침입탐지시스템)

  • Park, Ju-Gi;Choi, Eun-Bok
    • Journal of the Korea Society of Computer and Information
    • /
    • v.12 no.1 s.45
    • /
    • pp.127-135
    • /
    • 2007
  • As the Internet is used widely, criminal offense that use computer is increasing, and an information security technology to remove this crime is becoming competitive power of the country. In this paper, we suggest network-based intrusion detection system that use fuzzy expert system. This system can decide quick intrusion decision from attack pattern applying fuzzy rule through the packet classification method that is done similarity of protocol and fixed time interval. Proposed system uses fuzzy logic to detect attack from network traffic, and gets analysis result that is automated through fuzzy reasoning. In present network environment that must handle mass traffic, this system can reduce time and expense of security

  • PDF

A Novel Image Encryption using MLCA and CAT (MLCA와 CAT를 이용한 새로운 영상 암호화 방법)

  • Piao, Yong-Ri;Cho, Sung-Jin;Kim, Seok-Tae
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.13 no.10
    • /
    • pp.2171-2179
    • /
    • 2009
  • In this paper, we propose a novel Image Encryption using MLCA (Maximum Length Cellular Automata) and CAT (Cellular Automata Transform). Firstly, we use the Wolfram rule matrix to generate MLCA state transition matrix T. Then the state transition matrix T changes pixel value of original image according to pixel position. Next, we obtain Gateway Values to generate 2D CAT basis function. Lastly, the basis function encrypts the MLCA encrypted image into cellular automata space. The experimental results and security analysis show that the proposed method guarantees better security and non-lossy encryption.

Application of Reinforcement Learning in Detecting Fraudulent Insurance Claims

  • Choi, Jung-Moon;Kim, Ji-Hyeok;Kim, Sung-Jun
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.9
    • /
    • pp.125-131
    • /
    • 2021
  • Detecting fraudulent insurance claims is difficult due to small and unbalanced data. Some research has been carried out to better cope with various types of fraudulent claims. Nowadays, technology for detecting fraudulent insurance claims has been increasingly utilized in insurance and technology fields, thanks to the use of artificial intelligence (AI) methods in addition to traditional statistical detection and rule-based methods. This study obtained meaningful results for a fraudulent insurance claim detection model based on machine learning (ML) and deep learning (DL) technologies, using fraudulent insurance claim data from previous research. In our search for a method to enhance the detection of fraudulent insurance claims, we investigated the reinforcement learning (RL) method. We examined how we could apply the RL method to the detection of fraudulent insurance claims. There are limited previous cases of applying the RL method. Thus, we first had to define the RL essential elements based on previous research on detecting anomalies. We applied the deep Q-network (DQN) and double deep Q-network (DDQN) in the learning fraudulent insurance claim detection model. By doing so, we confirmed that our model demonstrated better performance than previous machine learning models.

Distance Learning In Ukraine: Problems And Connection With Modern Computer Technologies

  • Skoromnyi, Viktor;Voichenko, Olha;Ostapenko, Liliya;Trynko, Olga;Shportko, Oleksii;Tishkina, Olena
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.8
    • /
    • pp.105-110
    • /
    • 2021
  • The article presents the idea that in the conditions of modernization of higher professional education, there is an obvious contradiction between the practical need of higher education for a scientifically grounded theory and methodology of distance learning for students and the lack of the necessary didactic and content-methodological guidelines for its implementation. In theoretical research and applied development, as a rule, the technocratic approach prevails. The emphasis is on the technical capabilities of modern computers and telecommunications. Productively, from a pedagogical point of view, this contradiction can be resolved on the basis of modeling distance learning management for students, developing and implementing a corporate information educational environment in universities, increasing the effectiveness of the methodology of pedagogical interaction between students and teachers during the implementation of distance learning.