• Title/Summary/Keyword: social security information system

Search Result 347, Processing Time 0.028 seconds

Practical approaches to becoming the logistics hub of Northeast Asia (동북아 물류중심국가 추진전략에 관한 연구)

  • Oh, Moon-Kap
    • Journal of Distribution Science
    • /
    • v.11 no.6
    • /
    • pp.31-40
    • /
    • 2013
  • Purpose - The Northeast Asian Logistic Hub strategy was established to create a national competitive advantage in northeast Asia. Countries in this region are competing fiercely to become the central base distribution port as the volume of container shipping continues to increase due to the northeast Asian (especially Chinese) economic growth. The primary method by which shippers are improving their customer service and distribution is enhancing profits by minimizing call ports on the key route through strategic affiliations and the use of large vessels. Each nation is planning large-scale investments in the construction of sea ports that can accommodate large vessels. This paper proposes ways by which the logistical strategies of domestic corporations can keep pace with changes in government policy concerning the Northeast Asian Business Hub policy. It examines the logistics system in the Northeast Asian region, analyzes the government's Northeast Asian Business Hub policy, and suggests logistical strategies for domestic corporations through an analysis based on a questionnaire designed to grasp domestic firms' needs and goals. Research design, data and methodology - The purpose of this study is to determine how shipping companies establish partnerships with third-party logistics providers and draws out the implications of the results. The survey methods used were personal interviews and questionnaires distributed to a sample population through e-mail, fax, mail, and telephone. A total of 600 questionnaires were distributed, of which 165 were returned. Among these, ten were excluded due to insufficient content; ultimately, 155 were used for the sample. The statistical data collection process was analyzed through data coating and a statistical package program. Results - This study argues that greater flexibility in policies, administration, and systems will be needed to significantly improve established business practices. In this dissertation, we primarily identify that in order to become a center of northeast Asian logistics, Korea must adopt a new paradigm and abandon the existing systems that are based on the economic and social systems that have stemmed from bureaucracy, inflexibility, chauvinism, and equalitarianism. Flexible policies, administration, and systems will be necessary to improve business practices. Domestic corporations must establish a strategic logistics hub and related network while simultaneously pursuing value-added logistics businesses by increasing their manpower and building a logistics information system. This will strengthen their competitive edge and lead to system improvements. Conclusions - Domestic corporations must adopt a new paradigm and use more reasonable business laws, systems, and policies that are based on market-driven flexibility and transparency. Moreover, social norms and regulations should be established to help ensure political and social security. Korea must also develop a culture of tolerance for foreign companies. Finally, the paradigm defining the policy governing the development of the capital city and its satellite cities in this context must be changed.

Computational Analytics of Client Awareness for Mobile Application Offloading with Cloud Migration

  • Nandhini, Uma;TamilSelvan, Latha
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.8 no.11
    • /
    • pp.3916-3936
    • /
    • 2014
  • Smartphone applications like games, image processing, e-commerce and social networking are gaining exponential growth, with the ubiquity of cellular services. This demands increased computational power and storage from mobile devices with a sufficiently high bandwidth for mobile internet service. But mobile nodes are highly constrained in the processing and storage, along with the battery power, which further restrains their dependability. Adopting the unlimited storage and computing power offered by cloud servers, it is possible to overcome and turn these issues into a favorable opportunity for the growth of mobile cloud computing. As the mobile internet data traffic is predicted to grow at the rate of around 65 percent yearly, even advanced services like 3G and 4G for mobile communication will fail to accommodate such exponential growth of data. On the other hand, developers extend popular applications with high end graphics leading to smart phones, manufactured with multicore processors and graphics processing units making them unaffordable. Therefore, to address the need of resource constrained mobile nodes and bandwidth constrained cellular networks, the computations can be migrated to resourceful servers connected to cloud. The server now acts as a bridge that should enable the participating mobile nodes to offload their computations through Wi-Fi directly to the virtualized server. Our proposed model enables an on-demand service offloading with a decision support system that identifies the capabilities of the client's hardware and software resources in judging the requirements for offloading. Further, the node's location, context and security capabilities are estimated to facilitate adaptive migration.

Personal Information Detection by Using Na$\ddot{i}$ve Bayes Methodology (Na$\ddot{i}$ve Bayes 방법론을 이용한 개인정보 분류)

  • Kim, Nam-Won;Park, Jin-Soo
    • Journal of Intelligence and Information Systems
    • /
    • v.18 no.1
    • /
    • pp.91-107
    • /
    • 2012
  • As the Internet becomes more popular, many people use it to communicate. With the increasing number of personal homepages, blogs, and social network services, people often expose their personal information online. Although the necessity of those services cannot be denied, we should be concerned about the negative aspects such as personal information leakage. Because it is impossible to review all of the past records posted by all of the people, an automatic personal information detection method is strongly required. This study proposes a method to detect or classify online documents that contain personal information by analyzing features that are common to personal information related documents and learning that information based on the Na$\ddot{i}$ve Bayes algorithm. To select the document classification algorithm, the Na$\ddot{i}$ve Bayes classification algorithm was compared with the Vector Space classification algorithm. The result showed that Na$\ddot{i}$ve Bayes reveals more excellent precision, recall, F-measure, and accuracy than Vector Space does. However, the measurement level of the Na$\ddot{i}$ve Bayes classification algorithm is still insufficient to apply to the real world. Lewis, a learning algorithm researcher, states that it is important to improve the quality of category features while applying learning algorithms to some specific domain. He proposes a way to incrementally add features that are dependent on related documents and in a step-wise manner. In another experiment, the algorithm learns the additional dependent features thereby reducing the noise of the features. As a result, the latter experiment shows better performance in terms of measurement than the former experiment does.

Designing and Implementing IOT-based Casino Information System (Windows OS, Windows Server) (IOT 기반의 카지노정보시스템 설계 및 구현(Windows OS, Windows Server))

  • LEE, Dae Kun;NA, Seung You
    • Journal of Digital Convergence
    • /
    • v.13 no.12
    • /
    • pp.151-160
    • /
    • 2015
  • As a lexical meaning, casino is defined as "a certified gambling house, equipped with recreational facilities such as dance and music, etc., where people play roulette or cards." Casinos started from 17th to 18th century for European nobility and their social meetings and established a casino industry framework in the United States in the 1930s. The success of the casino business leads to the increase of sales; it became very helpful for the local and national government revenues and also for the related incidental tasks. Casino operations include a variety of fields, such as general customer management, dealer game management, security, account management, currency exchange, re-exchange management, marketing management, comp management and placement management, etc. These operations should be organically connected to each other by information systems such as a groupware, ERP and Customer Relationship Management (CRM), etc. In addition, in order to effectively manage comprehensive entertainment service, including accommodation and tourism, it is necessary to develop an information system which supports casino business and collateral entertainment service, collects the data generated throughout the business and provides information about the situations of management. Thus, this study will propose a casino information system designed and implemented, considering these details.

A Study on the Safe Use of Data in the Digital Healthcare Industry Based on the Data 3 Act (데이터 3법 기반 디지털 헬스케어 산업에서 안전한 데이터 활용에 관한 연구)

  • Choi, Sun-Mi;Kim, Kyoung-Jin
    • Journal of the Korea Convergence Society
    • /
    • v.13 no.4
    • /
    • pp.25-37
    • /
    • 2022
  • The government and private companies are endeavoring to help the digital healthcare industry grow. This includes easing regulations on the big data industry such as the amendment of the Data 3 Act. Despite these efforts, however, there have been constant demands for the amendment of laws related to the medical field and for securing medical data transmissions. In this paper, the Data 3 Act of Korea and the legal system related to healthcare are examined. Then the legal, institutional, and technical aspects of the strategies are compared to understand the issues and implications. Based on this, a legal and institutional strategy suitable for the digital healthcare industry in Korea is suggested. Additionally, a direction to improve social perception along with technical measures such as safe de-identification processing and data transmission are also proposed. This study hopes to contribute to the spread of various convergent industries along with the digital healthcare industry.

History of Guard System during the Period of Military Rule in the Goryeo Dynasty (고려 무신집권기 호위제도의 경호학적 고찰)

  • Lee, Sung-Jin;Cho, Sung-Jin
    • Korean Security Journal
    • /
    • no.34
    • /
    • pp.233-258
    • /
    • 2013
  • In the early days of the Goryeo Dynasty, the royal guard was comprised of the central regular army in the 2-gun-6-wi system, and Nasungeomgun was in charge of the security inside the palace. However, the military system became disorganized during the period of military rule and the royal guard had to rely on military subjects. The military officials suppressed the civil ministers centering on Jungbang, the guarding organization close to the King to incapacitate the royal authority and control the state affairs. When the rule of the three leaders of the military rule became short-lived and Dae-seung Gyeong is raised to the ruler, he organized a do-or-die squad comprised of a hundred and more people for his personal safety, and this became the first dobang. Dobang was disassembled after Dae-seung Gyeong died of disease, but under the rule of Chung-heon Choe, Dae-seung Gyeong's dobang was revived and reinforced into 'Yukbeon Dobang' to provide the ruler with personal protection and intensify the ruling system, and it was quite a large organization with more refined system. Yukbeon Dobang was expanded and reinforced into Naeoedobang under the rule of Woo Choe, the son of Chung-heon Choe, and it was enhanced even more into Dobang Samsipyukbeon System under the rule of the grandson, Hang Choe. Dobang can be considered as the guard organization in modern sense, and it collected information and surveyed the area where guarding is required and house troops that belonged to Naedobang eliminated the risks that may follow afterwards to make assurance doubly sure for guarding. The Choe's regime established Mabyeolcho as a private guard organization in addition to dobang, and this formed the cavalry and infantry units with dobang. Yabyeolcho organized by Woo Choe in the reign of King Gojong was divided into Joabyeolcho and Ubyeolcho, and later Sineuigun was integrated with them to form Sambyeolcho. Originally, Yabyeolcho was established under the rule of Woo Choe to prevent crime in the evening, but after Sineuigun was organized with the ones who were captured by Mongolian army but escaped, in other words when Sambyeolcho was organized, the organization displayed much broader influence by covering military and police affairs as well as punishment and imprisonment. The guarding organization during the Period of Military Rule in the Goryeo Dynasty did not have strict distinction between official guard and personal guard. The private guard in modern days which is the equivalent of personal guard is characterized by its commerciality, however, house troops and the members of dobang did not seem to pursued profit. The guard organization during the period of military rule started from dobang which was organized for personal safety but gradually developed publicness through the participation of civil ministers and expansion, and later it played the pivotal role for social security serving official purpose up to the level where the distinction between official and private activities was blurred during the period of Sambyeolcho.

  • PDF

Relationship Analysis between Malware and Sybil for Android Apps Recommender System (안드로이드 앱 추천 시스템을 위한 Sybil공격과 Malware의 관계 분석)

  • Oh, Hayoung
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.26 no.5
    • /
    • pp.1235-1241
    • /
    • 2016
  • Personalized App recommendation system is recently famous since the number of various apps that can be used in smart phones that increases exponentially. However, the site users using google play site with malwares have experienced severe damages of privacy exposure and extortion as well as a simple damage of satisfaction descent at the same time. In addition, Sybil attack (Sybil) manipulating the score (rating) of each app with falmay also present because of the social networks development. Up until now, the sybil detection studies and malicious apps studies have been conducted independently. But it is important to determine finally the existence of intelligent attack with Sybil and malware simultaneously when we consider the intelligent attack types in real-time. Therefore, in this paper we experimentally evaluate the relationship between malware and sybils based on real cralwed dataset of goodlplay. Through the extensive evaluations, the correlation between malware and sybils is low for malware providers to hide themselves from Anti-Virus (AV).

Modern Paradigm of Organization of the Management Mechanism by Innovative Development in Higher Education Institutions

  • Kubitsky, Serhii;Domina, Viktoriia;Mykhalchenko, Nataliia;Terenko, Olena;Mironets, Liudmyla;Kanishevska, Lyubov;Marszałek, Lidia
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.11
    • /
    • pp.141-148
    • /
    • 2022
  • The development of the education system and the labor market today requires new conditions for unification and functioning, the introduction of an innovative culture in the field of Education. The construction of modern management of innovative development of a higher education institution requires consideration of the existing theoretical, methodological and practical planes on which its formation is based. The purpose of the article is to substantiate the modern paradigm of organizing the mechanism of managing the innovative development of higher education institutions. Innovation in education is represented not only by the final product of applying novelty in educational and managerial processes in order to qualitatively improve the subject and objects of management and obtain economic, social, scientific, technical, environmental and other effects, but also by the procedure for their constant updating. The classification of innovations in education is presented. Despite the positive developments in the development of Education, numerous problems remain in this area, which is discussed in the article. The concept of innovative development of higher education institutions is described, which defines the prerequisites, goals, principles, tasks and mechanisms of university development for a long-term period and should be based on the following principles: scientific, flexible, efficient and comprehensive. The role of the motivational component of the mechanism of innovative development of higher education institutions is clarified, which allows at the strategic level to create an innovative culture and motivation of innovative activity of each individual, to make a choice of rational directions for solving problems, at the tactical level - to form motives for innovative activity in the most effective directions, at the operational level - to monitor the formation of a system of motives and incentives, to adjust the directions of motivation. The necessity of the functional component of the mechanism, which consists in determining a set of steps and management decisions aimed at achieving certain goals of innovative development of higher education institutions, is proved. The monitoring component of the mechanism is aimed at developing a special system for collecting, processing, storing and distributing information about the stages of development of higher education institutions, prediction based on the objective data on the dynamics and main trends of its development, and elaboration of recommendations.

Implementation of the Electronic Prescription Security System Using by an If Card (IC 카드에 의한 원외 전자처방전 보안을 위한 시스템 구축)

  • Kang, Se-Na;Lee, Ki-Han
    • The KIPS Transactions:PartC
    • /
    • v.10C no.3
    • /
    • pp.281-286
    • /
    • 2003
  • Nowadays, a patient's private medical data which is exposed to the outside world has a severe effect on not only the patient's private life but also his/her social activities and environment. So, it is important to securely protect the patient's private medical data from the illegal manipulation. This paper studies the method to store the electronic prescription information in an IC card. For that, an access control for users, such as a doctor, a nurse, a medical institute member, a pharmacy, a pharmacist, or a patient, is proposed to access the data stored in an IC card. The certificate is issued using the Crypto API of a certificate management model supported by Windows 2000. The public/private key is created by the Cryptographic Service Provider program, and the electronic prescription is signed using the digital signature. The proposed system, therefore, can improve the quality of medical services by securing the safety and integrity of the electronic prescription, stored in an IC card.

Indicator-based Behavior Ontology for Detecting Insider Threats in Network Systems

  • Kauh, Janghyuk;Lim, Wongi;Kwon, Koohyung;Lee, Jong-Eon;Kim, Jung-Jae;Ryu, Minwoo;Cha, Si-Ho
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.10
    • /
    • pp.5062-5079
    • /
    • 2017
  • Malicious insider threats have increased recently, and methods of the threats are diversifying every day. These insider threats are becoming a significant problem in corporations and governments today. From a technology standpoint, detecting potential insider threats is difficult in early stage because it is unpredictable. In order to prevent insider threats in early stage, it is necessary to collect all of insiders' data which flow in network systems, and then analyze whether the data are potential threat or not. However, analyzing all of data makes us spend too much time and cost. In addition, we need a large repository in order to collect and manage these data. To resolve this problem, we develop an indicator-based behavior ontology (IB2O) that allows us to understand and interpret insiders' data packets, and then to detect potential threats in early stage in network systems including social networks and company networks. To show feasibility of the behavior ontology, we developed a prototype platform called Insider Threat Detecting Extractor (ITDE) for detecting potential insider threats in early stage based on the behavior ontology. Finally, we showed how the behavior ontology would help detect potential inside threats in network system. We expect that the behavior ontology will be able to contribute to detecting malicious insider threats in early stage.