• Title/Summary/Keyword: societal security service

Search Result 10, Processing Time 0.02 seconds

A Web Based Error Manager for Societal Security Service (웹 기반 사회 안전 서비스를 위한 오류 관리기)

  • Ko, Eung-Nam;Hong, Sung-Ryong
    • Journal of Digital Contents Society
    • /
    • v.15 no.1
    • /
    • pp.87-91
    • /
    • 2014
  • This paper suggested a web based error manager for societal security service. This is a system that is suitable for detecting, sharing and recovering software error based on multimedia CSCW(Computer Supportes Cooperated Work). With error sharing system, a group cooperating users can share error applications. Our a web based error manager for societal security service enables user to share error objects through interaction awareness. This method has a file sharing, a window copy, a window overlay, or a window sharing. We implemented the web based error manager for societal security service so that the users participated in collaborative work may refer shared error objects as the same view to others.

A Study on Analysis of Intelligent Video Surveillance Systems for Societal Security (사회안전을 위한 지능형 영상감시분석시스템)

  • Kang, Heau-Jo
    • Journal of Digital Contents Society
    • /
    • v.17 no.4
    • /
    • pp.273-278
    • /
    • 2016
  • Disasters are linked with some attributes of modern society in diversity, complexity and unpredictability, so various approach and remedies of them will appease the nation's anxiety upon them. For this reason, in this paper we review the building plans and its application and its application Province pros and cons of intelligent video surveillance analysis system for social security, the future proposed service is the safety of people while performing a comprehensive urban traffic control functions as a video monitoring system for social security and to ensure, to prevent crime and accidents, it is to crack down on criminal offenses in advance expected to protect the property of citizens and public facilities.

How to improve carrier (telecommunications) billing services to prevent damage (통신과금서비스의 피해예방을 위한 개선방안)

  • Yoo, Soonduck;Kim, Jungil
    • Journal of Digital Convergence
    • /
    • v.11 no.10
    • /
    • pp.217-224
    • /
    • 2013
  • Due to the development of mobile technologies, the carrier (telecommunications) billing service market is rapidly growing. carrier (telecommunications) billing service allows users to make on-line purchases through mobile-billing. Users find this particularly convenient because the payment acts as a credit transaction. Furthermore, the system is commonly believed to be secure through its use of SMS (Short Message Service) authentication and a real-time transaction history to confirm the transaction. Unfortunately, there is a growing number of fraudulent transactions threaten the future of this system. The more well documented types of security breaches involves hackers intercepting the authentication process. By contaminating the device with security breaching applications, hackers can secretly make transactions without notifying users until the end of month phone bill. This study sheds light on the importance of this societal threat and suggests solutions. In particular, "secure" systems need to be more proactive in addressing the methods hackers use to make fraudulent transactions. Our research partially covers specific methods to prevent fraudulent transactions on carrier billing service providers' systems. We discuss about the proposed improvements such as complement of electronic payment systems, active promotion for fraudulent transactions enhanced monitoring, fraud detection and introduce a new authentication service. This research supports a future of secure communications billing services, which is essential to expanding new markets.

A Study on the Validity and Utility of Urban Plan Facilities for Prevention of Disaster (재해예방을 위한 도시계획시설의 타당성과 효용성에 관한 연구)

  • Choi, Woong;Park, Jeong Yong;Kim, Young Gyun
    • Journal of Korean Society of societal Security
    • /
    • v.4 no.1
    • /
    • pp.57-65
    • /
    • 2011
  • Studying the operation of urban control plan and control program of urban plan facilities to present development direction of urban plan in the future by performing multi-variate analysis, the research acquired the following conclusion. It is required to institutionally activate the inhabitants' participation by reflecting spontaneous participation and opinion of inhabitants to adminstration so that the effect of business can be maximized in the stage of establishing urban control plan. Furthermore, the participation of role dividing type is necessary to adjust and connect the interest of expert that has experience in practical business of overall urban plan, inhabitant and self-governing body. It is required to reduce the service supplied by government so as to enhance policy of plan-first and development last for facilities with high importance and utility such as road, park and water supply/sewage, etc as well as to seek control program that expands the participation of private sector for administration for which private service is possible.

  • PDF

A Study on IAM-Based Personal Data Protection Techniques in BaaS (BaaS에서 IAM을 이용한 개인정보 보호 기법에 관한 연구)

  • Mi-Hui Kim;Myung-Joe Kang
    • Journal of IKEEE
    • /
    • v.27 no.4
    • /
    • pp.548-555
    • /
    • 2023
  • With the advancement of the internet, the use of personal information in online interactions has increased, underscoring the significance of data protection. Breaches of personal data due to unauthorized access can result in psychological and financial damage to individuals, and may even enable wide-ranging societal attacks aimed at those associated with the victims. In response to such threats, there is active research into security measures using blockchain to safeguard personal information. This study proposes a system that uses middleware and IAM (Identity and Access Management) services to protect personal information in a BaaS (Blockchain as a Service) environment where blockchain is provided via the Internet. The middleware operates on servers where IAM roles and policies are applied, authenticates users, and performs access control to allow only legitimate users to access blockchain data existing in the cloud. Additionally, to understand the impact of the proposed personal information protection method on the system, we measure the response time according to the time taken and the number of users under three assumed scenarios, and compare the proposed method and research related to personal information protection using blockchain in terms of security characteristics such as idea, type of blockchain, authentication, and confidentiality.

Anti-seismic Capacity Improvement Modelling of Bridge Pier by Nickel -chrome Alloy Bar (니켈-크롬 합금 강바를 이용한 교각부 내진성능향상 모델링에 관한 연구)

  • Jang, Il-young;song, Jae-ho;Song, Seok-min;Lee, Seung-young;Ryu, Jeong-su
    • Journal of Korean Society of societal Security
    • /
    • v.2 no.2
    • /
    • pp.63-68
    • /
    • 2009
  • Seismic design of newly built bridges can be considered and carried out during construction process according to the revised road bridge design standard issued recently. While for the existing reinforced concrete bridge priers under service before new standard implements, their resistance capacity against lateral seismic loading is inferior. In this research, seismic reinforcing for existing bridge piers by nickel-chrome alloy bar has been analyzed. Based on the established model by MIDAS program, the behaviors of bridge piers including deformation and stress with and without nickel-chrome alloy reinforcing bars have been compared and discussed under lateral seismic loading. And the advantages of using nickel-chrome alloy bar as seismic reinforcement over other materials, such as good performance, good economy etc. have been demonstrated by comparison with other researches. Also the anti-seismic efficiency of nickel-chrome alloy reinforcing bars has been confirmed by MIDAS modeling analysis.

  • PDF

Trends in Cryptocurrency Custody Services and Evaluation Guidelines for DeFi Protocols' Custody Poten (가상자산 커스터디 서비스의 최신 동향 및 DeFi 프로토콜 커스터디 가능성 평가 가이드라인 제시)

  • Hyunggeun Lee;Moonho Joo;Jihun Lim;Beomjoong Kim;Kiseok Jeon;Junsik Sim;Junghee Lee
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.34 no.4
    • /
    • pp.811-831
    • /
    • 2024
  • This paper has two main objectives. The primary objective is to conduct a comprehensive review of existing survey papers on the advantages, disadvantages, taxonomy, and technical vulnerabilities of cryptocurrency custody services. Additionally, we examined recent regulatory developments, the application of existing frameworks, conditions for performing custody services, and service providers' obligations. The secondary objective is to identify DeFi protocols in the regulatory 'grey area' and analyze their technical aspects and governance mechanisms. By synthesizing these findings, we propose guidelines for assessing DeFi decentralization and their potential for integration within the regulatory framework, providing insights for industry experts, regulators, and policymakers to balance industry needs with societal benefits.

Evolving Internet Information & Technology as Enablers for Creating Shared Values

  • Song, In Kuk;Chun, Junchul
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.1
    • /
    • pp.309-317
    • /
    • 2015
  • Recently many companies began to realize their visions for the sustainable growth with the advent of CSV(Creating Shared Values). Michael E. Porter, a Harvard Professor, claims that placing social value creation at the core of business strategy has the potential to uncover big opportunities for individual companies and that shared value can play a significant role in increasing competitive advantages while fostering social prosperity. In consequence, the various researches have illustrated how to get the opportunity for competitive advantages from building a social value proposition into corporate strategy, and considerable studies have been promoted heavily from the managerial perspective. However, due to the lack of capability converging information technology with business strategy, any research effort to identify technological or Internet-related issues and to link the issues to CSV does not exist. With Korean being a Internet leading country, the demands of researches analyzing core technology, information, and service utilizing Internet are rapidly growing. The study aims to find out Internet-related enablers for CSV. This paper describes the concepts and features of CSV, identifies emerging Internet-related issues toward the opportunity for competitive advantage, and then depicts the rigorous research endeavors in the areas of Internet information, technology, and services. As a result, 11 papers presented and selected as the outstanding papers at APIC-IST 2014 handle the issues to be brought together, which include: Wireless and Sensor Network, Image Processing and HCI, Big Data and Business Intelligence, Security & Privacy in Internet, SNS & Communication, Smart-Learning and e-Learning, and Internet Business Strategy. The study finally recommends indispensible terms for substantially vitalizing CSV.

A Study on the Direction of Private Investigation System - Focus on the bill proposal in 2012·2013 (민간조사제도의 도입 방향에 관한 연구 - 제19대 국회 발의 법안을 중심으로(2012년·2013년))

  • Cho, Min-Sang;Oh, Youn-Sung
    • Korean Security Journal
    • /
    • no.36
    • /
    • pp.525-559
    • /
    • 2013
  • Modern society has been exposed to various dangers and crimes in the process of globalization, informationization, decentralization etc. along with the development of material civilization under rapid changing societal environment. These factors are exerting a lot of effects in public security environments, as result there are gradual interest about crime and crime prevention. Realization of responsibility who take charge of social safety, from public security to private security, appears important topic at the moment. The positive point of view which private security industry is responsible to cope with security spheres instead of public security has been emerged from the reason that the public security has limitation to solve security problems for themselves. It is the time to make effort to compromise the public security and the private security industry to forecast social change and prevent dangers in the advance. In Korea, there has been close cooperation between public security and private security for decades. Strongly emerging and interesting sphere is "Private Investigation(Private Detective)" in Korea at present. There has been some proposed legislations of private investigation for decreasing burden of public security and social sympathy about possibility of private investigation system is increasing now. In this study, we focused on the introduction of private investigation system through the analysis of bill proposals for last 14 years, for instance historical aspects, contents, the differences among bill proposals. Among these, a comparison on bill proposals of the 19th National Assembly's during 2012 - 2013 were analysed mainly. We examined the importance point at issue items for introduction of private investigation system. Suggestions for introduction of private investigation system is as follows. The necessity of independent bill for developmental private investigation system is needed and the main body should be a juristic person instead of a individual for the public interest and responsibility. For the good service of private investigation and to prevent the unqualified person become a private investigator, the recruiting system and examination of private investigator should be prepared well and take into consideration anticipated problems. Also the necessity of definite jurisdiction department's appointment to divide responsibility in operation.

  • PDF

Necessity and Implementation Strategies for Transitioning to All-Volunteer Force in South Korea (대한민국 모병제 전환의 필요성과 도입 방안)

  • Seung-Bae Seon;Sang-Hyuk Park
    • The Journal of the Convergence on Culture Technology
    • /
    • v.10 no.4
    • /
    • pp.405-411
    • /
    • 2024
  • This study aims to address the sustainability of South Korea's conscription system, which is being questioned due to issues like low birth rates and societal changes, and to explore the necessity and implementation strategies for transitioning to an all-volunteer force (AVF). South Korea has long maintained national security through conscription, but it now faces challenges such as a decrease in military resources and the advancement of high-tech military technologies. To address these challenges, the study analyzes domestic and international cases of AVF and assesses the current state and issues of South Korea's military service system. The findings indicate that an AVF can enhance military professionalism and efficiency, respect individual choice, and contribute to reducing gender imbalance and promoting social equity. A phased roadmap for the implementation of the AVF is proposed, along with the need for legal and institutional frameworks and measures to foster public consensus. The study also discusses the potential positive economic impacts and long-term cost savings of the AVF. This research aims to provide concrete strategies and policy recommendations for adopting a Korean-style AVF, thereby proactively responding to changes in the future security environment and establishing a sustainable national defense posture.