• Title/Summary/Keyword: 개인정보관리모델

Search Result 349, Processing Time 0.028 seconds

The study on the maturity measurement method of security management for ITSM System (ITSM적용을 위한 보안관리 성숙도 측정방법에 관한 연구)

  • Park, Jung-Oh;Kim, Sang-Geun;Choi, Byeong-Hun;Jun, Moon-Seog
    • Annual Conference of KIPS
    • /
    • 2007.11a
    • /
    • pp.1182-1185
    • /
    • 2007
  • ITSM 시스템을 구축 시 서비스 지원(Service Support)영역과 서비스 공급(Service Delivery) 부분과 동일하게 보안관리 영역을 지원하기에 보안관리 업무의 성숙도를 효율적으로 측정하였다. 보안관리 영역의 성숙도측정은 업무담당자의 인터뷰를 거쳐 업무성숙도를 측정, 결과분석 및 To-Be모델을 계획하였다. 업무성숙도의 측정은 9개도메인과 63개의 세부항목으로 구성하였으며 각 세부항목별 가중치와 기준점수를 부여하여 각 조직구성원들 개인의 보안업무 비중도, 보안업무의 성숙도를 함께 측정하였다.

Service Platform Based on User Exercise Information Collection and Analysis (사용자 운동 정보 수집 및 분석 기반의 서비스 플랫폼)

  • Lee, Hyun-Sup;Kim, Jindeog
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2022.05a
    • /
    • pp.624-626
    • /
    • 2022
  • It is possible to manage individual exercise information using a smartphone application that may be attached to exercise equipment. We propose a service platform that provides effective exercise techniques and management information to athletes by establishing an AI module to analyze and present the current user's exercise volume and exercise intensity direction through analysis of exercise data. To this end, it can be effectively managed by establishing a system based on a cloud environment and builds a hybrid health model that utilizes air and magnetic technologies at the same time.

  • PDF

Design and Implementation of Web Server for Analyzing Clickstream (클릭스트림 분석을 위한 웹 서버 시스템의 설계 및 구현)

  • Kang, Mi-Jung;Jeong, Ok-Ran;Cho, Dong-Sub
    • The KIPS Transactions:PartD
    • /
    • v.9D no.5
    • /
    • pp.945-954
    • /
    • 2002
  • Clickstream is the information which demonstrate users' path through web sites. Analysis of clickstream shows how web sites are navigated and used by users. Clickstream of online web sites contains effective information of web marketing and to offers usefully personalized services to users, and helps us understand how users find web sites, what products they see, and what products they purchase. In this paper, we present an extended web log system that add to module of collection of clickstream to understand users' behavior patterns In web sites. This system offers the users clickstream information to database which can then analyze it with ease. Using ADO technology in store of database constructs extended web log server system. The process of making clickstreaming into database can facilitate analysis of various user patterns and generates aggregate profiles to offer personalized web service. In particular, our results indicate that by using the users' clickstream. We can achieve effective personalization of web sites.

A Study on Design and Implementation of a Remote shame Examination Management System in Web-based (웹 기반 원격 모의고사 관리 시스템 설계 및 구현에 관한 연구)

  • Oh, Chang-Hwan;Lee, Ji-Sun;Chang, Keun;Lee, Byoung-Soo
    • Annual Conference of KIPS
    • /
    • 2000.10a
    • /
    • pp.493-496
    • /
    • 2000
  • 국가 백년지계를 좌우하는 교육 분야 중에서도 특히 입시관련 분야는 우리나라의 독특한 풍토와 교육적 환경에 의하여 세계의 어느 지역보다도 국민적 관심은 지대하다. 그러나 제도교육권의 열악한 환경은 이러한 점을 뒷받침하지 못하고 있기에 점차 비생산적이고 비능률적인 교육 산업구조를 고착화하는 수준에까지 이를 것으로 판단된다. 또한 해마다 70만명 가량의 수험생들이 자신들의 성적 관리를 위하여 연간 4-5회 가량의 모의고사를 보고 있으며, 기존의 OMR 처리 과정을 통해 각각의 성적 분석 결과를 확인하는데 까지 적지 않은 시간을 보내야만 하는 불편함을 가지고 있다. 본 연구에서는 이러한 문제점을 해결하기 위하여 Off-Line을 통해 실시되는 모의고사를 인터넷이라는 가상공간에서도 병행하여 보다 빠르게 개인들의 성적 분석 결과를 제공하고 효과적인 성적 관리가 가능한 시스템 모델을 제안한다 제안된 시스템 모델은 시험보기 부분과 결과 확인 및 분석 부분을 둔다. 시험보기 부분에서는 출제된 시험 문제의 정답을 확인하고 결과 확인 부분에서는 처리된 정답 결과를 토대로 성적 관리를 할 수 있도록 다양한 형태의 데이터 포맷으로 분석 표현 할 수 있는 방법을 기술하였다.

  • PDF

Asset-based Mapping Approach to Design for Poverty Informations (자산기반매핑을 이용한 가난정보 구축에 관한 연구)

  • Liou, Jaeik;Kim, Jae-Yun
    • Journal of the Korean Association of Geographic Information Studies
    • /
    • v.5 no.3
    • /
    • pp.55-67
    • /
    • 2002
  • Various researches and practices on asset management and asset-based mapping have been done with regard to engineering, industry, business and stocks marketing areas. Their notions and concepts are differently interpreted in response to different requirements. There are considerable research outcomes of management, operation and maintenance for physical, natural and digital assets. However, existing concept of asset management might have limitations to deal with diverse tangible or intangible assets at the individual/household/community level. In this paper, a conceptual framework of Hexad asset model is designed to explicate increase, decrease and other changes of assets flows as a geometric pathway. Particularly, consideration of lands and housing as important physical and natural assets to escape poverty not only leads to creation of an excellent 3D digital asset management, but also reaches to a new approach to asset-based mapping for a poverty information management and system.

  • PDF

Semantic User Profiles Manager based on OSGi (OSGi기반 시맨틱 사용자 프로파일 관리자)

  • Song, Chang-Woo;Kim, Jong-Hun;Chung, Kyung-Yong;Rim, Kee-Wook;Lee, Jung-Hyun
    • The Journal of the Korea Contents Association
    • /
    • v.8 no.8
    • /
    • pp.9-18
    • /
    • 2008
  • Research is being made for users' convenient access to services such as personalized data and contents services. The use of information and the fusion of services in various devices and terminals suggest the necessity to know what personalization mechanism is used to provide high quality contents at a time and place desired by users. Existing mechanisms are not easy to be handled by other service providers because each service provider has different preference and personal information, and are very inconvenient because service users have to set up and manage by themselves. Thus, the present paper proposes a Semantic User Profiles Manager based on OSGi, middleware for the provision and extension of semantic services, in order to manage users' profiles dynamically regardless of service provider. In addition, this paper defines a personalized semantic profile that enables user profiling, ontological domain modeling and semantic reasoning. In order to test the validity of this paper, we implemented semantic profiles into a bundle running based on OSGi. When users enter the range of the service area and use various devices, the semantic service matches in correspondence with semantic user profiles. The proposed system can easily extend the matching of services to user profiles and matching between user profiles or between services.

Development of Stress Index Model and u-SMC (Stress Management Center) Business Model from the Context-Aware Computing Perspective (상황인식적 서비스 관점의 스트레스 지수 모델 및 u-SMC(Stress Management Center) 비즈니스 모델의 개발)

  • Kim, Hyung-Jin;Lee, Sang-Hoon;Lee, Ho-Geun
    • Journal of Intelligence and Information Systems
    • /
    • v.14 no.2
    • /
    • pp.21-44
    • /
    • 2008
  • Recently, feasible services in ubiquitous computing environment are commonly based on context -aware computing. With the concept of context-awareness we can imagine more effective way to measure human being's daily stress and provide anti-stress services. Our study introduces logical and methodological approach to manage the stress through the development of stress index. From the practical perspectives, we also designed a business model for u-SMC, which is a profitable organization specialized in providing stress measurement services and personalized anti-stress services by utilizing the stress index model.

  • PDF

System Specification-based Design of Mobile Alarm System for Privacy Protection (시스템 명세화 기법 기반의 개인정보보호 모바일 알람 시스템 설계 및 구현)

  • Jang, Eun-Young;Kim, Hyung-Jong
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.20 no.1
    • /
    • pp.113-121
    • /
    • 2010
  • The system specification is a system theory based formal representation method for systems' structure and behavior modeling. When we make use of the system specification method in each step of software development, we can derive a hierarchical and modularized system design which enables us to manage the software development process flexibly. This research presents system specification based design of a mobile alarm system which sends alerts about illegal usage of private information and manages the response against the each alert. In our design of mobile alarm system, there are formal definition of alert message overcoming the functional limitation of mobile device and hierarchical modularized modeling of alarm processing using system specification. The efficiency of making use of the system specification is shown by applying the specification method to implementation of mobile alarm system. The contribution of this work is in design and implementation of mobile alarm system which enables us to handle the private information leakage situation more flexible way using system specification based software designing method.

Personal Kiosk : A Mobile Service Model for Ubiquitous Computing Environment (Personal Kiosk : 유비쿼터스 컴퓨팅 환경을 위한 모바일 서비스 모델)

  • Park Jeong-Kyu;Seo Seung-Ho;Kim Yang-Nam;Lee Keung-Hae
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.12 no.3
    • /
    • pp.170-182
    • /
    • 2006
  • Last few years have seen a rapid increase in research on ubiquitous computing. Ubiquitous computing is often touted as a technology that will make computing available to the user anywhere and anytime. One important problem to be addressed in building such a ubiquitous computing environment is how to manage services and deliver them to the user in an effective manner. This paper presents our model called Personal Kiosk(PK) as a way of solving the problem. PK is a model of ubiquitous service provisioning that enables the user to use desired services anytime and anywhere. The design and implementation of the current PK in the 'Local Area' setting with related technical issues are also presented. A location-sensing technique for indoor users and a personalized service provisioning based on user location and privileges are discussed in detail.

A Study on Data Security Control Model of the Test System in Financial Institutions (금융기관의 테스트시스템 데이터 보안통제 모델 연구)

  • Choi, Yeong-Jin;Kim, Jeong-Hwan;Lee, Kyeong-Ho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.24 no.6
    • /
    • pp.1293-1308
    • /
    • 2014
  • The cause of privacy extrusion in credit card company at 2014 is usage of the original data in test system. By Electronic banking supervision regulations of the Financial Supervisory Service and Information Security business best practices of Finance information technology (IT) sector, the data to identify the customer in the test system should be used to convert. Following this guidelines, Financial firms use converted customer identificaion data by loading in test system. However, there is some risks that may be introduced unintentionally by user mistake or lack of administrative or technical security in the process of testing. also control and risk management processes for those risks did not studied. These situations are conducive to increasing the compliance violation possibility of supervisory institution. So in this paper, we present and prove the process to eliminate the compliance violation possibility of supervisory institution by controlling and managing the unidentified conversion customer identification data and check the effectiveness of the process.