• Title/Summary/Keyword: 개인프레임

Search Result 353, Processing Time 0.024 seconds

A Study on Research Framework and Research Trends in the Healthcare Information Technology Area (헬스케어 정보기술 분야의 연구 프레임워크 및 연구동향)

  • Lee, N.K.;Lee, J.O.;Hwang, K.T.
    • Informatization Policy
    • /
    • v.21 no.3
    • /
    • pp.3-32
    • /
    • 2014
  • Recent developments of smart phone and ICT, and explosive developments of wireless sensor area drive radical changes on traditional health care service. To accommodate the changes, many researchers have studied to expand traditional healthcare service areas including home care for independent living and public care for preventive and collaborative wellness area. This study proposes a research framework for healthcare information technology area based on Mettler and Raptis's(2012) work. Then, the study analyze the research trends in the area based on the framework. The area of monitoring patients health status at home using smart phone, providing innovative healthcare service by out-patients monitoring, and implementing preventive healthcare services are identified most active and emerging research agenda. It is expected that the research framework and implications of this study can assist future research efforts and practical utilization of healthcare information technologies.

A Study on Research Framework and Research Trends in IT Service Management (ITSM) Area (IT 서비스 관리(ITSM) 분야의 연구 프레임워크 및 연구동향 분석)

  • Lee, Jong Ok;Shin, S.H.;Kim, Hong Keun;Hwang, K.T.
    • Informatization Policy
    • /
    • v.19 no.1
    • /
    • pp.3-24
    • /
    • 2012
  • This study proposes a research framework for IT service management (ITSM) area based on theories on innovation and IT achievements in the area of MIS. Then, existing ITSM literature is reviewed based on the research framework, and implications for future ITSM research are suggested. Major findings are as follows: (1) domestic research efforts should be continued to contribute to the diffusion of ITSM in industry, (2) since a certain level of research results has been accumulated, explanatory research rather than exploratory and/or descriptive studies should be pursued in the future, (3) research on the performance of ITSM is lacking, (4) research utilizing more objective data (secondary data obtained from ITSM systems) is needed. ITSM is innovation that can contribute to the improvement of productivity and competitiveness of organizations through systematic management of IT. It is expected that the research framework and implications of this study can assist future research efforts and practical utilization of ITSM.

  • PDF

The Brainwave Analyzer of Server System Applied Security Functions (보안기능을 강화한 뇌파 분석 서버시스템)

  • Choi, Sung-Ja;Kang, Byeong-Gwon;Kim, Gui-jung
    • Journal of Digital Convergence
    • /
    • v.16 no.12
    • /
    • pp.343-349
    • /
    • 2018
  • Electroencephalograph(EEG) information, which is an important data of brain science, reflects various levels of information from the molecular level to the behavior and cognitive stages, and the explosively amplified information is provided at each stage. Therefore, EEG information is an intrinsic privacy area of an individual, which is important information to be protected. In this paper, we apply spring security to web based system of spring MVC (Model, View, Control) framework to build independent and lightweight server system with powerful security system. Through the proposal of the platform type EEG analysis system which enhances the security function, the web service security of the EEG information is enhanced and the privacy of the EEG information can be protected.

A Study on eGovFrame Security Analysis and Countermeasures (eGovFrame 보안 분석 및 대응 방안에 관한 연구)

  • Joong-oh Park
    • Journal of Industrial Convergence
    • /
    • v.21 no.3
    • /
    • pp.181-188
    • /
    • 2023
  • The e-Government standard framework provides overall technologies such as reuse of common components for web environment development such as domestic government/public institutions, connection of standard modules, and resolution of dependencies. However, in a standardized development environment, there is a possibility of updating old versions according to core versions and leakage of personal and confidential information due to hacking or computer viruses. This study directly analyzes security vulnerabilities focusing on websites that operate eGovFrame in Korea. As a result of analyzing/classifying vulnerabilities at the internal programming language source code level, five items associated with representative security vulnerabilities could be extracted again. As a countermeasure against this, the security settings and functions through the 2 steps (1st and 2nd steps) and security policy will be explained. This study aims to improve the security function of the e-government framework and contribute to the vitalization of the service.

The Improvement Plan for Personal Information Protection for Artificial Intelligence(AI) Service in South Korea (우리나라의 인공지능(AI)서비스를 위한 개인정보보호 개선방안)

  • Shin, Young-Jin
    • Journal of Convergence for Information Technology
    • /
    • v.11 no.3
    • /
    • pp.20-33
    • /
    • 2021
  • This study is to suggest improvements of personal information protection in South Korea, according to requiring the safety of process and protection of personal information. Accordingly, based on data collection and analysis through literature research, this study derived the issues and suitable standards of personal information for major artificial intelligence services. In addition, this cases studies were reviewed, focusing on the legal compliance and porcessing compliance for personal information proection in major countries. And it suggested the improvement plan applied in South Korea. As the results, in legal compliance, it is required reorganization of related laws, responsibility and compliance to develop and provide AI, and operation of risk management for personal information protection laws in AI services. In terms of processing compliance, first, in pre-processing and refining, it is necessary to standardize data set reference models, control data set quality, and voluntarily label AI applications. Second, in development and utilization of algorithm, it is need to establish and apply a clear regulation of the algorithm. As such, South Korea should apply suitable improvement tasks for personal information protection of safe AI service.

CANVAS: A Cloud-based Research Data Analytics Environment and System

  • Kim, Seongchan;Song, Sa-kwang
    • Journal of the Korea Society of Computer and Information
    • /
    • v.26 no.10
    • /
    • pp.117-124
    • /
    • 2021
  • In this paper, we propose CANVAS (Creative ANalytics enVironment And System), an analytics system of the National Research Data Platform (DataON). CANVAS is a personalized analytics cloud service for researchers who need computing resources and tools for research data analysis. CANVAS is designed in consideration of scalability based on micro-services architecture and was built on top of open-source software such as eGovernment Standard framework (Spring framework), Kubernetes, and JupyterLab. The built system provides personalized analytics environments to multiple users, enabling high-speed and large-capacity analysis by utilizing high-performance cloud infrastructure (CPU/GPU). More specifically, modeling and processing data is possible in JupyterLab or GUI workflow environment. Since CANVAS shares data with DataON, the research data registered by users or downloaded data can be directly processed in the CANVAS. As a result, CANVAS enhances the convenience of data analysis for users in DataON and contributes to the sharing and utilization of research data.

Cyber Risk Management of SMEs to Prevent Personal Information Leakage Accidents (개인정보유출 사고 방지를 위한 중소기업의 사이버 위험관리)

  • So, Byoung-Ki;Cheung, Chong-Soo
    • Journal of the Society of Disaster Information
    • /
    • v.17 no.2
    • /
    • pp.375-390
    • /
    • 2021
  • Purpose: Most of cybersecurity breaches occur in SMEs. As the existing cybersecurity framework and certification system are mainly focused on financial and large companies, it is difficult for SMEs to utilize it due to lack of cybersecurity budget and manpower. So it is necessary to come up with measures to allow SMEs to voluntarily manage cyber risks. Method: After reviewing Cybersecurity market, cybersecurity items of financial institutions, cybersecurity framework comparison and cybersecurity incidents reported in the media, the criticality of cybersecurity items was analyzed through AHP analysis. And cybersecurity items of non-life insurers were also investigated and made a comparison between them. Result: Cyber risk management methods for SMEs were proposed for 20 major causes of cyber accidents. Conclusion: We hope that the cybersecurity risk assessment measures of SMEs in Korea will help them assess their risks when they sign up for cyber insurance, and that cyber risk assessment also needs to be linked to ERM standardization.

The Design of Intelligent Agent for Personal Finance Management System on Ubiquitous Environments (유비쿼터스 환경에서 개인자산관리 서비스를 위한 지능형 에이전트의 설계)

  • Shin, Kyung-Shik;Kim, Nam-Hee
    • Journal of Intelligence and Information Systems
    • /
    • v.15 no.4
    • /
    • pp.65-78
    • /
    • 2009
  • The rapid changes of financial environment have increased the need and demand for personal financial advisory service from financial experts. In particular, as the individual customers want to get more customized financial services, the financial institutions created the private banking (PB) sector and have constantly expanded their PB services. However, it remains still problematic that the private banking system requires high costs so that the number of eligible customers who can have proper PB services is quite limited. To solve this problem, we propose an intelligent agent that can provides specialized and customized personal financial advisory services to the customers with low costs. The proposed agent systemizes and structures the information and knowledge of financial experts in private banking services so that individual customers can easily access to high-quality PB services when they need. On the first attempt we develop a framework of U-smart PB, an intelligent agent for personal financial management based on different scenarios related to personal financial decisions, and derive its core services. This system not only provides information simply, but also proposes to support personal investment decisions technically as an intelligent agent that embodies real-time customized financial management in a ubiquitous environment, regardless of time and place.

  • PDF

Understanding Individual's Switching Intentions to Cloud Computing Service: Based on the Social Exchange Theory (개인 클라우드 컴퓨팅 서비스로의 전환의도에 관한 연구: 사회교환이론을 중심으로)

  • Shin, Seonjin;Park, Sung-Uk
    • Journal of Korea Technology Innovation Society
    • /
    • v.18 no.1
    • /
    • pp.176-203
    • /
    • 2015
  • While the importance of adopting cloud computing service has been emerged, comparatively little research has been conducted on examining factors of an individual user's intention to switch toward cloud computing service. Hereafter, this study presents and empirically tests users' intention to switch to cloud computing. Our model posits that the characteristics of cloud computing such as effectiveness, economics, accessability, switching cost, security concern, and satisfaction toward existing IT service to cloud service affect perceived value, which in turn, influences intention to switch. An experimental study using student subjects provided empirical validation for our proposed model. Survey data from 204 respondents was used to test the model using partial least square analysis. As the result of the analysis, five hypotheses out of seven hypotheses were supported. According to our results, among the characteristics of cloud computing, effectiveness, economics, switching cost, and security concern were found to have significant impact on users' intention to switch that mediated by perceived value. Based on our research findings, we hope that this research will stimulate researchers' interest in the emerging area of cloud computing adoption.

A Study of Real-time Service on Retransmission Slot in LR-WPAN (LR-WPAN에서 재전송 슬롯 기반 실시간 서비스 연구)

  • Cho, Moo-Ho
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.15 no.5
    • /
    • pp.19-27
    • /
    • 2010
  • In this paper, we propose a scheme for real-time data retransmission in LR-WPAN to support the required QoS even in the severe channel error environments. In IEEE 802.15.4a, as the user data rate is supported up to 850Kbps, the real-time streaming data can be transferred more easily. In this research, we study the beacon-enabled mode in IEEE 802.15.4 LR-WPAN standard. In the proposed scheme, special slots are dynamical1y assigned for retransmission of the packet that fails during a real-time data service, and in the severe channel error environments a time diversity is acquired. Analytical results show that the proposed scheme is more robust and achieves a much higher throughput than the previous protocol in LR-WPAN.