• Title/Summary/Keyword: 문서의 공개

Search Result 175, Processing Time 0.026 seconds

A Method of Identifying Ownership of Personal Information exposed in Social Network Service (소셜 네트워크 서비스에 노출된 개인정보의 소유자 식별 방법)

  • Kim, Seok-Hyun;Cho, Jin-Man;Jin, Seung-Hun;Choi, Dae-Seon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.23 no.6
    • /
    • pp.1103-1110
    • /
    • 2013
  • This paper proposes a method of identifying ownership of personal information in Social Network Service. In detail, the proposed method automatically decides whether any location information mentioned in twitter indicates the publisher's residence area. Identifying ownership of personal information is necessary part of evaluating risk of opened personal information online. The proposed method uses a set of decision rules that considers 13 features that are lexicographic and syntactic characteristics of the tweet sentences. In an experiment using real twitter data, the proposed method shows better performance (f1-score: 0.876) than the conventional document classification models such as naive bayesian that uses n-gram as a feature set.

Privacy Policy Analysis Techniques Using Deep Learning (딥러닝을 활용한 개인정보 처리방침 분석 기법 연구)

  • Jo, Yong-Hyun;Cha, Young-Kyun
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.2
    • /
    • pp.305-312
    • /
    • 2020
  • The Privacy Act stipulates that the privacy policy document, which is a privacy statement, should be disclosed in order to guarantee the rights of the information subjects, and the Fair Trade Commission considers the privacy policy as a condition and conducts an unfair review of the terms and conditions under the Terms and Conditions Control Act. However, the information subjects tend not to read personal information because it is complicated and difficult to understand. Simple and legible information processing policies will increase the probability of participating in online transactions, contributing to the increase in corporate sales and resolving the problem of information asymmetry between operators and information entities. In this study, complex personal information processing policies are analyzed using deep learning, and models are presented for acquiring simplified personal information processing policies that are highly readable by the information subjects. To present the model, the personal information processing policies of 258 domestic companies were established as data sets and analyzed using deep learning technology.

A Design and Implementation of Secure Electronic Bidding System (인터넷 기반 전자입찰시스템의 보안 설계 및 구현)

  • 윤선희
    • Journal of the Korea Computer Industry Society
    • /
    • v.3 no.7
    • /
    • pp.861-870
    • /
    • 2002
  • The area of business applications in the internet are extended enormously in result of fast development of computing and communication technologies, increase of internet use, and use of intranet/extranet in enterprise information system. Widely spread the use of the internet, there are various applications for Business to Business (B to B) or Business to Customer(B to C) model that are based on the intranet or extranet. This paper designed and implemented the Web-based Electronic Bidding System for Business to Business (B to B) model. The technical issues of electronic bidding system in the internet are involved in the connection between web client and server, electronic data interchange for the contract document, and security solution during the bidding and contracting processes. The web-based electronic bidding system in this paper is implemented using Java applet and servlet as a connection interface for web client and sewer, XML/EDI-based documents for a bid and a contract, and bidding server and notary server for enhancing the security using PKI(Public Key Infrastructure)-based public key cryptography, digital signature and Certification Authority (CA).

  • PDF

A Post-Management System of Digital Assets on Social network Services (소셜 네트워크 서비스에 게시된 디지털 자산의 사후 관리 시스템)

  • Moon, Wonsuk;Kim, Seoksoo
    • Journal of Digital Convergence
    • /
    • v.13 no.3
    • /
    • pp.209-214
    • /
    • 2015
  • Social network services such as Facebook and Flickr is a very useful service that was the foundation of the Internet. If a state in which the Internet is connected, music, photos, and us to be able to share it freely post such as documents. However, even when the digital information posted in such social network services the user has died, and have been published, it is also used for people who do not intend the bad purposes some problems can occur. Facebook is trying to apply the findings Jed R. Brubaker of UC Irvine University in order to solve this problem. However, in Korea, such efforts, not much appears for now. Therefore, we proposed a method that can be managed by delegated Facebook, safely a Delegator digital information posted on social networking services such as Flickr. Our proposed system, as compared with Jed R. Brubaker and Jeong-Kyung Moon is executed previous studies, we studied a method proposed by the appropriate compensates points shortage is passed through the future research. And I consider to have been proposed a method to safely use posted digital assets in a social network service.

한간 "산수서" 와 "구장산술" 의 비교

  • Cha, Jong-Cheon
    • Communications of Mathematical Education
    • /
    • v.15
    • /
    • pp.273-280
    • /
    • 2003
  • 1983년 말 중국 형주시 소재 강릉장가산 247호 묘에서 죽간의 형태로 출토된 ${\ulcorner}$산수소${\lrcorner}$ 는 그것이 엮어진 시점이 유휘의 ${\ulcorner}$구장산술${\lrcorner}$ 보아 최소한 450년 가량이나 거슬러 올라간다는 점에서 동야수학사의 기원을 크게 앞당기게 하는 막중한 의의를 지니는 문서가 아닐 수 없다. 그러나 석문 자체가 최근 들어와서야 겨우 공개되었을 뿐, 현재로서는 자료에 대한 평가와 내용 분석은 물론, 변역마저도 제대로 이루어지지 못한 상태에 있다. 이 글은 ${\ulcorner}$산수서${\lrcorner}$${\ulcorner}$구장산술${\lrcorner}$ 의 내용을 배교하여 ${\ulcorner}$산수서${\lrcorner}$ 의 특징을 밝히는 동시에 동양수학의 초창기 발달의 궤적을 더듬어 보려는 시도이다. ${\ulcorner}$산수서${\lrcorner}$ 는 '상승(相乘)'에서 '이전(里田)'까지 이어지는 70개 제명(題名)하에 서술되어 있는데, 제명들은 주제를 나타내는 것과 산법을 나타내는 것을 혼재하는 것으로 나타난다. 내용 가운데에는 '여직(女織)', '우시(羽矢)', '소광(少廣)' 등이 문제처럼 ${\ulcorner}$구장산술${\lrcorner}$ 의 그것들과 기본적으로 같거나 유사한 것들이 다수 발견되어 고대수학 전통의 연속성을 엿볼 수 있게 하지만, 동시에 의료수가 문제인 '의(醫)'처럼 ${\ulcorner}$산수서${\lrcorner}$에서만 발견되는 것들도 더러 눈에 띈다. ${\ulcorner}$산수서${\lrcorner}$${\ulcorner}$구장산술${\lrcorner}$ 사이에 이루어진 수학 발달은, 이를테면, 제급근 사이에 있어서 전자의 경우에는 $\sqrt{240}$$15\frac{15}{31}$로 계산한 데서도 드러나듯이 보간법에 의존한 반면, 후자의 경우에는 온답을 제시하는 데 하등의 어려움을 겪지 않았다는 차에서도 확인된다.

  • PDF

Secure Sharing and Recovering Scheme of e-Business Data Based on Weight Table (가중치 테이블 기반 안전한 e-비즈니스 데이터 분할 복원 방식)

  • Song, You-Jin;Kim, Jin-Seog
    • The KIPS Transactions:PartC
    • /
    • v.16C no.1
    • /
    • pp.27-36
    • /
    • 2009
  • The leaking of personal information is mostly occurred by internal users. The confidential information such as credit card number can be disclosed or modified by system manager easily. The secure storaging and managing scheme for sensitive data of individual and enterprise is required for distributed data management. The manager owning private data is needed to have a weight which is a right to disclose a private data. For deciding a weight, it is required that system is able to designate the level of user's right. In this paper, we propose the new algorithm named digit-independent algorithm. And we propose a new data management scheme of gathering and processing the data based on digit-independent algorithm. Our sharing and recovering scheme have the efficient computation operation for managing a large quantity of data using weight table. The proposed scheme is able to use for secure e-business data management and storage in ubiquitous computing environment.

A Study on Efficient Handover Scheme using Pre-authentication and Route Optimization in PMIPv6 (PMIPv6에서 사전 인증 기법과 경로 최적화를 이용한 효율적인 핸드오버 기법에 관한 연구)

  • Kim, Seong-Chul;Moon, Il-Young;Cho, Sung-Joon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.14 no.5
    • /
    • pp.1117-1124
    • /
    • 2010
  • PMIPv6 is a network-based mobility support scheme, proposed and standardized by NetLMM WG of IETF. It is proposed to solve problems of conventional mobility schemes, and to improve inefficiency of those. The standard document describes network components and detailed procedures to provide mobility to MN. But it describes only a handover procedure between MAGs, not between LMAs. In order to support seamless connectivity of MN efficiently, a handover procedure between LMAs is necessary. The proposed scheme in this paper utilizes a route optimization procedure to prevent inefficiency of inter-LMA tunneling scheme. At the same time, the proposed scheme utilizes a pre-authentication scheme to reduce handover latency. According to the result of performance evaluations, the proposed scheme greatly reduces handover latency, compared to conventional mobility support schemes.

Development of a Three Dimensional Control System for Implementing Rapid Prototyping Technology (쾌속조형기술의 구현을 위한 3차원 제어시스템 개발)

  • Cho, Sung-Mok
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.8 no.4
    • /
    • pp.775-780
    • /
    • 2007
  • Rapid Prototyping (RP) is a technology that produces prototype parts from 3D computer aided design model data without intermediate processing technology rapidly. CAD model data are created from 3D object digitizing systems but presented just as 2D data when they are printed as a hard copy or displayed on a monitor. However, Rapid Prototyping Technology fabricates 3D objects the same that CAD data because it transforms designed 3D CAD data into 2D cross sectional data, and manufactures layer by layer deposition sequentially. But most of all the small and medium scale companies which produce a toothbrush, a toy and such like provisions are in difficult situations to buy RP system because it is very expensive. In this paper, we propose a 3D control system adopting open source programs for implementing Rapid Prototyping Technology in order that RP system can be purchase at a moderate price.

  • PDF

Coreference Resolution for Korean Using Random Forests (랜덤 포레스트를 이용한 한국어 상호참조 해결)

  • Jeong, Seok-Won;Choi, MaengSik;Kim, HarkSoo
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.5 no.11
    • /
    • pp.535-540
    • /
    • 2016
  • Coreference resolution is to identify mentions in documents and is to group co-referred mentions in the documents. It is an essential step for natural language processing applications such as information extraction, event tracking, and question-answering. Recently, various coreference resolution models based on ML (machine learning) have been proposed, As well-known, these ML-based models need large training data that are manually annotated with coreferred mention tags. Unfortunately, we cannot find usable open data for learning ML-based models in Korean. Therefore, we propose an efficient coreference resolution model that needs less training data than other ML-based models. The proposed model identifies co-referred mentions using random forests based on sieve-guided features. In the experiments with baseball news articles, the proposed model showed a better CoNLL F1-score of 0.6678 than other ML-based models.

Research Records Management in Regional Public Hospital: Focusing on the Cases of Institutional Review Board (IRB) of Incheon Medical Center (지방의료원의 연구기록관리: 인천광역시의료원 임상연구윤리위원회(IRB) 사례)

  • Jiyeon Sim
    • Journal of Korean Society of Archives and Records Management
    • /
    • v.23 no.1
    • /
    • pp.127-132
    • /
    • 2023
  • The Incheon Medical Center Institutional Review Board (IRB), a department that reflects the characteristics of Incheon Medical Center, a medical and public institution, was established in 2013. IRB contributes to performing its role as a local accountable care hospital and protecting researchers and subjects by proving the ethics of research conducted at the medical center. So far, IRB has reviewed a total of 80 research proposals for human subject research and human-derived material research, and it currently exists as an independent department directly under the president of the medical center. This paper aims to explain the registration and preservation of IRB-related records, the maintenance of the Records Management Standard Table and related regulations, and archives, as well as to present limitations and improvements in the disclosure, utilization, and classification of records.