• Title/Summary/Keyword: 보안 정책 관리

Search Result 591, Processing Time 0.025 seconds

The Study of RIA Development Direction using Suggestion System (제안제도를 활용한 RIA 발전 방향에 관한 연구)

  • Shin, Young-Kyun;Chun, Jun-Hong;Kim, Yeon-Ok;Lee, Seon-Ho;Kim, Seong-Ho;Yoo, Seon-Hee
    • The Korean Journal of Nuclear Medicine Technology
    • /
    • v.15 no.1
    • /
    • pp.106-112
    • /
    • 2011
  • Purpose: Until now, the process was improved by the needs of experimenters personally. But recently, suggestion system in hospital has been activated in various ways. So the department of nuclear medicine laboratory is also aware of the need of operation improvement using suggestion system. It is intend to assist in the development by sharing excellent suggestion cases with other hospitals. Material & Method: A total of 124 suggestion cases from January 2007 to March 2010 were analyzed. Suggestion cases were divided into customer satisfaction, cost reduction, improved testing methods, equipment, environmental improvement, and computational system. Result: Suggestion cases of environmental improvement and computational system were accounted for 26.6% as 33 cases, respectively. Suggestion for customer satisfaction is 25.8% as 32 in a total of 124 cases. Conclusion: Activation of the awareness of operation improvement is induced by suggestion system. By securing system of operation improvement, employees' ideas can lead to the production and systematization. Furthermore, it enhances hospital competitiveness and promotes the development of the hospital.

  • PDF

Efficient Session Management mechanism applied Key Recovery technique in IPSec (IPSec에서 키 복구 기술을 적용한 효율적인 연결 관리 메커니즘)

  • Kim, Jeong-Beom;Lee, Yun-Jeong;Park, Nam-Seop;Kim, Tae-Yun
    • The KIPS Transactions:PartC
    • /
    • v.8C no.6
    • /
    • pp.775-782
    • /
    • 2001
  • Recently the use of Linux OS is increasing to tremendous figures. But due to the fact that Linux is distributed on an open-source policy, the need of security is an upcoming question which leads to widespread development of security on a Linux based environment. Cryptography, however, can cause various problems because of difficulty of key management. A lot of researchers have been concentrating on the key recovery technique to eliminate the reverse effect of using these kinds of security and to promote positive aspects of using it. In this thesis I am suggesting an mechanism based on the key recovery technique, as a method to save time in recovery and resetting a disconnection between two end-users through IPSec (IP Security) protocols in a VPN (Virtual Private Network) environment. The main idea of the newly suggested mechanism, KRFSH (Key Recovery Field Storage Header), is to store the information of the session in advance for the case of losing the session information essential to establish a tunnel connection between a SG and a host in the VPN environment, and so if necessary to use the pre-stored information for recovery. This mechanism is loaded on the IPSec based FreeS/WAN program (Linux environment), and so the VPN problem mentioned above is resolved.

  • PDF

A Study of the Effectiveness and Status of the Information Security Disclosure System (정보보호 공시제도의 운영실태와 효과성 분석)

  • Baek, Seung Jun;Lee, Hong Joo
    • Knowledge Management Research
    • /
    • v.22 no.1
    • /
    • pp.309-330
    • /
    • 2021
  • The information security disclosure system (ISDS) has been implemented since 2016 to ensure the protection of stakeholders and the right to know, and to promote voluntary investment in information protection by companies. Regarding the information security disclosure system, there have been studies that urge the implementation of the system, but studies that analyze the contents disclosed after the implementation of the system or suggest improvement directions are few. In this study, the contents of the information security disclosure system that had been announced on the information security industry promotion portal until 2019 were analyzed, the current status was summarized, and the direction of system improvement was suggested. In some cases, companies that disclosed information through the disclosure system increased the number of personnel in charge and obtained certifications related to information security, but did not find any effect on the increase/decrease in investment. The current disclosure system has not been activated because it has difficulty in giving individual companies incentives to disclose. Thus, this study suggests the inclusion of ISDS to information security management system (ISMS), which is currently mandatory for certain companies. In the current disclosure system, it is difficult for the company's stakeholders or customers to check the contents of the disclosure. As a way to do this, a method of including in the contents of the personal information processing policy or the notification of the use of personal information was suggested.

A Study on Collaborative Network for Coping with COVID-19 Using Social Network Analysis (소셜 네트워크 분석을 활용한 코로나19 대응 협력 네트워크에 관한 연구)

  • Oh, Juyeon;Kim, Jinjae;Lee, Taeho;Suh, Woojong
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.27 no.3
    • /
    • pp.89-108
    • /
    • 2022
  • The purpose of this study is to reveal the specific current and future shapes of the collaborative network among organizations witch cope the COVID-19 in Korea. For this, this study conducted social network analysis, based on the response data of 73 experts from 36 COVID-19-related organizations. As a result of the analysis, it was confirmed that the Korea Disease Control and Prevention Agency (KDCA) plays a pivotal role as a control tower in coping COVID-19 in all of the analysis of degree, betweenness, and closeness centrality. In addition, the results revealed concrete forms of collaborative relationships among participating organizations in the public and private sectors that constitute the present and future networks centered on the KDCA. Furthermore, this study presented which organizations and relationships should be the focus of establishing a future collaborative network through comparative analysis between the current cooperative network and the network to be built in the future. The analysis results and discussions of this study are expected to be used as useful information for policy development related to collaborative networks that can effectively respond to disasters caused by new diseases in the future.

Analyzing Research Trends in Blockchain Studies in South Korea Using Dynamic Topic Modeling and Network Analysis (다이나믹 토픽모델링 및 네트워크 분석 기법을 통한 블록체인 관련 국내 연구 동향 분석)

  • Kim, Donghun;Oh, Chanhee;Zhu, Yongjun
    • Journal of the Korean Society for information Management
    • /
    • v.38 no.3
    • /
    • pp.23-39
    • /
    • 2021
  • This study aims to explore research trends in Blockchain studies in South Korea using dynamic topic modeling and network analysis. To achieve this goal, we conducted the university & institute collaboration network analysis, the keyword co-occurrence network analysis, and times series topic analysis using dynamic topic modeling. Through the university & institute collaboration network analysis, we found major universities such as Soongsil University, Soonchunhyang University, Korea University, Korea Advanced Institute of Science and Technology (KAIST) and major institutes such as Ministry of National Defense, Korea Railroad Research Institute, Samil PricewaterhouseCoopers, Electronics and Telecommunications Research Institute that led collaborative research. Next, through the analysis of the keyword co-occurrence network, we found major research keywords including virtual assets (Cryptocurrency, Bitcoin, Ethereum, Virtual currency), blockchain technology (Distributed ledger, Distributed ledger technology), finance (Smart contract), and information security (Security, privacy, Personal information). Smart contracts showed the highest scores in all network centrality measures showing its importance in the field. Finally, through the time series topic analysis, we identified five major topics including blockchain technology, blockchain ecosystem, blockchain application 1 (trade, online voting, real estate), blockchain application 2 (food, tourism, distribution, media), and blockchain application 3 (economy, finance). Changes of topics were also investigated by exploring proportions of representative keywords for each topic. The study is the first of its kind to attempt to conduct university & institute collaboration networks analysis and dynamic topic modeling-based times series topic analysis for exploring research trends in Blockchain studies in South Korea. Our results can be used by government agencies, universities, and research institutes to develop effective strategies of promoting university & institutes collaboration and interdisciplinary research in the field.

A Study on the Perception of Research Data Managers to Establish a Korea Research Data Commons System (국가연구데이터커먼즈 체계 수립을 위한 연구데이터 관리자들의 인식에 관한 연구)

  • Seong-Eun Park;Mikyoung Lee;Minhee Cho;Sa-Kwang Song;Dasol Kim;Hyung-Jun Yim
    • Journal of the Korean Society for information Management
    • /
    • v.41 no.1
    • /
    • pp.465-486
    • /
    • 2024
  • The purpose of this study is to identify the current status of infrastructure and services for analyzing research data for research data managers at government-funded research institutions under the National Research Council for Science and Technology (NST) who will actually use the Korea Research Data Commons (KRDC), which is being developed by the Korea Institute of Science and Technology Information (KISTI) and to investigate the perceptions of research data managers related to the establishment of KRDC system. For the study, we conducted a survey targeting 24 government-funded research institutes, excluding KISTI, and interviewed research data managers from 9 of the 15 institutions surveyed who agreed to follow-up interviews. As a result of the survey, most institutions were providing related services, and their willingness to introduce an integrated analysis framework for the use of research data and provide a system for using externally released analysis software was also high. Meanwhile, when we investigated the external disclosure status of each institution's analysis services through follow-up interviews, only a minimal number of institutions were disclosing them to the outside world. The findings reveal that there is a demand to utilize analysis infrastructure and services when provided through the framework. However, it is difficult to disclose and share the analysis resources held by each organization. In order to establish the KRDC system, it is essential to share research sites' analysis infrastructure and services, and in addition, changes in the perception of research sites and institutional changes are necessary. Furthermore, there is a need to establish policies that consider the system's convenience, security, and compensation system raised in the follow-up interviews.

The Implementation Status of Dental Treatment Infection Control Standards of Dental Hygienists (치과위생사의 치과진료 감염방지기준에 관한 연구)

  • Yoo, Ha-Na;Kang, Kyung-Hee
    • Journal of Digital Convergence
    • /
    • v.11 no.12
    • /
    • pp.649-656
    • /
    • 2013
  • This study was conducted to find out about the implementation status of dental treatment infection control standards of dental hygienists. The subjects of research were the dental hygienists working at dentist offices in Chungnam, Cheonan-si using self-input method from July 25th, 2012 to August 1st 2012. The collected data was analyzed after computerized statistical processing using SPSS 18.0. For hepatitis B vaccination, the results were high with 75.0% of answers being 'yes' or auto-active immunity, but for the latest hepatitis vaccination period showed highest results in '5 years or more ago' with 48.0%. Although 93.0% answered that vaccination was important, the percentage of replies that they had vaccination education was relatively low with 41.0%. For the use of personal protection tools the use of protective goggles was low compared to the use of masks and medical gloves. The percentage of subjects that answered that they always wash their hands before treatment was relatively low with 56.0% compared to 82.0% of subjects that answered that they always washed their hands after treatment. Dental treatment equipment washing before sterilization, use of packing and re-sterilization of tools with damaged packing showed high results for 'yes', but the ratio of subjects that answered 'no' to water line management was low with 39%.

An Efficient Query-based XML Access Control Enforcement Mechanism (효율적인 질의 기반 XML 접근제어 수행 메커니즘)

  • Byun, Chang-Woo;Park, Seog
    • Journal of KIISE:Databases
    • /
    • v.34 no.1
    • /
    • pp.1-17
    • /
    • 2007
  • As XML is becoming a de facto standard for distribution and sharing of information, the need for an efficient yet secure access of XML data has become very important. To enforce the fine-level granularity requirement, authorization models for regulating access to XML documents use XPath which is a standard for specifying parts of XML data and a suitable language for both query processing. An access control environment for XML documents and some techniques to deal with authorization priorities and conflict resolution issues are proposed. Despite this, relatively little work has been done to enforce access controls particularly for XML databases in the case of query access. Developing an efficient mechanism for XML databases to control query-based access is therefore the central theme of this paper. This work is a proposal for an efficient yet secure XML access control system. The basic idea utilized is that a user query interaction with only necessary access control rules is modified to an alternative form which is guaranteed to have no access violations using tree-aware metadata of XML schemes and set operators supported by XPath 2.0. The scheme can be applied to any XML database management system and has several advantages over other suggested schemes. These include implementation easiness, small execution time overhead, fine-grained controls, and safe and correct query modification. The experimental results clearly demonstrate the efficiency of the approach.

A study of the major countries cyber terrorism Response System and Implications - Focusing on Analyzing the U.S., U.K. and Germany Cases - (주요국의 사이버테러 대응체계와 시사점 분석 - 미국·영국·독일 사례의 비교를 중심으로 -)

  • Kwon, Oh-Kook;Seok, Jae-Wang
    • Korean Security Journal
    • /
    • no.49
    • /
    • pp.187-214
    • /
    • 2016
  • In the mordern society, the reliance on the cyber domain and the cyber connectivity has been increasingly strengthened. Due to this phenomenon, the cyberterror against critical infrastructures and state organs might lead to fatal consequences. Lately, North Korea's cyberattacks against South Korea's national organizations and financial computer networks are becoming more and more intelligent and sophisticated. The cyberattacks against such critical infrastructures have caused enormous economic loss and social disorder. This paper is designed to examine comparatively the cyberterror related laws and organizations of the advanced countries such as U.S. and U.K. and to draw implications. Although those countries are under different institutional and cultural backgrounds with varying security envrionments, they are identically pursuing measures by establishing government-wide counterterror system for coordination and cooperation. They are also commonly focusing upon creating new organizations equipped with new system and upon enhancing intelligence performance and devising punishment regulations. Korea is lack of framework laws regulating cyber security, having only scattered individual laws. Since such legal base is far from efficient counterterror activities, it is necessary that the legal and policy response of the advanced countries should be closely studied for selective introduction. That will eventually lead to legislation of cyber security law. With such legislation on hand, it is subsequently required to strengthen crisis management for prevention of cyberterror and to create joint response team, cooperating with private organizations.

  • PDF

A Study on Telcos' Strategies to Digital Converged Service and Its Prospects; Focusing on TV-based VOD Service (통신사업자의 통신방송 융합사업 진출전략 및 전망 - TV-based VOD를 중심으로 -)

  • 조병선;황호영
    • Proceedings of the Korea Technology Innovation Society Conference
    • /
    • 2003.11a
    • /
    • pp.23-40
    • /
    • 2003
  • 초고속인터넷 접속서비스 시장이 성숙 단계에 접어듬으로써 성장세는 급격히 둔화되고 경쟁환경은 심화되는 과정에서 통신사업자들이 기존의 신규가입자 유치 위주의 정책에서 벗어나 초고속인터넷 가입자 인프라를 기반으로 새로운 부가 서비스 및 차별화 된 서비스의 개발을 통해 가입자 확대 및 ARPU(Average Revenue Per Unit)를 중대 시킬 수 있는 수익원 개발이 절실하다. 이러한 상황하에서 통신방송 융합 서비스는 통신사업자에게 기회와 위협이라는 상반된 현상으로 다가오고 있다. TV-based VOD 서비스는 보다 양질의 멀티미디어 서비스를 원하는 고객의 수요와 신규 고객을 유치하고 가입자를 Lock-in 시키며, 타 통신 사업자의 고객을 자사 고객으로 전환시키고자 하는 차별화 전략의 일환으로 도입되기 시작하였고, 또한 ARPU를 증대 시키고 다양한 수익원 개발의 일환으로 인터넷 접속서비스 외에 부가가치를 창출 할 수 있는 Killer Service로서 주목을 받고 있다. TV VOD 사업이 성공적으로 국내 시장에 정착될 경우, 통신사업자에게는 여러 형태의 수익원 발굴이 가능할 것으로 예상된다. 즉 가입비, 월 이용료, 부가 사용료 등과 같은 포괄적인 형태의 가입비가 주된 수익원이 될 것이이며, pay-per-view(PPV) 형태의 이용료 역시 주된 수익원이 될 것이다. 이 외에도 셋톱박스, 홈게이트웨이/서버 등과 같은 단말기의 임대와 판매를 통한 수익 창출방안과 다른 서비스들과 마찬가지로 광고도 중요한 수익원천으로 활용 할 수 있을 것이며 또한 미디어업체 또는 CP(contents provider)를 대상으로, 보안, 인증, 과금, 결제, 회원 관리, 이용정보 제공 서비스 등도 사업자의 수익원으로 활용할 이 있을 것이다. TV-based VOD 서비스는 망 진화에 따른 차세대 초고속인터넷 서비스 기술인 VDSL이나 Advanced 케이블모뎀을 이용 DVD 급 고화질의 TV-based VOD 서비스가 시작되면서 ARPU를 증대 시키고 다양한 수익원 개발의 일환으로 인터넷 접속서비스 외에 부가가치를 창출 할 수 있는 Killer Service로서 VOD서비스가 주목을 받고 있다. TV-based VOD 서비스는 가입자망의 진화 와 밀접하게 연관되어 전개되는 서비스로 Post-ADSL에 대한 예측과 VOD에 서비스에 대한 설문조사 결과를 토대로 하여 예측 한 바에 의하면 Post-ADSL 가입자는 2003년 153만명에서 2004년 444만으로 증가하고 2006년 987만 명에 이를 것으로 전망되고, VOD서비스 가입의향도 16%에서 2006년 34% 까지 증가하는 것으로 나타났다. 따라서 VOD서비스 가입자는 2003년 24만 명에서 2004년 98만으로 증가하고 2006년 335만 명으로 증가하는 것으로 예측되었다.

  • PDF