• Title/Summary/Keyword: 보호 동기

Search Result 311, Processing Time 0.031 seconds

A Study on the Information Protection Intention of Digital Healthcare Service Providers (디지털 헬스케어 서비스 제공자의 정보보호의도에 관한 연구)

  • Yang, Chang-Gyu
    • Asia-Pacific Journal of Business Venturing and Entrepreneurship
    • /
    • v.17 no.4
    • /
    • pp.163-172
    • /
    • 2022
  • This study investigates the IPI (Information Protection Intention) of DHS (Digital Healthcare Service) providers by introducing PMT (Protection Motivation Theory). This study examines the effects of protection motivation, such as threat appraisal and coping appraisal, on IPI, such as ICI(Induction Control Intention) and SDI(Self Defense Intention). The research model, based on the PMT, adopted severity, vulnerability, reaction efficacy and self-efficacy as independent variables. The research model was validated through quantitative research, a survey of 222 DHS providers in South Korea, using structural equation modeling. The results show that (1) a clear awareness of the consequences of security threats increases the understanding of DHS providers on the severity of closure of healthcare information, and thus may decreases abuse of DHS by providers; (2) user confidence and satisfaction on the security system may make them be confident that they can handle the closure of healthcare information by themselves; and (3) although DHS providers are realizing the consequences of closure of healthcare information, they think that they are unlikely to encounter such situations. As a result of this study, venture companies that provide DHS need to provide contents that can continuously increase providers' security level in order to increase providers' information protection intention. It suggests that IPI is important through trust of healthcare service providers.

스트림 암호시스템에 관한 연구

  • 이만영
    • Review of KIISC
    • /
    • v.1 no.2
    • /
    • pp.9-28
    • /
    • 1991
  • 창간호에 이어 본고에서는 동기축자암호시스템(synchronous stream ciphers)의 암호 화 및 복호, 키 자동키 암호시스템, 그리고 자기동조축자암호시스템의 암호문귀환암호시스 템과 평문귀환암호시스템에 관하여 분석하고자 한다.

  • PDF

A Strong RFID Authentication Protocol Based on Synchronized Secret Information (비밀정보 동기화에 기반한 Strong RFID 인증)

  • Ha, Jae-Cheol;Ha, Jung-Hoon;Park, Jea-Hoon;Moon, Sang-Jae;Kim, Hwan-Koo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.17 no.5
    • /
    • pp.99-109
    • /
    • 2007
  • Lee et al. recently proposed an RFID mutual authentication scheme based on synchronized secret information. However, we found that their protocol is vulnerable to a spoofing attack in which an adversary can impersonate a legal tag to the reader by sending a malicious random number. To remedy this vulnerability, we propose two RFID authentication protocols which are secure against all possible threats including backward and forward traceability. Furthermore, one of the two proposed protocols requires only three hash operations(but, $[m/2]{\cdot}2+3$ operations in resynchronization state, m is the number of tags) in the database to authenticate a tag, hence it is well suitable fur large scale RFID systems.

A Study on the Influencing Factors on perceived usefulness and continuous use intention of used trading app's users: Focusing on consumption value and protection motive theory (중고거래 앱(App) 사용자의 지각된 유용성 및 지속적 사용의도에 미치는 영향요인에 관한 연구: 소비가치와 보호동기 이론을 중심으로)

  • Joung, HyunSuk;Kim, MiSook;Hong, KwanSoo
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.27 no.2
    • /
    • pp.143-161
    • /
    • 2022
  • This study examines the effect of used trading app's consumption value and protection motivation and the perceived usefulness and continuous use intention. The proposed research model and developed hypotheses were tested using structural equations modeling based on data collected from 293 customers with experience in used transaction app's. The results of the study confirm the positive effects of the used trading app's consumption value and protection motive theory is perceived usefulness of customer. In addition, there is a positive relationship between a customer's perceived usefulness and continuous use intention of used trading app's. The study provides On a theoretical level valuable insights into the sustainability of transaction app's after post-COVID 19 and the importance of developing used trading app's consumption value and protection motivation, but there is also a limitation that the region is limited.

Effects of Job Stress and Drinking Motivations on the Drinking Behavior of Korea's Mentally Challenged in Sheltered Employment (보호고용 정신지체인의 직무스트레스와 음주동기가 음주행위에 미치는 영향)

  • Bae, Kyung-Hee;Kim, Yu-Soon
    • Korean Journal of Social Welfare
    • /
    • v.56 no.4
    • /
    • pp.35-55
    • /
    • 2004
  • Effects of job stress and drinking motivations on the drinking behavior of Korea's mentally challenged in sheltered employment. The purpose of this article was to investigate job stress, drinking motivations, and factors influencing the drinking behavior of Korea's mentally challenged. The 97 subjects' average job stress level was slightly below average. The subjects were found to experience salary-related stress the most out of the five sub-areas of job stress. The strongest motivations of drinking was the social motivation. In terms of drinking behavior, the most common drinking frequency was 3-4 times a year. The most common drinking amount was two 500cc mugs of beer. The significant predictors to explain the variance of the frequency of drinking was motivations to cope with, age, and salary-related stress. The mentally challenged drink more often when they have coping motivations and salary-related stress, and when they are younger. The significant predictors to explain the variance of the amount of drinking was motivations to emotional uplifting, drinking colleagues, stress from role overload. The mentally challenged drink more when they have motivations to emotionally uplift themselves and less role overload-related stress and as they drink alone.

  • PDF

Fault Simulation of Generating Bus Using RTDS Model of the Precise Generator Protection Relay (고정밀 발전기 보호계전기의 RTDS 모델을 이용한 발전단 사고 모의)

  • Park, Sung-Woo;Cho, Yoon-Sung;Lee, Chul-Kyun;Cha, Syeng-Tae;Shin, Jae-Kyung
    • Proceedings of the KIEE Conference
    • /
    • 2006.11a
    • /
    • pp.302-304
    • /
    • 2006
  • 본 연구에서 개발한 실시간 시뮬레이터에 적용 가능한 발전단 사고 모의를 위한 정밀 모델 개발 목적은 발전단에서 발생되는 다양한 사고 중 전기적 형태로 모의 가능한 사고를 분류하고 실시간 시뮬레이터로 모의하도록 발전기 모델 및 보호계전요소 모델을 개발하여 이를 현장 실무 교육 및 훈련에 활용하기 위한 것이다. 본 연구에서는 RTDS/RSCAD로 구현 가능한 6가지 계전 요소(거리계전, 주파수, 역전력, 과여자, 과전압, 동기탈조)에 대해 모델링하였다. 그리고 보호계전기가 효과적인 보호계전을 수행할 수 있도록 계전기 신호 처리 모듈, 거리계전기 모듈, 역전력 모듈, 과여자 모듈, 주파수 모듈, 과전압 모듈, 동기탈조 모듈을 UDC를 이용하여 개발하였다. 그리고, 각 요소의 출력에 대해서 Flex Logic을 이용하여 최종적으로 계전기의 트립을 결정하는 모듈을 개발하였다. 또한 발전단 사고에 따른 발전기 보호 과정을 모의함으로써 발전회사 발전기 운전원들이 실제적인 발전기 동특성 및 발전기 보호계전기의 동작을 이해할 수 있도록 하였다.

  • PDF

A Study on the Factors of Experience and Habit on Information Security Behavior of New Services - based on PMT and UTAUT2 (경험 및 습관이 신규서비스의 정보보호 행동에 미치는 요인에 대한 연구 - 보호 동기이론과 UTAUT2을 중심으로)

  • Lee, Hong-Je;Kho, Hyeong-Seog;Roh, Eun-Hee;Han, Kyeong-Seok
    • Journal of Digital Contents Society
    • /
    • v.19 no.1
    • /
    • pp.93-102
    • /
    • 2018
  • This study aims to present policy implications by analyzing information security behavior factors of internet users. The research model, based on PMT and UTAUT2, consists of perceived threat, severity, social influence, self-efficacy, experience and habits, PC and privacy behaviors, security behaviors on new services and set demographic characteristics, use places of internet, use of paid products, and experiences of accident as moderate variables to analyze the effect on security behavior. The results showed that perceived severity, self-efficacy significantly influenced on experience and habits, and experience and habits and self-efficacy had a high influence on PC and privacy behavior. Also, PC and privacy behaviors have a high impact on security behavior of new services. Age, income, use of paid products, and experience of accidents have a moderating effects on security behaviors. The results of this study are expected to help policy decision making to improve the level of information security of internet users.

Design of high-speed block transmission technology for real-time data duplication (실시간 데이터 이중화를 위한 고속 블록 전송기술 설계)

  • Han, JaeSeung;An, Jae-Hoon;Kim, Young-Hwan;Park, Chang-Won
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2018.07a
    • /
    • pp.445-448
    • /
    • 2018
  • 본 논문에서는 데이터 이중화 저장시스템의 장애발생으로 인한 백업서버 데이터 손실을 보호하기 위해 무 손실 실시간 데이터 이중화 시스템 설계방안을 제안한다. 이는 원본서버의 데이터와 백업서버의 데이터가 특정 시점 T에서 100% 일치하지 않는 비동기 방식을 동기방식으로 해결하기 위한 시스템 설계 제안으로, 원본서버의 데이터 생성과 동시에 실시간 데이터 백업을 목적으로 한다. 이를 위해 전송단계에서 필요한 가장 빠른 압축인 LZ4 압축 알고리즘을 기반으로 Intel AVX 명령어를 사용하여 보다 압축속도를 증진시켜 실시간 시스템을 구축한다. 또한 전송 중 보안위협으로부터 보호하기 위해 Key 전달 기법과 AES 암호화 알고리즘에 대해 기술한다.

  • PDF

A Proposal of SH-Tree Based Data Synchronization Method for Secure Maritime Cloud (안전한 해사클라우드 환경을 위한 SH-Tree 기반의 데이터 동기화 기법 제안)

  • Lee, Donghyeok;Park, Namje
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.26 no.4
    • /
    • pp.929-940
    • /
    • 2016
  • The IMO e-navigation strategy has requested a communication infrastructure providing authorized seamless information transfer between stakeholders. The Maritime Cloud is the term used to describe the concept of an infrastructure that support authorized, seamless information transfer, adding those elements, that are necessary to support the e-navigation domain. It is necessary to consider the study on maritime cloud security, but the study is still an early stage. In this paper, we propose a secure synchronization method for the maritime cloud services. The proposed method can be synchronize between the vessel based on the SH-Tree, and it has the advantage that there is no exposure information in the synchronization process.

The Analysis and Improvement of Generator Protection System in Pumped Storage Hydro plant (양수발전기 보호 분석 및 개선)

  • Kim, Chun-Kyum
    • Proceedings of the KIEE Conference
    • /
    • 2011.07a
    • /
    • pp.211-213
    • /
    • 2011
  • 통상 발전원으로서의 역할만을 담당하는 일반 화력발전기와는 달리 양수발전기는 발전원으로서의 역할뿐 아니라 계통운영의 경제성과 운영방향에 따라 부하로서의 역할을 수행한다. 이때는 동기기로서 조상기 혹은 전동부하가 되며 이로 인하여 일반 화력발전기와는 다르게 양수운전등 부하로서의 역할을 위한 또 다른 보호시스템을 적용하고 있다. 대용량 발전기와 전동부하로서의 역할을 겸용함으로써 필연적으로 나타나는 화력발전기와의 보호방식 차이를 비교 분석하고 보다 안정된 설비운전을 위한 보호시스템 적용에 대해 논하고자한다.

  • PDF