• Title/Summary/Keyword: 위험기반서비스수준

Search Result 55, Processing Time 0.027 seconds

A Study on the Information Protection Intention of Digital Healthcare Service Providers (디지털 헬스케어 서비스 제공자의 정보보호의도에 관한 연구)

  • Yang, Chang-Gyu
    • Asia-Pacific Journal of Business Venturing and Entrepreneurship
    • /
    • v.17 no.4
    • /
    • pp.163-172
    • /
    • 2022
  • This study investigates the IPI (Information Protection Intention) of DHS (Digital Healthcare Service) providers by introducing PMT (Protection Motivation Theory). This study examines the effects of protection motivation, such as threat appraisal and coping appraisal, on IPI, such as ICI(Induction Control Intention) and SDI(Self Defense Intention). The research model, based on the PMT, adopted severity, vulnerability, reaction efficacy and self-efficacy as independent variables. The research model was validated through quantitative research, a survey of 222 DHS providers in South Korea, using structural equation modeling. The results show that (1) a clear awareness of the consequences of security threats increases the understanding of DHS providers on the severity of closure of healthcare information, and thus may decreases abuse of DHS by providers; (2) user confidence and satisfaction on the security system may make them be confident that they can handle the closure of healthcare information by themselves; and (3) although DHS providers are realizing the consequences of closure of healthcare information, they think that they are unlikely to encounter such situations. As a result of this study, venture companies that provide DHS need to provide contents that can continuously increase providers' security level in order to increase providers' information protection intention. It suggests that IPI is important through trust of healthcare service providers.

A Study on Implementation Plan for AI Service Impact Assessment (인공지능 서비스 영향평가 추진방안에 대한 연구)

  • Shin, Sunyoung
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.22 no.5
    • /
    • pp.147-157
    • /
    • 2022
  • The purpose of this study is to establish policy recommendations for the promotion of AI service impact assessment based on the definition of impact assessment and analysis of domestic and foreign AI service impact assessment cases. The direction of implementation was analyzed based on the case of impact evaluation promoted in various fields at home and abroad and the case of impact evaluation at home and abroad of artificial intelligence services. As a step-by-step implementation plan, in the first stage, quantitative indicators such as AI level survey-based economic effects are developed, and in the second stage, information culture such as safety and reliability and artificial intelligence ethics described in the Framework Act on Intelligence Information, social, economic, information protection, and people's daily lives are prepared. In the third stage, discussion on detailed metrics and methods will be expanded and impact assessment results will be evaluated. This study requires analysis through various participants such as policy designers, artificial intelligence service developers, and civic groups in the future.

A Study on the Sustainable Tourism Destination Management Plan using LBS (LBS를 이용한 지속가능한 관광지 관리방안에 관한 연구)

  • Park, Jae-Wan
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.18 no.3
    • /
    • pp.447-451
    • /
    • 2017
  • This study proposes a new model of tourism destination management based on the tourism management program using information and communication technology provided by LBS. The personalized tourist information service can enhance the satisfaction of tourists. Sustainability can be expanded through management based on the capacity of the tourism destination. Increased satisfaction leads to more diverse tourism activities. Various tourism activities increase the consumption expenditure, which satisfies the local tourism destination management purpose. The tourism destination management plan of the central and local governments is a comprehensive system in which detailed policy support plans are formulated from the perspective of the three requirements for sustainability-economic, socio-cultural, and environmental-and concerned parties are connected and resources are supported through detailed processes in which the sources of disparities in accessibility are identified and the roles are delegated at the national, community, and regional levels.

Minimizing the Risk of an Open Computing Environment Using the MAD Portfolio Optimization (최적포트폴리오 기법을 이용한 개방형 전산 환경의 안정성 확보에 관한 연구)

  • Kim, Hak-Jin;Park, Ji-Hyoun
    • Journal of Intelligence and Information Systems
    • /
    • v.15 no.2
    • /
    • pp.15-31
    • /
    • 2009
  • The next generation IT environment is expected to be an open computing environment based on Grid computing technologies, which allow users to access to any type of computing resources through networks. The open computing environment has benefits in aspects of resource utilization, collaboration, flexibility and cost reduction. Due to the variation in performance of open computing resources, however, resource allocation simply based on users' budget and time constraints often fails to meet the Service Level Agreement(SLA). This paper proposes the Mean-Absolute Deviation(MAD) portfolio optimization approach, in which service brokers consider the uncertainty of performance of resources, and compose resource portfolios that minimize the uncertainty. In order to investigate the effect of this approach, we simulate an open computing environment with varying uncertainty levels, users' constraints, and brokers' optimization strategies. The simulation result concludes threefolds. First, the MAD portfolio optimization improves the success ratio of delivering the required performance to users. Second, the success ratio depends on the accuracy in predicting the variability of performance. Thirdly, the measured variability can also help service brokers expand their service to cost-critical users by discounting the access cost of open computing resources.

  • PDF

UML based User-Centric Design for Evaluating of Risk Order (위험 순위 산정을 위한 UML 기반 사용자 중심 설계)

  • Woo, Chan-Il;Lee, Seung-Dae
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.12 no.2
    • /
    • pp.841-846
    • /
    • 2011
  • Presently, the level of service(LOS) of the domestic roads are evaluated by using average speed of passing by vehicles. However, this method has been designed by considering the degree of congestion on the road only, without considering the reality of traffic safety. Therefore, for the LOS to serve as an index evaluating proper road design and operation, it should be able to deal with wider coverage than known factors which directly affects road users. Therefore the study wants to explore the concept of user cost, as a factor that covers traffic safety and flow, for evaluating roads. Also, the study wants to develop UML based user-centric design, not a one-time development method, for evaluating risk order of roads.

Design and Implementation of A Context-Aware Authentication Security Service Based on u-Hospital Environments (u-병원 환경 기반에서 상황인식 인증 보안 서비스 설계 및 구현)

  • Jeong, Chang-Won;Choi, Jae-Hyeong;Joo, Su-Chong
    • Journal of Internet Computing and Services
    • /
    • v.13 no.2
    • /
    • pp.51-57
    • /
    • 2012
  • The warming up of the recent competition in the smart phone industry followed by rapid increase of open platforms and app stores have led the mobile terminals to adopt the general purpose operating system. The mobile device utilizing this OS is vulnerable to mobile malignant code which is highly transferable. As a result, the scale of mobile attack and harm increase. However, compared to the malicious code and virus which keep increasing, the elements for security to prevent are insufficient. Therefore, this paper describe about the Context Aware Service that eliminates the potentially risky elements on the smart phone service, which could threaten the usability of the service including invasion of personal information. The proposed system prevents from disclosure of personal information by giving the procedure of information, and realizes the service that is able to change the sequence of identifying the users' information to prepare for emergency.

Development of Social Work Strategies for School-linked services - Based on Latent Class Growth Analysis of Delinquent Behaviors in adolescence - (학교연계 서비스를 위한 사회복지실천 전략 개발 - 청소년기 경비행행동의 차별적 발달궤적에 대한 잠재계층성장분석 -)

  • Lee, Sang-Gyun
    • Korean Journal of Social Welfare Studies
    • /
    • v.40 no.3
    • /
    • pp.377-406
    • /
    • 2009
  • This study used laten class growth analysis to identify discrete developmental patterns of delinquent behaviors in adolescence. This present article also examined associations among these trajectories to determine how the development of delinquent behaviors relates to protective and risk factors, which include parental monitoring, attachment with parent, association with deviant peers, self-control, and negative stigma from others. Four-wave panel data from a Korea Youth Panel Study were used for the latent class growth model analysis. The sample consisted of 3,446 adolescents who were assessed at 4 measurement waves with approximately 1-year interval. Four trajectories of delinquent behaviors emerged: delinquency persistence, delinquency increaser, delinquency decreaser, normative group(almost no delinquent behaviors). Association with deviant peers had the most proximal strong influence on the probability of being in the delinquency increaser and delinquency persistence group compared, noed to the normative group. Parental monitoring, self-efficacy and negative stigma also differentiated the four delinquent behavior trajectories from one another after controllig for socio-demographic variables. The study suggested that there is a significant heterogeneity in the timing and change rate of delinquency progression. Adolescent delinquency prevention and intervention programs will need to consider this heterogeneity and enhance attention to protective and risk factors depending on the subpopulation.

The Security Risk and Countermeasures of Blockchain based Virtual Currency Trading (블록체인 기반 가상화폐 거래의 보안 위험 및 대응방안)

  • Chung, Young-Seek;Cha, Jae-Sang
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.11 no.1
    • /
    • pp.100-106
    • /
    • 2018
  • Since the concept of virtual currency called Bitcoin was announced in 2008, the blockchain technology, which is the basis of Bitcoin, is attracting attention as an important platform technology in the era of the 4th industrial revolution that can change our society in the future. Although Existing electronic financial transactions store and manage all transaction history at a reliable central organization such as government and bank, blockchain-based electronic financial transactions are composed of a distributed structure in which all participants participating in the transaction store and manage the transaction history, it is possible to secure transaction transparency while reducing system construction and operation costs. Besides the virtual currency that started with bit coins, the technology of these blockchains has been extended in various fields such as smart contracts and document management. The key technology area of this blockchain is security based on proven cryptographic technology to make it difficult to forge and hack, but there are security risks such as security vulnerabilities in the virtual currency trading service, We will discuss security risks in using virtual currency and discuss countermeasures. Especially security accidents of virtual currency exchanges are occurring frequently recently, the damage of users who trade the virtual currency is also increasing, we propose security threats and security countermeasures against virtual currency exchanges.

Active Disaster Alerting Service System based on App of Smart Moving Object (스마트 이동객체의 App 기반 능동형 재해경보서비스 시스템)

  • Han, Gi-Tae
    • Journal of the Korea Society of Computer and Information
    • /
    • v.16 no.9
    • /
    • pp.131-143
    • /
    • 2011
  • Previous alerting service based on LBS was caused severe overload problem of server by using the method to confirm the location of each moving object on server. In this paper, by loading an App on smart moving object, we proposed a novel algorithm named ADAS(Active Disaster Alert Service) for accessing to the server site with oneself location information as needed and implemented the disaster alerting service system with visualization for user. In the proposed method, running App access to the server periodically with the present location coordinate gained from GPS module or network module and the ID of moving object. Then, the server compare the present location coordinate of moving object and the coordinates of disasters registered in DIDB and transmit the n NDIs existed in near distance orderly from the coordinate of present moving object to the client. The App compares the coordinate of present location for moving object and the coordinates of NDI is transmitted from server by real time and executes the service with classifying levels of alert into three steps such as danger, carefulness and safety. And new NDIs are gained by accessing DIDB on Server periodically during running App. Therefore, this will be become a novel method for reducing fundamentally the server overload problem in comparison with previous alerting service that the career of moving object is managed on server.

A Study on the Lightweight Cryptographic Algorithms for Remote Control and Monitoring Service based on Internet of Things (사물인터넷 기반 원격 제어 및 모니터링 서비스를 위한 경량 암호화 알고리즘 연구)

  • Jeong, Jongmun;Bajracharya, Larsson;Hwang, Mintae
    • Asia-pacific Journal of Multimedia Services Convergent with Art, Humanities, and Sociology
    • /
    • v.8 no.5
    • /
    • pp.437-445
    • /
    • 2018
  • Devices have a lot of small breakdowns rather than big breakdowns. But it often wastes time and increases cost of maintenance, such as calling a service technician for small breakdowns. So, if we use remote control and monitoring service using Internet of Things, we can minimize the time period and cost for the maintenance. However, security is important because remote control and monitoring services contain personal information which when leaked, may be dangerous. There are many types of Internet based monitoring devices that are in use, but it is difficult to expect a high level of security because there are many cases in which the performance is minimal. Therefore, in this paper, we classify remote control and monitoring services based on Internet of Things type and derive encryption requirement for four types. We also compared and analyzed the lightweight cryptographic algorithms that can be expected to use high performance even on the Internet of Things. And it is derived that LED is used as a equipment management type, DESLX as a environment management type, CLEFIA as a healthcare management type and LEA as a security management type are the optimal lightweight cryptographic algorithms for each type.