• Title/Summary/Keyword: 정보보호 교육기관

Search Result 106, Processing Time 0.022 seconds

Building Disaster Communication Network to Protect Foreign Knowledge Workers from Disasters (외국인 지식노동자 보호를 위한 재난통신 네트워크 구축에 관한 개념적 연구)

  • Oh, Nam-Kyung
    • The Journal of the Korea Contents Association
    • /
    • v.22 no.2
    • /
    • pp.107-115
    • /
    • 2022
  • This study discusses how to protect foreign knowledge workers from disasters conceptually. While their prestigious social and economic status, the knowledge workers can become vulnerable to disasters due to their nomadic lifestyle and voluntary isolation from communities where they reside temporarily. This study introduced and discussed strengths and weaknesses of various types of disaster communication networks and found the Small World Network (SWN) and the use of structural holes would be an appropriate strategy for the protection of knowledge workers. The use of mediators for disaster communication would be a strategic intervention from public and private organizations since that addresses voluntary isolation issue without restructuring existing disaster communication network.

Improving Research Information Security in Academic Institutes through the Analysis of Security Awareness and Activities (보안 인지 및 실천 현황 분석을 통한 대학 연구정보보안 수준 제고 방안)

  • Park, Il-Hyung;Kim, Seong-Woo;Seo, Seung-Woo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.20 no.2
    • /
    • pp.91-108
    • /
    • 2010
  • Universities are one of leading R&D institutes, however, their scarce security investment allows research information to leak outside. This paper proposes methods for improving security level of academic institutes to protect research information by analyzing security awareness and activities. To do that, we verified the current status of information security and awareness level by analyzing the survey which was conducted for a member of Seoul National University. As a result of statistical analysis using correlation, analysis of variance, multi regression and so on, we concluded that it is essential to improve security awareness, activities, professor's security level and management process for research labs. Thus, we suggest the following methods, security awareness and knowledge development through education, security management for research labs through provision, introduction of data protection softwares and physical control of visitors which are to be adopted to improve security level.

Organisation des Rettungsdienstes in Deutschland (독일의 응급구조업무의 조직)

  • Kim, Ki Young
    • Proceedings of the Korean Society of Disaster Information Conference
    • /
    • 2015.11a
    • /
    • pp.300-302
    • /
    • 2015
  • 독일의 응급구조업무의 조직은 독일 기본법(GG) 제30조, 제70조에 따라 오로지 연방부들에게 있다. 유럽 연합은 기술적 조직적 통일성과는 별도로 각각의 국민들의 건강보호의 일부분으로 응급구조의 조직과 재정에서 상당히 광범위하게 재량을 인정하고 있으며 이에 따라 유럽연합의 시스템과 정책들의 입법적 조화를 사실상 포기하고 있는 실정이다. 독일연방주들은 자신들의 주응급구조법률(LRDG)에서 응급구조업무의 보장을 일반적으로 재차 지방자치단체(주 근교도시중심)에게 독자적인 업무로서 인정하고 있다(가령 슐레비히 홀스타인주 응급구조법(RDGSH) 제6조). 이러한 주들은 응급구조를 자신의 관할지역에 대해 준비하고 스스로 운영하거나 운영통제할 수 있는 구조목적의 단체들(RZV)과 공동협력을 할 수 있다. 각각의 업무능력과 법적인 기준에 따라 구조 목적의 단체들(RZV)은 자신의 이름으로 응급구조를 운영하거나 하나 또는 다수의 기관(공공 구조서비스 혹은 사설 구조서비스)에게 시행을 위임할 수 있다. 이러한 측면에서 본 연구에서는 독일의 경우 의사가 직접 현장 의료를 담당하고 있다는 점에서최근 입법을 통해 응급구조사의 교육과정을 개편하고 있으며, 질적 향상을 통해 응급의사와 응급구조사의 권한범위에서 독일 응급구조사의 권한확대가 시도되고 있다는 시사점을 도출하고 있다.

  • PDF

A Study on the Improvement of Evaluation System of National Infrastructure System using Meta-Evaluation (메타평가를 이용한 국가기반체계 평가시스템 개선에 관한 연구)

  • Lee, Seong-Yeob;Lee, Jung-Myoung;Jung, Yong-Kyun;Cheung, Chong-Soo
    • Journal of the Society of Disaster Information
    • /
    • v.14 no.2
    • /
    • pp.203-210
    • /
    • 2018
  • Purpose: The purpose of this study is to build a model for the meta - evaluation of the national infrastructure system and to improve the evaluation system of the national infrastructure system using the model. Method: For the study, the disaster-related laws and regulations, the evaluation report of the national infrastructure system published by the government, the guideline for the establishment of the national infrastructure protection plan, the meta-evaluation previous research data, To analyze the actual state of the evaluation. Results: Among the indices of evaluation of the current national infrastructure system, the supplementary requirements were derived from seven indicators such as appropriateness of education and training plan and implementation of disaster response, evaluation and communication with stakeholders, and evaluation committee training time. Conclusion: It is expected that the improvement plan derived from this study can be used to improve the evaluation index of the national infrastructure system.

A New Efficient Private Key Reissuing Model for Identity-based Encryption Schemes Including Dynamic Information (동적 ID 정보가 포함된 신원기반 암호시스템에서 효율적인 키 재발급 모델)

  • Kim, Dong-Hyun;Kim, Sang-Jin;Koo, Bon-Seok;Ryu, Kwon-Ho;Oh, Hee-Kuck
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.15 no.2
    • /
    • pp.23-36
    • /
    • 2005
  • The main obstacle hindering the wide deployment of identity-based cryptosystem is that the entity responsible for creating the private key has too much power. As a result, private keys are no longer private. One obvious solution to this problem is to apply the threshold technique. However, this increases the authentication computation, and communication cost during the key issuing phase. In this paper, we propose a new effi ient model for issuing multiple private keys in identity-based encryption schemes based on the Weil pairing that also alleviates the key escrow problem. In our system, the private key of a user is divided into two components, KGK (Key Description Key) and KUD(Key Usage Desscriptor), which are issued separately by different parties. The KGK is issued in a threshold manner by KIC (Key Issuing Center), whereas the KW is issued by a single authority called KUM (Key Usage Manager). Changing KW results in a different private key. As a result, a user can efficiently obtain a new private key by interacting with KUM. We can also adapt Gentry's time-slot based private key revocation approach to our scheme more efficiently than others. We also show the security of the system and its efficiency by analyzing the existing systems.

About Child Abuse A Study on the Perception of Parents and Early Childhood Teachers (아동학대에 대한 학부모와 유아교사의 인식 차이)

  • Ha, Jung-Sun;Kim, Yong-sook
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.20 no.4
    • /
    • pp.189-196
    • /
    • 2019
  • The purpose of this study was to analyze the perception of child abuse by parents and early childhood teachers. For this purpose, a questionnaire survey was conducted with parents and early childhood teachers belonging to kindergarten in G district. The frequency, percentage, mean and standard deviation were calculated using the SPSS 21.0 program, and the t-test and the ${\chi}^2$ test were used to obtain data on child abuse(physical, language, emotion and thinking, neglect, preventive measure, improvement plan). The results of this study are as follows: First, the difference of perception about child abuse was higher in early childhood teachers than parents. Recognition of subordinate content is neglected in both parents and early childhood teachers, body, emotion and thinking, and language. Second, parent awareness of child abuse prevention education and participatory seminar education was more perceived than subcontent of preventive measures. The awareness and satisfaction of child abuse preventive education, the awareness of the legal role and function of the child protection agency, the mandatory reporting of child abuse, and the perception of the obligor were more perceived by early childhood teachers. Third, the subcontracting of the child abuse improvement measures, the provision of child abuse preventive education and provision of data, the actual situation of child abuse through mass media and promotion of measures, expansion of child abuse prevention education using mass media, Teachers were more aware of education. These results are expected to provide basic data on understanding and recognition of the prevention of child abuse by parents and early childhood teachers.

A Study on Strategic Development Approaches for Cyber Seniors in the Information Security Industry

  • Seung Han Yoon;Ah Reum Kang
    • Journal of the Korea Society of Computer and Information
    • /
    • v.29 no.4
    • /
    • pp.73-82
    • /
    • 2024
  • In 2017, the United Nations reported that the population aged 60 and above was increasing more rapidly than all younger age groups worldwide, projecting that by 2050, the population aged 60 and above would constitute at least 25% of the global population, excluding Africa. The world is experiencing a decline in the rate of increase in the working-age population due to global aging, and the younger generation tends to avoid difficult and challenging occupations. Although theoretically, AI equipped with artificial intelligence can replace humans in all fields, in the realm of practical information security, human judgment and expertise are absolutely essential, especially in ethical considerations. Therefore, this paper proposes a method to retrain and reintegrate IT professionals aged 50 and above who are retiring or seeking career transitions, aiming to bring them back into the industry. For this research, surveys were conducted with 21 government/public agencies representing demand and 9 security monitoring companies representing supply. Survey results indicated that both demand (90%) and supply (78%) unanimously agreed on the absolute necessity of such measures. If the results of this research are applied in the field, it could lead to the strategic development of senior information security professionals, laying the foundation for a new market in the Korean information security industry amid the era of low birth rates and longevity.

Factors Influencing Individual's Intention to Provide MyData: Focusing on the Moderating Effects of Individual Capabilities and Institutional Type (개인의 마이데이터 제공의도에 영향을 미치는 요인: 개인역량과 기관유형의 조절효과를 중심으로)

  • Dong Keun Park;Sung-Byung Yang;Sang-Hyeak Yoon
    • Knowledge Management Research
    • /
    • v.24 no.1
    • /
    • pp.73-97
    • /
    • 2023
  • Recently, the MyData market has been growing as the importance of data and issues related to personal information protection have drawn much attention together. MyData refers to the concept of guaranteeing an individual's right to personal information and providing and utilizing one's data according to individual consent. MyData service providers can combine and analyze customer information to provide personalized services. In the early days, the MyData business was activated mainly by private companies and the financial industry, but recently, public institutions are also actively taking advantage of MyData. Meanwhile, the importance of an individual's intention to provide MyData for the success of MyData businesses continues to increase, but research related to this is lacking. Moreover, existing studies have been mainly conducted on individual benefits of MyData; there are not enough studies in which both public benefit and perceived risk factors are considered at the same time. In this regard, this study intends to derive factors affecting the intention to provide MyData based on the privacy calculus model, examine their influencing mechanism, and further verify the moderating effects of individual capabilities and institutional type. This study can find academic significance in that it expanded and demonstrated the privacy calculus model in the context of MyData providing intention. In addition, the results of this study are expected to offer practical guidelines for developing and managing new services in MyData businesses.

A Study on the Current State of Illegal Distribution of Literary Works on Internet Cafes and Homepages (인터넷 카페와 홈페이지의 어문저작물 불법 전송 실태에 관한 연구)

  • Kwack, Dong-Chul
    • Journal of the Korean Society for information Management
    • /
    • v.21 no.4 s.54
    • /
    • pp.209-231
    • /
    • 2004
  • The purpose of this study is to examine the current state of illegal distribution of literary works on internet cafes and homepages, and figure out how to protect the rights of copyright holders. For this study, examined were the cafes and menus of homepages of major Websites on the Internet, where illegal copying and delivery of literary works could happen. For each Website, the volumes of the entire collection, the number of literary works held, the maximum and average number of transactions were investigated, and literary works categorized according to genres were analyzed. The result shows that the strict legislation and regulation by government or copyright organizations could hinder the positive distribution of awareness about the copyright : but, still strongly needed is the promotion and education of the importance of copyright to help the public understand better. Providers of portal services should take a proper step to strengthen the training of and systematic support for copyright-related issues for both operators and users of cafes and homepages on Websites.

Research on international examples on prevention of juvenile delinquency

  • Park, Jong-Ryeol;Noe, Sang-Ouk
    • Journal of the Korea Society of Computer and Information
    • /
    • v.25 no.8
    • /
    • pp.151-157
    • /
    • 2020
  • The first thing we can consider to prevent juvenile delinquency is to punish those criminals. However, this is not always the proper solution. In consideration to the feature of juvenile period when they lack in proper judgment it is better to provide education than punishment so that they are not branded as criminals in our society. Also, by returning to the society, they can obtain social techniques and obtain the opportunity of making contribution to the society, which is also good for their career development. Combining international examples on juvenile delinquency prevention, there is a need to comprehensively evaluate level of probation and risk exposure of juvenile based on placement matrix of comprehensive strategy program in the US. Also, control solution by juvenile crime development phase should be made. In terms of control treatment based on crime phase, crime history should be considered when applying control. For the subject of preventing juvenile crime, it shouldn't be legal organizations like before but shall be home, school, local society, and legal organization together.