• Title/Summary/Keyword: 정보보호 만족도

Search Result 455, Processing Time 0.023 seconds

The Efficient Management Method about the Workers of the Welfare Facilities for Improving the Quality of Elderly Medical Service (노인의료서비스의 질적 제고를 위한 시설종사자 관리의 효율화 방안)

  • Cho, Woo-Hong;Park, Chun-Gyu;Son, Myeong-Dong
    • Journal of the Korea Society of Computer and Information
    • /
    • v.18 no.6
    • /
    • pp.91-99
    • /
    • 2013
  • This study has a purpose of analyzing the difference of care giver's subjective awareness of self-efficacy and job satisfaction according to the types of welfare facilities, before studying the structural relationship between the management variables about workers at the welfare facilities for improving the quality of elderly medical welfare service. As a result of empirical analysis, there was no awareness difference of care givers according to the types of the elderly medical welfare facilities, but in general it was emphasized that the care givers' satisfaction with self-efficacy and job satisfaction was very essential in providing the elderly medical service. Therefore, this study has significance that it provided the theoretical fundament for efficient management method about the workers of the elderly medical welfare facilities.

A Study on Models for Technical Security Maturity Level Based on SSE-CMM (SSE-CMM 기반 기술적 보안 성숙도 수준 측정 모델 연구)

  • Kim, Jeom Goo;Noh, Si Choon
    • Convergence Security Journal
    • /
    • v.12 no.4
    • /
    • pp.25-31
    • /
    • 2012
  • The SSE-CMM model is how to verify the level of information protection as a process-centric information security products, systems and services to develop the ability to assess the organization's development. The CMM is a model for software developers the ability to assess the development of the entire organization, improving the model's maturity level measuring. However, this method of security engineering process improvement and the ability to asses s the individual rather than organizational level to evaluate the ability of the processes are stopped. In this research project based on their existing research information from the technical point of view is to define the maturity level of protection. How to diagnose an information security vulnerabilities, technical security system, verification, and implementation of technical security shall consist of diagnostic status. The proposed methodology, the scope of the work place and the current state of information systems at the level of vulnerability, status, information protection are implemented to assess the level of satisfaction and function. It is possible that measures to improve information security evaluation based on established reference model as a basis for improving information security by utilizing leverage.

An empirical study on the performance factors of the BSC perspectives on government support regional innovation clusters in the management consulting (클러스터 혁신지역의 정부지원 경영컨설팅에 대한 BSC관점 성과요인 측면에서의 실증적 소고)

  • Park, Soon-mo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.6
    • /
    • pp.1583-1593
    • /
    • 2015
  • This study applied the BSC performance consulting experience and diverse variable factors and whether there any differences in terms of satisfaction and the relationship between the support for the government consulting firm specializing in human resources by the resident of the innovation cluster area was investigated through empirical research. According to the study, a new high in recent local government support Consulting Consulting satisfaction by professionals residing in the area that applies to industrial clusters leads to practical consultancy, which was being evaluated as a significant boon to real performance of the company.

Cryptanalysis of a Hash Function Proposed at PKC'98 (PKC'98에 제안된 해쉬함수의 공격)

  • 한대완;박상우;지성택
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.11 no.6
    • /
    • pp.127-134
    • /
    • 2001
  • At PKC\`98, SangUk Shin et al. proposed a new hash function based on advantages of SHA-1, RIPEMD-160, and HAVAL. They claimed that the Boolean functions of the hash function have good properties including the SAC(Strict Avalanche Criterion). In this paper, we first show that some of Boolean functions which are used in Shin\`s hash function does not satisfy the SAC, and then argue that satisfying the SAC may not be a good property of Boolean functions, when it is used for constructing compress functions of a hash function.

Measurement of Remediation for Compromised User Account of Web Single Sign-On (SSO) (침해된 웹 SSO 계정 보호를 위한 보안 조치 실험 연구)

  • Nam, Ji-Hyun;Choi, Hyoung-Kee
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.31 no.5
    • /
    • pp.941-950
    • /
    • 2021
  • Single Sign-On (SSO) service manages user's account passwords from multiple websites so that security in a high level is required. Users who use the SSO service are authenticated through the Identity Provider (IdP) when logging into the website. We present the security requirements that IdP can take in order to minimize the user's risk whose IdP account is compromised. We describe the security threats that arise when the security requirements are not satisfied. Through evaluation, we prove that the attacker's session cannot be canceled even if the user recognizes the attack if the IdP does not satisfy the security requirements.

A Study on the Fingerprinting scheme without Trusted Third Party (신뢰기관 비참여의 핑커프린팅 기법에 관한 연구)

  • Yong, Seung-Lim
    • Journal of the Korea Society of Computer and Information
    • /
    • v.14 no.7
    • /
    • pp.81-88
    • /
    • 2009
  • Fingerprinting scheme is a technique which supports the copyright protection to track redistributors of digital content using cryptographic techniques. These schemes enable the original merchant to identify the original buyer of the digital data by embedding fingerprints into digital contents. Asymmetric property of fingerprinting schemes is important to keep the buyer's privacy. In this paper, we propose a symmetric encryption based fingerprinting protocol without trusted third party. Our scheme enables the reduction of computational costs for the encryption using symmetric key encryption scheme. Since a trusted third party doesn't take part in making the fingerprint of each buyer, the protocol doesn't need to control the trusted third party and it is more secure against collusion attack.

e-Learning 이용자 특성과 만족에 관한 연구

  • Moon Tae-Hyun
    • The Journal of Information Technology
    • /
    • v.6 no.3
    • /
    • pp.137-150
    • /
    • 2003
  • Recently, developing information technology and increasing internet usage, e-Learning service industry is rapidly growing. However institutions and regulations related e-Learning service are insufficient. Users of e-Learning service were lower grade in school relatively, spent average 40,000won/month and used other private education service. Users answered that they were generally satisfied at e-Learning service but were not satisfied at e-Learning 'fee'and 'the contract process'. Specially, the result suggest that consumer's satisfaction is affect by experience of demage and complains related e-Learning usage.

  • PDF

Effect of job anxiety on life satisfaction of industry workers in the COVID-19 pandemic: focusing on the mediating effect of family support (코로나 팬데믹에서 서비스산업종사자들의 직업 불안이 삶의 만족에 미치는 영향: 가족지지의 매개효과)

  • Kim, Jeong-o
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2022.07a
    • /
    • pp.345-346
    • /
    • 2022
  • 본 연구에서는 코로나19 팬데믹에서 서비스산업종사자들의 직업 불안이 삶의 만족에 미치는 영향 관계를 알아보고자 연구를 진행하였다. 거기에 가족지지의 매개효과를 검증하고자 하였다. 2019년말에 발생한 코로나19는 세계적으로 한 번도 경험해 보지 못한 새로운 세상을 경험하고 있다. 자국의 국민을 보호하고자 국제 공항은 외국의의 출입을 철저히 봉쇄함으로써 코로나 확산을 막았고, 그로인하여 세계 경제교역은 큰 타격을 받았다. 산업관련 물동량은 점차 회복되고 있으나 여행객을 포함한 인적교류는 아직도 힘든 상황으로 호텔업, 관광업등의 서비스산업은 상당한 영향을 받아 거기에 종사하는 직원들 또한 자신의 직업에 대한 불안이 늘고 있다. 2021년 현재 대부분의 나라에서 위드코로나 정책으로 전환하면서 서비스산업이 점차 회복되고 있으나 아직도 힘든 상황을 보내고 있다. 따라서 본 고는 포스트 코로나시대에 서비스산업종사자들의 직업불안을 낮게 하고 삶의 만족을 높이는 방안을 제시하고자 하였다.

  • PDF

Cancelable Iris Templates Using Index-of-Max Hashing (Index-of-Max 해싱을 이용한 폐기가능한 홍채 템플릿)

  • Kim, Jina;Jeong, Jae Yeol;Kim, Kee Sung;Jeong, Ik Rae
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.3
    • /
    • pp.565-577
    • /
    • 2019
  • In recent years, biometric authentication has been used for various applications. Since biometric features are unchangeable and cannot be revoked unlike other personal information, there is increasing concern about leakage of biometric information. Recently, Jin et al. proposed a new cancelable biometric scheme, called "Index-of-Max" (IoM) to protect fingerprint template. The authors presented two realizations, namely, Gaussian random projection-based and uniformly random permutation-based hashing schemes. They also showed that their schemes can provide high accuracy, guarantee the security against recently presented privacy attacks, and satisfy some criteria of cancelable biometrics. However, the authors did not provide experimental results for other biometric features (e.g. finger-vein, iris). In this paper, we present the results of applying Jin et al.'s scheme to iris data. To do this, we propose a new method for processing iris data into a suitable form applicable to the Jin et al.'s scheme. Our experimental results show that it can guarantee favorable accuracy performance compared to the previous schemes. We also show that our scheme satisfies cancelable biometrics criteria and robustness to security and privacy attacks demonstrated in the Jin et al.'s work.

Personal Information Protection for Biometric Verification based TeleHealth Services (바이오인식을 이용한 원격의료에서의 개인정보보호)

  • Shin, Yong-Nyuo;Chun, Myung-Geun
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.20 no.5
    • /
    • pp.659-664
    • /
    • 2010
  • This paper provides an integrated framework for biometric data and private information protection in TeleHealth. Biometric technology is indispensable in providing identification and convenience in the TeleHealth environment. Once biometric information is exposed to mallicious attacker, he will suffer great loss from the illegferuse of his biometric data by someone else because of difficulty of change not like ID and password. We have to buil by someone esystem data bon the integrated framework for biometric data and private information protection in TeleHealth. First, we consider the structure of the biometric system and the security requirements of y someone esystem data bon the biometrics. And then, we define the TeleHealth system model and provide the vulnerabilities and countermeasures of the biometric-data by someone eintegrated model.byhe TeleHealth sse bec requires two-phata authentication for countermeasure. Finally, we made some functionferrequirements for main componenets of biometric-data bintegrated TeleHealth system framework to protect biometric data.