• Title/Summary/Keyword: 정보보호 지원 정책

Search Result 142, Processing Time 0.024 seconds

An Analysis of the Effect of the Pilot Project for the Management of the Elderly's Food Service in Cheongju City: Focused on improving hygiene control (청주시 노인급식 관리지원 시범사업의 효과분석 : 위생관리개선을 중심으로)

  • Lee, Joo-Eun
    • Journal of Digital Convergence
    • /
    • v.19 no.1
    • /
    • pp.431-441
    • /
    • 2021
  • In this study, the hygiene control status of meals for the elderly was investigated for the elderly care facilities, communal living families, and day care centers, which are members of the Cheongju Social Welfare Food Management Support Center, and the improvement of food hygiene management was compared and analyzed to find out the effectiveness of the pilot project after conducting management support such as hygiene education for the elderly and providing related supplies and information. The study found that after the first support, the average score of overall feeding hygiene control increased significantly from 63.13 points (out of 100) to 75.10 points (p<0.001) and from 75.10 points (out of 100) to 80.89 points (p<0.001). After primary support, 16 out of 29 items showed significant differences in average scores in the checklist, and 7 out of 29 after secondary visit support (p<0.05, p<0.01, p<0.001). Based on the effectiveness of the above-mentioned pilot project to support senior citizens' meal service management, more welfare facilities for senior citizens should be continuously supported by the Foodservice Management Support Center.

Design and Effect Analysis of Confederation Interface for ROK-US Combined Exercises (한미 연합연습 모의지원을 위한 다중 페더레이션 인터페이스 설계 및 효과분석)

  • Won, Kyoungchan;Jeong, Sukjae
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.19 no.12
    • /
    • pp.498-506
    • /
    • 2018
  • Recently, the US commanded a wargame simulation system of a combined ROK-US exercise with single federation. However, after the OPCON transfer, many limitations to the single federation have been cited such as security policies and information protection. We suggest a hierarchical federation as a way to overcome these problems. Regarding HLA rules, the participants use the same FOM and RTI in single federation. There are limitations to implement CI in applying heterogeneous FOMs and RTIs in current single federation. Therefore, we propose implementing CI with heterogeneous FOMs and RTIs in a hierarchical federation. This system overcomes the weaknesses of the system structure, which is a disadvantage of the single federation. In the federation test, we can apply heterogeneous FOMs and RTIs and achieve similar performance to the current combined exercise simulation. In conclusion, ROK should lead the simulation system of combined exercises using the CI after the OPCON transfer.

Access Control for XML Documents Using Extended RBAC (확장된 RBAC를 이용한 XML문서에 대한 접근제어)

  • Kim, Jong-Hun;Ban, Yong-Ho
    • Journal of Korea Multimedia Society
    • /
    • v.8 no.7
    • /
    • pp.869-881
    • /
    • 2005
  • XML(eXtensible Markup Language) has emerged as a prevalent standard for document representation and exchange on the Internet. XML documents contain information of different sensitivity degrees, so that XML Document must selectively shared by user communities. There is thus the need for models and mechanisms enabling the specification and enforcement of access control policies for XML documents. Mechanisms are also required enabling a secure and selective dissemination of documents to users, according to the authorizations which the users have. In this paper, we give an account of access control model and mechanisms, which XML documents can be securely protected in web environments. We make RBAC Based access Control polices to the problem of secure and selective access of XML documents. The proposed model and mechanism guarantee that the secure use for XML documents through definition of authority for element, attribute, link within XML document as well as XML document.

  • PDF

A Study of Automatically Authentication System for Virtual Resource Organization on Grid (그리드상의 가상 자원 조직에 대한 자동 인증 시스템 연구)

  • 최병선;이원구;이재광
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2004.05a
    • /
    • pp.301-306
    • /
    • 2004
  • The Grid VO(Virtual Organization) is temporary VO where gather indivisual, authority, or system resource, differ from previous VO concept that controled by internal principal and policy set. It have many problems in case of indivisuals, authorities, or system resources that became member\ulcorner of some Grid VO at same time and combination followed changing condition of system resource for building Grid VO. This paper propose lightweighted Grid VO authentication system based on XML security to solve the authentication of the problems occuring in building Grid VO. In this paper, Grid VO authentication system is including Grid VO authentication module that is intermediate management system in PH to previous authentication service structure and provide effective authentication service to Grid VO.

  • PDF

Qualitative Case Study on the Rearing Experience of Parents who Adopted a Child from Foster Care (위탁아동 입양부모의 양육경험에 관한 질적 사례연구)

  • Kwon, Ji-Sung;Chung, Ick-Joong;Min, Sung-Hye;Shin, Hye-Won
    • Journal of the Korean Society of Child Welfare
    • /
    • no.40
    • /
    • pp.73-107
    • /
    • 2012
  • The purpose of this study is to understand the rearing experience of parents who adopted a child for whom they were foster parents. Several cases of foster care adoption were found. We carried out individual interviews for data collection. Within-case and across-case analyses were conducted based on the data gathered from individual interviews of four cases. As a result, we were able to grasp significant issues from each case and find out common subjects found in all cases. The common subjects were 'special encounter: accident, connection, and inevitability', 'my child already', 'fundamental but insignificant difference', 'discontinuity in social support: things that are lost, and things that are gained', 'truth that is unable to hide, and truth that needs to be hidden', and 'family's destiny'. Based on the results of this study, policy recommendations and practice guidelines were suggested to help families undergoing adoption from foster care. Also, recommendations for further research were provided to overcome the study limitations.

Study on Security Framework using Security Quantitative Analysis for the Effective Multimedia Services to WLAN Mesh Network (무선랜 메쉬 네트워크에서의 효율적인 멀티미디어 서비스를 위한 보안 정량화 기반의 프레임워크 연구)

  • Shin, Myoung-Sub;Lim, Sun-Hee;Yi, Ok-Yeon;Lim, Jong-In
    • Journal of Broadcast Engineering
    • /
    • v.13 no.2
    • /
    • pp.261-273
    • /
    • 2008
  • Multimedia service whose use is rapidly increasing supports effective services to convert and transmit multimedia data based on network speed, noise circumstance, terminal computation, and type of contents for satisfying QoS. For supporting information protection of multimedia service, it offers middle level of singular security service or security mechanism which is based on policy of service provider, depending on present terminal computation and type of contents. It can support security mechanism for more effective multimedia service, if we study security of application layer and network layer for supporting multimedia service. In this paper, we propose Multimedia security framework reflected on quantitative analysis of the WLAN(Wireless Local Area Network) mesh network security using the utility function in the level of the sorority, violation and addictive compensation model.

A Study on the Real Condition and the Improvement Directions for the Protection of Industrial Technology (산업기술 보호 관리실태 및 발전방안에 관한 연구)

  • Chung, Tae-Hwang;Chang, Hang-Bae
    • Korean Security Journal
    • /
    • no.24
    • /
    • pp.147-170
    • /
    • 2010
  • This study is to present a improvement directions for the protection of industrial key technology. For the purpose of the study, the survey was carried out on the administrative security activity of 68 enterprises including Large companies, small-midium companies and public corporations. survey result on the 10 items of security policy, 10 items of personal management and 7 items of the assets management are as follows; First, stable foundation for the efficient implement of security policy is needed. Carrying a security policy into practice and continuous upgrade should be fulfilled with drawing-up of the policy. Also for the vitalization of security activity, arrangement of security organization and security manager are needed with mutual assistance in the company. Periodic security inspection should be practiced for the improvement of security level and security understanding. Second, the increase of investment for security job is needed for security invigoration. Securing cooperation channel with professional security facility such as National Intelligence Service, Korea internet & security agency, Information security consulting company, security research institute is needed, also security outsourcing could be considered as the method of above investment. Especially small-midium company is very vulnerable compared with Large company and public corporation in security management, so increase of government's budget for security support system is necessary. Third, human resource management is important, because the main cause of leak of confidential information is person. Regular education rate for new employee and staff members is relatively high, but the vitalization of security oath for staff members and the third party who access to key technology is necessary. Also access right to key information should be changed whenever access right changes. Reinforcement of management of resigned person such as security oath, the elimination of access right to key information and the deletion of account. is needed. Forth, the control and management of important asset including patent and design should be tightened. Classification of importance of asset and periodic inspection are necessary with the effects evaluation of leak of asset.

  • PDF

The Improvements of the Social Welfare Field in the 6th Edition of KDC (한국십진분류법 제6판 사회복지학 분야의 분류체계 수정 전개 방안)

  • Kim, Jeong-Hyen
    • Journal of Korean Library and Information Science Society
    • /
    • v.48 no.3
    • /
    • pp.63-81
    • /
    • 2017
  • This study investigated general problems concerning the social welfare field in the KDC 6th edition based comparative analysis academic characteristics and classification system, and suggested on some ideas for the improvements of them. Results of the study are summarized as follows. First, a main field of the social welfare is generally divided into a general social welfare, social works, and social welfare services to special classes and groups including people with disabilities, young people, aged, women, and families. Second, I analyzed on social welfare from the collection database at the National Library of Korea. Based on analysis of the data. the keyword frequency of social welfare policy and management, pensions, care services, and support works for the underprivileged was relatively high. Third, modified classification of items was basically performed through the academic characteristics of the social welfare and the keyword analysis, and maintaining the existing KDC classification system caused less confusion as much as possible.

A Study on Information Bias Perceived by Users of AI-driven News Recommendation Services: Focusing on the Establishment of Ethical Principles for AI Services (AI 자동 뉴스 추천 서비스 사용자가 인지하는 정보 편향성에 대한 연구: AI 서비스의 윤리 원칙 수립을 중심으로)

  • Minjung Park;Sangmi Chai
    • Knowledge Management Research
    • /
    • v.25 no.3
    • /
    • pp.47-71
    • /
    • 2024
  • AI-driven news recommendation systems are widely used today, providing personalized news consumption experiences. However, there are significant concerns that these systems might increase users' information bias by mainly showing information from limited perspectives. This lack of diverse information access can prevent users from forming well-rounded viewpoints on specific issues, leading to social problems like Filter bubbles or Echo chambers. These issues can deepen social divides and information inequality. This study aims to explore how AI-based news recommendation services affect users' perceived information bias and to create a foundation for ethical principles in AI services. Specifically, the study looks at the impact of ethical principles like accountability, the right to explanation, the right to choose, and privacy protection on users' perceptions of information bias in AI news systems. The findings emphasize the need for AI service providers to strengthen ethical standards to improve service quality and build user trust for long-term use. By identifying which ethical principles should be prioritized in the design and implementation of AI services, this study aims to help develop corporate ethical frameworks, internal policies, and national AI ethics guidelines.

Preliminary Diagnosis of Fishing Ground Environment for Establishing the Management System in Fisheries Resources Protection Area (수산자원보호구역 관리체제 구축을 위한 어장환경 예비진단)

  • Lee, Dae-In;Park, Dal-Soo;Jeon, Kyeong-Am;Eom, Ki-Hyuk;Park, Jong-Soo;Kim, Gui-Young
    • Journal of the Korean Society of Marine Environment & Safety
    • /
    • v.15 no.2
    • /
    • pp.79-89
    • /
    • 2009
  • For preliminary diagnosis on current fishing ground environment and basic information for establishment of effective and rational management policy in fisheries resources protection area, water and sediment quality and changes of total area in the 10 marine protection areas designated for fisheries resources management in Korea were assessed. Results showed that environmental quality in these areas has been degraded by pollution sources, coastal utilization and development stress, etc. The pattern and degree of contamination differed by protection areas, suggesting that it is necessary for optimum environmental management plan considering the regional characteristics. The total designated area of protection areas in 2003 changed by $-22.9{\sim}2.4%$, on average -6.4%, compared with the first year of designation; Wando-Doam Bay showd the highest increase rate (2.4%), and Hansan Bay has the highest decrease rate (-22.9%) Decrease rate of land and sea in total area showd 6.1% and 6.6%. An integrated management of environmental data in protection areas is required for systematic assessment. Therefore, the suitable environmental and information management is needed specifically considering the environment characteristics such as development and utilization conditions of land and sea area Furthermore, bemuse urbanization and industrialization threats the junctions of the protection areas, authorized ministry (MIFAFF) should develope and establish monitoring and management procedures based on the related laws.

  • PDF