• Title/Summary/Keyword: 중요정보

Search Result 21,690, Processing Time 0.033 seconds

Object Regions Prior Transmission Method Using Bidirectional Round fitter (양방향 반올림 필터를 이용한 객체 영역 우선 전송 기법)

  • 강경원;문광석
    • Journal of the Institute of Convergence Signal Processing
    • /
    • v.3 no.4
    • /
    • pp.1-6
    • /
    • 2002
  • Generally, most significant information of images is included in the object regions. Thus, this paper proposes the object regions prior transmission method using the bidirectional round filter. The proposed method extracts the object regions, and then transmits the wavelet coefficients of the object regions, prior to others, in the encoding procedure using SPIHT So, it makes significant image information be restored faster than others for a short time. Consequently, through the proposed method the significant information of images is able to be recognized at a low bit rate and the condition of the continuous transmission is decidable by recognizing significant information fast, so that the searching time and efficiency can be improved.

  • PDF

A Study on Threat factors of Information Security in Social Network Service by Analytic Hierarchy Process (AHP를 이용한 SNS 정보보호 위협요인 분석)

  • Sung, Ki-Hoon;Kong, Hee-Kyung;Kim, Tae-Han
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.20 no.6
    • /
    • pp.261-270
    • /
    • 2010
  • As the usage of social network service(SNS) increases recently, great attention has been shown to the information security in SNS. However, there has been little investment in SNS environment for security while preferential investment to attract subscribers has been made so far. Moreover, there is still a lack of confidence for investment effect and an absence of framework to analyze the threat factors of information security in SNS. In this paper, we propose to model for decision-making standard of SNS information security investment by the AHP. The result shows that 'service image' is the most important criterion for the decision of SNS information security. It also shows that 'Profile-squatting and reputation slander through ID thefts' and 'Corporate espionage' are important threat factors in SNS information security.

Study on Token based KMS for Information Sharing (정보 공유를 위한 토큰 기반 KMS 연구)

  • Sung-Hwa Han;Hoo-Ki Lee
    • Convergence Security Journal
    • /
    • v.23 no.5
    • /
    • pp.29-34
    • /
    • 2023
  • KMS (Knowledge Management System) is used by various organizations to share information. This KMS includes important information as well as basic information used by each organization. To protect infortant information stored in KMS, many KMS use user identification and authentication features. In such a KMS security environment, if the account information of a user who can access the KMS is leaked, a malicious attacker using the account information can access the KMS and access all authorized important information. In this study, we propose KMS with user access control function that can protect important information even if user account information is leaked. The KMS with the user access control function proposed in this study protects the stored files in the KMS by applying an encryption algorithm. Users can access important documents by using tokens after logging in. A malicious attacker without a Token cannot access important files. As a result of checking the unit function for the target user access control function for effectiveness verification, it was confirmed that the access control function to be provided by KMS is normally provided.

Analysis on Functional Requirements and Degree of Importance of Online Archival Exhibitions (온라인 기록전시의 기능요건과 상대적 중요도 분석)

  • Im, Su-Hyeon;Seo, Eun-Gyoung
    • Journal of Korean Society of Archives and Records Management
    • /
    • v.21 no.3
    • /
    • pp.119-138
    • /
    • 2021
  • This study aims to provide the basic functional requirements and degree of importance of online archival exhibitions, which have played an essential role in the records information service lately. It first derived the properties of online archival exhibitions and their functional attributes through literature analysis. Next, it analyzed the degree of importance of functional requirements using the analytic hierarchy process (AHP) method. As a result, 3 properties and 13 functional requirements of online archival exhibitions were proposed. It was found that the archivists managing the online archival exhibitions considered the most important property to be "Information Transmission," the second the "Effectiveness of Exhibition," and the third the "Informative Function." As for the most critical functional requirements, these are "Aesthetics," "Interaction," "Usability," "Educational Experience Provision," and "Promotion and Exhibition Activation," while the least are "Theme Originality" and "Content Inclusiveness."

Design of Web based Acess Control System (Web 기반의 접근제어 시스템 설계)

  • Lee, Kyeong hyo;Jo, A Aeng;Park, Ik-Su;Oh, Byeong-Kyun
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2007.11a
    • /
    • pp.1194-1197
    • /
    • 2007
  • 개인정보는 정보서비스의 효율적인 운용과 새로운 비즈니스 모델에서 수익창출을 위한 자원으로 활용되고 있다. 이로 인하여 중요 정보에 대한 불법적인 사용 또는 개인정보 소유자의 허가 없는 사용으로 개인 프라이버시 침해가 발생되고 있다. 따라서 본 논문에서는 각 정보 시스템에서 사생활보호와 중요정보보호를 위한 정보 보안정책 모델을 제안한다. 제안된 모델은 정보 제공정책 모델과 정보 사용정책 모델로 구성하여 정보자기결정권을 부여하여 이중적인 접근제어 방식을 적용하고자 한다.

EDI 시스템 구현의 성공요인에 관한 연구

  • 이동만;김병곤
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.1 no.1
    • /
    • pp.177-201
    • /
    • 1996
  • 오늘날 우리사회는 컴퓨터기술과 통신기술의 발달로 인하여 정보사회로의 이행이 급속히 진전되고 있으며, 기업들은 치열한 경쟁에서 살아남기 위하여 정보기술을 이용한 경영혁신에 많은 노력을 기울이고 있다. 정보기술의 급속한 발달에 따라 정보시스템의 기능이 조직의 내부에서 점차적으로 조직외부의 고객과 공급자 그리고 경쟁자 등으로 그 초점이 이동되어가고 있는 실정이다. 기업조지간에 통신망기술로 연결하여 정보를 교환하는 조직간정보시스템(Interorganizational System : IOS) 은 산업의 구조를 변화시킬 뿐만 아니라 , 기업에 잠재적 경쟁우위를 제공하는데 중요한 역할을 수행한다. 조직간정보 시스템이 특수한 형태인 전자자료교환(Electronic Data Interchange : EDI) 시스템은 표준양식에 의한 기업간의 거래문서를 전자적으로 컴퓨터와 컴퓨터간 통신 네트워크에 의해 교환하는 것으로서, 기업간 정보거개의 혁신적인 개선과 업무절차의 간소화에 의한 생산성의 향상 및 업무의 효율성 증대 등 획기적인 성과를 가져온다. 본 연구의 목적은 EDI 시스템의 성공적 구현에 영향을 미치는 주요요인에 대한 중요도 순위를 설문을 통하여 조사하고자 하는 것이다. 우선 EDI 시스템의 개념을 살펴본후, EDI 시스템구현의 성공요인에 대한 선행연구들을 고찰하고, 선행연구에서 도출된 주요요인들을 연구자별로 분류하여, 본 연구에서 조사하고자 하는 요인들을 설정한다. 다음으로 EDI를 이용하고 있는 국내기업의 70여개 기업체를 대상으로 설문조사를 실시하여 자료를 수집하고 본 연구에서 조사하고자 하는 19가지 주요요인에 대한 중요도를 실증적으로 분석하고자 한다.

  • PDF

Information Security Research for Smartwork System (Smartwork System을 위한 정보보호연구)

  • Cheon, Jae-Hong;Park, Dae-Woo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2016.05a
    • /
    • pp.323-325
    • /
    • 2016
  • Computing loud arrival times were, important data Clouding and, without being limited to the device, may process the information. Recently, work environment and improved access to Cloud and Mobile, this decision has been made to take effect immediately. However, when such important decisions of the government, the security is required. In this paper, we study the network access and control in IoT, Cloud, Bigdata, Smartwork System applied to Mobile. Study the authentication, authorization, and security for each security level Level of Service to connect to the DB information. Research of this paper will be used as the basis for the information processing and decision-making system design and construction of public institutions and agencies as important information for the protection Smartwork System.

  • PDF

A Study on the Perceived Importance of Digital Information Resources in Public Libraries (공공도서관 디지털 정보자원요소 중요도 연구)

  • Chang, Durk-Hyun
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.44 no.4
    • /
    • pp.413-433
    • /
    • 2010
  • The purpose of this study is to portray the current condition of digital reading rooms in public libraries in specific terms of information resource constituencies. With the growth in numbers of public libraries in Korea, emphasis was also put on digital information services using digital reading rooms in public libraries. However, it is also recognized that these digital reading rooms are merely traditional reading rooms with equipment. In this regard, the objective for the study was to identify and describe the types of electronic information resources in order to determine the rationale for the development of digital information resource management in public libraries. The focus was especially put on investigating the quality and the degree of perceived importance of electronic resources. Data for this case study was collected from four relatively big public libraries in three cities. The investigation was conducted by the document reviews and surveys and interviews with librarians and patrons. The study found that digital resource management should be put on a new stage, especially in terms of education and reliable information for the regional community. The study also added some suggestions for the future development and refinement of electronic resource management in public libraries.

A Study on Improvement of Information Security awareness through Game: Focusing on Changes in Awareness of Information Security Policies (게임을 통한 정보보안인식 향상에 관한 연구: 개별 정보보안정책에 대한 인식변화를 중심으로)

  • Choi, Jong-hyun
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.4
    • /
    • pp.951-962
    • /
    • 2018
  • In order to strengthen the information security of the organization, it is important to invest in the information security facility, but the information security awareness of the organization members is also very important. Effective education is needed to raise awareness of this information security. However, the method of collective education utilized by most organizations is not very effective. Educational methods using serious games can be a good alternative. Educational methods using serious games have already proved effective through various cases and researches and are used in many fields. In this paper, we design and implement a game program to improve the awareness of individual information security policy importance. The training was conducted for the members of the organization and the change of awareness about the importance of individual information security policy was examined through analysis of evaluation data before and after the training.