• Title/Summary/Keyword: Access authority

Search Result 243, Processing Time 0.036 seconds

The Surrey Research Park: A Case Study of Strategic Planning for Economic Development

  • Parry, Malcolm
    • World Technopolis Review
    • /
    • v.1 no.3
    • /
    • pp.206-225
    • /
    • 2012
  • The development of the Surrey Research Park by the University of Surrey is an addition to a number of existing strategies to collaborate with industry that it has developed over its 120 year history. The potential to undertake this development was based on owning a substantial land holding that the University acquired when the Borough Council for the town of Guildford invited the University to relocate from Battersea in London to its new location in 1966. Initial plans for the Park in 1979 were accelerated in 1981 in response to plans by the then government to reduce funding for Higher Education in the UK. Beyond a broad master plan for the site that was based on topography and access to the site the plans that were developed were based on a survey of 100 companies that were deemed to be in the target market for the site and a review of the other 7 science parks that were being developed in the UK in 1981. The findings from this proved to be important in developing the master plan for the site. Another important influence on the project was the objectives that were defined for the 3 stakeholders in the project of the University, the tenant companies and the planning authority relate to economic development, a competitive advantage of tenant companies, knowledge transfer, the profile for the University and the capacity to generate income proved to be a valuable framework on which to develop a master plan. These details were underpinned by five objectives which served the three stakeholders in the site. Those for the University included commercial potential, knowledge transfer and image and reputation; those for the town primarily related to economic development and the plan was to help tenants gain a competitive advantage by locating on the site. In addition a number of success indicators were defined for the project against which to measure performance and have remained as a useful set of parameters on which to base the assessment of the performance of the site. In combination with these indicators a further analysis deals with the success factors that are considered as important in influencing performance. The paper sets details the history of the park and covers the success indicators and factors and reviews these in the context of the original objectives for the site.

A Study on DRM Model Using Electronic Cash System (전자화폐 시스템을 적용한 DRM 모델에 관한 연구)

  • Lee, Deok-Gyu;Oh, Hyung-Geun;Lee, Im-Yeong
    • Journal of Korea Multimedia Society
    • /
    • v.7 no.8
    • /
    • pp.1107-1119
    • /
    • 2004
  • There is Electronic-cash system as important payment means in Electronic-commerce and the requirement of electronic cash is independence, transferability, divisibility etc. This is important requirement in DRM to provide contents as a same requirement to contents. Because contents itself can see that requirement of Electronic-cash can be transferred the control of to contents requirement as monetary concept. Can apply equally in reproduction and copy for contents, anonymity user's access etc, and several relations. In this paper, wish to put by value that is equal about Electronic-cash and contents, and apply concept of Electronic-cash through this and present DRM model after examine requirement of Electronic-cash and DRM's requirement. Concept used in this paper left copy use authority to use hierarchic tree structure and endowed anonymity for contents and anonymity about user for anonymous user. Finally, examines and compares and analyzes proposed existing methods.

  • PDF

A Decision-Making Model for Handling Personal Information Using Metadata (메타데이터를 활용한 개인정보 처리에 대한 의사결정 모델)

  • Kim, Yang-Ho;Cho, In-Hyun;Lee, Kyung-Ho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.26 no.1
    • /
    • pp.259-273
    • /
    • 2016
  • After realizing through the three large-scale data leakage incidents that intentional or accidental insider jobs are more serious than external intrusions, financial companies in Korea have been taking measures to prevent data leakage from occuring again. But, the IT system architecture reflecting the domestic financial environment is highly complicated and thereby difficult to grasp. It is obvious that despite administrative, physical, and technical controls, insider threats are likely to cause personal data leakage. In this paper, we present a process that based on metadata defines and manages personally identifiable attribute data, and that through inter-table integration identifies personal information broadly and controls access. This process is to decrease the likelihood of violating compliance outlined by the financial supervisory authority, and to reinforce internal controls. We derive and verify a decision-making model that reflects the proposed process.

A Study on the Abnormal Behavior Detection Model through Data Transfer Data Analysis (자료 전송 데이터 분석을 통한 이상 행위 탐지 모델의 관한 연구)

  • Son, In Jae;Kim, Huy Kang
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.4
    • /
    • pp.647-656
    • /
    • 2020
  • Recently, there has been an increasing number of cases in which important data (personal information, technology, etc.) of national and public institutions are leaked to the outside world. Surveys show that the largest cause of such leakage accidents is "insiders." Insiders of organization with the most authority can cause more damage than technology leaks caused by external attacks due to the organization. This is due to the characteristics of insiders who have relatively easy access to the organization's major assets. This study aims to present an optimized property selection model for detecting such abnormalities through supervised learning algorithms among machine learning techniques using actual data such as CrossNet data transfer system transmission log, e-mail transmission log, and personnel information, which safely transmits data between separate areas (security area and non-security area) of the business network and the Internet network.

A Study on Cloud Network and Security System Analysis for Enhanced Security of Legislative Authority (입법기관의 보안강화를 위한 Cloud 네트워크 분석 및 보안 시스템 연구)

  • Nam, Won-Hee;Park, Dea-Woo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.15 no.6
    • /
    • pp.1320-1326
    • /
    • 2011
  • National institutions on the importance of information security is being recognized, information security laws are being discussed in Congress 3.4 DDoS incident and Nonghyup hacking, etc. However, National Assembly Secretariat when the results of the Information Security Consulting has been assessed very low 61.2 points, evaluation of hardware and software in secure areas were vulnerable. This paper, the legislative support agencies National Assembly and National Assembly Secretariat on the network and computer systems, and managerial, technical and physical security elements are analyzed for the status. And network should have the legislative support agencies and system for the physical network separation, DDoS attack response, Virus attack response, hacking attacks response, and Cyber Emergency Response Team/Coordination Center for Cyber infringing design and research through the confidentiality, integrity, availability, access control, authentication and security analysis is based on the evaluation criteria. Through this study, the legislative support agencies to strengthen the security of data and security laws enacted to provide the basis for.

Comparison on the education effects of cardiopulmonary resuscitation application using smart-phone -Focused on animation CPR and modified pocket CPR- (스마트폰을 활용한 심폐소생술 어플리케이션의 교육 효과 비교 -애니메이션을 활용한 심폐소생술과 변형된 포켓 심폐소생술을 중심으로-)

  • Park, Hee;Cho, Keun-Ja
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.16 no.1
    • /
    • pp.480-489
    • /
    • 2015
  • This study aimed to compare the education effect of easily accessible cardiopulmonary resuscitation (CPR) applications on smart-phones. The differences of performance and accuracy of CPR between animation CPR group and modified Pocket CPR group in Reserve Officers' Training Corps students of K university were evaluated by 2010 AHA guidelines. Data were collected from May 19, 2012 to May 20, 2012. There was no statistically significant difference between both of group in the performance and accuracy of CPR. However, the modified Pocket CPR group showed significant increase in the accuracy of chest compression depth (26.4%, p<.05), while the animation CPR group showed significant increase in the accuracy of chest compression location after the education (25.2%, p<.01). In conclusion, the methods using advantage and complementing disadvantage of animation CPR application and Pocket CPR application could help that people could easily access and perform to CPR.

A Study on the Bibliographic Utility and Its Use of CIP Data : With a Focus on the LC CIP Program and OCLC (서지 유틸리티와 CIP 데이터 활용에 관한 연구 - OCLC와 미국국회도서관 CIP 프로그램을 중심으로 -)

  • Yoon Cheong-Ok
    • Journal of Korean Library and Information Science Society
    • /
    • v.36 no.2
    • /
    • pp.349-367
    • /
    • 2005
  • This study examines how CIP program of the Library of Congress distributes, provides an access to, and helps upgrade CIP data through bibliographic utilities. LC CIP program can be characterized by the participation of many U.S. mainstream publishers, a continuing increase in the number of CIP data assigned annually, and an effort to immediately upgrade the completeness and accuracy of CIP data in cooperation with bibliographic utilities. Cooperation between LC and bibliographic utilities in performing quality control is worth noting, when compared with the limitation of CIP program of the National Library of Korea. It is suggested that the National Library of Korea should provide complete and accurate bibliographic and authority records for other types of new and old library materials published in Korea as well as CIP data for new monographic materials.

  • PDF

Design of E-Document Management System Using Dynamic Group Key based on OOXML (OOXML기반의 동적 그룹키를 이용한 전자문서 관리 시스템의 설계)

  • Lee, Young-Gu;Kim, Hyun-Chul;Jung, Taik-Yeong;Jun, Moon-Seog
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.34 no.12B
    • /
    • pp.1407-1417
    • /
    • 2009
  • We propose a e-document management system that can provide segmented page information on a document according to different levels of authority from access control environment. The proposed system creates hierarchy identifier using a one-way hash chain and therefore does not need to own key information for all users as in existing system. Also by creating group keys by compounding hash chain hierarchy identifier with randomly formed group identifier, the system can flexibly respond to dynamic changes from group member movements while at the same time resolving the problems of key formation and management in document encoding technique using symmetric key for each page. Lastly as a result of comparative analysis through an experiment with existing e-document management systems, the proposed system showed superiority in the efficiency of encoding and decoding document and the speed of encoding and decoding by the pages.

Evidence Based Practice in Long Term Care Settings

  • Specht, Janet K.
    • Journal of Korean Academy of Nursing
    • /
    • v.43 no.2
    • /
    • pp.145-153
    • /
    • 2013
  • Purpose: The purpose of this manuscript is to discuss the need for use of evidence based practice (EBP) in LTC, the current use of evidence in long term care facilities and what we know about adoption of the use of EBP in LTC. Methods: Literature review and reporting of findings from the M-TRAIN study that was a quasi-experimental design to test the effectiveness of an intervention to increase the use of EBPs for urinary incontinence and pain in 48 LTC facilities. Results: Barriers to adopting EBPs include lack of available time, lack of access to current research literature, limited critical appraisal skills, excessive literature to review, non-receptive organizational culture, limited resources, and limited decision-making authority of staff to implement change. Strategies to promote adoption of EBP include the commitment of management; the culture of the home; leadership; staff knowledge, time, and reward; and facility size, complexity, the extent that members are involved outside the facility, NH chain membership, and high level of private pay residents. Findings from the M-TRAIN add, stability of nurse leader and congruency between the leaders perception of their leadership and the staff's perception of the leadership. Conclusion: There is clear evidence of the need and the benefits to residents of LTC and to the health care system yet adoption of EBP continues to be slow and sporadic. There is also evidence for the process of establishing best evidence and many resources to find the available EBPs. The urgent need now is finding ways to best get the EBPs implemented in LTC. There is growing evidence about best methods to do this but continued research is needed. Clearly, residents in LTC deserve the best care possible and EBPs represent an important vehicle by which to do this.

Implementation of Intelligent Home Network System using Wireless Sensor (무선센서를 이용한 지능형 홈네트워크 시스템 구현)

  • Ju, Jae-han;Na, Seung-kwon
    • Journal of Advanced Navigation Technology
    • /
    • v.21 no.3
    • /
    • pp.294-299
    • /
    • 2017
  • Home network service is evolving into a service that can receive contents such as remote education, home automation, remote meter reading and various entertainment anytime and anywhere by connecting all household appliances in home with wired and wireless network. In this paper, an intelligent home gateway installed at home is connected to the mobile communication terminal from the outside to solve the problems of the existing home network and configure and maintain a more efficient and comfortable home network environment for the user, In the window, the login page is activated to confirm the user access authority, and the user proceeds the authentication procedure through own login information. When the normal authentication procedure is performed, the intelligent home gateway maintains only the network connection with the user, and the user presents the intelligent home network system using the RFID which is accessed by the intelligent home network system.