• Title/Summary/Keyword: Assurance services

Search Result 226, Processing Time 0.025 seconds

An Assurance Mechanism of Intrusion Data for Making Digital Evidence in Digital Computing Environment (디지털 컴퓨팅 환경의 디지털 증거화를 위한 침해 데이터보증 메커니즘)

  • Jang, Eun-Gyeom
    • Journal of Internet Computing and Services
    • /
    • v.11 no.4
    • /
    • pp.129-141
    • /
    • 2010
  • In digital computing environment, for the mal functions in appliances and system errors, the unaccepted intrusion should be occurred. The evidence collecting technology uses the system which was damaged by intruders and that system is used as evidence materials in the court of justice. However the collected evidences are easily modified and damaged in the gathering evidence process, the evidence analysis process and in the court. That’s why we have to prove the evidence’s integrity to be valuably used in the court. In this paper, we propose a mechanism for securing the reliability and the integrity of digital evidence that can properly support the Computer Forensics. The proposed mechanism shares and manages the digital evidence through mutual authenticating the damaged system, evidence collecting system, evidence managing system and the court(TTP: Trusted Third Party) and provides a secure access control model to establish the secure evidence management policy which assures that the collected evidence has the corresponded legal effect.

A Study on the Advancement of Accreditation Systems and Surveyors' Expertise for Long-term Care Facilities: Focusing on Overseas Cases (해외 사례 고찰을 통한 지자체 노인요양시설 인증 체계 및 조사원 고도화 방안)

  • Seo, Yun Jeong;Lee, Soonsung;Seo, Dong-Min;Yoon, Ju Young;Sagong, Hae;Kim, Da Eun
    • Perspectives in Nursing Science
    • /
    • v.15 no.2
    • /
    • pp.81-91
    • /
    • 2018
  • Purpose: This study aimed to suggest strategies for advancing local-government-based accreditation systems and surveyor training in long-term care facilities in Korea. Methods: A comprehensive review of the literature including research papers and official reports issued by governments from the United States, Australia, and Japan was conducted to explore domestic and international policies related to long-term care facility certification and accreditation systems. Results: The USA has two types of care quality assurance systems including mandatory certification (5-star rating system) by the Centers for Medicare and Medicaid Services and voluntary accreditation by the Joint Commission on Accreditation of Healthcare Organizations. Australia operates a government-based mandatory accreditation system for all long-term care facilities through the Australian Aged Care Quality Agency. Japan, particularly the Tokyo district, operates a third-party evaluation system that involves the voluntary participation of long-term care facilities. Conclusion: This study provides several strategies to enhance accreditation processes and surveyors'expertise. For instance, motivating facilities to voluntarily participate in accreditation is necessary by 1) providing sufficient and continuous consultations and feedback about how to improve care quality, 2) differentiating accreditation domains and indicators from the national health insurance certification system, and 3) actively utilizing accreditation results and providing incentives.

A Vision for Nursing Education Reform in Korea (한국 간호교육에 대한 개혁 전망)

  • 김모임
    • Journal of Korean Academy of Nursing
    • /
    • v.24 no.2
    • /
    • pp.313-318
    • /
    • 1994
  • To build a suitable National Health Care System for the coming 21s1 century, Nursing must also be renewed. The future Korea will be united and the majority of its population will raidly consist of the aged. Economically standing on the same level with developed countries the growth of scientific technologies will foster communications, firing astounding changes in the medical field. While the overall life style pattern of Koereans not to mention the structure of diseases undergo change, the possibility that the reckless induction of high-tech health care may only cause medical fees to eascafate. It can전so be expected that the health care system will evolve towards the consumers. Nursing in the 21s1 century will be of two scenarios according to WHO, which presents the role of the nurse. The first scenario is that "a gen-eric health care work force" namely a "care giver" will replace all other health professions. If Nursing does not become the compatent profession fitting to this purpose it will eventually dei out. The second scenario is that nurses who are educated in a well grounded and extensive general background and have command of a specialized area will undertake services varying from health pro-motion to treatment and rehabilitation both direct and indirectly, while supervising other personnel. The nurse here would become the "care giver". To become the necessary health care profession in the 21s1 century, nurses should be provided with more educational opportunities, variating in its con-tents, course, and system, enabling them to grow. Clair Faign points out that the minimal educational entry for the nursing profession is a 4 year undergraduate education in this aspect, now in the time to set the future of Nursing into the course of the first scenario. A new educational system stipulating a baccalaureate nursing degree is in urgent need, and aside from govermental actions nurse themseives should formaily officiallze this process, striving for quality assurance. While considering 6 years nursing education programs, multifarious degree courses for existing 3 years educated nurse should be provided Junior nursing schools must devise measures to grow into baccalaucate institutions, also. Among the existing courses, the Self Study Degree Program should be converted into RN, BSN courese provided by universities, and clinical training for the University on the Air must be supplimented, The possibility of establishing nursing courses into commercial high school programs only jeopardizes the development of the nursing profession.

  • PDF

A Study on Introducing Security Certification for Control Systems (제어시스템 보안인증 도입 방안 연구)

  • Choi, Hoyeol;Kim, Daeyeong;Shin, Hyungjune;Hahn, Changhee;Hur, Junbeom
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.26 no.3
    • /
    • pp.725-734
    • /
    • 2016
  • SCADA(Supervisory Control and Data Acquisition) system is widely used for remote monitoring and control throughout the domestic industry. Due to a recent breach of security on SCADA systems, such as Stuxnet, the need of correctly established secure certification of a control system is growing. Currently, EDSA-CRT (Embedded Device Security Assurance-Communication Robustness Test), which tests the ability to provide core services properly in a normal/abnormal network protocol, is only focused on the testing of IP-based protocols such as IP, ARP, TCP, etc. Thus, in this paper, we propose test requirements for DNP3 protocol based on EDSA-CRT. Our analysis show that the specific test cases provide plentiful evidences that DNP3 should follow based on its functional requirements. As a result, we propose 33 specific test case for DNP3 protocol.

A Study of Information Security Maturity Measurement Methodology for Banking System based on Cyber -based Transaction Processing Architecture Diagnosis (사이버거래 처리 구조 진단을 기반으로 한 뱅킹시스템 정보보호 성숙도 측정방법론 연구)

  • Bang, Kee-Chun
    • Journal of Digital Contents Society
    • /
    • v.15 no.1
    • /
    • pp.121-128
    • /
    • 2014
  • SSE-CMM for security engineering, engineering, assurance, risk is divided into three elements of the process maturity assessment model and the level of information security presented. Maturity measurement of privacy, vulnerability diagnosis and risk analysis methodologies is used in practical field for present a comprehensive conclusion. The common cyber services are internet banking, mobile banking, telephone banking and the like. Transaction structure, a kind of cyber-banking system, information security maturity of the existing measurement methodologies for research purposes, vulnerability diagnosis and risk analysis methodologies to be used in practical field present a comprehensive conclusion. To ensure safety and convenience for the user, convenient to deal with cyber environment is the key to the activation of cyber trading. Particularly by measuring the maturity of cyber banking system to ensure the safety of the practice field much effects are expected as a result.

Inpatient Cost Variation among Hospitals in Some Tracer Diseases (일부 다빈도 상병에서 입원진료비의 변이 정도와 요인에 대한 연구)

  • Kim, Yoon;Kim, Yong-Ik;Shin, Young-Soo
    • Health Policy and Management
    • /
    • v.3 no.1
    • /
    • pp.25-52
    • /
    • 1993
  • Variation in the utilization of medical services is a very important issue in cost containment and quality assurance of health care. Practice variation directly affects health care expenditure especially in fee-for-service system, which is the payment system of health insurance in Korea. In addition to cost issue it is generally accepted that variations in medical practice and the cost of inpatient care suggest the possibility of inappropriate quality of care. This study is to closely examine the patterne and degrees of variation in cost structure of inpatient care among types of hospital and individual hospitals in some tracer diseases, and also to inquire into the service items which contribute much to the variation of total medical care cost. Foru common diseases, i.e. Cesarean Section, appendectomy, cataract extraction and pediatric pneumonia, were selected as tracer diseases. In most tracer diseases there were statistically significant differences in total medical care cost among hospitals in same type of hospital as well as among types of hospital(p<0.01). When total medical care cost were subdivided into the types of service, cost of medication and diagnostic examination varied the most prominenly. When the cost of medication were subdivided again, cost of parenteral antibiotics showed the most prominent variation. Of total medical care cost, medication was most contributory to the variation of total medical care cost(58.1~82.3%), and cost of antibiotics was most contributory to the variation of medication cost(63.9~92.2%). The results of study implicated that reducing the variation of medication may plays a significant role in containing the cost of inpatient care. In order to sort out the factors affecting practice variations including drug prescription pattes further researches are required.

  • PDF

Primary visit, transfer, and re-transfer to emergency department in patients with severe emergency diseases in Chungnam (충남에서 발생한 중증응급환자의 응급의료기관 일차 방문, 전원 및 재전원 현황)

  • Choi, Il Kug;Choi, Han Joo;Lee, Hae Jung
    • Journal of The Korean Society of Emergency Medicine
    • /
    • v.29 no.5
    • /
    • pp.399-407
    • /
    • 2018
  • Objective: Regionalization is one of the principal subjects for the advancement of rural emergency medical service systems in South Korea. This study shows the characteristics of interhospital transfer and status of the incidence of three major emergency disorders (acute myocardial infarction [AMI], acute stroke, and severe trauma) in one local province. Methods: A retrospective study was conducted for patients with three major emergency disorders who visited emergency medical facilities in one local province from January 2013 to December 2015, on the basis of the National Emergency Department Information System (NEDIS) data. Results: The incidence of three major emergency disorders had increased annually. Patients with each of these disorders tended to choose distinguishing methods of visiting emergency medical facilities. AMI patients tended to visited emergency medical facilities using private cars or on foot, while severe trauma patients usually visited by 119 ambulance, and acute stroke patients used 119 ambulance and private car in similar amounts. Overall, 65% of AMI patients were treated in intraregional medical facilities, but about 70% of acute stoke and severe trauma patients were transferred outside of the region. Conclusion: Because each of these disorders has an individual characteristic, it is difficult to expect a solution for the problems associated with emergency disorders just by assuring the availability of medical resources. Based on regionalization, a policy to provide the optimal treatment for those emergency disorders should be developed by planning public medical service systems based on the individual characteristics of emergency disorders, the standardized transfer plans of emergency patients and the assurance for mobilization and sharing of confined medical resources.

Impact of Emotional Labor on Quality of Service by Social Workers in Public Sector (사회복지전담공무원의 감정노동이 서비스 질에 미치는 영향)

  • Lee, Yong-Jae;Kim, Jang-Hwan;Park, Jong-Heui
    • The Journal of the Korea Contents Association
    • /
    • v.19 no.6
    • /
    • pp.541-552
    • /
    • 2019
  • Recently, social welfare officers are suffering from a lot of job stress due to increasing work and are carrying out emotional labor. This study assessed the effect of emotional labor on the quality of welfare service through a questionnaire survey on 937 civil servants in Sejong city and Chungcheongnam-do provinces. First, social welfare officers experienced more than average level of emotional labor, and they performed more internal behavior than surface behavior. Second, the services provided by the social welfare officers were higher than usual, followed by tangibility, assurance, reliability, empathy, and responsiveness. Third, deeping acting had a positive (+) influence on service quality among the sub-factors of emotional labor. In other words, the quality of service increases as the emotional state itself changes, On the other hand, deeping acting did not affect service quality. In the future, policy responses to excessive work burden of social welfare officers should be needed and a manual for responding to emotional labor should be provided.

CSfC Network Security Architecture Analysis for the Assurance of Commercial Security Solutions in Defense Area (국방 상용보안제품 도입을 위한 CSfC(Commercial Solutions for Classified Program) 네트워크 보안 아키텍처 분석)

  • Lee, Yong-joon;Park, Se-joon;Park, Yeon-chool
    • Journal of Internet Computing and Services
    • /
    • v.22 no.6
    • /
    • pp.91-97
    • /
    • 2021
  • The United States is responding to evolving cyberattacks through the Commercial Solutions for Classified Program (CSfC). Authorized safety evaluation and certification are being carried out so that US government agencies can quickly introduce civilian commercial security products into the national pavilion. Commercial security products registered in the CSfC process can be used by defense agencies through a rapid approval process. Defense agencies approve commercial security products without duplicate evaluation. Approved security products can reduce the time, cost, and cost of the approval process required to implement the defense information system. In this study, security control for 4 types of network security architecture MSC (Multi-Site Connectivity), MA (Mobile Access), Campus WLAN, and DAR (Data at Rest) proposed by the US National Security Agency (NSA) for introduction to national defense A detailed analysis was performed on the items.

Study on the Application of a Decentralized Identity System within University Based on Zero-Knowledge Proof for Self-Sovereign Identity Assurance (자기주권 신원 보장을 위한 영지식증명 기반의 대학 내 DID 시스템 적용방안 연구)

  • Im Sung Sik;Kim Seo Yeon;Kim Dong Woo;Han Su Jin;Lee Ki Chan;Oh Soo Hyun
    • Convergence Security Journal
    • /
    • v.24 no.2
    • /
    • pp.141-150
    • /
    • 2024
  • With the increasing frequency of incidents related to personal information leaks, there is a growing concern about personal information protection. Moreover, with the emergence of blockchain technology, there is a heightened interest in self-sovereign identity models applied through blockchain, with ongoing research on Decentralized Identifiers (DID) to achieve this. However, despite universities storing and utilizing significant information such as personal data, their computer systems are operated and managed based on centralized systems, leading to annual occurrences of personal data breaches. Therefore, this paper proposes and implements a DID-based computing system applicable within universities. Additionally, it establishes and executes prominent services within the university context. The proposed system ensures users' self-sovereign identities through verifiable credentials, enabling the establishment of a secure integrated information system within the university, departing from traditional centralized systems.