• Title/Summary/Keyword: Data protection

Search Result 3,415, Processing Time 0.036 seconds

An Analysis on the Importance and Performance of Personal Information Protection for the Elderly Welfare Center Employees

  • You, Gil-Jun
    • Journal of the Korea Society of Computer and Information
    • /
    • v.23 no.11
    • /
    • pp.185-191
    • /
    • 2018
  • The purpose of this study is to present effective basic data for business management through analysis of importance and performance of personal information protection of the elderly welfare center workers. For this purpose, the questionnaire on the protection of personal information was reconstructed based on the diagnostic level of the personal information security management level of the public institution and the questionnaire was conducted on 105 employees of the elderly welfare center in Chungbuk area. Based on the responses to the importance and the degree of performance of the personal information protection of the elderly welfare center employees, technical statistics and corresponding sample T-tests were conducted and the importance-performance analysis (IPA) was used. Followings are the results of this study: First, there is a statistically significant difference between the importance and the implementation of the management system for the protection of personal information of the workers in the elderly welfare center, establishment and implementation of protection measures, establishment and implementation of infringement measures. Second, IPA analysis on the protection of personal information of the workers in the elderly welfare center shows that the establishment and implementation of protection measures are the areas to maintain good performance. Third, in IPA analysis of the sub-factors of the personal information protection of the workers in the welfare center of the elderly, in the construction and management of the management system, in performing the role of the personal information protection officer and establishing and implementing protection measures, The factors of prevention of information disclosure and exposure and the safe use and management of personal information processing system were analyzed as areas requiring intensive improvement. This study is meaningful as a basic research that can raise the awareness of the personal information protection of the workers in the elderly welfare center and induce the improvement of the related work.

Detection of Surges by Frequency Analysis on Lan Equipment (랜설비에 유기되는 이상전압의 주파수분석을 통한 서지의 검출)

  • Huh, Chang-Su;Lee, Se-Hyun
    • Proceedings of the KIEE Conference
    • /
    • 2001.11a
    • /
    • pp.213-215
    • /
    • 2001
  • We investigated the frequency characteristics of surges induced on Lan equipments by using V-F converter. which installed on the second part of protection system. We stored and analyzed the frequency converting data with the amplitude of overvoltage. In addition. The data acquisition system was made so that we could be examine the results wave through WEB. From this results, it is found that this frequency analysis could be helped for design and protection of various undesired surges.

  • PDF

Performance Comparison of Wavelet Transform Based Watermarking and DCT Transform Based Watermarking (Wavelet 변환과 DCT 변환을 이용한 워터마킹에 관한 연구)

  • 장용원;한승수;김인택
    • Proceedings of the IEEK Conference
    • /
    • 2000.11c
    • /
    • pp.85-88
    • /
    • 2000
  • With the rapid growth of network distributions of digitized media(audio, image, and video), there is an urgent need for copyright protection. For now watermarking is a well-known technique for copyright protection of digital data. To embed a digital watermark to the image, discrete cosine transform(DCT) and wavelet transform are commonly used. In this paper, the performance of the DCT based watermarking technique and wavelet based watermarking technique were compared and the influences of the parameter a that decides the strength of the watermarking data were considered.

  • PDF

EU Data Protection 개정안 이슈 및 시사점

  • Kim, Sang Woo
    • Review of KIISC
    • /
    • v.22 no.6
    • /
    • pp.39-42
    • /
    • 2012
  • 최근 mobile device, cloud computing 및 social networking 등 새로운 기술 trend의 등장으로 기존 법률 체계의 현실성 및 적절성에 대한 재검토 요구가 등장하고, 이에 따라 EU Data Protection Directive에 대한 개정안(reform proposal)이 2012년 1월 제시되었다. 따라서 새롭게 제시된 개정안의 주요 내용과 이슈, 그리고 이로부터 파생되는 시사점에 대해 고찰하고자 한다.

DATA BASE SYSTEM DEVELOPMENT AND STATISTICAL ANALYSIS OF EIR3 ACCIDENTS OF SEVERAL COUNTRIES

  • Kim, In-Tae;Kim, In-Won;Song, Hee-Oeul
    • Proceedings of the Korea Institute of Fire Science and Engineering Conference
    • /
    • 1997.11a
    • /
    • pp.319-326
    • /
    • 1997
  • The fire accident cases of several countries such as Korea, Japan, United States, etc., were collected and compared statistically. The trends of fire accidents in several countries will help us establish detailed plans for fire protection and reduce the possible fire accidents in the future. For construction of data base system, the program FADS was developed, which is operable in Windows environment.

  • PDF

Weakness and Improvement of Cloud Shredder (Cloud Shredder에 대한 취약점 분석 및 개선 방안에 관한 연구)

  • Park, Minsu;Kang, Sunghoon;Kim, Seungjoo
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.38B no.5
    • /
    • pp.401-409
    • /
    • 2013
  • Recently, almost all data has stored and managed in the shape of digital as development of IT infrastructure. Digital data is able to store the huge data in very small space. but if the disk should be stolen or lost, it would have many secure problems such as data leakage. Currently, digital data is protected by encryption method to prevent data leakage. However, the encryption method is not enough to protect data because the performance of attack system is higher and the attack methods is various. Therefore, there is a need for a new advanced data protection method. To solve secure problems, many research has been progressed like Cloud Shredder, which distributes data and then store. In this paper, We found out the problem of the Cloud Shredder and proposed an advanced method of digital data protection to solve those problem.

Multi-Agent based Distribution Protection Coordination Algorithm (Multi-Agent 기반의 배전계통 보호협조 알고리즘)

  • Lim, Il-Hyung;Choi, Myeon-Song;Lee, Seung-Jae
    • Proceedings of the KIEE Conference
    • /
    • 2009.07a
    • /
    • pp.4_5
    • /
    • 2009
  • A new protection coordination algorithm in Multi-Agent based distribution automation system is proposed in this paper. Distribution network protection coordination is acted by normal state distribution operation. But, in more and more complex distribution network structure, it has a big problem that central server processed all measurement data, coordination setting and controls for operation. So, a algorithm to change coordination setting is proposed automatically in terminal devices which Recloser and OCR to include Multi-Agent concepts in distribution network.

  • PDF

On Performance Enhancement of CDP(Continuous Data Protection) System Using Flash SSD (Flash SSD를 이용한 CDP(Continuous Data Protection)의 성능개선)

  • Ko, Dae-Sik
    • Journal of Advanced Navigation Technology
    • /
    • v.15 no.5
    • /
    • pp.801-807
    • /
    • 2011
  • If the System is downed by computer or disasters, it can have a bad influence on the reliability of the corporation and business continuity because all companies are computerized. Accordingly, interest on the business continuity without the loss of data in the corporate is increasing. In this paper, system faults have been defined as physical faults and logical faults and CDP solution using Flash SSD has been proposed for enhancing IOPS which is needed for realtime-backup. In order to measure IOPS performance of the CDP using Flash SSD, we constructed an experimental system. From the results we can see that IOPS performance of CDP using Flash SSD is about 50 times more effective than that of the S-ATA.

Generation and Protection of Efficient Watermark Signals and Image Quality Preservation in Transmission Channel Using Turbo Coding (효과적인 워터마크 신호의 생성과 보호 및 터보코딩을 이용한 전송채널상에서의 화질 보존)

  • Cho, Dong-Uk;Bae, Young-Lae
    • The KIPS Transactions:PartB
    • /
    • v.9B no.1
    • /
    • pp.91-98
    • /
    • 2002
  • In this paper, an implementation method of the efficient image transmission stage using watermarking and channel ceding is proposed. Usually, image communication system consists of both a transmitter part and a receiver part. The transmitter part takes charge of copyright protection of the generated image data, and image coding and compression that can deal with channel noises when transmitting. In the transmitter part, we propose a channel coding method which protects both the watermark signal and the original signal for protecting the copyright of image data and solving channel noises when transmitting. Firstly, copyright protection of image data is conducted. For this, image structure analysis is performed, and both the improvement of image quality and the generation of the watermark signal are made. Then, the histogram is constructed and the watermark signals are selected from this. At this stage, by embedding of the coefficients of curve fittness into the lower 4 bits of the image data pixels, image quality degradation due to the embedding of watermark signals are prevented. Finally, turbo coding, which has the most efficient error correction capability in error correction codes, has been conducted to protect signals of watermark and preserved original image quality against noises on the transmission channel. Particularly, a new interleaving method named "semi random inter]easer" has been proposed.

Geographic Information System Application to Wellhead Protection Area Delineation (우물수원 보호구역의 범위 결정에 대한 지형정보시스템의 응용)

  • Kim, Chul
    • Journal of Korea Water Resources Association
    • /
    • v.31 no.1
    • /
    • pp.27-34
    • /
    • 1998
  • Groundwater simulation model suing GIS and Arc/Info Gridfunctions were used to delineate wellhead protection areas. Groundwater simulation model was developed within Arcview GIS. The model. which integrates the data input and manipulation. Process simulation. and display of the results . was developed by considering time variations of the parameters. The model was applied to the EPA data. The hydraulic distributions from the EPA data and those calculated from groundwater simulation model agree well and zone of influence from EPA data and that calculated suing GRID functions seem to be consistent. The developed model may be an efficient tool to delineate WHPA because it integrates all the processes inside the GIS.

  • PDF