• Title/Summary/Keyword: IT Security

Search Result 11,488, Processing Time 0.043 seconds

A Study on Developing the Model of Reasonable Cost Calculation for Privacy Impact Assessment of Personal Information Processing System in Public Sector (공공기관 개인정보 처리시스템의 개인정보 영향평가를 수행하기 위한 합리적인 대가 산정 모델 개발에 관한 연구)

  • Shin, Young-Jin
    • Informatization Policy
    • /
    • v.22 no.1
    • /
    • pp.47-72
    • /
    • 2015
  • According to the progress of national informatization throughout the world, infringement and threaten of privacy are happening in a variety of fields, so government is providing information security policy. In particular, South Korea has enhanced personal impact assessment based on the law of personal information protection law(2011). But it is not enough to effect the necessary cost calculation standards and changeable factors to effect PIA. That is, the budgets for PIA was calculated lower than the basic budget suggested by Ministry of Government Administration Home affairs(2011). Therefore, this study reviewed the cost calculation basis based on the literature review, cost basis of similar systems, and reports of PIA and obtained to the standard with Delphi analysis. As a result, the standards of PIA is consisted to the primary labors and is utilized to how the weights by division of target system, construction and operating costs of target system, type of target systems, etc. Thus, the results of this study tried to contribute to ensure the reliability of PIA as well as the transparency of the budget for privacy in public sector.

An Investigation of Users' Privacy Protection Behaviors: Factors Affecting Privacy Protection Technology Adoption (개인정보보호 기술 수용행동에 영향을 미치는 요인에 대한 연구)

  • Choi, Bomi;Park, Minjung;Chai, Sangmi
    • Information Systems Review
    • /
    • v.17 no.3
    • /
    • pp.77-94
    • /
    • 2015
  • As Internet has become a popular media for sharing information, users create and share tremendous volume of information including large amount of personal information in cyberspace. Sharing private information online can enhance strength of social relationship but it could also bring negative consequences like information privacy invasion. Although many companies and governments address the importance of information privacy online, there are countless cases of crimes and hackings relating personal information online world wide. Since there are some researches investigating the role of governments and organizations on online privacy domain but there is little research regarding users' privacy protection behaviors. This study investigates relationship between Internet users' information privacy protection behavior and environmental factors. Especially, this study focuses on users' behaviors regarding information privacy protection technology adoption. According to our research results, users' online privacy protective behaviors positively affected by governmental regulations expressed as an information privacy protection law. In addition, if user is allowed to use anonymity when he or she uses online services, they have more tendencies to adopt privacy protection technologies. The detailed research findings and contribution are discussed as well.

Consecutive Difference Expansion Based Reversible DNA Watermarking (연속적 차분 확장 기반 가역 DNA 워터마킹)

  • Lee, Suk-Hwan;Kwon, Ki-Ryong
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.52 no.7
    • /
    • pp.51-62
    • /
    • 2015
  • Of recent interests on high capacity DNA storage, DNA watermarking for DNA copyright protection, and DNA steganography for DNA secret communication are augmented, the reversible DNA watermarking is much needed both to embed the watermark without changing the functionality of organism and to perfectly recover the host DNA sequence. In this paper, we address two ways of DE based reversible DNA watermarking using noncoding DNA sequence. The reversible DNA watermarking should consider the string structure of a DNA sequence, the organism functionality, the perfect recovery, and the high embedding capacity. We convert the string sequence of four characters in noncoding region to the decimal coded values and embed the watermark bit into coded values by two ways; DE based multiple bits embedding (DE-MBE) using pairs of neighbor coded values and consecutive DE-MBE (C-DE-MBE). Two ways process the comparison searching to prevent the false start codon that produces false coding region. Experimental results verified that our ways have more high embedding capacity than conventional methods and produce no false start codon and recover perfectly the host sequence without the reference sequence. Especially C-DE-MBE can embed more high two times than DE-MBE.

Realization of a Web-based Distribution System for the Monitoring of Business Press Releases and News Gathering Robots (기업 보도자료 모니터링을 위한 웹기반 배포시스템 및 기사 수집로봇 구현)

  • Shin, Myeong-Sook;Oh, Jung-Jin;Lee, Joon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.18 no.12
    • /
    • pp.103-111
    • /
    • 2013
  • At present, a variety of Korean news stories have been about important online content and its importance in the press is becoming higher. Diverse news from businesses are provided to the public as press releases through newspapers or broadcasting media. For such news to become information for a press release, enterprises visit reporters, use e-mails, faxes, or couriers to deliver the information. However, such methods have problems with time, human resources, expenses, and file damage. Also, with these methods it is bothersome for enterprises to check what has been released and for the press to make frequent contact with enterprises for interviews and for content to be released. Therefore, this study aimed to realize a distribution system which enterprises can use to distribute data to be released to the press and to easily check what is to be released while the press can ask for interview requests in a simple way, as well as a news gathering robot that can collects news on the enterprises involved from articles online or in portal sites.

A Convergence Study of Cultural Competence Dimensions of Nurses and Nursing Students (간호사와 간호대학생의 문화적 역량 구성요소에 관한 융합적 연구)

  • Han, Kyung-A;Moon, Hee;Sun, Chun-Ja
    • Journal of the Korea Convergence Society
    • /
    • v.12 no.9
    • /
    • pp.239-250
    • /
    • 2021
  • This study has been conducted to identify the theoretical understanding of cultural competence by systematically reviewing national and international quantitative studies on 'nurses' and 'nursing students' cultural competence dimensions. A literature search was conducted over approximately three months from June to August 2020, targeting academic journals and dissertations published from January 1, 2010, to December 31, 2019. Literature extraction was conducted according to the PRISMA guidelines, and 67 papers from a total of 1,175 were selected for the systematic literature review. As a result, the most commonly measured component was cultural perception, other dimensions included cultural knowledge, cultural skills, cultural sensitivity, cultural encounter, cultural attitude, cultural behavior, cultural longings and cultural receptivity, cultural experience, cultural security, cultural ethics, cultural beliefs, cultural practice, motivation and curiosity, cultural emotions and empathy. Therefore, in order to improve the cultural competency of nurses and nursing students, it is necessary to seek consensus and a multifaceted approach that is essential in each society based on various components.

The Details and Outlook of Three Data Acts Amendment in South Korea: With a Focus on the Changes of Domestic Financial and Data Industry (데이터 3법 개정안의 내용과 전망: 국내 금융 및 데이터 산업계의 변화를 중심으로)

  • Kim, Eun-Chan;Kim, Eun-Young;Lee, Hyo-Chan;Yoo, Byung-Joon
    • Informatization Policy
    • /
    • v.28 no.3
    • /
    • pp.49-72
    • /
    • 2021
  • This study analyzes the major content, significances, and future outlook of Three Data Acts amendment enacted in August 2020 in South Korea, with the focus on their impact on the financial and data industries. It seems that the revision of the Credit Information Act will enable the specification of a business which had previously only been regulated as the business of credit inquiry, and also enable the domestic data industry to activate the MyData industry, data trading and platforms, and specify data pseudonymization and trading procedures. For the rational and efficient implementation of the amendments to the Three Data Acts, the Personal Information Protection Committee must be as transparent and lawful in its activities as possible, and fairness must be guaranteed. Even in the utilization of personal information, the development or complementation of the related data processing technologies is essential, and clear data processing methods and areas must be regulated. Furthermore, the amendments must be supported with guarantees and the systematization of a fair competitive system in the data market, stricter regulations on penalties for illegal acts related to data, establishment and strengthening of the related security systems, and reinforcement of the system of cooperation for data transfer.

Application of Reverse Transcription Droplet Digital PCR for Detection and Quantification of Tomato Spotted Wilt Virus (Reverse Transcription Droplet Digital PCR을 활용한 Tomato Spotted Wilt Virus 검출 및 정량)

  • Lee, Hyo-Jeong;Park, Ki Beom;Han, Yeon Soo;Jeong, Rae-Dong
    • Research in Plant Disease
    • /
    • v.27 no.3
    • /
    • pp.120-127
    • /
    • 2021
  • Plant viruses cause significant yield losses, continuously compromising crop production and thus representing a serious threat to global food security. Tomato spotted wilt virus (TSWV) is the most harmful plant virus that mainly infects horticultural crops and has a wide host range. Reverse-transcription quantitative real-time PCR (RT-qPCR) has been widely used for detecting TSWV with high sensitivity, but its application is limited owing to the lack of standardization. Therefore, in this study, a sensitive and accurate reverse transcription droplet digital polymerase chain reaction (RT-ddPCR) method was established for TSWV detection. Additionally, we compared the sensitivities of RT-qPCR and RT-ddPCR for TSWV detection. Specificity analysis of RT-ddPCR for TSWV showed no amplification for main pepper viruses and negative control. TSWV transcripts levels measured by RT-ddPCR and RT-qPCR showed a high degree of linearity; however, the former yielded results that were at least 10-fold more sensitive and detected lower TSWV copy numbers than the latter. Collectively, our findings show that RT-ddPCR provides improved analytical sensitivity and specificity for TSWV detection, making it suitable for identifying low TSWV concentrations in field samples.

Analysis of Health Care Service Trends for The Older Adults Based on ICT (국내외 ICT기반 노인 건강관리 서비스 동향분석)

  • Lee, Sung-Hyun;Hong, Sung Jung;Kim, Kyung Mi
    • Journal of the Korea Convergence Society
    • /
    • v.12 no.5
    • /
    • pp.373-383
    • /
    • 2021
  • Our society is aging rapidly. In this super-aged society, the increase in healthcare costs are considered a national problem that undermines the sustainability of social security. Various services for healthcare for the elderly have been promoted to address this. However, most of them have focused on healthcare after the outbreak of chronic diseases and lack preventive healthcare. Most of the preventive healthcare projects are only pilots. In this paper, the current status of health care services for senior citizens at home and abroad was analyzed and based on this, the limitations and improvements were analyzed to propose the establishment of IoT-based Total Silver Care Center. IoT-based Total Silver Care Center may be conveniently monitored the health status of the elderly through various sensors, medical devices, and smart bands. And based on this, it can improve the quality of nursing services through time-saving and work efficiency of nursing providers. In addition, health care interventions may be provided in a timely manner if there is a change in the health status of users. And real-time imaging systems can help overcome mental difficulties.

Development of Authentication Service Model Based Context-Awareness for Accessing Patient's Medical Information (환자 의료정보 접근을 위한 상황인식 기반의 인증서비스 모델 개발)

  • Ham, Gyu-Sung;Joo, Su-Chong
    • Journal of Internet Computing and Services
    • /
    • v.22 no.1
    • /
    • pp.99-107
    • /
    • 2021
  • With the recent establishment of a ubiquitous-based medical and healthcare environment, the medical information system for obtaining situation information from various sensors is increasing. In the medical information system environment based on context-awareness, the patient situation can be determined as normal or emergency using situational information. In addition, medical staff can easily access patient information after simple user authentication using ID and Password through applications on smart devices. However, these services of authentication and patient information access are staff-oriented systems and do not fully consider the ubiquitous-based healthcare information system environment. In this paper, we present a authentication service model based context-awareness system for providing situational information-driven authentication services to users who access medical information, and implemented proposed system. The authentication service model based context-awareness system is a service that recognizes patient situations through sensors and the authentication and authorization of medical staff proceed differently according to patient situations. It was implemented using wearables, biometric data measurement modules, camera sensors, etc. to configure various situational information measurement environments. If the patient situation was emergency situation, the medical information server sent an emergency message to the smart device of the medical staff, and the medical staff that received the emergency message tried to authenticate using the application of the smart device to access the patient information. Once all authentication was completed, medical staff will be given access to high-level medical information and can even checked patient medical information that could not be seen under normal situation. The authentication service model based context-awareness system not only fully considered the ubiquitous medical information system environment, but also enhanced patient-centered systematic security and access transparency.

Digital Revolution and Welfare State Reforms: Revisiting Social Investment and Social Protection (기술혁명과 미래 복지국가 개혁의 논점: 다시 사회투자와 사회보호로)

  • Choi, Young Jun;Choi, Jung Eun;Ryu, Jung Min
    • 한국사회정책
    • /
    • v.25 no.1
    • /
    • pp.3-43
    • /
    • 2018
  • The digital revolution has brought about both positive expectations and negative concerns. Many experts predict that the current technological revolution, so-called "Fourth Industrial Revolution", which is expected to increase productivity in a disruptive way, has significant implications on employment and the labor market. In subsequence, the possible demise of the traditional employment system could markedly undermine the comtemporary welfare state. As a result, basic income has emerged as an alternative. However, little welfare state research has conducted the systematic review on the impact of the present technological revolution on employment and welfare states. In this paper, we will start to review the gist of the digital revolution and critically review recent studies on its effects on employment and welfare states together with actual case studies. In particular, we will investigate the experiences of platform economies of Uber and Amazon Mechanical Turk, and the German experience from 'Work 4.0'. Finally, we will discuss key issues of future welfare state reforms. This research argues that the effects of the technological revolution on employment and welfare state policies would be enormous, but they will be most likely to be mediated by domestic political and policy institutions. It emphasizes the importance of high-quality social investment that would enable individuals to flexibly adapt technological changes and support creative human capital resource. But, high-quality social investment could not be sustained without the decent social protection system that universally provides security to people.