• Title/Summary/Keyword: Information Assurance

Search Result 657, Processing Time 0.029 seconds

A case study on the implementation of the UK(Scotland) Quality Assurance system - based on the Stakeholder Theory - (영국(스코틀랜드) 질 관리체제 적용에 관한 사례연구 - 이해관계자 이론(Stakeholder Theory)을 중심으로 -)

  • Kim, Jeongeun
    • Korean Journal of Comparative Education
    • /
    • v.18 no.4
    • /
    • pp.27-55
    • /
    • 2008
  • Since quality assurance and enhancement (QAE) raises the fundamental issue of the survival of higher education institutions and national competitiveness, guides on quality assurance (QA) are popular both domestically and worldwide. Despite the focus in many countries on trying to establish and implement QA systems, no clear investigation has been conducted on what actually happens in the institutions. Therefore, the present study examines the quality control system of the UK at an institutional level by focusing on the case of Scotland QAE. As Scottish QAE especially emphasizes student engagement and quality culture, this study investigates the present QAE situation in the institution and current ideas for better future practices by analyzing the perceptions of internal stakeholders' from the University of Edinburgh, School of Education, based on the stakeholder theory and implications for other contexts. The stakeholder analysis results demonstrate the successful application of QAE with a high level of understanding and stakeholder interest. However, the current strategy is missing certain opportunities for staff and students. Therefore, further information disclosure, formative evaluation, better communication and administrational supports are required for improved practice.

Information System Audit Improvement Plan in Requirements Engineering-based Quality Assurance and Project Management (요구공학 기반 품질보증 및 프로젝트 관리에서의 정보시스템 감리 개선 방안)

  • Jung Chul, Shin;Dong Soo, Kim;Hee Wan, Kim
    • Journal of Service Research and Studies
    • /
    • v.11 no.1
    • /
    • pp.45-58
    • /
    • 2021
  • Requirements engineering can be seen as proceeding with various processes and activities such as extraction, analysis, specification, management, and verification without temporal and spatial constraints in the development environment of information systems that are becoming large and decentralized. Developing requirements well and conducting continuous evaluation and management is the shortcut to success in project management, and it is recognized as a very important matter in relation to requirements in the information system audit. When we conduct information system audit and conducting projects subject to audit, we need to improve the required engineering aspect. Therefore, this study derives inspection items suitable for the target project by referring to the audit inspection manual and audit inspection guide when conducting the current audit, and relates to the required engineering aspect among the contents of the inspection guide for each business type that is the basis for deriving the inspection items were derived for each audit point/audit area for the project management and quality assurance project type corresponding to the inspection items. The suitability of the extracted occupation items was verified through a questionnaire survey by experts.

Actual Condition of Quality Control of X-ray Imaging System in Primary Care Institution: focused on Gwangju Metropolitan City (1차 의료기관의 엑스선 발생장치 정도관리에 관한 현황조사:광주광역시 지역을 중심으로)

  • Dong, Kyung-Rae;Lee, Seun-Joo;Kweon, Dae-Cheol;Goo, Eun-Hoe;Jung, Jae-Eun;Lee, Kyu-Su
    • Journal of Radiation Protection and Research
    • /
    • v.35 no.1
    • /
    • pp.34-42
    • /
    • 2010
  • With the expanded use of radiation in modern medical practices, the most important issue in regards to efforts to reduce individual exposure dose is quality assurance. Therefore in order to study the present condition of quality assurance, the Gwangju Metropolitan City area was divided into five districts each containing ten hospitals. Four experiments were conducted: a reproducibility experiment for kVp, mA, and examination time (sec) intensity of illumination; half-value layer (HVL) measurement; and beam perpendicularity test matching experiment. The tube voltage reproducibility experiment for all fifty hospitals resulted in a 95.33% passing rate and mA and examination time both resulted in a 77.0% passing rate. The passing rate for intensity of illumination was 86.0% and 52.0% for HVL, which was the lowest passing rate of all four factors. For the beam perpendicularity test matching experiment, generally the central flux is matched to within $1.5^{\circ}$. Of all fifty hospitals 30.0% were beyond $3^{\circ}$. The results of the survey showed that 58% responded that they knew about quality assurance cycle. All fifty respondents stated that they have not received any training in regards to quality assurance at their current place of employment. Although quality assurance is making relative progress, the most urgent issue is awareness of the importance of quality assurance. Therefore, the implementation of professional training focusing on safety management and accurate quality assurance of radiation will reduce the exposure to radiation for radiologists and patients and higher quality imaging using less dosage will also be possible.

VR Threat Analysis for Information Assurance of VR Device and Game System (VR 기기와 게임 시스템의 정보보증을 위한 VR 위협 분석)

  • Kang, Tae Un;Kim, Huy Kang
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.2
    • /
    • pp.437-447
    • /
    • 2018
  • Virtual Reality (VR) is becoming a new standard in the game industry. PokeMon GO is a representative example of VR technology. The day after the launch of PokeMon Go in the U.S, It has achieved the highest number of iOS App Store downloads. This is an example of the power of VR. VR comprises gyroscopes, acceleration, tactile sensors, and so on. This allow users could be immersed in the game. As new technologies emerge, new and different threats are created. So we need to research the security of VR technology and game system. In this paper, we conduct a threat analysis for information assurance of VR device (Oculus Rift) and game system (Quake). We systematically analyze the threats (STRIDE, attack library, and attack tree). We propose security measures through DREAD. In addition, we use Visual Code Grepper (VCG) tool to find out logic errors and vulnerable functions in source code, and propose a method to solve them.

A Study on the development of Test Report Information Service(TRIS) by User survey analysis (사용자 설문분석을 통한 군수품 시험성적서 정보서비스 고도화 방안에 대한 연구)

  • Park, Dongsoo;Lee, Donghun
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.18 no.2
    • /
    • pp.405-414
    • /
    • 2017
  • In this study, a survey for a satisfaction evaluation of the Test Report Information Service (TRIS) was conducted. A survey questionnaire on modified Information System Success Model(ISSM) of Delone and Mclean was carried out by 183 users in three groups, such as munition quality assurance agency, munition corporation, and test institute. As a survey result, training on the TRIS was in strong demand in all three groups. An understanding and proficiency of the overall system were different from the work process of each user group. In addition, the munition quality assurance agency needs to enhance the system function with its characteristics. Test institute has necessity of the linkage method with the TRIS depending on the authentication system. User groups are different in the operational method of TRIS between the contractor and cooperation. Accordingly, cooperation needs to be educated continually. This study can help in the construction of a Military Quality Integration Information System to secure the reliability of munitions.

A Study on the Improvement of Air Traffic Safety Information Management (관제 안전정보 관리체계 개선을 위한 연구)

  • Shin, Oksig;Kim, Ilyoung
    • Journal of Aerospace System Engineering
    • /
    • v.2 no.3
    • /
    • pp.7-11
    • /
    • 2008
  • This is a study to research the effective way to enhance the performance of safety management by gathering and analyzing the information of undesirable occurrences that may result in accident or serious incident. This includes the way to identify the potential hazards related with the proactive activities. As detailed improvements, this paper introduces the mandatory and voluntary reporting system, normal operation safety survey, ATC quality assurance and the encouragement of just culture.

  • PDF

A Study on the Assurance Methods for Application (적용을 위한 보증 방법론 연구)

  • Lee, Ji-Eun;Choi, Byoung-Ju
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2003.05c
    • /
    • pp.1825-1828
    • /
    • 2003
  • IT 시스템을 보증할 필요가 커지면서 이미 많은 보증 방법론이 제안된 바 있다. 이러한 여러 가지 보증 방법론들은 그 목적, 범위, 대상, 접근방법에서 모두 다르다. 따라서 상황에 맞도록 적합한 보증 방법론을 선택하여 적절한 방법으로 적응하기 위해서는 방법론들에 대한 분석이 선행될 필요가 있다 이를 위하여 본 논문에서는 다양한 보증 방법론들을 분류하고 관련 보증 방법론들을 서로 비교 분석하였다.

  • PDF

A Study on the Evaluation Procedures for IT System Development Site (IT 시스템 개발현장실사 절차에 관한 연구)

  • 김태훈;김재성;김행곤
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2003.10a
    • /
    • pp.892-894
    • /
    • 2003
  • IT 시스템 평가과정은 시스템의 보안기능과 이에 적용된 보증수단이 요구사항들을 만족하는지에 대한 신뢰도를 확인하는 것이며, 평가결과는 소비자가 IT 제품이나 시스템이 주어진 환경에 적용하기에 충분히 안전한지, 사용상 내재하는 보안위험이 허용가능한지를 결정하는데 도움이 될 수 있다. 평가를 통하여 평가보증등급(EAL: Evaluation Assurance Level) 3 이상으로 인증받기 위해서는 ALC_DVS. 1 컴포넌트의 요구사항을 만족하여야 하며, 이들 요구사항은 개발현장에 대한 실사를 요구하게 된다. 본 논문에서는 ALC_DVS. 1 컴포넌트에서 요구하는 현장 실사의 중요성을 파악하고, 국내에 적용가능한 ALC_DVS. 1 컴포넌트 패밀리를 제안하고 실사 준비에 필요한 절차를 도출하였다.

  • PDF

SLA Assurance on the integrated web services using BPEL4WS (BPEL4WS를 이용한 웹 서비스 통합 관점의 SLA보증기법)

  • 정승준;국윤규;김운용;최영근
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2004.10a
    • /
    • pp.22-24
    • /
    • 2004
  • 웹 서비스는 SOAP, WSDL, UDDI와 같은 표준을 기반으로 인터넷상의 분산된 여러 서비스들을 통합하는 가장 효과적인 방법으로 알려져 있다. 이러한 통합을 위하여 웹 서비스 표준 프로세스 통합모델 언어인 BPEL4WS가 제시되었다. 이와 같은 분산된 서비스 통합 시에 서비스 신뢰성 확보를 위해서는 통합 환경 상의 품질 관리가 필요하나 확실한 대안 책이 없었다. 이에 본 논문에서는 사용자와 공급자 사이의 협정을 통해 품질 보증하는 SLA를 이용하여, BPEL4WS로 통합한 환경에 적합한 품질 보증기법을 제시한다. 또한 제시한 기법의 효율적인 활용을 위한 웹 서비스 통합 프레임워크를 제시한다.

  • PDF

A Method to Elicit Privacy Requirements and Build Privacy Assurance Cases for Privacy Friendly System (프라이버시 친화 시스템 개발을 위한 프라이버시 요구사항 도출 및 보증 사례 작성)

  • Cho, Ju Hye;Lee, Seok-Won
    • Journal of KIISE
    • /
    • v.44 no.9
    • /
    • pp.918-931
    • /
    • 2017
  • Recently, the spread of smartphones and various wearable devices has led to increases in the accumulation and usage of personal information. As a result, privacy protection has become an issue. Even though there have been studies and efforts to improve legal and technological security measures for protecting privacy, personal information leakage accidents still occur. Rather than privacy requirements, analysts mostly focus on the implementation of security technology within software development. Previous studies of security requirements strongly focused on supplementing the basic principles and laws for privacy protection and securing privacy requirements without understanding the relationship between privacy and security. As a result, personal information infringement occurs continuously despite the development of security technologies and the revision of the Personal Information Protection Act. Therefore, we need a method for eliciting privacy requirements based on related privacy protection laws that are applicable to software development. We also should clearly specify the relationship between privacy and security. This study aims to elicit privacy requirements and create privacy assurances cases for Privacy Friendly System development.