• Title/Summary/Keyword: Information Assurance

Search Result 650, Processing Time 0.036 seconds

Actual Condition of Quality Control of X-ray Imaging System in Primary Care Institution: focused on Gwangju Metropolitan City (1차 의료기관의 엑스선 발생장치 정도관리에 관한 현황조사:광주광역시 지역을 중심으로)

  • Dong, Kyung-Rae;Lee, Seun-Joo;Kweon, Dae-Cheol;Goo, Eun-Hoe;Jung, Jae-Eun;Lee, Kyu-Su
    • Journal of Radiation Protection and Research
    • /
    • v.35 no.1
    • /
    • pp.34-42
    • /
    • 2010
  • With the expanded use of radiation in modern medical practices, the most important issue in regards to efforts to reduce individual exposure dose is quality assurance. Therefore in order to study the present condition of quality assurance, the Gwangju Metropolitan City area was divided into five districts each containing ten hospitals. Four experiments were conducted: a reproducibility experiment for kVp, mA, and examination time (sec) intensity of illumination; half-value layer (HVL) measurement; and beam perpendicularity test matching experiment. The tube voltage reproducibility experiment for all fifty hospitals resulted in a 95.33% passing rate and mA and examination time both resulted in a 77.0% passing rate. The passing rate for intensity of illumination was 86.0% and 52.0% for HVL, which was the lowest passing rate of all four factors. For the beam perpendicularity test matching experiment, generally the central flux is matched to within $1.5^{\circ}$. Of all fifty hospitals 30.0% were beyond $3^{\circ}$. The results of the survey showed that 58% responded that they knew about quality assurance cycle. All fifty respondents stated that they have not received any training in regards to quality assurance at their current place of employment. Although quality assurance is making relative progress, the most urgent issue is awareness of the importance of quality assurance. Therefore, the implementation of professional training focusing on safety management and accurate quality assurance of radiation will reduce the exposure to radiation for radiologists and patients and higher quality imaging using less dosage will also be possible.

VR Threat Analysis for Information Assurance of VR Device and Game System (VR 기기와 게임 시스템의 정보보증을 위한 VR 위협 분석)

  • Kang, Tae Un;Kim, Huy Kang
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.2
    • /
    • pp.437-447
    • /
    • 2018
  • Virtual Reality (VR) is becoming a new standard in the game industry. PokeMon GO is a representative example of VR technology. The day after the launch of PokeMon Go in the U.S, It has achieved the highest number of iOS App Store downloads. This is an example of the power of VR. VR comprises gyroscopes, acceleration, tactile sensors, and so on. This allow users could be immersed in the game. As new technologies emerge, new and different threats are created. So we need to research the security of VR technology and game system. In this paper, we conduct a threat analysis for information assurance of VR device (Oculus Rift) and game system (Quake). We systematically analyze the threats (STRIDE, attack library, and attack tree). We propose security measures through DREAD. In addition, we use Visual Code Grepper (VCG) tool to find out logic errors and vulnerable functions in source code, and propose a method to solve them.

A Study on the development of Test Report Information Service(TRIS) by User survey analysis (사용자 설문분석을 통한 군수품 시험성적서 정보서비스 고도화 방안에 대한 연구)

  • Park, Dongsoo;Lee, Donghun
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.18 no.2
    • /
    • pp.405-414
    • /
    • 2017
  • In this study, a survey for a satisfaction evaluation of the Test Report Information Service (TRIS) was conducted. A survey questionnaire on modified Information System Success Model(ISSM) of Delone and Mclean was carried out by 183 users in three groups, such as munition quality assurance agency, munition corporation, and test institute. As a survey result, training on the TRIS was in strong demand in all three groups. An understanding and proficiency of the overall system were different from the work process of each user group. In addition, the munition quality assurance agency needs to enhance the system function with its characteristics. Test institute has necessity of the linkage method with the TRIS depending on the authentication system. User groups are different in the operational method of TRIS between the contractor and cooperation. Accordingly, cooperation needs to be educated continually. This study can help in the construction of a Military Quality Integration Information System to secure the reliability of munitions.

A Study on the Improvement of Air Traffic Safety Information Management (관제 안전정보 관리체계 개선을 위한 연구)

  • Shin, Oksig;Kim, Ilyoung
    • Journal of Aerospace System Engineering
    • /
    • v.2 no.3
    • /
    • pp.7-11
    • /
    • 2008
  • This is a study to research the effective way to enhance the performance of safety management by gathering and analyzing the information of undesirable occurrences that may result in accident or serious incident. This includes the way to identify the potential hazards related with the proactive activities. As detailed improvements, this paper introduces the mandatory and voluntary reporting system, normal operation safety survey, ATC quality assurance and the encouragement of just culture.

  • PDF

A Study on the Assurance Methods for Application (적용을 위한 보증 방법론 연구)

  • Lee, Ji-Eun;Choi, Byoung-Ju
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2003.05c
    • /
    • pp.1825-1828
    • /
    • 2003
  • IT 시스템을 보증할 필요가 커지면서 이미 많은 보증 방법론이 제안된 바 있다. 이러한 여러 가지 보증 방법론들은 그 목적, 범위, 대상, 접근방법에서 모두 다르다. 따라서 상황에 맞도록 적합한 보증 방법론을 선택하여 적절한 방법으로 적응하기 위해서는 방법론들에 대한 분석이 선행될 필요가 있다 이를 위하여 본 논문에서는 다양한 보증 방법론들을 분류하고 관련 보증 방법론들을 서로 비교 분석하였다.

  • PDF

A Study on the Evaluation Procedures for IT System Development Site (IT 시스템 개발현장실사 절차에 관한 연구)

  • 김태훈;김재성;김행곤
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2003.10a
    • /
    • pp.892-894
    • /
    • 2003
  • IT 시스템 평가과정은 시스템의 보안기능과 이에 적용된 보증수단이 요구사항들을 만족하는지에 대한 신뢰도를 확인하는 것이며, 평가결과는 소비자가 IT 제품이나 시스템이 주어진 환경에 적용하기에 충분히 안전한지, 사용상 내재하는 보안위험이 허용가능한지를 결정하는데 도움이 될 수 있다. 평가를 통하여 평가보증등급(EAL: Evaluation Assurance Level) 3 이상으로 인증받기 위해서는 ALC_DVS. 1 컴포넌트의 요구사항을 만족하여야 하며, 이들 요구사항은 개발현장에 대한 실사를 요구하게 된다. 본 논문에서는 ALC_DVS. 1 컴포넌트에서 요구하는 현장 실사의 중요성을 파악하고, 국내에 적용가능한 ALC_DVS. 1 컴포넌트 패밀리를 제안하고 실사 준비에 필요한 절차를 도출하였다.

  • PDF

SLA Assurance on the integrated web services using BPEL4WS (BPEL4WS를 이용한 웹 서비스 통합 관점의 SLA보증기법)

  • 정승준;국윤규;김운용;최영근
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2004.10a
    • /
    • pp.22-24
    • /
    • 2004
  • 웹 서비스는 SOAP, WSDL, UDDI와 같은 표준을 기반으로 인터넷상의 분산된 여러 서비스들을 통합하는 가장 효과적인 방법으로 알려져 있다. 이러한 통합을 위하여 웹 서비스 표준 프로세스 통합모델 언어인 BPEL4WS가 제시되었다. 이와 같은 분산된 서비스 통합 시에 서비스 신뢰성 확보를 위해서는 통합 환경 상의 품질 관리가 필요하나 확실한 대안 책이 없었다. 이에 본 논문에서는 사용자와 공급자 사이의 협정을 통해 품질 보증하는 SLA를 이용하여, BPEL4WS로 통합한 환경에 적합한 품질 보증기법을 제시한다. 또한 제시한 기법의 효율적인 활용을 위한 웹 서비스 통합 프레임워크를 제시한다.

  • PDF

A Method to Elicit Privacy Requirements and Build Privacy Assurance Cases for Privacy Friendly System (프라이버시 친화 시스템 개발을 위한 프라이버시 요구사항 도출 및 보증 사례 작성)

  • Cho, Ju Hye;Lee, Seok-Won
    • Journal of KIISE
    • /
    • v.44 no.9
    • /
    • pp.918-931
    • /
    • 2017
  • Recently, the spread of smartphones and various wearable devices has led to increases in the accumulation and usage of personal information. As a result, privacy protection has become an issue. Even though there have been studies and efforts to improve legal and technological security measures for protecting privacy, personal information leakage accidents still occur. Rather than privacy requirements, analysts mostly focus on the implementation of security technology within software development. Previous studies of security requirements strongly focused on supplementing the basic principles and laws for privacy protection and securing privacy requirements without understanding the relationship between privacy and security. As a result, personal information infringement occurs continuously despite the development of security technologies and the revision of the Personal Information Protection Act. Therefore, we need a method for eliciting privacy requirements based on related privacy protection laws that are applicable to software development. We also should clearly specify the relationship between privacy and security. This study aims to elicit privacy requirements and create privacy assurances cases for Privacy Friendly System development.

A Study on the Quality of Mobile Web Service for Environment Landscape Architecture - Focus on Korean Professional Portal Site, Lafent - (환경조경 이동통신용 웹의 서비스 품질 연구 - 전문포털사이트 라펜트를 중심으로 -)

  • Choi, Ja-Ho;Oh, Jeong-Hak
    • Journal of the Korean Society of Environmental Restoration Technology
    • /
    • v.23 no.2
    • /
    • pp.17-31
    • /
    • 2020
  • In the field of environmental landscape architecture, the internet medium is used as an effective communication tool not only in the private level but also in the policy level. Recently, the active utilization of mobile web service is emphasized as the time changes, but there is not much improvement or advance in services due to lack of relevant studies. Therefore, this study is intended to provide basic data needed for improvement and advance by researching the quality of mobile web service among multichannel services provided in environmental landscape architecture related internet media. The model for measuring service quality is SERVQUAL, which was verified in the study of Choi(2015), Choi and Koo(2016), and the final valid samples are total 230. First, the subjects were analyzed as the representative media that are possible to acquire comprehensive knowledge related to environmental landscape architecture. Second, the highest importance level in each subsection was 'protection and security maintenance of customer information' followed by 'Reliability about accurate information supply'. Regarding performance level, 'Reliability about accurate information supply' and 'professional knowledge to communicate with users' are highly evaluated. Third, regarding Importance-Performance Analysis(IPA), the first priority management should is 'Tangibles', and the next are 'Responsibility' and 'Empathy'. The ones for maintenance of the status quo are 'Reliability' and 'Assurance', and there is none for effort reduction. Meanwhile, regarding the importance of each factor and difference in the quality of PC web service and mobile web service studied before, the biggest difference is in 'Tangibles', followed by 'Assurance', 'Empathy', 'Responsibility' and 'Reliability'. It is suggested that the revitalization of Landscape information science(LB1106) presented in the National Science&Technology Standard Classification System is needed. In the future, it is necessary to research the change trend on users' response through continuous evaluation of improved mobile web service.

Application and Analysis of the Paradigm of Software Safety Assurance for a Digital Reactor Protection System in Nuclear Power Plants (원전 디지털 원자로보호계통 소프트웨어 안전보증 패러다임 적용 및 분석)

  • Kwon, Kee-Choon;Lee, Jang-Soo;Jee, Eunkyoung
    • KIISE Transactions on Computing Practices
    • /
    • v.23 no.6
    • /
    • pp.335-342
    • /
    • 2017
  • In the verification and validation procedures regarding the safety-critical software of nuclear power plants for the attainment of the requisite license from the regulatory body, it is difficult to judge the safety and dependability of the development, implementation, and validation activities through a simple reading and review of the documentation. Therefore, these activities, especially safety assurance activities, require systematic evaluation techniques to determine that software faults are acceptable level. In this study, a safety case methodology is applied in an assessment of the level and depth of the results of the development and validation of a manufacturer in its targeting of the bistable processor of a digital reactor protection system, and the evaluation results are analyzed. This study confirms the possibility of an effective supplementation of the existing safety demonstration method through the application of the employed safety case methodology.