• 제목/요약/키워드: Information Protection Practice

검색결과 118건 처리시간 0.117초

Knowledge and Practice of Dental Practitioners Regarding Patient's Personal Information (환자 개인정보보호에 관한 치과종사자의 인식 및 실천)

  • Lee, Su-Young;So, Ji-Hyoun
    • Journal of dental hygiene science
    • /
    • 제17권2호
    • /
    • pp.99-107
    • /
    • 2017
  • The purpose of this study was to identify knowledge awareness, and performance of dentist and dental staff regarding protection of patient's personal information. In addition, this research was conducted to highlight the importance of protection of patient's personal information and provide a guideline for establishing measures in this regard. A survey was conducted on 506 dentists or dental staff working in Seoul, Gyeonggi and Chungcheong provinces. The data was analyzed using t-test, one-way ANOVA, $x^2$, Pearson's correlation coefficient, and Scheffe test, using the PASW Statistics ver. 18.0 program. We found that the participants' knowledge and perception of the protection of patient's personal information were relatively low compared to those of other professionals. Such knowledge and perception were especially and significantly low in dental hygienists. In addition, a high level of knowledge and awareness showed a positive correlation with the extent of performance. Therefore, it is important that dentists and dental staff are aware of issues regarding the protection of patients' personal information. For this purpose, educational and training programs on such issues appear essential.

Identifying Stakeholder Perspectives on Data Industry Regulation in South Korea

  • Lee, Youhyun;Jung, Il-Young
    • Journal of Information Science Theory and Practice
    • /
    • 제9권3호
    • /
    • pp.14-30
    • /
    • 2021
  • Data innovation is at the core of the Fourth Industrial Revolution. While the catastrophic COVID-19 pandemic has accelerated the societal shift toward a data-driven society, the direction of overall data regulation remains unclear and data policy experts have yet to reach a consensus. This study identifies and examines the ideal regulator models of data-policy experts and suggests an appropriate method for developing policy in the data economy. To identify different typologies of data regulation, this study used Q methodology with 42 data policy experts, including public officers, researchers, entrepreneurs, and professors, and additional focus group interviews (FGIs) with six data policy experts. Using a Q survey, this study discerns four types of data policy regulators: proactive activists, neutral conservatives, pro-protection idealists, and pro-protection pragmatists. Based on the results of the analysis and FGIs, this study suggests three practical policy implications for framing a nation's data policy. It also discusses possibilities for exploring diverse methods of data industry regulation, underscoring the value of identifying regulatory issues in the data industry from a social science perspective.

The ISO the research also the ISMS security maturity of 27001 regarding a measurement modeling (ISO 27004 information security management measurement and metric system) (ISO 27001의 ISMS 보안성숙도 측정 모델링에 관한 연구 (ISO 27004 정보보호관리 측정 및 척도 체계))

  • Kim, Tai-Dal
    • Journal of the Korea Society of Computer and Information
    • /
    • 제12권6호
    • /
    • pp.153-160
    • /
    • 2007
  • Recently, the demand against the system risk analysis and security management from the enterprises or the agencies which operate a information system is increasing even from domestic. The international against the standardization trend of information protection management system it investigates from the dissertation which it sees. It analyzed and against information property information protection management system integrated it will be able to manage a danger modeling it did it proposed. Having analyzed as well as compared the matureness of security-measurement models in regard to the global standard of proposal system, the administrative presentation for various IT technology resources. which have been managed singly so far, is now well applied under the united control of the company itself, and enabled the automated management of authentication support and renewal for ISO 27001, ISO 9000, ISO 14000, resulting in much advanced operation for both material and human resources.

  • PDF

An Approach for Security Problems in Visual Surveillance Systems by Combining Multiple Sensors and Obstacle Detection

  • Teng, Zhu;Liu, Feng;Zhang, Baopeng;Kang, Dong-Joong
    • Journal of Electrical Engineering and Technology
    • /
    • 제10권3호
    • /
    • pp.1284-1292
    • /
    • 2015
  • As visual surveillance systems become more and more common in human lives, approaches based on these systems to solve security problems in practice are boosted, especially in railway applications. In this paper, we first propose a robust snag detection algorithm and then present a railway security system by using a combination of multiple sensors and the vision based snag detection algorithm. The system aims safety at several repeatedly occurred situations including slope protection, inspection of the falling-object from bridges, and the detection of snags and foreign objects on the rail. Experiments demonstrate that the snag detection is relatively robust and the system could guarantee the security of the railway through these real-time protections and detections.

Field Applicability of Design Methodologies for Groundwater Quality Monitoring Network

  • Lee, Sang-Il
    • Korean Journal of Hydrosciences
    • /
    • 제10권
    • /
    • pp.47-58
    • /
    • 1999
  • Protection of groundwater resources from contamination has been of increasing concern throughout the past decades. In practice, however, groundwater monitoring is performed based on the experience and intuition of experts or on the convenience. In dealing with groundwater contamination, we need to know what contaminants have the potential to threat the water quality and the distribution and concentration of the plumes. Monitoring of the subsurface environment through remote geophysical techniques or direct sampling from wells can provide such information. Once known, the plume can be properly menaged. Evaluation of existing methodologies for groundwater monitoring network design revealed that one should select an appropriate design method based on the purpose of the network and the avaliability of field information. Integer programming approach, one of the general purpose network design tools, and a cost-to-go function evaluation approach for special purpose network design were tested for field applicability. For the same contaminated aquifer, two approaches resulted in different well locations. The amount of information, however, was about the same.

  • PDF

A Disk-based Archival Storage System Using the EOS Erasure Coding Implementation for the ALICE Experiment at the CERN LHC

  • Ahn, Sang Un;Betev, Latchezar;Bonfillou, Eric;Han, Heejune;Kim, Jeongheon;Lee, Seung Hee;Panzer-Steindel, Bernd;Peters, Andreas-Joachim;Yoon, Heejun
    • Journal of Information Science Theory and Practice
    • /
    • 제10권spc호
    • /
    • pp.56-65
    • /
    • 2022
  • Korea Institute of Science and Technology Information (KISTI) is a Worldwide LHC Computing Grid (WLCG) Tier-1 center mandated to preserve raw data produced from A Large Ion Collider Experiment (ALICE) experiment using the world's largest particle accelerator, the Large Hadron Collider (LHC) at European Organization for Nuclear Research (CERN). Physical medium used widely for long-term data preservation is tape, thanks to its reliability and least price per capacity compared to other media such as optical disk, hard disk, and solid-state disk. However, decreasing numbers of manufacturers for both tape drives and cartridges, and patent disputes among them escalated risk of market. As alternative to tape-based data preservation strategy, we proposed disk-only erasure-coded archival storage system, Custodial Disk Storage (CDS), powered by Exascale Open Storage (EOS), an open-source storage management software developed by CERN. CDS system consists of 18 high density Just-Bunch-Of-Disks (JBOD) enclosures attached to 9 servers through 12 Gbps Serial Attached SCSI (SAS) Host Bus Adapter (HBA) interfaces via multiple paths for redundancy and multiplexing. For data protection, we introduced Reed-Solomon (RS) (16, 4) Erasure Coding (EC) layout, where the number of data and parity blocks are 12 and 4 respectively, which gives the annual data loss probability equivalent to 5×10-14. In this paper, we discuss CDS system design based on JBOD products, performance limitations, and data protection strategy accommodating EOS EC implementation. We present CDS operations for ALICE experiment and long-term power consumption measurement.

The Characteristic of Media Consumer and Legal Principles for Consumer Movements Protection (언론소비자의 특성과 소비자운동의 보호법리 - 광고불매운동을 중심으로)

  • Lee, Seung-Sun
    • Korean journal of communication and information
    • /
    • 제48권
    • /
    • pp.5-24
    • /
    • 2009
  • This study is aimed to analyze the concept of media consumer and legal principles for consumer movements protection. Based on the concept and legal principles, this research is to review the characteristics of the advertisement boycott campaign. Article 124 of the Constitution prescribes that the state should guarantee the consumer protection movements. According to the Article 4 of the Framework Act on Consumer, consumers have the fundamental right to obtain proper compensation for damages sustained due to use of goods and etc. according to prompt and fair procedure. The type of boycott can be classified into two pattern on the basis of boycott's target or object. They are primary boycott and. secondary boycott. Consumer's boycott independent of primary or secondary, are under the protection of the consumer's right. Media consumers use scarce resources to satisfy their wants and needs to acquire news information and advertising information. Their resources are time and money. Therefore, ads boycott campaign or media boycott campaign is the primary boycott. Consumer's right should be guaranteed to the maximum. The Constitution and consumer protection law should protect the practice of consumer's right, especially consumer's boycott campaign.

  • PDF

Semantic Analysis of Information Assurance Concept : A Literature Review (문헌 연구를 통한 정보보증 개념의 구문 분석)

  • Kang, Ji-Won;Choi, Heon-jun;Lee, Hanhee
    • Convergence Security Journal
    • /
    • 제19권1호
    • /
    • pp.31-40
    • /
    • 2019
  • Today, information security (INFOSEC) as a discipline is gaining more and more importance according to the emergence and extension of the cyberspace. Originated from Joint Doctrine for Information Operation (Joint Pub 3-13) by the U.S. Department of Defense, 'information assurance (IA)' is the concept widely used in the relevant field. Grown from the practice of information security, it encompasses broader and more proactive protection that includes countermeasures and repair, security management throughout an information system (IS)'s life-cycle, and trustworthiness of an IS in the process of risk analysis. In Korea, many industry professionals tend to misunderstand IA, remaining unaware of the conceptual differences between IA and INFOSEC. On this account, the current study attempted to provide a combined definition of IA by reviewing relevant literature. This study showed the validity of the wordings used in the proposed definition phrase by phrase.

A Novel Hybrid Algorithm Based on Word and Method Ranking for Password Security

  • Berker Tasoluk;Zuhal Tanrikulu
    • International Journal of Computer Science & Network Security
    • /
    • 제23권3호
    • /
    • pp.161-168
    • /
    • 2023
  • It is a common practice to use a password in order to restrict access to information, or in a general sense, to assets. Right selection of the password is necessary for protecting the assets more effectively. Password finding/cracking try outs are performed for deciding which level of protection do used or prospective passwords offer, and password cracking algorithms are generated. These algorithms are becoming more intelligent and succeed in finding more number of passwords in less tries and in a shorter duration. In this study, the performances of possible password finding algorithms are measured, and a hybrid algorithm based on the performances of different password cracking algorithms is generated, and it is demonstrated that the performance of the hybrid algorithm is superior to the base algorithms.

Prototype Design of Medicine Information System to check medicinal misusing (약물 남용 방지를 위한 의약품 정보 시스템의 프로토타입 설계)

  • Kim, Ha-Gang;Oh, Su-Hee;Kim, Nam-Ho;Cha, Byung-Rae
    • Journal of Advanced Navigation Technology
    • /
    • 제13권3호
    • /
    • pp.448-458
    • /
    • 2009
  • Recently, the Korean Pharmaceutical Association has a public service advertisements for medicinal misusing prevention and environment protection by medicinal substances. And the cost and procedure complexity was increased by specialization of dispensary and medical practice. To overcome this situation, we felt the need of a medicine information system. Ubiquitous and convergence technology have become trends in the IT field. In this research, we designed prototype of medicine information system for management and prevention of medicinal misusing using IT technologies.

  • PDF