• Title/Summary/Keyword: Information Security Strategic

검색결과 141건 처리시간 0.136초

Evolving the Cybersecurity of Clinical Photography in Plastic Surgery

  • Daisy L. Spoer;Alexandra Junn;John D. Bovill;Zoe K. Haffner;Andrew I. Abadeer;Stephen B. Baker
    • Archives of Plastic Surgery
    • /
    • 제50권4호
    • /
    • pp.443-444
    • /
    • 2023
  • Point-of-care photography and photo sharing optimize patient outcomes and facilitate remote consultation imperative for resident surgeons. This literature review and external pilot survey study highlight the risks associated with current practices concerning patient privacy and biometric security. In a survey of 30 plastic surgeon residents and attendings, we found that the majority took photos of patients with their iPhones and shared them with colleagues via Apple iMessage. These findings corroborate previous reports and highlight a lack of physician user acceptance of secure photo-sharing platforms. Finally, we frame a successful example from the literature in the context of a postulated framework for institutional change. Prioritizing the privacy and safety of patients requires a strategic approach that preserves the ease and frequency of use of current practices.

Development of a Secure Routing Protocol using Game Theory Model in Mobile Ad Hoc Networks

  • Paramasivan, Balasubramanian;Viju Prakash, Maria Johan;Kaliappan, Madasamy
    • Journal of Communications and Networks
    • /
    • 제17권1호
    • /
    • pp.75-83
    • /
    • 2015
  • In mobile ad-hoc networks (MANETs), nodes are mobile in nature. Collaboration between mobile nodes is more significant in MANETs, which have as their greatest challenges vulnerabilities to various security attacks and an inability to operate securely while preserving its resources and performing secure routing among nodes. Therefore, it is essential to develop an effective secure routing protocol to protect the nodes from anonymous behaviors. Currently, game theory is a tool that analyzes, formulates and solves selfishness issues. It is seldom applied to detect malicious behavior in networks. It deals, instead, with the strategic and rational behavior of each node. In our study,we used the dynamic Bayesian signaling game to analyze the strategy profile for regular and malicious nodes. This game also revealed the best actions of individual strategies for each node. Perfect Bayesian equilibrium (PBE) provides a prominent solution for signaling games to solve incomplete information by combining strategies and payoff of players that constitute equilibrium. Using PBE strategies of nodes are private information of regular and malicious nodes. Regular nodes should be cooperative during routing and update their payoff, while malicious nodes take sophisticated risks by evaluating their risk of being identified to decide when to decline. This approach minimizes the utility of malicious nodes and it motivates better cooperation between nodes by using the reputation system. Regular nodes monitor continuously to evaluate their neighbors using belief updating systems of the Bayes rule.

The Design and Implementation of Secure Instant Messaging System (안전한 단문 전송 시스템 설계 및 구현)

  • Song, Gi-Pyeung;Son, Hong;Jo, In-June;Ju, Young-Ji;Lee, Dal-Won
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 한국해양정보통신학회 2001년도 춘계종합학술대회
    • /
    • pp.667-671
    • /
    • 2001
  • The Instant Messenger(IM) is the most popular personal communication tool today. IM is a tool that can substitute E-mail for a person, and can secure the user for a company. Further, it is claimed as it has a limitless potential. However, there has been several reports on security issues. It has known that the transmitting message is not secured for the attacks, and hacking tools has been developed. In addition, several reports has been made regards to the vulnerability. In other words, anyone can been through and manipulate the messages that are sent or received via IM. This is a barrier for the IM to be developed as a corporate's strategic tool, and furthermore, it will create serious personal privacy issue. IETF IMPP Working Group is preparing a standard mutual relationship between IM. However, it is complicated due to the American On-Lines's absence, whom has ensured the most number of IM users. There was a discussion only about the form of the transmitting data, but it is insufficient state to discuss the security service for general. In this paper, I design and implement the Secure Instant Messaging System, to solve the IM's vulnerability and the security issue presented above.

  • PDF

The Design and Implementation of Secure Instant Messaging System (안전한 단문 전송 시스템 설계 및 구현)

  • Song, Gi-Pyeung;Sohn, Hong;Jo, In-June;Ju, Young-Ki;Lee, Dal-Won
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • 제5권2호
    • /
    • pp.357-364
    • /
    • 2001
  • The Instant Messenger(IM) is the most popular personal communication tool today. IM is a tool that can substitute E-mail for a person, and can secure the user for a company. Further, it is claimed as it has a limitless potential. However, there has been several reports on security issues. It has known that the transmitting message is not secured for the attacks, and hacking tools has been developed. In addition, several reports has been made regards to the vulnerability. In other words, anyone can peep through and manipulate the messages that are sent or received via IM. This is a barrier for the IM to be developed as a corporate's strategic tool, and furthermore, it will create serious personal privacy issue. IETF IMPP Working (:roup is preparing a standard mutual relationship between IM. However, it is complicated due to the American On-Lines's absence, whom has ensured the most number of IM users. There was a discussion only about the form of the transmitting data, but it is insufficient state to discuss the security service for general. In this paper, 1 design and implement the Secure Instant Messaging System, to solve the IM's vulnerability and the security issue presented above.

  • PDF

A Study on the Strategy for Improvement of Operational Test and Evaluation of Weapon System and the Determination of Priority (무기체계 운용시험평가 개선전략 도출 및 우선순위 결정)

  • Lee, Kang Kyong;Kim, Geum Ryul;Yoon, Sang Don;Seol, Hyeon Ju
    • Convergence Security Journal
    • /
    • 제21권1호
    • /
    • pp.177-189
    • /
    • 2021
  • Defense R&D is a key process for securing weapons systems determined by mid- and long-term needs to cope with changing future battlefield environments. In particular, the test and evaluation provides information necessary to determine whether or not to switch to mass production as the last gateway to research and development of weapons systems and plays an important role in ensuring performance linked to the life cycle of weapons systems. Meanwhile, if you look at the recent changes in the operational environment of the Korean Peninsula and the defense acquisition environment, you can see three main characteristics. First of all, continuous safety accidents occurred during the operation of the weapon system, which increased social interest in the safety of combatants, and the efficient execution of the limited defense budget is required as acquisition costs increase. In addition, strategic approaches are needed to respond to future battlefield environments such as robots, autonomous weapons systems (RAS), and cyber security test and evaluation. Therefore, in this study, we would like to present strategies for improving the testing and evaluation of weapons systems by considering the characteristics of the security environment that has changed recently. To this end, the improvement strategy was derived by analyzing the complementary elements of the current weapon system operational test and evaluation system in a multi-dimensional model and prioritized through the hierarchical analysis method (AHP).

Development of AI-based Cognitive Production Technology for Digital Datadriven Agriculture, Livestock Farming, and Fisheries (디지털 데이터 중심의 AI기반 환경인지 생산기술 개발 방향)

  • Kim, S.H.
    • Electronics and Telecommunications Trends
    • /
    • 제36권1호
    • /
    • pp.54-63
    • /
    • 2021
  • Since the recent COVID-19 pandemic, countries have been strengthening trade protection for their security, and the importance of securing strategic materials, such as food, is drawing attention. In addition to the cultural aspects, the global preference for food produced in Korea is increasing because of the Korean Wave. Thus, the Korean food industry can be developed into a high-value-added export food industry. Currently, Korea has a low self-sufficiency rate for foodstuffs apart from rice. Korea also suffers from problems arising from population decline, aging, rapid climate change, and various animal and plant diseases. It is necessary to develop technologies that can overcome the production structures highly dependent on the outside world of food and foster them into export-type system industries. The global agricultural industry-related technologies are actively being modified via data accumulation, e.g., environmental data, production information, and distribution and consumption information in climate and production facilities, and by actively expanding the introduction of the latest information and communication technologies such as big data and artificial intelligence. However, long-term research and investment should precede the field of living organisms. Compared to other industries, it is necessary to overcome poor production and labor environment investment efficiency in the food industry with respect to the production cost, equipment postmanagement, development tailored to the eye level of field workers, and service models suitable for production facilities of various sizes. This paper discusses the flow of domestic and international technologies that form the core issues of the site centered on the 4th Industrial Revolution in the field of agriculture, livestock, and fisheries. It also explains the environmental awareness production technologies centered on sustainable intelligence platforms that link climate change responses, optimization of energy costs, and mass production for unmanned production, distribution, and consumption using the unstructured data obtained based on detection and growth measurement data.

The Impact of IS Policy and Sanction Perceptions on Compliance Intention through Justice: The Role of Justice Sensitivity (정보보안 정책 및 제재 인식이 공정성을 통해 준수 의도에 미치는 영향: 공정 민감성의 역할)

  • In-Ho Hwang
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • 제18권2호
    • /
    • pp.337-348
    • /
    • 2023
  • As protecting organizations' information assets affects their substantiality, they are increasing their investments in policies, regulations, and technologies for systematic information asset management and protection. This study confirms the impact on information security(IS) compliance from the perspective of employees who apply IS policies to actual work. In particular, this study identifies mechanisms linked to IS policy awareness, sanction, justice, and IS compliance from the perspective of expanding deterrence theory. We applied 316 samples obtained from workers of organizations that applied IS policies and regulations to work and verified the relationship between mechanisms by using AMOS and SPSS packages. As a result of the verification, IS policy awareness had a positive effect on organization justice and compliance intention through the severity and clarity of sanctions. Individual justice sensitivity had a moderating effect on the cause and outcome of justice. The sanction-related mechanism presented in this study provides strategic implications for organizations that require active IS activities by insiders.

Conceptual Approaches to Training Specialists Using Multimedia Technologies

  • Shchyrbul, Oleksandr;Babalich, Viktoriya;Mishyn, Sergii;Novikova, Viktoriia;Zinchenko, Lina;Haidamashko, Iryna;Kuchai, Oleksandr
    • International Journal of Computer Science & Network Security
    • /
    • 제22권9호
    • /
    • pp.123-130
    • /
    • 2022
  • Modernization of the educational sector requires globalization, democratization, and the transition to an information technology society. The main goal of education at the present stage is to solve the problem of ensuring the priority of the development of education and science. In modern conditions, the quality of training of qualified specialists is becoming particularly relevant. The great role of teacher education is emphasized by its main goal, which is to train specialists who can ensure the versatile and innovative development of a person as a person and the highest value of society, its mental, physical and aesthetic abilities, high moral qualities, and, consequently, the enrichment on this basis of the intellectual, creative and cultural potential of the people. Among the strategic tasks of modernizing higher education is to ensure informatization of the educational process and access to International Information Systems. The essence of the concept of multimedia is clarified. In the context of media education, multimedia lists a number of functions: informational, interpretive, cultural, entertainment, and educational. The need to meet the needs outlined in the article in the conditions of informatization of the educational process requires the teacher to have knowledge and skills in the field of multimedia pedagogical technologies, knowledge of advanced methods and means of modern science. It is considered what relevant concepts of media education have been developed and are being developed in Ukraine and form an important basis for the modernization of education, which will contribute to the construction of an information society in the country and the formation of civil society. Distance learning is considered - the most democratic form of education that allows broad segments of society to get an education. Distance learning methods are used in higher education institutions, in school education, in the system of advanced training of teachers, in the system of training managerial personnel.

A Case Study on BSC System Implementation of Korea Minting & Security Printing Corporation (한국조폐공사 BSC 시스템 구축 사례)

  • Lee, Choong-Seop
    • Information Systems Review
    • /
    • 제9권1호
    • /
    • pp.191-214
    • /
    • 2007
  • This study analyzes the process of establishing BSC based strategic performance evaluation system of KOMSCO. This case could be a reference to other public institutes for BSC introduction and efficient BSC usage. Internal control system of KOMSCO has been improved by EVA system in 1999, BSC introduction and Job analysis in 2001 through 2002, and BSC performance evaluation system in 2004. KOMSCO tries to reflect BSC concept by inducing employees to cooperate selection process of CSF and KPI and by considering the organizational characteristics of KOMSCO in constructing it's performance indices. It is suggested that these processes are very important and should be followed by other institutes in their BSC introduction. By applying BSC, KOMSCO provides improvement in employees' understanding of strategy, performance management, and performance evaluation. KOMSCO' information system based on ERP and efficiently connected to EIS, KMS, and BSC seems to play an important role of BSC application. BSC system of KOMSCO is now in the early stage of application and needs to be evaluated by the efficiency of usage in terms of overall performance evaluation system, deduction system of evaluation point for excess accomplishment over target, and connection to budget system.

Factors Influencing Mobile Commerce Adoption and the Moderating Effect of Gender: Focused on Shanghai and Guangzhou (중국 소비자의 성별 모바일커머스 수용의도에 미치는 요인에 관한 연구: 광저우.상하이지역 소비자를 중심으로)

  • Lee, Jungsae
    • International Commerce and Information Review
    • /
    • 제16권3호
    • /
    • pp.25-50
    • /
    • 2014
  • This study is to identify the factors and explore the moderating effects of gender in influencing customer behavioral intention to adopt mobile commerce in Shanghai and Guangzhou in China. An extended study based on TRA, TPB and TAM, UTAUT, technology adoption model is applied for designing on this study model of behavioral intention to adopt mobile commerce focused on emotional variables and cross-gender differences. The results of analysis reveal that the effects of perceived risk, personal innovativeness, individual familarity and social influence on behavioral intentions to adopt mobile commerce as well as to differ across gender. Differences cross gender is specially the perceived risk and social influence. Findings imply that mobile commerce operators need to be communicated to female consumers, the risk-free quality including security, payment and certification system along with the social influence of using mobile commerce. When targeting female consumers in China, the word of mouth marketing strategic approach and improvement of communications of mobile commerce should be focused.

  • PDF