• Title/Summary/Keyword: Information Transparency

Search Result 602, Processing Time 0.028 seconds

Blockchain-based non-manipulable probability control system (블록체인 기반 조작불가능한 확률제어 시스템)

  • Kim, Myeongkil;Kwon, Minho;Kim, Jinhyeok
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2022.07a
    • /
    • pp.153-154
    • /
    • 2022
  • 본 논문에서는 블록체인 기반의 투명성/신뢰성을 제공하는 조작 불가능한 확률 제어 시스템을 제안한다. 해당 시스템은 클라이언트에 의해 질의 된 확률값을 블록체인상에서 산출해냄으로써, Legacy 시스템 아키텍처의 한계인 조작 가능성을 원천적으로 배제할 수 있다. 이는 블록체인 참여 노드 간의 데이터를 동일하게 공유하여 투명성을 확보하고, 이를 기반으로 데이터에 대한 신뢰성을 확보한 확률 제공 기능이다. 특히 해당 시스템은 Private/Permissioned 구조 기반의 블록체인 네트워크를 기반으로 운영 노드에 의해서 유지/관리되어 별도의 트랜잭션 수수료가 블록체인상에서 발생하지 않는다. 또한 Public Blockchain 메인 네트워크상의 미래 블록에 대한 정보를 확률값 산출 Seed에 활용함으로써, Non-deterministic 한 환경을 제공한다. 이는 클라이언트가 확률 질의에 대한 검증 과정을 직접 수행하거나 Third-party 검증을 통해 확률값에 대한 조작 여부를 확인할 수 있다.

  • PDF

Reversible Multipurpose Watermarking Algorithm Using ResNet and Perceptual Hashing

  • Mingfang Jiang;Hengfu Yang
    • Journal of Information Processing Systems
    • /
    • v.19 no.6
    • /
    • pp.756-766
    • /
    • 2023
  • To effectively track the illegal use of digital images and maintain the security of digital image communication on the Internet, this paper proposes a reversible multipurpose image watermarking algorithm based on a deep residual network (ResNet) and perceptual hashing (also called MWR). The algorithm first combines perceptual image hashing to generate a digital fingerprint that depends on the user's identity information and image characteristics. Then it embeds the removable visible watermark and digital fingerprint in two different regions of the orthogonal separation of the image. The embedding strength of the digital fingerprint is computed using ResNet. Because of the embedding of the removable visible watermark, the conflict between the copyright notice and the user's browsing is balanced. Moreover, image authentication and traitor tracking are realized through digital fingerprint insertion. The experiments show that the scheme has good visual transparency and watermark visibility. The use of chaotic mapping in the visible watermark insertion process enhances the security of the multipurpose watermark scheme, and unauthorized users without correct keys cannot effectively remove the visible watermark.

Education and Ethics in Information Age (정보 시대의 교육과 윤리)

  • Ko, Young-Man
    • Journal of Korean Library and Information Science Society
    • /
    • v.38 no.4
    • /
    • pp.3-17
    • /
    • 2007
  • In Information age, information problems are continuously differentiated either in individual or in social domain. The danger of reality lost is also day by day increased by digital media and the changes happen at too fast pace. Form the dialect point of view, the education of information literacy is a very important cultural media to arbitrate the conflict between the reasonable solution of the individual information problem and the social information problem. This study is an attempt to discuss the macroscopic initiative of educational system and Information ethics on the basis of the dialectic interpretation of the cultural discourse of the information literacy.

  • PDF

MyData Personal Data Store Model(PDS) to Enhance Information Security for Guarantee the Self-determination rights

  • Min, Seong-hyun;Son, Kyung-ho
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.16 no.2
    • /
    • pp.587-608
    • /
    • 2022
  • The European Union recently established the General Data Protection Regulation (GDPR) for secure data use and personal information protection. Inspired by this, South Korea revised their Personal Information Protection Act, the Act on Promotion of Information and Communications Network Utilization and Information Protection, and the Credit Information Use and Protection Act, collectively known as the "Three Data Bills," which prescribe safe personal information use based on pseudonymous data processing. Based on these bills, the personal data store (PDS) has received attention because it utilizes the MyData service, which actively manages and controls personal information based on the approval of individuals, and it practically ensures their rights to informational self-determination. Various types of PDS models have been developed by several countries (e.g., the US, Europe, and Japan) and global platform firms. The South Korean government has now initiated MyData service projects for personal information use in the financial field, focusing on personal credit information management. There is also a need to verify the efficacy of this service in diverse fields (e.g., medical). However, despite the increased attention, existing MyData models and frameworks do not satisfy security requirements of ensured traceability, transparency, and distributed authentication for personal information use. This study analyzes primary PDS models and compares them to an internationally standardized framework for personal information security with guidelines on MyData so that a proper PDS model can be proposed for South Korea.

ASTAS: Architecture for Scalable and Transparent Anycast Services

  • Stevens, Tim;De Leenheer, Marc;Develder, Chris;De Turck, Filip;Dhoedt, Bart;Demeester, Piet
    • Journal of Communications and Networks
    • /
    • v.9 no.4
    • /
    • pp.457-465
    • /
    • 2007
  • Native information provider(IP) anycast suffers from routing scalability issues and the lack of stateful communication support. For this reason, we propose architecture for scalable and transparent anycast services(ASTAS), a proxy-based architecture that provides support for stateful anycast communications, while retaining the transparency offered by native anycast. Dynamic resource assignment for each initiated session guarantees that a connection is established with the most suitable target server, based on network and server conditions. Traffic engineering in the overlay can be realized in an effective way due to the dissemination of aggregated state information in the anycast overlay. To minimize the total deployment cost for ASTAS architectures, we propose optimized proxy placement and path finding heuristics based on look-ahead information gathered in network nodes. Contrary to a regular integer linear program(ILP) formulation, these heuristics allow to optimize proxy placement in large networks. A use case on a European reference network illustrates that lower proxy costs enable proxy deployment closer to the end-users, resulting in a reduced network load.

Accuracy and reliability evaluation of basic CPR application information developed in Korean (국문으로 개발된 기본심폐소생술 애플리케이션 정보의 정확성과 신뢰성 평가)

  • Jung, Eun-Kyung;Kang, Ji-Hun
    • The Korean Journal of Emergency Medical Services
    • /
    • v.23 no.3
    • /
    • pp.41-51
    • /
    • 2019
  • Purpose: This dissertation is a descriptive research study analyzing the accuracy and reliability of the cardiopulmonary resuscitation (CPR) application developed in Korea. Methods: Two faculty members from the emergency medical services department and the emergency medicine department searched applications from July 1 to July 10, 2019 and selected a total of 13 applications. Twelve questions were assessed for information accuracy and three were assessed for reliability. In accordance with application types, the number and mean ± standard deviation were analyzed. The t-test was used to compare the accuracy of CPR information in accordance with information sources. Results: The results revealed the following errors: 7 cases (53.8%) identified the chest center lining from the nipple center-line as the chest pressure point; 5 cases (38.5%) did not provide information on the depth of 6 cm that should not be exceeded; and 4 cases (30.8%) did not provide advise to check respiration. When the CPR information sources were included, the information accuracy score was high; a significant difference was observed (p=.035). Conclusion: In the case of applications providing medical information regarding CPR, it is necessary to provide at least authoritarian, sources of information, and author transparency as well as continuous effort and attention.

Intention to Participate Crowdfunding based on Trust and Perceived Risk: An Exploratory Study with Comparison between Korea and Austria (이용자의 신뢰와 위험인지에 따른 크라우드펀딩(Crowdfunding) 참여의도: 한국과 오스트리아 탐색적 비교 연구)

  • JiHyun Lee;SangAh Park;DongBack Seo
    • Information Systems Review
    • /
    • v.22 no.1
    • /
    • pp.125-146
    • /
    • 2020
  • With the penetration of the Internet and e-commerce, a 'crowdfunding' has emerged as a new way of financing. Crowdfunding has the advantage for a person to able to a simple way to finance her/his an innovative product or service from crowd. However, the success rate for crowdfunding projects is less than half. In this study, we introduce social exchange theory to explore the impact of trust and perceived psychological risk on the intention to participate in a crowdfunding website. Different from previous studies that have focused on a crowdfunding creator, we consider two different perspectives of a project creator and a project supporter. In addition, we compare perceptions of crowdfunding in different cultural contexts by conducting survey in two different countries Korea and Austria. Result shows that trust in recommendation and trust in website have different impacts on the intention to participate from two different perspectives. It also shows that perception of the quality and transparency of information provided by crowdfunding website has greater impact on trust in Korea than that in Austria. In case of perception of psychological risk, it has a negative impact on Austria's intention to create or support a project. On the other hand, it has relatively small impact on the intention to support and does not affect the intention to create a project in Korea.

A Framework for Enterprise Information Supply Chain Using XBRL Web Services (XBRL을 활용한 기업정보공급사슬의 웹서비스 구현방안에 대한 연구)

  • Jung, Chul-Yong
    • The Journal of Information Systems
    • /
    • v.15 no.4
    • /
    • pp.247-268
    • /
    • 2006
  • We introduce about XBRL, eXtensible Business Reporting Language, which is widely accepted as the international standard language for business financial reporting. XBRL is a language for the electronic communication of business and financial data which is revolutionizing business reporting around the world. It provides major benefits in the preparation, analysis and communication of business information. It offers cost savings, greater efficiency and improved accuracy and reliability to all those involved in supplying or using financial data. XBRL is a kind of XML application based on the open Internet technologies. We propose a framework for enterprise information supply chain using XBRL Web services. A Web service is defined as a software system based on XML and designed to support interoperable machine-to-machine interaction over a network by the W3C. Web services are frequently just application programming interfaces (API) that can be accessed over a network, such as the internet and executed on a remote system hosting the requested services. An XBRL Web service-based enterprise information supply chain enables for companies to implement seamless information supply chains from businesses to financial institutions, to supervisory authorities, and to other stake holders for real time information access. And thereby it is expected to contribute to the increase in the value of companies due to the enhanced visibility and transparency of accounting and management.

  • PDF

Determinants of The Level of Information Distribution on Financial Statement

  • Van Thi Hong NGUYEN;Anh Phuong PHAM
    • Journal of Distribution Science
    • /
    • v.21 no.6
    • /
    • pp.91-97
    • /
    • 2023
  • Purpose: Interim financial statements provide timely and qualified financial information for users. Hence, the importance of the interim financial statement is increasingly noticeable among information users. This research studies determinants of interim financial statements disclosure in Vietnamese-listed enterprises. Research design, data and methodology: The sample is 55 enterprises listed in VNIndex and is in the list of Forbes top 100 largest companies in 2020. Data was collected from interim financial statements for four years, from 2018 to 2021. GMM is used in this study. Results: The regression analysis results show that reporting lag has a positive impact on the level of information distribution of interim financial reporting; companies audited by BIG4 tend to have a higher level of information disclosure. The higher the return on assets, the more disclosure is made; the larger the company size, the greater the disclosure level. Owner equity structure and Leverage do not affect the disclosure level of interim financial reporting. Conclusions: The information disclosure level on the interim financial statement should be improved to increase transparency. In addition to continuing to encourage these companies to provide more information voluntarily, government authorities should have effective regulations to require sufficient information disclosure from other listed companies.

A Study on Information Security Governance Framework (정보보안 거버넌스 프레임워크에 관한 연구)

  • Kim, Min-Jun;Kim, Kui-Nam J.
    • Convergence Security Journal
    • /
    • v.10 no.4
    • /
    • pp.13-19
    • /
    • 2010
  • The flow of time, depending on the company's ongoing business link to guarantee the proportion of much greater importance, it in the organization as part of an enterprise-wide level, rather than acting on the information society has been considered as the topic of race. Information Security Governance, the integrity of the information, service continuity, the three kinds of information asset protection purpose begins. It is essential for corporate governance, transparency should be part, must be aligned with the IT framework. Existing information security governance framework that small businesses a wide range of governance issues and interests have never had. Therefore, we simplified the information security governance framework is proposed, and solve problems, and propose a framework for analysis of the safety and efficiency through the analysis of the effectiveness of the proposed method were discussed.