• Title/Summary/Keyword: Information analysis

Search Result 58,614, Processing Time 0.061 seconds

Risk Analysis for Protecting Personal Information in IoT Environments (사물인터넷(IoT) 환경에서의 개인정보 위험 분석 프레임워크)

  • Lee, Ae Ri;Kim, Beomsoo;Jang, Jaeyoung
    • Journal of Information Technology Services
    • /
    • v.15 no.4
    • /
    • pp.41-62
    • /
    • 2016
  • In Internet of Things (IoT) era, more diverse types of information are collected and the environment of information usage, distribution, and processing is changing. Recently, there have been a growing number of cases involving breach and infringement of personal information in IoT services, for examples, including data breach incidents of Web cam service or drone and hacking cases of smart connected car or individual monitoring service. With the evolution of IoT, concerns on personal information protection has become a crucial issue and thus the risk analysis and management method of personal information should be systematically prepared. This study shows risk factors in IoT regarding possible breach of personal information and infringement of privacy. We propose "a risk analysis framework of protecting personal information in IoT environments" consisting of asset (personal information-type and sensitivity) subject to risk, threats of infringement (device, network, and server points), and social impact caused from the privacy incident. To verify this proposed framework, we conducted risk analysis of IoT services (smart communication device, connected car, smart healthcare, smart home, and smart infra) using this framework. Based on the analysis results, we identified the level of risk to personal information in IoT services and suggested measures to protect personal information and appropriately use it.

Cyber-attack group analysis method based on association of cyber-attack information

  • Son, Kyung-ho;Kim, Byung-ik;Lee, Tae-jin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.1
    • /
    • pp.260-280
    • /
    • 2020
  • Cyber-attacks emerge in a more intelligent way, and various security technologies are applied to respond to such attacks. Still, more and more people agree that individual response to each intelligent infringement attack has a fundamental limit. Accordingly, the cyber threat intelligence analysis technology is drawing attention in analyzing the attacker group, interpreting the attack trend, and obtaining decision making information by collecting a large quantity of cyber-attack information and performing relation analysis. In this study, we proposed relation analysis factors and developed a system for establishing cyber threat intelligence, based on malicious code as a key means of cyber-attacks. As a result of collecting more than 36 million kinds of infringement information and conducting relation analysis, various implications that cannot be obtained by simple searches were derived. We expect actionable intelligence to be established in the true sense of the word if relation analysis logic is developed later.

The big data analysis framework of information security policy based on security incidents

  • Jeong, Seong Hoon;Kim, Huy Kang;Woo, Jiyoung
    • Journal of the Korea Society of Computer and Information
    • /
    • v.22 no.10
    • /
    • pp.73-81
    • /
    • 2017
  • In this paper, we propose an analysis framework to capture the trends of information security incidents and evaluate the security policy based on the incident analysis. We build a big data from news media collecting security incidents news and policy news, identify key trends in information security from this, and present an analytical method for evaluating policies from the point of view of incidents. In more specific, we propose a network-based analysis model that allows us to easily identify the trends of information security incidents and policy at a glance, and a cosine similarity measure to find important events from incidents and policy announcements.

Beyond Categories: A Structural Analysis of the Social Representations of Information Users' Collective Perceptions on 'Relevance'

  • Ju, Boryung;O'Connor, Daniel O.
    • Journal of Information Science Theory and Practice
    • /
    • v.1 no.2
    • /
    • pp.16-35
    • /
    • 2013
  • Relevance has a long history of scholarly investigation and discussion in information science. One of its notable concepts is that of 'user-based' relevance. The purpose of this study is to examine how users construct their perspective on the concept of relevance; to analyze what the constituent elements (facets) of relevance are, in terms of core-periphery status; and to compare the difference of constructions of two groups of users (information users vs. information professionals) as applied with a social representations theory perspective. Data were collected from 244 information users and 123 information professionals through use of a free word association method. Three methods were employed to analyze data: (1) content analysis was used to elicit 26 categories (facets) of the concept of relevance; (2) structural analysis of social representations was used to determine the core-periphery status of those facets in terms of coreness, sum of similarity, and weighted frequency; and, (3) maximum tree analysis was used to present and compare the differences between the two groups. Elicited categories in this study overlap with the ones from previous relevance studies, while the findings of a core-periphery analysis show that Topicality, User-needs, Reliability/Credibility, and Importance are configured as core concepts for the information user group, while Topicality, User-needs, Reliability/Credibility, and Currency are core concepts for the information professional group. Differences between the social representations of relevance revealed that Topicality was similar to User-needs and to Importance. Author is closely related to Title while Reliability/Credibility is linked with Currency. Easiness/Clarity is similar to Accuracy. Overall, information users and professionals function with a similar social collective of shared meanings for the concept of relevance. The overall findings identify the core and periphery concepts of relevance and their relationships in terms of coreness, similarity, and weighted frequency.

Theoretical Perspective of Social Network Analysis (네트웍 연구의 사회적 접근과 분석이론)

  • Yoo Sarah
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.20
    • /
    • pp.297-330
    • /
    • 1991
  • The work presents the theoretical background and methodology to network analysis. This approach to information network has been widespread use in many researches of social science. Theoretically based idea of structural analysis of information flow were reviewed and the major perspective and the practical aspects of the analysis were discussed. To show an approach of the methodology to library environment, HISP project which analyzed the network structure of a health information dissemination to a health community was demonstrated.

  • PDF

Proposition of Information Processing and Analysis Technology Education in the Era of Hyperconnection, Hyperintelligence, and Hyperconvergence

  • Seung-Woo, LEE;Sangwon, LEE
    • International Journal of Advanced Culture Technology
    • /
    • v.10 no.4
    • /
    • pp.94-101
    • /
    • 2022
  • For the purpose of this study, in order to adapt to the era of intelligent informatization in the 4th Industrial Revolution, we propose an information processing and analysis technology education plan that can solve problems through information search and collection. To this end, first, we explored the necessity and content of information processing and analysis technology in hyperconnection, hyperintelligence, and hyperconvergence under the theme of various majors in IT, focusing on understanding information technology in the software and hardware curriculum. Second, the curriculum improvement plan was proposed based on information literacy, computing thinking skills, and cooperative problem-solving skills for efficient software and hardware-linked curriculum operation based on information processing and analysis technology. Third, I would like to emphasize that it is essential to secure connectivity between other studies for future innovation in new technologies related to computer technology, machine technology, and infrastructure technology through hyperconnection, hyperintelligence, and hyperconvergence in the software and hardware curriculum. Through this, we intend to cultivate creative convergence talent required by the future society.

The Advance of Technology Analysis (기술분석의 고도화)

  • 설성수
    • Journal of Korea Technology Innovation Society
    • /
    • v.5 no.3
    • /
    • pp.260-276
    • /
    • 2002
  • Technology Analysis is advanced by the development of the analysis of technological information such as technological bibliometric analysis and patent analysis. Also, the advance of technology analysis has led the development of the family of techno-market analysis such as cost-benefit analysis, analysis for new item development, and the valuation of technology and technology business. Technology analysis mostly based on technological information analysis is confronted by new challenges from the development of information science and technology such as text mining.

  • PDF

Discussions on Availability of Weather Information Data and Painting Effect of Existing 8,600 TEU Container Ship Using Ship Performance Analysis Program

  • Shin, Myung-Soo;Ki, Min Suk;Lee, Gyeong Joong;Park, Beom Jin;Lee, Yeong Yeon;Kim, Yeongseon;Lee, Sang Bong
    • Journal of Ocean Engineering and Technology
    • /
    • v.34 no.6
    • /
    • pp.377-386
    • /
    • 2020
  • This paper discusses the effectiveness of onboard measurements and data extracted from weather information for speed-power analysis. Furthermore, validation results of hull and propeller cleaning and painting during dry-docking are discussed. Wind and wave information can be obtained from onboard measurements or weather information from the National Oceanic and Atmospheric Administration (NOAA). The weather information of a specified position and time is extracted from NOAA weather data and compared with onboard measurements. In addition, to validate the effects of hull cleaning and painting during dry-docking, speed-power analysis results of before and after dry-docking are compared. The results show that both onboard measurements and weather information show acceptable reliability when added resistance and speed-power analysis results are compared with each other. Moreover, the ship performance analysis (SPA) software clearly shows the effects of hull cleaning and painting, and it can provide reliable analysis results with either onboard measurements or weather information. In conclusion, it is confirmed that the analysis method and SPA software used in this study are effective in analyzing the ship's speed-power performance.

The Utilization of Customer Information in Korean Retail Bank

  • Kwak, Soo-Hwan
    • Journal of Information Management
    • /
    • v.39 no.2
    • /
    • pp.235-249
    • /
    • 2008
  • The combination of information and technology makes dramatically increase both information quality and quantity. Almost of company utilize customer information for the purpose of increasing sales amount and profitability. The purpose of this paper is to discover customer information's utilization practices in the Korean financial industry. The case of K Bank's information analysis in the inbound and outbound marketing is provided, The customer segmentation is used for the inbound marketing by using RFM analysis. And the loan card model is used for the outbound marketing by using logit analysis.

Quantitative Hazard Analysis of Information Systems Using Probabilistic Risk Analysis Method

  • Lee, Young-Jai;Kim, Tae-Ho
    • Journal of Information Technology Applications and Management
    • /
    • v.16 no.3
    • /
    • pp.59-71
    • /
    • 2009
  • Hazard analysis identifies probability to hazard occurrence and its potential impact on business processes operated in organizations. This paper illustrates a quantitative approach of hazard analysis of information systems by measuring the degree of hazard to information systems using probabilistic risk analysis and activity based costing technique. Specifically the research model projects probability of occurrence by PRA and economic loss by ABC under each identified hazard. To verify the model, each computerized subsystem which is called a business process and hazards occurred on information systems are gathered through one private organization. The loss impact of a hazard occurrence is produced by multiplying probability by the economic loss.

  • PDF