• Title/Summary/Keyword: Information dysfunction

Search Result 172, Processing Time 0.022 seconds

Study on the Learning Elements of 'Information Ethics' Topic of Informatics Subject (정보 교과의 '정보 윤리' 주제의 학습 요소에 관한 연구)

  • Jeong, InKee;Kim, Kapsu
    • Journal of The Korean Association of Information Education
    • /
    • v.18 no.2
    • /
    • pp.295-306
    • /
    • 2014
  • A form of life is changed rapidly through development of ICT. And we need information ethics as a new norm of information-oriented society. The effect of information ethics can be maximized by education. Therefore, a new curriculum is demanded by new technology and circumstance. Korea Association of Information education has studied a new curriculum and suggested a new plan that contents of information education classified by 'Software', 'Computer System' and 'Convergence Activities' sections. And the 'Convergence Activities' section is composed of 'Information Ethics', 'Productivity Tools' and 'Robot'. In this paper, we studied on learning elements of the 'Information Ethics' of first grade to ninth grade. We analysed the domestic and foreign curriculum, research results and new issues about information ethics and selected the learning elements about information ethics. We nextly suggested the achievement goals, teaching-learning methods and evaluation methods of information ethics. We expect that the learning elements we suggested about information ethics will contribute to deal with wisely information dysfunction and to training correct talented individuals.

Analysis of Support from the Government and the Private Sector for the Educational Informatization Policies (교육정보화 정책에 대한 정부부처와 민간의 지원 내용 분석)

  • Kim, Ja-Mee;Lee, Sung-Jin;Lee, Won-Gyu
    • 한국정보교육학회:학술대회논문집
    • /
    • 2010.08a
    • /
    • pp.85-93
    • /
    • 2010
  • The purpose of this study was to examine support for education informatization provided by the government agencies and the private sector in a bid to give some suggestions on education informatization, as the three-stage education informatization plan was soon going to be completed. And it's found that the government agencies pushed ahead with the education informatization plan to boost national competitiveness, and their policies primarily focused on coping with the dysfunction of informatization and narrowing information divide. On the contrary, the private sector moved ahead with the plans that aimed at building necessary infrastructure in underdeveloped areas and providing various sorts of support involving education to the low-income classes.

  • PDF

An Optimum-adaptive Intrusion Detection System Using a Mobile Code (모바일 코드를 이용한 최적적응 침입탐지시스템)

  • Pang Se-chung;Kim Yang-woo;Kim Yoon-hee;Lee Phil-Woo
    • The KIPS Transactions:PartC
    • /
    • v.12C no.1 s.97
    • /
    • pp.45-52
    • /
    • 2005
  • A damage scale of information property has been increasing rapidly by various illegal actions of information systems, which result from dysfunction of a knowledge society. Reinforcement in criminal investigation requests of network security has accelerated research and development of Intrusion Detection Systems(IDSs), which report intrusion-detection about these illegal actions. Due to limited designs of early IDSs, it is hard for the IDSs to cope with tricks to go around IDS as well as false-positive and false-negative trials in various network environments. In this paper, we showed that this kind of problems can be solved by using a Virtual Protocol Stack(VPS) that possesses automatic learning ability through an optimum-adaptive mobile code. Therefore, the enhanced IDS adapts dynamically to various network environments in consideration of monitored and self-learned network status. Moreover, it is shown that Insertion/Evasion attacks can be actively detected. Finally, we discussed that this method can be expanded to an intrusion detection technique that possesses adaptability in the various mixed network environments.

An Effect on the Audit Quality and Customer Satisfaction by the Service Quality of Information System Audit (정보시스템감리의 서비스품질요인이 감리품질과 고객만족에 미치는 영향)

  • Kim DongSoo;Kim Hyunsoo;Ahn Yeonshick
    • The KIPS Transactions:PartD
    • /
    • v.11D no.7 s.96
    • /
    • pp.1467-1476
    • /
    • 2004
  • The importance and demand about IS(information system) audit we increasing to raise quality of IS and prevention of the IS risk and dysfunction. Technology and system research for the substantiality and raising reliability of IS audit are continuously performed. But, there are misunderstanding of audit clients about IS audit, insufficiency of auditor's ability and misunderstanding of new technology and target business area. Therefore, is not getting trust from client or system integrator because service quality of IS audit is weak relatively. This study aims at survey correlation between audit service quality factor and audit quality, between audit quality and customer satisfaction. The results of this study are as follow. Auditor's ability, correspondence has a significant effect on audit quality, also audit quality on audit satisfaction, and Auditor`s ability, reliability has a significant effect on audit satisfaction.

A Study on Real IP Traceback and Forensic Data Generation against Bypass Attack (우회적인 공격에 대한 실제 IP 역추적 실시와 포렌식 자료 생성)

  • Youn, Byung-Sun;Yang, Hae-Sool;Kim, Dong-Jhoon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.13 no.1
    • /
    • pp.143-151
    • /
    • 2008
  • Execute IP traceback at this paper as target an intruder's attacking that Bypass Attack in order to avoid an exposure of own Real IP address Design IP traceback server and agent module, and install in Internet network system for Real IP traceback. Set up detection and chase range aggressive loop around connection arbitrariness, and attack in practice, and generate Real IP data cut off by fatal attacks after data and intrusion detection accessed general IP, and store to DB. Generate the Forensic data which Real IP confirms substance by Whois service, and ensured integrity and the reliability that buy to early legal proof data, and was devoted to of an invader Present the cyber criminal preventive effect that is dysfunction of Ubiquitous Information Society and an effective Real IP traceback system, and ensure a Forensic data generation basis regarding a judge's robe penalty through this paper study.

  • PDF

Integrity proof Method research in Mobile Forensic (모바일 포렌식 에서의 무결성 입증방안 연구)

  • Kim, Ki-Hwan;Shin, Young-Tae;Park, Dea-Woo
    • KSCI Review
    • /
    • v.15 no.1
    • /
    • pp.37-46
    • /
    • 2007
  • Lately, is trend that diffusion of Mobile information appliance that do various function by development of IT technology is increasing much. There is function that do more convenient and efficient life and business using portable phone that is Daepyo?? of Mobile information appliance, but dysfunction that is utilized by Beopjoe of pointed end engineering data leakage, individual's privacy infringement, threat and threat etc. relationship means to use Mobile Phone is appeared and problems were appeared much. However, legal research of statute unpreparedness and so on need research and effort to prove delete, copy, integrity of digital evidence that transfer secures special quality of easy digital evidence to objective evidence in investigation vantage Point is lacking about crime who use this portable phone. It is known that this digital Forensic field is Mobile Forensic. Is purposeful to verify actually about acquisition way of digital evidence that can happen in this treatise through portable phone that is Mobile Forensic's representative standing and present way to prove integrity of digital evidence using Hash Function.

  • PDF

Toward Design and Implement to Multiple Schemes for Strong Authentication Mechanism - Case Studying : Secure Entrance System - (다단계 사용자 신분확인 메커니즘 설계와 구현 방안 : 출입통제 시스템 사례 중심으로)

  • Hong Seng-Phil;Kim Jae-Hyoun
    • Journal of Internet Computing and Services
    • /
    • v.7 no.2
    • /
    • pp.161-172
    • /
    • 2006
  • As the innovative technologies related to ubiquitous computing are being rapidly developed in recent IT trend, the concern for IT dysfunction(e.g., personal information abuse, information risk, threat, vulnerability, etc.) are also increasing. In our study, we suggested how to design and implement to multiple schemes for strong authentication mechanism in real system environments. We introduce the systematic and secure authentication technologies that resolve the threats incurring from the abuse and illegal duplication of financial transaction card in the public and financial institutions. The multiple schemes for strong authentication mechanism applied to java technology, so various application programs can be embedded, Independent of different platforms, to the smartcard by applying the consolidated authentication technologies based on encryption and biometrics(e.g., finger print identification). We also introduce the appropriate guidelines which can be easily implemented by the system developer and utilized from the software engineering standpoint of view. Further, we proposed ways to utilize java card based biometrics by developing and applying the 'smartcard class library' in order for the developer and engineers involved in real system environment(Secure entrance system) to easily understand the program. Lastly, we briefly introduced the potential for its future business application.

  • PDF

Association of the number of remaining teeth with kidney function in community-dwelling healthy older adults: a cross-sectional study

  • Yui Nanba;Yuhei Matsuda;Satsuki Watanabe;Mayu Takeda;Takafumi Abe;Kazumichi Tominaga;Minoru Isomura;Takahiro Kanno
    • Journal of the Korean Association of Oral and Maxillofacial Surgeons
    • /
    • v.49 no.5
    • /
    • pp.243-251
    • /
    • 2023
  • Objectives: Although a few studies have investigated the relationship between kidney and oral function (number of remaining teeth), their results remain inconclusive. Therefore, this study aimed to investigate the relationship between kidney function and oral health in community-dwelling healthy elderlies and examine the factors associated with kidney function. Materials and Methods: We used cross-sectional data from the Shimane prefecture cohort recruited by the Center for Community-Based Health Research and Education in 2019. We collected clinical data on dental status, background factors and kidney function (estimated glomerular filtration rate [eGFR], mL/min/1.73 m2 and creatinine levels, mg/dL). Results: The study enrolled 481 participants, whose mean age was 66.7±7.4 years, and 223 (46.4%) participants were men. Multivariate analysis revealed significant correlations between eGFR (B=0.17, P=0.04), creatinine (B=-0.54, P<0.01), and the number of remaining teeth. The number of remaining teeth was associated with creatinine and eGFR, which are indicators of kidney function. Conclusion: This study suggests that preserving the teeth may prevent decline in kidney function. Dental professionals should provide instructions and professional care to reduce the risk of systemic diseases such as kidney dysfunction.

AN HISTORY OF MAXILLOFACIAL PROSTHESES (악안면 보철물의 역사)

  • Min, Seung-Ki
    • Maxillofacial Plastic and Reconstructive Surgery
    • /
    • v.22 no.4
    • /
    • pp.383-396
    • /
    • 2000
  • Before the advent of early plastic or maxillofacial reconstructive surgery, facial features could only be replaced and mimicked by prosthetic, artificial means. Facial deformity or dysfunction, whether congenital or acquired by trauma or mutilating disease, has long been an area of constant research, development and innovation in many cultures of the world. One of the greatest contributors to the need for maxillofacial prosthetics has been physical conflict and warfare. The use of maxillofacial prostheses is not merely the replacement of a missing or disfigured aspect of the face, but the rehabilitation of that individual back into the society from which they originate. Rehabilitation includes the restoration of the person's self worth and confidence, not just physically but psychologically. In sixteenth century, Ambroise Pare, French military surgeon, first have tried many maxillofacial prosthetics for injured war soldiers with papier-mache, silver, gold and copper. According to patient's demand who lost their maxillofacial figures, maxillofacial personnel have increased and prosthetic's skill have been advanced all of the world. Over the last decade, there has been a very rapid development in technical possibilities to provide patients with facial prostheses retained by skin penetrating implants. This article will present overall history of maxillofacial prostheses and some background information on the materials used from the old world. And to overcome still many limitation of prosthetic, new minds and new ideas for technique and materials should be developed.

  • PDF

Correlation between EGFR Expression and Radiosensitivity in Cervical Adenocarcinoma Cases

  • Hernowo, Bethy S;Suryanti, Sri;Wibisono, Fennisia
    • Asian Pacific Journal of Cancer Prevention
    • /
    • v.17 no.5
    • /
    • pp.2535-2537
    • /
    • 2016
  • Background: Most of the cervical cancer patients, including those with cervical adenocarcinomas, come at advanced stage in the developing world so its mortality is high. Radiotherapy is one of the treatment modality for advanced stage cervical adenocarcinomas, but its efficacy depends on several prognostic factors such as the stage, histopathology, presence of organ dysfunction and expression of cellular biology markers mainly involve in cell proliferation such as the epidermal growth factor receptor (EGFR). Some research indicates that activation of EGFR in malignancy (including cervical cancer) correlates with aggressive behavior, a poor prognosis and decreasing sensitivity of radiotherapy. However, the combination between targeted therapies and radiotherapy are innovative approaches which may provide a good result. This study aimed to assess any correlation between expression of EGFR and response to radiotherapy in cervical adenocarcinoma cases. Materials and Methods: A total of 32 women were registered in a retrospective study period January 2007 and May 2014. Paraffin blocks from these patients were processed by classical histological techniques and for immunohistochemical staining of EGFR, scoring being accomplished according to the immunoreactive scoring (IRS) of Remmele and Stegner. Results: Among the studied molecular factors, there was significant correlation expression of EGFR with poor response to radiotherapy (p=0.0001). Conclusions: The result of this study showed a significant correlation between expression of EGFR and sensitivity of radiation in cervical adenocarcinoma cases. Further research is necessary to obtain information about new therapeutic management.