• 제목/요약/키워드: Information protection

Search Result 4,519, Processing Time 0.029 seconds

Biometric Information Protection Measures in the Biometric Person Authentication System Using Match-on-Card (Match-on-Card를 사용한 생체 개인 인증 시스템에서의 생체정보 보호대책)

  • 이상곤;조대성
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.40 no.6
    • /
    • pp.237-246
    • /
    • 2003
  • To acquire certificate of security evaluation for information protection Products, it is necessary for a designer to grasp the threats listed in a protection profile and to reflect them in the product design. BDPP is a protection profile for the biometric devices. In this paper, we applied BDPP to a Match-on-Card, and ertracted some security requirements to protect biometric data against threats. We also studied some countermeasures satisfying the security requirements.

The perception and practice of privacy protection in some dental hygiene students

  • Lee, Seung-Hun
    • Journal of Korean society of Dental Hygiene
    • /
    • v.18 no.4
    • /
    • pp.561-570
    • /
    • 2018
  • Objectives: This study explored the perception and practice of privacy protection of some dental hygiene students. Methods: On the basis of survey data from 126 respondents, the correlation between the perception and the practice was analyzed. Also the multiple regression analysis was performed on the variables that affect the practice. Cronbach's ${\alpha}$ of the questionnaire was more than 0.6. The items were scored on 5 points scale or true-false type. Results: The perception of privacy protection was 3.23 points, the law is 0.88 points, and the practice is 3.47 points. The educated students were more perceive than those who did not(p<0.05). The higher the perception, the higher the practice(r=0.230, p<0.01). The practice was influenced by the perception(p<0.05). Conclusions: Dental hygiene students should be educated to perceive and protect the personal and medical information of a patient. Also, an educational institutions need a efforts to protect personal information.

Audit Method for Personal Information Protection in On-line Games (온라인게임에서 개인정보보호 감리 모형)

  • Kim, Hee-Wan;Shin, Joong-Won;Kim, Dong-Soo
    • Journal of Digital Convergence
    • /
    • v.10 no.3
    • /
    • pp.23-37
    • /
    • 2012
  • Illegal game players' hacking and propagation of malignant code in online game exposes privacy of online game customers. So, online game companies have to support the standardized systems and operations of customers' privacies. Since online game companies implement authentication of information protection, which focuses on assets or physical, systemic security, they need a more professional system that is related to protection of individual privacy. We analyzed the individual information protection system, which includes ISO27001, ISMS of KISA, GMITS, ePrivacy, online game privacy protection guide, and BS10012. Using the suggested systems, we proposed the systemic tools that measure the level of individual information protection, which includes process and check items of each phase.

Privacy of Capability Token in the IoT Service System

  • Jang, Deresa;Kim, Jin-bo;Kim, Mi-Sun;Seo, Jae-Hyun
    • Journal of Multimedia Information System
    • /
    • v.3 no.3
    • /
    • pp.103-110
    • /
    • 2016
  • The recent development of the Internet of things (IoT) has led to the introduction of new access control measures. Even during the access control for security, however, there might be privacy infringements due to unwanted information provision and collection. Measures to control this process are therefore required. This paper defines the structure and policies of tokens to protect privacy that can be exposed through the token information when you use the capability token in the IoT service system.

An Information Ethics Approach to the Justification of Intellectual Property Rights (지적 재산권의 정당화에 관한 정보윤리학적 접근)

  • 임상수
    • Journal of the Korean BIBLIA Society for library and Information Science
    • /
    • v.12 no.2
    • /
    • pp.31-47
    • /
    • 2001
  • From the viewpoint of Information Ethics. I tried to examine the moral justification of Intellectual Property Rights in the age of the digital information society. Lockian traditional argument of property rights which is based on the value of labor and Hegelian theory of personalization, both are not enough to justify the new Intellectual Property Rights. The notions of Intellectual Property Rights are to be changed. One change is from the absolute dominion over material property to the limited dominion over intellectual property. The change from property rights to process control rights is the other. To protect these intellectual property rights, there are three possible protection devices that we might take - legal protection, technical protection and moral protection. I argued that both legal and technical protection have some limitations, so the final way to protect the IP rights is to attempt to establish the moral protection as a fundamental solution.

  • PDF

A Selective Protection Scheme for Scalable Video Coding Based on Dependency Graph Model

  • Hendry, Hendry;Kim, Munchurl
    • Proceedings of the Korean Society of Broadcast Engineers Conference
    • /
    • 2010.11a
    • /
    • pp.78-81
    • /
    • 2010
  • In this paper, we propose an efficient and effective selective protection scheme to SVC that exploit the propagation of protection effect by protecting significant frames that can give the maximum visual quality degradation. We model SVC dependency coding structure as a directed acyclic graph which is characterized with an estimated visual quality value as the attribute at each node. The estimated visual quality is calculated by using our model based on the proportions of intra- and inter-predicted MBs, amounts of residual, and estimated visual quality of reference frames. The proposed selective protection scheme traverses the graph to find optimal protection paths that can give maximum visual quality degradation. Experimental results show that the proposed selective protection scheme reduces the required number of frames to be protected by 46.02% compared to the whole protection scheme and 27.56% compared to the layered protection scheme.

  • PDF

Perception differences between users and policy-makers on technology protection support system for small and medium-sized businesses (중소기업 기술보호지원제도에 대한 이용자와 정책담당자의 인식차이 분석)

  • Park, Sanghoon;Cho, Namwook
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.13 no.1
    • /
    • pp.37-48
    • /
    • 2017
  • As the risk of technical leakage is increasing, technology protection support systems for small and medium-sized businesses have gained attention. This paper analyzed the perception gap of the user and policy-maker regarding technology protection support systems. First, to identify key elements of technology protection support systems and construct measurement factors, interviews with experts are conducted. Then, surveys are conducted to analyze the perception differences between the users and policy-makers. Factor analysis and ANOVA have been utilized to analyze survey results. The result shows that the perception gaps exist in the following areas: management system, cost reduction, copyright protection, customer satisfaction, leakage prevention, and awareness. To enhance the effectiveness of technology protection support systems, this paper suggests technology protection support systems should be customized in terms of the company's size and type of busines.

A Comparison of Restoration Schemes in Multiprotocol Label Switching Networks (MPLS망의 보호 복구 기술의 비교)

  • 오승훈;김영한
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.27 no.4C
    • /
    • pp.316-325
    • /
    • 2002
  • This paper investigates the restoration schemes which are applied to the MPLS domain upon a network failure. We define the following three restoration service models by combining the various restoration schemes: "FIS-based protection service" (FIS: failure indication signal), "inversion traffic protection service" and "1+1 protection service". After a qualitative analysis of the performance in them, we have analyzed it on quantitative basis by the simulation. According to the simulation results, "1+1 protection service" guarantees the fastest and most lossless restoration service among them; however, it results in consuming considerable bandwidth and producing an amount of control traffic, which means poor network utilization. On the other hand, "FIS-based protection service" spends less bandwidth and generates less control traffic, which means better network utilization, but produces poor restoration service. "Inversion traffic protection service" provides the medium restoration service and utilization between "1+1 protection service" and "FIS-based protection service."

On-chip ESD protection design by using short-circuited stub for RF applications (Short-Circuited Stub를 이용한 RF회로에서의 정전기 방지)

  • 박창근;염기수
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2002.05a
    • /
    • pp.288-292
    • /
    • 2002
  • We propose the new type of on-chip ESD protection method for RF applications. By using the properties of RF circuits, we can use the short-circuited stub as ESD protection device in front of the DC blocking capacitor Specially, we can use short-circuited stub as the portion of the matching circuit so to reduce the and various parameters of the transmission line. This new type ESD protection method is very different from the conventional ESD protection method. With the new type ESD protection method, we remove the parasitic capacitance of ESD protection device which degrade the performance of core circuit.

  • PDF

Evaluation Model of Technology Protection Competency customized for Small and Medium-sized Enterprises (중소기업 맞춤형 기술보호 수준평가 모델 연구)

  • Park, Sanghoon;Cho, Namwook
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.13 no.2
    • /
    • pp.113-125
    • /
    • 2017
  • In today's highly competitive environment, the importance of technology protection cannot be overemphasized. To evaluate technology protection competency of Small and Medium-sized Enterprises(SMEs), Government has conducted surveys every year but its effectiveness is still in question. To enhance the effectiveness of technology protection for SMEs, a customized evaluation model of technology protection competency has been suggested in this study. Surveys are conducted to measure the relative importance of evaluation areas that can be influenced by the size and type of business. The analysis shows that there exists significant differences between evaluation areas. This study suggests that the effectiveness of technology protection can be enhanced by utilizing a customized evaluation model depending on the size and type of business. Also, the proposed model can be used for SMEs to identify and enhance their weakness in technology protection. Overall, it is expected that the proposed model can be effectively used to protect valuable technologies in various SMEs.