• 제목/요약/키워드: Information protection industry

검색결과 392건 처리시간 0.024초

Chemical Use and Associated Health Concerns in the Semiconductor Manufacturing Industry

  • Yoon, Chungsik;Kim, Sunju;Park, Donguk;Choi, Younsoon;Jo, Jihoon;Lee, Kwonseob
    • Safety and Health at Work
    • /
    • 제11권4호
    • /
    • pp.500-508
    • /
    • 2020
  • Background: Research on the status of many chemicals used in the semiconductor industry is needed. The purpose of this study was to describe the overall status of chemical use in the semiconductor industry in Korea and to examine it from a health perspective. Methods: Data on the status of chemical use and safety data sheets at 11 of 12 major semiconductor workplaces in Korea were collected. The number of chemical products and chemical constituents, quantities of chemicals, and trade secret ingredients used, as well as the health hazards were examined. Results: On average, 210 chemical products and 135 chemical constituents were used at the surveyed workplaces. Among all chemical products, 33% (range: 16-56%) contained at least one trade secret ingredient. Most of the trade secret ingredients were used in the photolithography process. Several carcinogens, including sulfuric acid, chromic acid, ethylene oxide, crystalline silica, potassium dichromate, and formaldehyde were also used. Only 29% (39 of 135) of the chemical constituents had occupational exposure limits, and more than 60% had no National Fire Protection Association health, safety, and reactivity ratings. Based on the aforementioned results, this study revealed the following. First, many chemical products and constituents are being used in the semiconductor industry and many products contained trade secret ingredients. Second, many products contained significant amounts of carcinogenic, mutagenic, and reproductive toxicant materials. Conclusion: We conclude that protecting workers in the semiconductor industry against harm from chemical substances will be difficult, due to widespread use of trade secret ingredients and a lack of hazard information. The findings of the status of chemical use and the health and safety risks in semiconductor industry will contribute to epidemiological studies, safe workplace, and worker health protection.

시스템 인증기법을 적용한 DRM 시스템 설계 및 구현 (A Design and Implementation of DRM System by Applying System Authentication Method)

  • 장은겸;이범석
    • 디지털산업정보학회논문지
    • /
    • 제5권2호
    • /
    • pp.177-184
    • /
    • 2009
  • The digital contents distribution system via network provides comfortability, usability, and diversified functions to content's users. However, for the characteristic of easy access of digital contents, the copyright infringements and indiscreet contents distribution are realized in this days. In other words, any users with the authentication key can access to copyright contents with any restrictions. To solve this problems, we proposed a user authentication mechanism which prevent indiscreet access to the digital content by using user system information. Also, to provide safe distribution of digital content, we used user's unique content authentication key.

안전한 클라우드 서비스를 위한 상호의존적 다중세션 인증 기법 설계 (A Design of Interdependent Multi Session Authentication Scheme for Secure Cloud Service)

  • 송준호;최도현;박중오
    • 디지털산업정보학회논문지
    • /
    • 제10권3호
    • /
    • pp.181-196
    • /
    • 2014
  • Cloud computer technology currently provides diverse services based on a comprehensive environment ranging from hardware to solution, network and service. While the target of services has been extended from institutions and corporations to personal infrastructure and issues were made about security problems involved with protection of private information, measures on additional security demands for such service characteristics are insufficient. This paper proposes a multi-session authentication technique based on the characteristics of SaaS (Software as a Service) among cloud services. With no reliable authentication authority, the proposed technique reinforced communication sessions by performing key agreement protocol safe against key exposure and multi-channel session authentication, providing high efficiency of performance through key renewal using optimzied key table. Each formed sessions have resistance against deprivation of individual confirmation and service authority. Suggested confirmation technique that uses these features is expected to provide safe computing service in clouding environment.

연합학습 기반 자치구별 건물 변화탐지 알고리즘 성능 분석 (Performance Analysis of Building Change Detection Algorithm)

  • 김영현
    • 디지털산업정보학회논문지
    • /
    • 제19권3호
    • /
    • pp.233-244
    • /
    • 2023
  • Although artificial intelligence and machine learning technologies have been used in various fields, problems with personal information protection have arisen based on centralized data collection and processing. Federated learning has been proposed to solve this problem. Federated learning is a process in which clients who own data in a distributed data environment learn a model using their own data and collectively create an artificial intelligence model by centrally collecting learning results. Unlike the centralized method, Federated learning has the advantage of not having to send the client's data to the central server. In this paper, we quantitatively present the performance improvement when federated learning is applied using the building change detection learning data. As a result, it has been confirmed that the performance when federated learning was applied was about 29% higher on average than the performance when it was not applied. As a future work, we plan to propose a method that can effectively reduce the number of federated learning rounds to improve the convergence time of federated learning.

키워드 빈도와 중심성 분석을 활용한 블록체인 기반 사물인터넷 연구 동향 : 미국·영국·한국을 중심으로 (Research Trend on Blockchain-based IoT Using Keyword Frequency and Centrality Analysis : Focusing on the United States, United Kingdom, Korea)

  • 이택균
    • 디지털산업정보학회논문지
    • /
    • 제20권1호
    • /
    • pp.1-15
    • /
    • 2024
  • This study aims to analyze research trends in blockchain-based Internet of Things focusing on the US, UK, and Korea. In Elsevier's Scopus, we collected 2,174 papers about blockchain-based Internet of Things published in from 2018 to 2023. Keyword frequency and centrality analysis were conducted on the abstracts of the collected papers. Through the obtained keyword frequencies, we tried to identify keywords with high frequency of occurrence and through centrality analysis, we tried to identify central research keywords for each country. As a result of the centrality analysis, research on blockchain, smart contracts, Internet of Things, security and personal information protection was conducted as the most central research in each country. The implication for Korea is that cybersecurity, authentication research appears to have been conducted with a lower centrality compared to the United States and the United Kingdom. Thus, it seems that intensive research related to cybersecurity and authentication is needed.

모바일 메신저 보안인식과 보안의도를 통한 개인정보 보호행동에 미치는 영향 - 자기결정성 이론을 중심으로 - (The effects on privacy protection behavior through mobile messenger security awareness and security intention - Focus on Theory of Self-Determination -)

  • 민경은;김성준;권두순
    • 경영과정보연구
    • /
    • 제35권1호
    • /
    • pp.207-233
    • /
    • 2016
  • 최근 모바일 어플리케이션을 기반으로 하는 모바일 메신저 산업이 빠른 성장세에 있다. 그리고 단순히 메신저를 공유하던 형태를 넘어 개인에게 맞춤형 정보를 제공하는 다양한 형태의 서비스를 제공하게 되면서 혁신적인 변화를 일으키고 있다. 또한 메신저 보안이 개인화되고 지능화된 기능을 통해 더 다양한 모바일 어플리케이션의 보안에 대한 중요성이 증가되고 있다. 본 연구는 국내 모바일 메신저 이용자들이 어플리케이션 서비스 이용요인들에 대해 파악하고 이들 요인이 모바일 보안에 대한 보안인식과 보안태도를 통해 개인정보보호행동에 영향을 미치는 요인들에 인과관계를 실증 연구하고자 한다. 이를 위해 인간의 본연적인 내재적 동기를 강조한 자기결정성(SDT: Self-Determination Theory) 이론의 주요 변수들을 적용한 연구모형을 제시하였다. 본 연구의 연구모형을 실증적으로 검증하기 위해 모바일 메신저를 이용한 경험이 있는 일반인과 대학생들을 대상으로 설문조사를 실시하였다. 연구결과 첫째, 지각된 자율성은 보안인식과 보안의도에 유의한 영향을 미치는 것으로 나타났다. 둘째, 지각된 유능성은 보안의도에 유의한 영향을 미치는 것으로 나타났다. 셋째, 지각된 관계성은 보안인식과 보안의도에 유의한 영향을 미치는 것으로 나타났다. 마지막으로, 보안인식과 보안의도는 개인정보 보호행동에 유의한 영향을 미치는 것으로 나타났다. 이를 통해 개인의 메신저의 보안의 중요성을 강조하고 소비자들에게 필요한 보안지침 개발을 위한 긍정적인 역할을 하는데 기여하고자 한다.

  • PDF

디지털 콘텐츠 저작권 보호를 위한 CDN에서 다중서명 (Multisignature Suitable for Digital Contents Copyright Protect ion on CDN)

  • 신승수;김덕술
    • 한국컴퓨터정보학회논문지
    • /
    • 제10권4호
    • /
    • pp.77-85
    • /
    • 2005
  • 디지털 저작권 보호는 저작자의 지적인 재산권과 그에 기울인 노력의 보호 측면에서 중요하며 디지털 콘텐츠 산업의 발전을 위해 매우 중요하다. 하지만 디지털 콘텐츠는 복제가 용이하고 원본과 복사본이 동일하다는 특성으로 인해 저작권의 보호와 대량 불법 복제 및 불법 유통 방지에 어려움을 겪고 있는 실정이다. CDN에서 디지털 콘텐츠 제공자들은 공동으로 저작된 디지털 콘텐츠에 대한 저작권 보호 방안이 필요하다. 본 논문에서는 공동으로 저작된 디지털 콘텐츠에 대한 저작권 보호를 위하여 부인방지 다중기법을 사용하였다. 부인방지 다중기법에 대한 효율성을 입증하였다.

  • PDF

소셜미디어 사용자의 프라이버시 패러독스 현상으로 인한 개인정보 무관심 형태에 대한 연구 (Indifference Problems of Personal Information Protection of Social Media Users due to Privacy Paradox)

  • 김연종;박상혁
    • 디지털산업정보학회논문지
    • /
    • 제15권4호
    • /
    • pp.213-225
    • /
    • 2019
  • Privacy paradox is a paradoxical behavior that provides personal information even though you are concerned about privacy. Social media users are also often concerned about their personal information exposure. It is even reluctant to describe personal information in profile. However, some users describe their personal information in detail on their profile, provide it freely when others request it, or post their own personal information. The survey was conducted using Google Docs centered on Facebook users. Structural equation model analysis was used for hypothesis testing. As an independent variable, we use personal information infringement experiences. As a mediator, we use privacy indifference, privacy concern, and the relationship with the act of providing personal information. Social media users have become increasingly aware of the fact that they can not distinguish between the real world and online world by strengthening their image and enhancing their image in the process of strengthening ties, sharing lots of information and enjoying themselves through various relationships. Therefore, despite the high degree of privacy indifference and high degree of privacy concern, the phenomenon of privacy paradox is also present in social media.

Detecting Knowledge structures in Artificial Intelligence and Medical Healthcare with text mining

  • Hyun-A Lim;Pham Duong Thuy Vy;Jaewon Choi
    • Asia pacific journal of information systems
    • /
    • 제29권4호
    • /
    • pp.817-837
    • /
    • 2019
  • The medical industry is rapidly evolving into a combination of artificial intelligence (AI) and ICT technology, such as mobile health, wireless medical, telemedicine and precision medical care. Medical artificial intelligence can be diagnosed and treated, and autonomous surgical robots can be operated. For smart medical services, data such as medical information and personal medical information are needed. AI is being developed to integrate with companies such as Google, Facebook, IBM and others in the health care field. Telemedicine services are also becoming available. However, security issues of medical information for smart medical industry are becoming important. It can have a devastating impact on life through hacking of medical devices through vulnerable areas. Research on medical information is proceeding on the necessity of privacy and privacy protection. However, there is a lack of research on the practical measures for protecting medical information and the seriousness of security threats. Therefore, in this study, we want to confirm the research trend by collecting data related to medical information in recent 5 years. In this study, smart medical related papers from 2014 to 2018 were collected using smart medical topics, and the medical information papers were rearranged based on this. Research trend analysis uses topic modeling technique for topic information. The result constructs topic network based on relation of topics and grasps main trend through topic.

스마트 그리드 개인정보 보안이슈 방안 제시 (Proposed measure for Smart Grid's Personal Information Security Issue)

  • 최희식;조양현
    • 디지털산업정보학회논문지
    • /
    • 제12권4호
    • /
    • pp.41-49
    • /
    • 2016
  • Smart Grid is a next generation of new power growth electrical grid which provide high quality of electrical service by using Information Technologies to increase intelligence and performance. By using Smart Grid system, it can support energy management such as increase quality of electrical power, decrease energy and decrease emissions. However, Smart Grid uses information of energy consumption and when Smart Grid collects information, it will create private information. In this thesis, it will address issues of security private information which caused by Smart Grid for administrative measure and efficiency of Smart Grid in domestic. Also, cryptographic module algorithm, latest security solutions and strong wireless security policy for network environment such as wireless communication Iinternet are require for Smart Grid perform successfully and protect national power network equipment from cyber-attack and can stop leakage of user's personal information. Finally, it is urgent to prepare protection measures of National industrial facilities and power grid which can prepare for a cyber terrorism and penetration attacks and build emergency countermeasure management team for Smart Grid are require for safe Smart Grid environment.