• Title/Summary/Keyword: Information protection industry

Search Result 392, Processing Time 0.029 seconds

A Study on the Curriculum of Department of Information Security in Domestic Universities and Graduate Schools and Comparison with the Needs of Industry Knowledge (국내 대학 및 대학원 정보보호 교육과정 분석 및 산업체 필요 지식과의 관련성 비교)

  • Kim, Min-Jeong;Lee, Haeni;Song, Shin-Jeong;Yoo, Jinho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.24 no.1
    • /
    • pp.195-205
    • /
    • 2014
  • These days cyber attacks are increasing all over the world, and the national critical infrastructure and information network protection has become important. For this reason, the concentrated investment in information security and development of professional human resource are essential, but there is a shortage of information security workforce in Korea. Currently, departments of information security in domestic universities make efforts to develop human resource of information security and have a increasing interest in the curriculum design. So this paper investigates the curriculums of information security in domestic universities and graduate schools. And then, it compares with the needs of industry knowledge and skills by using SPSS. Through this analysis, we will get implications about curriculum design of Information security.

A Study on the Countermeasure to Deal with Cyber Terrorism (사이버테러리즘의 대응방안에 관한 연구)

  • Oh Tae-Kon
    • The Journal of the Korea Contents Association
    • /
    • v.5 no.3
    • /
    • pp.93-101
    • /
    • 2005
  • These days, modern society is facing a 'turning point of paradigm' from industrial society to knowledge and information society. It indicates an entry to the high-speed network society centering on knowledge. Specifically, Korea has invested enormously to If Industry and finally other advanced countries are eager to export technologies of our country through benchmarking. However, because of our growth-oriented policy, Korea is not very good at dealing with the dysfunctions of information-centered society, and one of the representative problems is cyber-terrorism. Cyber terrorism which anonymous actors do to the uncertain number of people is one of the new types of terrorism. This study aims at political and legal speculations on cyber terrorism for protection of contents and find its countermeasures.

  • PDF

A Study of Automatic Deep Learning Data Generation by Considering Private Information Protection (개인정보 보호를 고려한 딥러닝 데이터 자동 생성 방안 연구)

  • Sung-Bong Jang
    • The Journal of the Convergence on Culture Technology
    • /
    • v.10 no.1
    • /
    • pp.435-441
    • /
    • 2024
  • In order for the large amount of collected data sets to be used as deep learning training data, sensitive personal information such as resident registration number and disease information must be changed or encrypted to prevent it from being exposed to hackers, and the data must be reconstructed to match the structure of the built deep learning model. Currently, these tasks are performed manually by experts, which takes a lot of time and money. To solve these problems, this paper proposes a technique that can automatically perform data processing tasks to protect personal information during the deep learning process. In the proposed technique, privacy protection tasks are performed based on data generalization and data reconstruction tasks are performed using circular queues. To verify the validity of the proposed technique, it was directly implemented using C language. As a result of the verification, it was confirmed that data generalization was performed normally and data reconstruction suitable for the deep learning model was performed properly.

sDBMS for Hacking Prevention Based on PMI for Web Contents Protection (Web컨텐츠 보호를 위한 PMI 기반의 해킹방지 sDBMS)

  • Eyoo, Du-Gyu;Jun, Mun-Suk
    • Journal of the Korea Computer Industry Society
    • /
    • v.5 no.8
    • /
    • pp.829-840
    • /
    • 2004
  • Business model in Web environments is usually provided by digital data. Information exchange of users and service providers should be performed by encryted data. Encrypted protection. In this paper, We have prevented using contents by users is not accessed based on RBAC. in this paper, We propose a new DB encryption scheme which use RBAC and digital signature based on PMI.

  • PDF

An Evaluation Study on the Copyright Protection Environment for Digital Libraries (디지털도서관의 저작권보호 환경 평가 연구)

  • 이종문
    • Journal of the Korean Society for information Management
    • /
    • v.19 no.3
    • /
    • pp.211-326
    • /
    • 2002
  • This study is to analyze and evaluate copyright protection environment in digital reproduction and transmission, find out problems involved. and suggest recommendations for improvement. Data was collected 50 libraries to which digital reproduction and transmission is permitted under the Copyright Act were surveyed to examine the present states of digitalization and the systems employed. Also, library users, sampled from 5 libraries carrying out all the 6 technical measures obliged by the Copyright Act, were surveyed to examine their use of digital materials and perception on the copyright. After reviewing descriptive statistics, frequency and cross-tabulation analysis were made. The results of the analysis are most of the libraries. except for the industry university libraries, have implemented digital library systems, but the introduction rate of both digital reproduction system and transmission system are high (68.0% and 84.0%. respectively), while that of copyright protection system was low (26.0%). 84.0% of the libraries surveyed digitalize the full text, but the Libraries have digital collection less than 5,000 items, and only 33.3% of them digitalize materials with securing the copyrights. Regulations on copyright protections are not obliged properly. and it appeared that not only users' perception and perception of copyright as well as their use of electronic books are relatively low.

Problems and countermeasures of the private security industry according to the current situation

  • Park, Su-Hyeon;Choi, Dong-Jae
    • Journal of the Korea Society of Computer and Information
    • /
    • v.25 no.12
    • /
    • pp.315-320
    • /
    • 2020
  • The purpose of this study is to analyze and interpret the current situation of private security companies·guards for the past three years, security companies by size, general·special (new education), and qualification system provided by the Police Agency, Security Association, etc. It provides a theoretical foundation for private security and provides a new perspective for interpreting private security. As a result, through the current situation, this private security has a concentration of metropolitan area and facility security, an abnormal personal protection company contrast, the number of personal protection institutes, there is a special security shift to regular jobs, and the current continuous education On the other hand, the education of special security guards has been shown to be limited. In the qualification system, the utilization of security instructor qualifications and the utilization and public relations of personal probation officer qualifications will appear. The current state of typical private security is as follows. The first is the balanced development of private security and the clarity of business divisions. Second, the quality of private security education and educational institutions must be high. Third is the recognition of the qualification system and active public relations.

Design of Digital fulltext Protection System using Digital Fingerprinting (핑거프린팅을 이용한 디지털 원문 보호시스템 설계)

  • Kim, Sang-Kuk;Lee, Jae-Kwang
    • Journal of the Korea Computer Industry Society
    • /
    • v.5 no.5
    • /
    • pp.699-710
    • /
    • 2004
  • It is one of important techniques to protect illegal uses and forgeries for text databases when the internet has become widsepread. Lots of studies and system developments has been progressed in order to protect text databases, important documents of the companies, and blueprints of the research institutes. Given this project securing the KISTI (Korea Institute of Science and Teschnology Information) digital contents, we are to design a watermaking and fingerprinting system protecting document images, and a agent notifying the traitors' location.

  • PDF

Governance Strategies for Trade in Financial Services in Korea (금융서비스의 무역거버넌스 전략)

  • Park, Moon-Suh
    • International Commerce and Information Review
    • /
    • v.11 no.4
    • /
    • pp.229-259
    • /
    • 2009
  • Financial service in economy is same with neural net or vein net of human body. Moreover, every economic entity which has experienced global financial crisis in 2008 is realizing more importance and power of financial service, and is recognizing financial service as a part of new engine of growth for economic development. As global linkages relating financial service in the industry are deepened, we can expect that the economic interests between countries are more conflicted. Because financial service is regarded as critical factors in order to ensure future competitive advantage, more active change of financial service paradigm in Korea is required. The purpose of this paper is to analyze the paradigm of financial service in global business aspect, to prepare the global governance strategies about financial service, and to bring up some ideas for Korea's economic development after global financial crisis by intensifying the competitiveness of financial services. It is suggested that Korea should prepare the "Master Law for Financial Service" (provisional name) in advance as governance strategy for financial service. And not only establishing the financial risks prevention system and consumer's protection agency, but financial competitiveness strengthening actions will have to be included in governance strategy of financial service in Korea.

  • PDF

Imaging Inspection Systems for the Remanufacturing Industry (재제조 산업을 위한 영상 검수 시스템)

  • Youm, SungKwan;Shin, Kwang-Seong
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2021.10a
    • /
    • pp.574-575
    • /
    • 2021
  • Re-manufacturing is the process of recovering the function and performance of the original product through a re-assembly process such as a new product assembly process after reprocessing by recovering used products or parts that are in the disposal stage at the end of their lifespan. One of the manufacturing methods. The remanufacturing industry is important not only in terms of environmental protection, but also in terms of economics. The success or failure of the industry as a whole depends on trust in products and price competitiveness. Image processing systems are used to reduce labor costs and improve product reliability in the product manufacturing process. In this study, foreign substances and defects that are difficult to identify with the human eye are detected by using the pre-processing step of determining whether to recycle the drum and image processing immediately before shipment after regenerating the drum to regenerate the waste drum.

  • PDF

Trends of healthcare industry research institutes (보건산업부문 기업부설 연구소의 동향)

  • Hong Sang-Jin;Kang Tak-Lim
    • Journal of Society of Preventive Korean Medicine
    • /
    • v.6 no.1
    • /
    • pp.36-50
    • /
    • 2002
  • Health industry, a knowledge based high value-added industry, is being considered as a strategic area for the 21C and many advanced countries are making every endeavors for the promotion of health industry along with information technology, new materials, and mechatronics. Korean health industry, however, has been excluded from the governmental supports as well as bound by strict regulation so far, and there is a significant gap in technology compared with advanced countries. In 21C, technology is the main factor of national competitiveness and that is why the role of R&D institutes are so important in the high level of competition to cope with the technology protection policies of advanced countries. In this article, with Directory of Korean R&D Institutes published by Korea Industry Technology Association, I reviewed the trends of R&D institute of health industry. Main findings of the research can be summarized as follows. The portion of health industry R&D institute is 3.6% of total R&D institute but the amount of R&D investment is over than 5% This means health industry are knowledge based and R&D intensified industry, meanwhile the variations of same industry R&D institutes of health industry is huge in R&D investments and other activities. Regional distributions of health industry institutes show some kind of different patterns in each industry areas. Medical devices and Medical informatics's preference of metropolitan region are distinguished with other industry areas. Many of the institutes are located in same site of it's company rather than operating separate building for R&D specific uses. It is better for transforming ideas to products and close cooperation of research body with product lines, but it is a handicap for networking and communicating with other research institutions too. It takes 18.4yrs for bearing R&D institute on the average. For a long times 'copy products' or 'me too products' policies were easy way to maintain business entities. But recently, it is recognized that research activities are essential component of sustaining it's own business firms. This means technology itself is leading power of corporation itself in the high level of competition.

  • PDF