• Title/Summary/Keyword: Information security education

Search Result 913, Processing Time 0.028 seconds

Safety Management Network of Sports Facilities Abroad and System Status (해외의 스포츠시설 안전관리 네트워크 및 시스템 현황)

  • Kim, Il-Gwang;Kwon, Hei-Won;Choi, Jin-Ho
    • Journal of Digital Convergence
    • /
    • v.14 no.6
    • /
    • pp.547-562
    • /
    • 2016
  • The purpose of this research was to provide the information of mandatory regulation for Korean sports facilities and the preliminary data for building sport safety management manual through sports facilities abroad and system status. Futhermore, based on the information of sports facilities safety management, this research performed the benchmarking of each country sports facilities safety management system. As a result, in the U.S, Department of Homeland Security(DHS) leads effort to achieve a safe, secure, and resilient homeland. In Germany, law & regulations, sports facilities safety guideline and expert extension have been reviewed. Germany is more realistic and practical than other countries. In Australia, Major Hazard Facilities(MHF) is responsible for eliminating the risk of a major incident. Emergency Management System(EMS) should spontaneously respond when the alarm is raised as early detection and intervention are vital to ensuring that a small incident does not escalate to become a major disaster.

A Korean CAPTCHA Study: Defeating OCRs In a New CAPTCHA Context By Using Korean Syllables

  • Yang, Tae-Cheon;Ince, Ibrahim Furkan;Salman, Yucel Datu
    • International Journal of Contents
    • /
    • v.5 no.3
    • /
    • pp.50-56
    • /
    • 2009
  • Internet is being used for several activities by a great range of users. These activities include communication, e-commerce, education, and entertainment. Users are required to register regarding website in order to enroll web activities. However, registration can be done by automated hacking software. That software make false enrollments which occupy the resources of the website by reducing the performance and efficiency of servers, even stop the entire web service. It is crucial for the websites to have a system which has the capability of differing human users and computer programs in reading images of text. Completely Automated Public Turing Test to Tell Computers and Human Apart (CAPTCHA) is such a defense system against Optical Character Recognition (OCR) software. OCR can be defined as software which work for defeating CAPTCHA images and make countless number of registrations on the websites. This study proposes a new CAPTCHA context that is Korean CAPTCHA by means of the method which is splitting CAPTCHA images into several parts with random rotation values, and drawing random lines on a grid background by using Korean characters only. Lines are in the same color with the CAPTCHA text and they provide a distortion of image with grid background. Experimental results show that Korean CAPTCHA is a more secure and effective CAPTCHA type for Korean users rather than current CAPTCHA types due to the structure of Korean letters and the algorithm we are using: rotation and splitting. In this paper, the algorithm of our method is introduced in detail.

An Energy- Efficient Optimal multi-dimensional location, Key and Trust Management Based Secure Routing Protocol for Wireless Sensor Network

  • Mercy, S.Sudha;Mathana, J.M.;Jasmine, J.S.Leena
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.10
    • /
    • pp.3834-3857
    • /
    • 2021
  • The design of cluster-based routing protocols is necessary for Wireless Sensor Networks (WSN). But, due to the lack of features, the traditional methods face issues, especially on unbalanced energy consumption of routing protocol. This work focuses on enhancing the security and energy efficiency of the system by proposing Energy Efficient Based Secure Routing Protocol (EESRP) which integrates trust management, optimization algorithm and key management. Initially, the locations of the deployed nodes are calculated along with their trust values. Here, packet transfer is maintained securely by compiling a Digital Signature Algorithm (DSA) and Elliptic Curve Cryptography (ECC) approach. Finally, trust, key, location and energy parameters are incorporated in Particle Swarm Optimization (PSO) and meta-heuristic based Harmony Search (HS) method to find the secure shortest path. Our results show that the energy consumption of the proposed approach is 1.06mJ during the transmission mode, and 8.69 mJ during the receive mode which is lower than the existing approaches. The average throughput and the average PDR for the attacks are also high with 72 and 62.5 respectively. The significance of the research is its ability to improve the performance metrics of existing work by combining the advantages of different approaches. After simulating the model, the results have been validated with conventional methods with respect to the number of live nodes, energy efficiency, network lifetime, packet loss rate, scalability, and energy consumption of routing protocol.

Case Analysis for Introduction of Machine Learning Technology to the Mining Industry (머신러닝 기술의 광업 분야 도입을 위한 활용사례 분석)

  • Lee, Chaeyoung;Kim, Sung-Min;Choi, Yosoon
    • Tunnel and Underground Space
    • /
    • v.29 no.1
    • /
    • pp.1-11
    • /
    • 2019
  • This study investigated use cases of machine learning technology in domestic medical, manufacturing, finance, automobile, urban sectors and those in overseas mining industry. Through a literature survey, it was found that the machine learning technology has been widely utilized for developing medical image information system, real-time monitoring and fault diagnosis system, security level of information system, autonomous vehicle and integrated city management system. Until now, the use cases have not found in the domestic mining industry, however, several overseas projects have found that introduce the machine learning technology to the mining industry for improving the productivity and safety of mineral exploration or mine development. In the future, the introduction of the machine learning technology to the mining industry is expected to spread gradually.

An Enhancement Method of Document Restoration Capability using Encryption and DnCNN (암호화와 DnCNN을 활용한 문서 복원능력 향상에 관한 연구)

  • Jang, Hyun-Hee;Ha, Sung-Jae;Cho, Gi-Hwan
    • Journal of Internet of Things and Convergence
    • /
    • v.8 no.2
    • /
    • pp.79-84
    • /
    • 2022
  • This paper presents an enhancement method of document restoration capability which is robust for security, loss, and contamination, It is based on two methods, that is, encryption and DnCNN(DeNoise Convolution Neural Network). In order to implement this encryption method, a mathematical model is applied as a spatial frequency transfer function used in optics of 2D image information. Then a method is proposed with optical interference patterns as encryption using spatial frequency transfer functions and using mathematical variables of spatial frequency transfer functions as ciphers. In addition, by applying the DnCNN method which is bsed on deep learning technique, the restoration capability is enhanced by removing noise. With an experimental evaluation, with 65% information loss, by applying Pre-Training DnCNN Deep Learning, the peak signal-to-noise ratio (PSNR) shows 11% or more superior in compared to that of the spatial frequency transfer function only. In addition, it is confirmed that the characteristic of CC(Correlation Coefficient) is enhanced by 16% or more.

A Study on the controversial Issues of the Private Investigator System (공인탐정제도 도입에 따른 주요 쟁점 논의)

  • Jaemin Lee
    • Journal of the Society of Disaster Information
    • /
    • v.19 no.2
    • /
    • pp.254-261
    • /
    • 2023
  • Purpose: With the diversification of modern society, it is difficult to predict crime types, and the limitations of the state's functions, such as human limitations and lack of budget, are increasing. Method: However, as the number of private investigation companies that do not use illegal means to solve the request increased, attempts were made to introduce a public detective system that would manage and supervise it and compensate for the gap in public power. Result: However, due to the nature of the Private Investigator system, legislation has not progressed as the National Police Agency and the Ministry of Justice are at odds with existing laws that guarantee existing jobs such as lawyers and credit research. Conclusion: Therefore, this study analyzes the bills related to the authorized detective to the National Assembly, examines major issues such as the scope of work of the authorized detective business, the selection of management and supervisory authorities, and suggests ways to improve the successful settlement of the Private Investigator system.

Assessment of public knowledge, perception, and acceptance of nuclear power in Bangladesh

  • Md Iqbal Hosan;Md Jafor Dewan;Md Hossain Sahadath;Debasish Roy;Drupada Roy
    • Nuclear Engineering and Technology
    • /
    • v.55 no.4
    • /
    • pp.1410-1419
    • /
    • 2023
  • Public perception plays a crucial role in the successful completion of a nuclear power project. As a newcomer country to nuclear power, there are lots of misconceptions among the Bangladeshi people about nuclear energy. Consequently, it is crucial to minimize all the doubts among mass people and build up their positive outlook toward nuclear power. This demands a comprehensive survey to figure out the public opinion, concerns, false impressions, and knowledge gap regarding nuclear power. In the present study, these issues were addressed by a survey that was responded to by 661 persons for the 24 survey questions. The questions were categorized based on information, knowledge, faith, benefit, awareness, and technology. Feedback and responders' basic demographic and socioeconomic information were collected from various locations in Bangladesh through online and in-person surveys. The responses were analyzed in both statistical and descriptive ways. Some of the feedback was found to vary with age, sex, and education level while others were quite independent of these parameters. It is found that socioeconomic development and energy security can be achieved by the inclusion of nuclear energy in the power system master plan of the country. However, huge knowledge gaps and misconceptions were found among the public regarding nuclear energy. As per feedback, political instability and corruption may affect the national nuclear power project in Bangladesh. Low faith in the existing rules & regulations for nuclear power programs was also observed. The result of this study will be handy to develop the communication and public awareness strategy for a successful nuclear power project in Bangladesh.

A Study on China's Intention to Switching to Shared Bike Platforms: Mechanisms of Trust and Distrust

  • Wenlong Lu;Yung Ho Suh;Sae Bom Lee
    • Journal of the Korea Society of Computer and Information
    • /
    • v.28 no.7
    • /
    • pp.179-187
    • /
    • 2023
  • Consumer trust plays a crucial role in the development of the sharing economy. This study primarily focuses on the factors influencing consumer trust and examines the case of ofo, a former leader in China's bike-sharing industry. This paper analyzes the decline in consumer trust in ofo, which can be attributed to internal management issues and the near-bankruptcy situation. The "difficulty in refunds" issue faced by ofo since December 2018 has been growing continuously, and this study explores the factors influencing trust and distrust in this context. By considering product factors (quality), platform factors (payment security, privacy protection, reputation), and social factors (social norms, government regulation) as independent variables, the study analyzes the factors affecting consumer trust. The analysis results revealed that as consumers' distrust towards shared bikes increases, their switching intention also increases. The company's reputation and social norms were found to influence both trust and distrust, while government regulation was found to influence trust. The research findings provide insights relevant to sharing economy platforms and offer guidance for future studies.

A study on Satisfaction with Treatment in Medically vulnerable areas based on DRM (DRM기반 의료취약지 진료만족도 조사 연구)

  • Kyeung-Hwa Lee
    • Journal of the Health Care and Life Science
    • /
    • v.9 no.2
    • /
    • pp.213-220
    • /
    • 2021
  • A policy is needed to provide appropriate medical services to rural residents living in medically vulnerable areas and to resolve imbalances in health and medical resources through this. In general, a survey method is used to secure medical services to the residents, and a security policy is needed to distribute and collect the questionnaire type and personal information between the investigator and the participant as digital contents. The proposed thesis introduces DRM (Digital Rights Management) technology as a way to safely manage the questionnaire type of the investigator and the personal information of the participants, and improves the problem that the existing License Server issues, renews, and cancels licenses to all domains. In order to do this, it provides convenience to the DRM-based survey policy that only DMs bundled with the family domain performs license management after the certificate is issued.

Comparative Research on the Health Information Manager(HIM) Duties of One Malaysian Hospital and Similar Scale Korean hospitals (말레이시아 1개 병원과 병상규모가 유사한 한국의 병원 간 보건정보관리자 직무 비교연구)

  • Kim, Hey-Kyung;Lee, Hyun-Ju
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.15 no.10
    • /
    • pp.6158-6167
    • /
    • 2014
  • The aim of this study was to perform comparative analysis of the duties of 7 new roles of HIMs in Malaysian and Korean hospitals of a similar scale. A Malaysian general hospital with a scale of 272 hospital beds was chosen. The researcher visited a Malaysian hospital in person and interviewed the staff in charge over a 2 week period from July 22nd 2013 to August 2nd 2013. For domestic hospitals, 13 general hospitals with 270 hospital beds, similar to the Malaysian general hospital, were chosen. Phone interviews with the department recorded the duty recording work. Regarding 7 new roles of Health Information Manager (HIM), although the role as a Health information manager and Security Officer in Malaysian general hospital was not defined, 30.8% performed their role in Korean general hospitals. The classification of disease & procedure within the role of Clinical data specialist was performed by both countries, and while the tumor registry was done in a Malaysian general hospital, only 15.4% of Korean general hospitals were operating. The statistics of the discharged patients were not measured in the Malaysian general hospital but 76.9% of Korean general hospitals recorded these statistics. Although 22.1% of Korean general hospitals operated registration work of special disease, Malaysian general hospital not only had a total legal contagious disease registration, but also took charge of information registration of hospital births and deceased ones. Other than these, the Patient Information Coordinator, Data Quality Manager, Document and Repository Manager, Research and Decision Support Analyst roles were not done by either country. The new role of HIM is operated in a low percentage in Korean middle and small hospitals. Therefore, to clearly establish the role of HIM in Korea, and have middle and small hospitals to operate such a role, it is essential for the related association to give continuous education and provide support to clarify the role within the hospital working environment. It is desirable to benchmark Malaysian general hospital's registration work on special diseases and others, and expand the work to improve overall.