• Title/Summary/Keyword: Integrity Information

Search Result 1,465, Processing Time 0.027 seconds

Does Cloned Template Text Compromise the Information Integrity of a Paper, and is it a New Form of Text Plagiarism?

  • Jaime A. Teixeira da Silva
    • International Journal of Knowledge Content Development & Technology
    • /
    • v.13 no.2
    • /
    • pp.23-35
    • /
    • 2023
  • Word templates exist for select journals, and their primary objective is to facilitate submissions to those journals, thereby optimizing editors' and publishers' time and resources by ensuring that the desired style (e.g., of sections, references, etc.) is followed. However, if multiple unrelated authors use the exact same template, a risk exists that some text might be erroneously cloned if template-based papers are not carefully screened by authors, journal editors or proof copyeditors. Elsevier Procedia® was used as an example. Select cloned text, presumably derived from MS Word templates used for submissions to Elsevier Procedia® journals, was assessed using Science Direct. Typically, in academic publishing, identical text is screened using text similarity software during the submission process, and if detected, may be flagged as plagiarism. After searching for "heading should be left justified, bold, with the first letter capitalized", 44 Elsevier Procedia® papers were found to be positive for vestigial template text. The integrity of the information in these papers has been compromised, so these errors should be corrected with an erratum, or in the case of extensive errors and vast tracts (e.g., pages long) of template text, papers should be retracted and republished.

Analysis of MSAS Correction Information and Performance in Korea (MSAS 보정정보 분석 및 국내 적용 시 성능 평가)

  • Jeong, Myeong-Sook;Kim, Jeong-Rae
    • Journal of the Korean Society for Aeronautical & Space Sciences
    • /
    • v.37 no.4
    • /
    • pp.372-382
    • /
    • 2009
  • A GNSS software for processing the SBAS correction data is developed, and Japan MSAS correction data is analyzed. MSAS orbit correction data is analyzed and compared with WAAS data. MSAS ionosphere correction data is analyzed and the effect of the equatorial anomaly on the correction accuracy is discussed. Degradation due to receive delay of correction information and effect of the degradation on protection level analyzed using partial remove of MSAS correction information. Integrity and availability for precision approch using the MSAS system analyzed.

A Maritime DGPS Reference Station Configuration Proposal for Operation Improvement

  • Choi, Yong Kwon;Son, Seok Bo;Lee, Sang Jeong
    • Journal of Positioning, Navigation, and Timing
    • /
    • v.4 no.4
    • /
    • pp.187-193
    • /
    • 2015
  • A maritime Differential Global Positioning System (DGPS) reference station broadcasts correction information to users having a DGPS receiver so that the navigation performance can be improved. A maritime DGPS reference station consists of a reference station (RS) that generates and broadcasts correction information, an integrity monitor (IM) that monitors the integrity of correction information, and a control station (CS) that controls them. A maritime DGPS reference station is continuously operated for 24 hours, and thus improvement in the ease of operation is a major element that can improve the performance of the system. In this study, a configuration of a maritime DGPS reference station that can improve the ease of operation and a relevant protocol were proposed, and an example of the implementation of the proposed system was presented.

An Enhanced Description Assistant for SOAP Message Exchange in SOA

  • Hung, Pham Phuoc;Byun, Jeong-Yong
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2011.06a
    • /
    • pp.336-339
    • /
    • 2011
  • When SOAP messages carry vital business information, their integrity and confidentiality needs to be preserved. Concerns have been raised due to XML Rewriting attacks on SOAP message which create a foundation for typical faults in SOAP messages and make it vulnerable to use in Web Service environment. We have already provided a solution to tackle this problem on integrity of SOAP messages in earlier works by proposing a system called System Description Assistant. That system was able to identify and fix typical faults in SOAP messages. This paper mainly reflects future directions of our previous researches and enhances previous ones by adding more comprehensive functions to detect and possibly fix faults occurred due to XML rewriting attacks.

Information System of Anti-Crisis Management in the Context of Ensuring National Security

  • Kryshtanovych, Myroslav;Antonova, Liudmyla;Pohrishchuk, Borys;Mironova, Yulia;Storozhev, Roman
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.12spc
    • /
    • pp.719-725
    • /
    • 2021
  • The main purpose of the study is to determine the main aspects of information support for anti-crisis management in the context of ensuring national security. In modern conditions, under the influence of COVID-19, it becomes important to develop a modern paradigm for the transformation of anti-crisis management, based on the determination of the laws of state development on the basis of the imperative of national interests and territorial integrity. These are, firstly, the patterns of development of the state system of public administration, secondly, the patterns of development of a complex of state interests, and thirdly, patterns of development of the modern model of the country's territorial integrity. As a result of the study, the key aspects of the anti-crisis management system were identified in the context of ensuring the security of national interests.

A Lattice-Based Role Graph Security Model ensuring Confidentiality and Integrity (비밀성과 무결성을 보장하는 격자개념의 역할그래프 보안 모델)

  • Choi, Eun-Bok
    • Journal of the Korea Society of Computer and Information
    • /
    • v.14 no.6
    • /
    • pp.91-98
    • /
    • 2009
  • In this paper, this model ensures confidentiality and integrity of mandatory access cotrol policy which based on fuzzy function with importance of information. And it solves authorization abuse problem through role graph creation algorithm and flowing policy that security grade is applied. Because this model composes role hierarchy which bind similar role concept to apply to commercial environment, it has expansile advantage by large scale security system as well as is easy that add new role.

A Study on Extraction of Mobile Forensic Data and Integrity Proof (모바일 포렌식 자료의 추출과 무결성 입증 연구)

  • Kim, Ki-Hwan;Park, Dea-Woo
    • Journal of the Korea Society of Computer and Information
    • /
    • v.12 no.6
    • /
    • pp.177-185
    • /
    • 2007
  • Lately, it is a trend that diffusion of Mobile Information Appliance that do various function by development of IT technology. There is function that do more convenient and efficient exchange information and business using mobile phone that is Mobile Information Appliance, but disfunction that is utilized by pointed end engineering data leakage, individual's privacy infringement, threat, etc. relationship means to use mobile phone is appeared and problems were appeared much. However, legal research of statute unpreparedness and so on need research and effort to prove delete, copy, integrity of digital evidence that transfer secures special quality of easy digital evidence to objective evidence in investigation vantage point is lacking about crime who use this portable phone. It is known that this Digital Forensic field is Mobile Forensic. In this paper. We are verify about acquisition way of digital evidence that can happen in this treatise through mobile phone that is Mobile Forensic's representative standing and present way to prove integrity of digital evidence using Hash Function.

  • PDF

Research on Understanding of Game Information for the Elderly (중.노년층의 컴퓨터 게임이용과 인식에 대한 연구)

  • An, Jeong-Shin
    • The Korean Journal of Community Living Science
    • /
    • v.19 no.2
    • /
    • pp.235-244
    • /
    • 2008
  • The purpose of this study was to examine the elderly generation's understanding of game information and for recognition of computer based games as a recreation activity for the mid-to late adults. This study investigated game use and personal thoughts about the influences of computer games on each generation. The study was conducted by survey with the subjects being 242 adults aged 40 to 72 living in Busan and Kyung-nam area. Findings indicated that 43.5% of adults used computers to access games. The purposes for computer use were: business, searching portal sites, and games. 44.8% of adults knew about game information education. 67.4% of adults who had someone as a game information resource reported that their children provided the game information. Most adults used arcade games and recognized the influences of game information as positive to adults and the elderly but negative to children and adolescents. Finally, the adults aged "after mid-life" who knew about game information education showed higher ego-integrity and psychological well-being. These findings have implications for the development of elderly education programs aimed at promoting quality of life for older adults.

  • PDF

Operations of Administration Tool and Consistency Properties for RBAC Database Integrity (RBAC 데이터베이스의 무결성을 위한 일관성 특성과 관리도구 동작)

  • 오석균;김성열
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.5 no.4
    • /
    • pp.16-21
    • /
    • 2000
  • Role Based Access Control(RBAC) reduces the cost of administering access control policies as well as making the process less error-prone. Administration tool is most important component in the concept of RBAC. The administration tool for the RBAC security system must be maintain the integrity of user-role and role-role relationships in the RBAC Database. Therefor, it is required set functions, properties defining integrity of database. When it will be designed security systems which is applying RBAC policy on the Linux(server system environments, this paper defines integrity of database for user-role and role-role relationships, and we propose formal specification of operation in order to manage these relationships. The proposed formal specification leads to the consistency requirements for the RBAC database which are defined as a set of relationship. Also, this paper can easily derive the implementation of the RBAC administration tool by formal specification of operations. It leads us tn the minimal set for a more efficiently implementation of administration tool.

  • PDF

A Formal Specification of Role Graph Model Increasing Integrity (무결성이 강화된 역할 그래프 모델의 정형적 명세)

  • Choi EunBok;Lee HyeongOk
    • Journal of Korea Multimedia Society
    • /
    • v.7 no.11
    • /
    • pp.1620-1629
    • /
    • 2004
  • The objectives of access control are to protect computing and communication resources from illegal use, alteration, disclosure and destruction by unauthorized users. Although Biba security model is well suited for protecting the integrity of information, it is considered too restrictive to be an access control model for commercial environments. And, Role-Based Access Control(RBAC) model, a flexible and policy-neutral security model that is being widely accepted in commercial areas, has a possibility for compromising integrity of information. In this paper, We present the role graph model which enhanced flexibility and integrity to management of many access permission. Also, In order to represent those rule and constraints clearly, formal descriptions of role assignment rule and constraints in Z language are also given.

  • PDF