• Title/Summary/Keyword: National Authority Data

Search Result 251, Processing Time 0.026 seconds

A Study on the National Cryptographic Policy : About the Right to Access the Cryptographic (국가 암호정책에 대한 연구 : 암호접근권한을 중심으로)

  • Kim, Dong-hoon;Kwon, Hun-yeong;Hong, Seokhie
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.31 no.1
    • /
    • pp.99-109
    • /
    • 2021
  • With the recent development of ICT, information exchange through data communication network is increasing. Cryptography is widely used as the base technology to protect it. The initial cryptography technology was developed for military use and authorized only by the nation in the past. However, nowadays, much of the authority was unwillingly transferred to the private due to the pervasive use of ICT. As a result, there have been conflicts between the private demand to use cryptography and the nation's authority. In this paper, we survey the conflicts between nations and the private in the process of formulating the cryptography policy. Morever, we investigate the reality of the cryptography policy in Korea. Our investigations are expected to help the government apply cryptographic control policy in a balanced manner and plan development of cryptography industries. Lastly, we propose a need to establish a cryptanalysis organization and to legislate a legal sanction against fraudulent use of cryptography.

A Study on the Bibliographic Utility and Its Use of CIP Data : With a Focus on the LC CIP Program and OCLC (서지 유틸리티와 CIP 데이터 활용에 관한 연구 - OCLC와 미국국회도서관 CIP 프로그램을 중심으로 -)

  • Yoon Cheong-Ok
    • Journal of Korean Library and Information Science Society
    • /
    • v.36 no.2
    • /
    • pp.349-367
    • /
    • 2005
  • This study examines how CIP program of the Library of Congress distributes, provides an access to, and helps upgrade CIP data through bibliographic utilities. LC CIP program can be characterized by the participation of many U.S. mainstream publishers, a continuing increase in the number of CIP data assigned annually, and an effort to immediately upgrade the completeness and accuracy of CIP data in cooperation with bibliographic utilities. Cooperation between LC and bibliographic utilities in performing quality control is worth noting, when compared with the limitation of CIP program of the National Library of Korea. It is suggested that the National Library of Korea should provide complete and accurate bibliographic and authority records for other types of new and old library materials published in Korea as well as CIP data for new monographic materials.

  • PDF

Utilizing Integrated Public Big Data in the Database System for Analyzing Vehicle Accidents

  • Lee, Gun-woo;Kim, Tae-ho;Do, Songi;Jun, Hyun-jin;Moon, Yoo-Jin
    • Journal of the Korea Society of Computer and Information
    • /
    • v.22 no.9
    • /
    • pp.99-105
    • /
    • 2017
  • In this paper, we propose to design and implement the database management system for analyzing vehicle accidents through utilizing integration of the public big data. And the paper aims to provide valuable information for recognizing seriousness of the vehicle accidents and various circumstances at the accident time, and to utilize the produced information for the insurance company policies as well as government policies. For analysis of the vehicle accidents the system utilizes the integrated big data of National Indicator System, the Meteorological Office, National Statistical Office, Korea Insurance Development Institute, Road Traffic Authority, Ministry of Land, Infrastructure and Transport as well as the National Police Agency, which differentiates this system from the previous systems. The system consists of data at the accident time including weather conditions, vehicle models, age, sex, insurance amount etc., by which the database system users are able to obtain the integral information about vehicle accidents. The result shows that the vehicle accidents occur more frequently in the clear weather conditions, in the vehicle to vehicle conditions and in crosswalk & crossway. Also, it shows that the accidents in the cloudy weather leads more seriously to injury and death than in the clear weather. As well, the vehicle accident information produced by the system can be utilized to effectively prevent drivers from dangerous accidents.

Experiences of Families in the Intensive Care Unit: Interactions with Health Care Providers (중환자실 환자 가족의 경험: 의료인들과의 상호작용)

  • Lee, Mimi;Yi, Myungsun
    • Korean Journal of Adult Nursing
    • /
    • v.29 no.1
    • /
    • pp.76-86
    • /
    • 2017
  • Purpose: The purpose of the study was to provide deep understanding of the reported experiences of families with their loved one in the intensive care unit (ICU), focusing on interactions with healthcare providers. Methods: The data were collected by individual interviews of eleven participants. The transcribed data were analyzed using qualitative content analysis to identify major themes and sub-themes that represented the experiences of families. Results: Five themes and 13 sub-themes emerged. "Captive of patients' delayed death: Fear and anxiety" describes psychological problems arising when the family member became critically ill enough to warrant being admitted to the ICU. "Families as the weak: Suppression and resistance" describes interpersonal difficulties arising due to lack of information and trust with healthcare providers. "Deprivation of authority and duty as families: Helplessness" illustrate situational barriers in attempting to protect and support family member. "Re-establishment of trust relationship with healthcare providers: Gratitude and appreciation" describes how they satisfied with themselves by regaining trust relationship. Lastly, "Acceptance of reality through direct care participation: Relief and peace" illustrates peace of mind by gaining sense of reality through active direct care participation. Conclusion: This study demonstrates the positive and negative experiences of families with ICU patients. The results will be useful in developing family-centered nursing interventions.

Pedestrian Accident Models of Roundabout Near Schools by the Number of Entry and Circulatory Lane (회전 및 진입 차로 수에 따른 학교와 인접한 회전교차로 보행자 사고모형)

  • Son, Seul Ki;Park, Byung Ho
    • Journal of the Korean Society of Safety
    • /
    • v.32 no.5
    • /
    • pp.135-140
    • /
    • 2017
  • This study deals with the safety of roundabout. The purpose of this study is to analyze the factors affecting the pedestrian accidents of roundabout near schools. In pursuing the above, this study gives particular attentions to comparatively analyzing the pedestrian accident by number of entry and circulatory lane. The traffic accident data from 2013 to 2015 are collected from TAAS data set of Road Traffic Authority. To develop the pedestrian accident model, the Poisson and negative binomial models has been utilized in this study. Such the dependent variable as the number of pedestrian accidents and the 24 independent variables as geometry, traffic volume and others are used. The main results are as follows. First, 3 Poisson and 2 negative binomial models(${\rho}^2$ of 0.153~0.426) which are all statistically significant are developed. Second, the common variable of models based on the number of circulatory roadway lane is analyzed to be the entry lane width and that of the number of entry lane is evaluated to be the design speed. Also specific variables are evaluated to splitter island, roundabout sign, number of approach road, bus stop and elementary school. Finally, the design speed might be expected to decrease the number of pedestrian accidents near schools.

A Study on Competitiveness Improvement of Chittagong Container Port

  • Haque Md Jubair;Woo-Chul Ahn
    • Asia-Pacific Journal of Business
    • /
    • v.14 no.1
    • /
    • pp.439-451
    • /
    • 2023
  • Purpose - Market structure is crucial to identify as it defines the market states for new and existing container ports to perform within a given region. the study aims to compare the major ports in the Bay of Bengal in the context of Chittagong Port. Design/methodology/approach - For this study, the past 9 years of container volume data have been collected and analyzed through the HHI index, BCG matrix and shift effect analysis. Based on the analysis, this study has found that the Chittagong Port is in an oligopoly competitive market structure. Findings - The findings have shown that port in low market share and low growth in very recent years with the moderately concentrated ports HHI index. The shift effect analysis shows that the container volumes shifted from one port to another in the 2019 and 2020 periods. This study is the pioneer study in the Bay of Bengal region to identify the market structure, analyze market share and growth, and analyze the market concentration. Research implications or Originality - Future recommendations for the port authority is to take advantage of geolocation; attract international; tax exemption, faster clearance process, reduced waiting charges; increasing storage and technological machinery; promoting maritime logistics education; promoting Chittagong tourism; collaboration with other countries. Also, this study can be used as basic data for the establishment of a new supply chain between Korea and Southwest Asia for the Korean government and companies.

A User Authentication Model Based on Double Key for Secure Collusion Resistance in the Cloud Environment (클라우드 환경에서 공모 저항을 지원하는 이중 키 기반의 사용자 인증 모델)

  • Choi, Jeong-hee;Lee, Sang-ho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.2
    • /
    • pp.261-273
    • /
    • 2019
  • Recently, with the development of IT technology, there is an increasing interest in cloud services as the number of users using mobile devices such as mobile phones and tablets is increasing. However, there is a need for techniques to control or control various methods of accessing data as the user's service demands increase. In this paper, we propose a dual key based user authentication model that improves the user 's authentication efficiency by using two keys (secret key and access control key) to access the users accessing various services provided in the cloud environment. In the proposed model, the operation process and the function are divided through the sequence diagram of the algorithms (key generation, user authentication, permission class permission, etc.) for controlling the access right of the user with dual keys. In the proposed model, two keys are used for user authentication and service authorization class to solve various security problems in the cloud service. In particular, the proposed model is one of the most important features in that the algorithm responsible for access control of the user determines the service class of the user according to the authority, thereby shortening the management process so that the cloud administrator can manage the service access permission information of the user.

Enhancing the Applicability and Improvement Direction of Integrated Environmental Permit System (통합환경허가시스템의 활용도 제고 및 개선방향)

  • Park, Jae Hong;Shin, Su Jeong;Lee, Dae Gyun
    • Journal of Korean Society on Water Environment
    • /
    • v.34 no.3
    • /
    • pp.339-345
    • /
    • 2018
  • The integrated environmental permit system is currently in operation online. It carries out various functions of postmanagement such as the submission of annual reports containing operations management data onto integrated management workplaces, the operation and management of emission facilities and prevention facilities, and the disclosure of information on the integrated permission. On the other hand, the integrated environmental permit system needs to perform various roles in order to stably manage and smoothly perform the permitting work. It is necessary to utilize this system to establish policies by using diverse operations management data onto integrated management workplaces collected in the integrated environmental permit system. This system can also play a role in improving the post-management system and user convenience after the permission review and approval processes. The integrated environmental permit system can be effectively used to set up the BAT-AEL because it collects all of the cross-media data and identifies the overall status of the workplace. In order to establish a post management system after the approval, it is necessary to provide performance management and performance evaluation functions as conditions of the permit after approval. In addition, a variety of support functions should be provided to enable the permission authority and the environmental expert examination agency to facilitate the review of permits. It will be necessary to provide an evaluation system and a proactive diagnostic function to determine whether permission conditions and permit emission standards will change in the future. Also, it is important to adopt an information exchange platform that can be used to collect the status data onto the workplaces; the platform can also be used as an information exchange site for technical working groups (TWG), and for collecting field experts' opinions.

Design and Implementation of Blockchain for Securing Data of National Education Information System School Life Records (교육행정정보시스템 학교생활기록부 데이터의 안정성 확보를 위한 블록체인 설계 및 구현)

  • Kim, Heekyung;Park, Namje
    • Journal of the Korea Convergence Society
    • /
    • v.11 no.3
    • /
    • pp.27-35
    • /
    • 2020
  • The purpose of this study is to study the technical implementation methods to prevent problems such as the record of important educational activities of the student life record department or the continuous illegal leakage and manipulation. To this end, in this paper, by applying a private blockchain that can be participated only by a given organization or individual, it prevents outsiders from participating in the block network, and creates legitimate authority by creating two types of block data: student information block and access record block in the life record book. We proposed a block mechanism that can be registered, modified, and accessed only by authorized staff members. As a result, we have prepared an alternative to prevent forgery and alteration of the living records by third parties and to secure the integrity of the living records. If applied to the educational administrative information system, social consensus will be established that the operation and management of the life record book is reliable.

Analysis of the National Police Agency business trends using text mining (텍스트 마이닝 기법을 이용한 경찰청 업무 트렌드 분석)

  • Sun, Hyunseok;Lim, Changwon
    • The Korean Journal of Applied Statistics
    • /
    • v.32 no.2
    • /
    • pp.301-317
    • /
    • 2019
  • There has been significant research conducted on how to discover various insights through text data using statistical techniques. In this study we analyzed text data produced by the Korean National Police Agency to identify trends in the work by year and compare work characteristics among local authorities by identifying distinctive keywords in documents produced by each local authority. A preprocessing according to the characteristics of each data was conducted and the frequency of words for each document was calculated in order to draw a meaningful conclusion. The simple term frequency shown in the document is difficult to describe the characteristics of the keywords; therefore, the frequency for each term was newly calculated using the term frequency-inverse document frequency weights. The L2 norm normalization technique was used to compare the frequency of words. The analysis can be used as basic data that can be newly for future police work improvement policies and as a method to improve the efficiency of the police service that also help identify a demand for improvements in indoor work.