• Title/Summary/Keyword: Online protection

Search Result 257, Processing Time 0.025 seconds

Uncertainty Analysis and Application to Risk Assessment (위해성평가의 불확실도 분석과 활용방안 고찰)

  • Jo, Areum;Kim, Taksoo;Seo, JungKwan;Yoon, Hyojung;Kim, Pilje;Choi, Kyunghee
    • Journal of Environmental Health Sciences
    • /
    • v.41 no.6
    • /
    • pp.425-437
    • /
    • 2015
  • Objectives: Risk assessment is a tool for predicting and reducing uncertainty related to the effects of future activities. Probability approaches are the main elements in risk assessment, but confusion about the interpretation and use of assessment factors often undermines the message of the analyses. The aim of this study is to provide a guideline for systematic reduction plans regarding uncertainty in risk assessment. Methods: Articles and reports were collected online using the key words "uncertainty analysis" on risk assessment. Uncertainty analysis was conducted based on reports focusing on procedures for analysis methods by the World Health Organization (WHO) and U.S. Environmental Protection Agency (USEPA). In addition, case studies were performed in order to verify suggested methods qualitatively and quantitatively with exposure data, including measured data on toluene and styrene in residential spaces and multi-use facilities. Results: Based on an analysis of the data on uncertainty, three major factors including scenario, model, and parameters were identified as the main sources of uncertainty, and tiered approaches were determined. In the case study, the risk of toluene and styrene was evaluated and the most influential factors were also determined. Five reduction plans were presented: providing standard guidelines, using reliable exposure factors, possessing quality controls for analysis and scientific expertise, and introducing a peer review system. Conclusion: In this study, we established a method for reducing uncertainty by taking into account the major factors. Also, we showed a method for uncertainty analysis with tiered approaches. However, uncertainties are difficult to define because they are generated by many factors. Therefore, further studies are needed for the development of technical guidelines based on the representative scenario, model, and parameters developed in this study.

A Study on Construction Plan for Character Archives (캐릭터 아카이브 구축 방안 연구)

  • Pyeon, Hyunchang;Rieh, Hae-young
    • Journal of the Korean BIBLIA Society for library and Information Science
    • /
    • v.29 no.2
    • /
    • pp.149-168
    • /
    • 2018
  • In modern society, the economic and cultural influence of characters is increasing day by day. However, there is no comprehensive records management system for characters in Korea. The purpose of this study is to identify the necessity of comprehensive character records management system and requirements for records producers and users, and suggest a construction plan for archives that reflects this idea. Related cases in domestic and overseas were identified and analyzed, survey was conducted of character designers and users participating in the '2017 Character Licensing Fair' in order to understand their needs on character archives, and it was followed by interviews of two character designers. From the implications of the related cases and the analysis results of the questionnaire survey and the interviews, plans for records collection, management, and services were suggested for constructing character archives. Specifically, preparation of collection policy, insertion of watermark to prevent pirating, online sales of characters, and one-stop service that can provide licensing for copyright protection and record utilization were suggested.

A Survey on the Research Trends in the Field of Eco and Eco-friendly Fashion in Korea - Focused on Journal Publications from 2010 through 2014 - (한국 에코·친환경패션 분야의 연구동향 - 2010년부터 2014년까지 학회지를 중심으로 -)

  • Choi, Hae-Joo
    • Journal of the Korean Society of Costume
    • /
    • v.66 no.5
    • /
    • pp.163-173
    • /
    • 2016
  • As the severity of environmental problems has come to light in recent times environmental protection has garnered more interest and importance. The purpose of this study was to determine the current research trends in ecofriendly fashion in Korea by analyzing the research trends related to eco fashion, provide information necessary for developing eco and eco-friendly fashion in the future, and set the research direction for related research. The study analyzed 1,746 research papers in Journal of Korean Society of Costume, Journal of the Korean Society of Clothing and Textiles, Research Journal of the Costume Culture, and Journal of the Korea Fashion and Costume Design Association from 2010 to 2014, and a total of 55 research papers related to eco fashion were selected. Major conclusions of the study are as follows: First, Journal of the Korean Society of Clothing and Textiles published the most papers on eco fashion, Journal of the Korea Fashion and Costume Design Association published the fewest. Second, the highest number of research papers published in a year was 14 in 2014. Only a small number of papers were published in 2012, but the figure increased in 2014. Third, the most frequently covered topic among the 12 topics was the 'eco-friendly' topic with 13 papers (23.64%), followed by topics on corporate social responsibility (CSR), eco, sustainable, green, ethical, and recycle, respectively. The 7 topics above were covered by 47 of the selected 55 papers (85.45%). Fourth, the following research methods were used: the questionnaire method, literature review, case study, Internet search, costume construction, online survey and interview. The questionnaire method was used in 22 papers (29.33%), making it the most frequently used method. Fifth, fields of research were divided into fashion design(19 papers, 34.55%) and fashion marketing(36 papers, 65.45%). Papers on fashion design was published the most in 2010, and fashion marketing papers peaked in 2014. The use of eco fashion will be expanded in various ways in terms of country, firms and consumers in the future.

A Study of Natural Language Plagiarism Detection

  • Ahn, Byung-Ryul;Kim, Heon;Kim, Moon-Hyun
    • Proceedings of the Korea Society of Information Technology Applications Conference
    • /
    • 2005.11a
    • /
    • pp.325-329
    • /
    • 2005
  • Vast amount of information is generated and shared in this active digital As the digital informatization is vividly going on now, most of documents are in digitalized forms, and this kind of information is on the increase. It is no exaggeration to say that this kind of newly created information and knowledge would affect the competitiveness and the future of our nation. In addition to that, a lot of investment is being made in information and knowledge based industries at national level and in reality, a lot of efforts are intensively made for research and development of human resources. It becomes easier in digital era to create and share the information as there are various tools that have been developed to create documents along with the internet, and as a result, the share of dual information is increasing day in and day out. At present, a lot of information that is provided online is actually being plagiarized or illegally copied. Specifically, it is very tricky to identify some plagiarism from tremendous amount of information because the original sentences can be simply restructured or replaced with similar words, which would make them look different from original sentences. This means that managing and protecting the knowledge start to be regarded as important, though it is important to create the knowledge through the investment and efforts. This dissertation tries to suggest new method and theory that would be instrumental in effectively detecting any infringement on and plagiarism of intellectual property of others. DICOM(Dynamic Incremental Comparison Method), a method which was developed by this research to detect plagiarism of document, focuses on realizing a system that can detect plagiarized documents and parts efficiently, accurately and immediately by creating positive and various detectors.

  • PDF

Analysis of the factors related to the infection control practice of 119 emergency medical service providers based on the PRECEDE model (PRECEDE 모형에 기반한 119구급대원의 감염관리 수행 관련 요인 분석)

  • Yang, Yeunsoo;Kimm, Heejin;Jee, Sun Ha;Hong, Seok-Hwan;Han, Sang-Kyun
    • The Korean Journal of Emergency Medical Services
    • /
    • v.24 no.1
    • /
    • pp.7-24
    • /
    • 2020
  • Purpose: Emergency medical service (EMS) personnel are at high risk of spreading infection. In this study, we used the PRECEDE model to identify the knowledge, status, and barriers to infection control among Korean paramedics to provide basic infection control data. Methods: A total of 164 respondents were analyzed for the study. A questionnaire was administered and collected through an online self-response platform. Descriptive analysis, t-test, ANOVA, multiple regression, and logistic regression analyses were performed to determine infection control practices and associated factors using SAS 9.4. To identify the pathways and direct, indirect, total effects based on the PRECEDE model, we used AMOS 26.0. Results: Highly rated self-efficacy (OR 8.82, 95% CI: 3.23-24.09), awareness (OR 6.05, 95% CI: 2.06-17.72), and enabling factors (OR 3.23, 95% CI: 1.18-8.78) led to superior infection control. As a result of the structural model analysis, the highly rated enabling factors and awareness led to superior practice patterns. Conclusion: Practice is related to self-efficacy, awareness, and enabling factors; however, further research is needed to develop strategies for infection control. In particular, institutional arrangements are needed to improve the enabling factors. Improving infection control performance may lead to better infection control and enhanced protection of EMS personnel and patients against infection risks.

A Comparative Analysis of PKI Authentication and FIDO Authentication (PKI 인증과 FIDO 인증에 대한 비교 분석)

  • Park, Seungchul
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.21 no.7
    • /
    • pp.1411-1419
    • /
    • 2017
  • The two factor authentication capability, private key possession and key protection password knowledge, and the strong public key cryptography protocol of PKI authentication have largely contributed to the rapid construction of Internet transaction trusted infrastructure. The reusability of a certificate-based identity for every PKI site was another contribution factor of the spread of PKI authentication. Nevertheless, the PKI authentication has been criticised mainly for the cost of PKI construction, inconvenience of individual certificate management, and difficulties of password management. Recently FIDO authentication has received high attention as an alternative of the PKI authentication. The FIDO authentication is also based on the public key cryptography which provides strong authentication services, but it does not require individual certificate issuance and provides user-friendly and secure authentication services by integrating biometric technologies. The purpose of this paper is to concretely compare the PKI-authentication and FIDO-authentication and, based on the analysis result, to propose their corresponding applications.

How Protect Terrestrial Broadcast Contents? KBS' Systematic Strategy to Restrict Illegal Use (지상파 방송프로그램 어떻게 보호할 것인가? KBS의 방송프로그램 보호 전략)

  • Kim, Byung-Sun;Cho, In-Joon;Hahm, Sang-Jin;Lee, Keun-Sik
    • Proceedings of the Korean Society of Broadcast Engineers Conference
    • /
    • 2010.07a
    • /
    • pp.208-211
    • /
    • 2010
  • 2012년 지상파 방송은 아날로그 송출을 종료하고 디지털 방송으로 전환된다. 이렇게 전환되는 지상파 디지털 방송은 무료로 누구나 시청할 수 있는 보편적 서비스를 지향하기 때문에, 케이블TV, 위성TV, IPTV 등의 다른 매체와는 달리 기술적 보호조치 없이 방송되고 있다. 또한 DTV 방송프로그램은 원본과 똑같은 화질로 개인이 쉽게 저장할 수 있고 인터넷을 통하여 누구나 쉽게 접근이 가능하기 때문에, DTV 방송프로그램의 무단복제와 인터넷을 통한 불법재배포는 큰 문제점으로 대두되고 있다. 이러한 불법 대량배포는 방송프로그램의 저작권을 심각히 침해할 뿐만 아니라, 방송사의 고품질의 방송프로그램을 제작환경을 더욱 열악하게 만들고 있다. 또한 일반 사용자는 인식하지 못하는 사이에 인터넷을 통해 불법 콘텐츠를 사용하게 되는 악순환에 빠지게 된다. 이에 본 논문은 KBS에서 추진하고 있는 여러 콘텐츠 보호 기술들을 하나의 보호 고리로 연결하는 KBS 보호기술 체계를 소개하고자 한다. 이를 위하여 KBS는 아래의 3가지 보호 기술을 개발하여 체계적으로 연결하여 적용하고 있다. 첫째, 프로그램의 저작권과 배포 정보를 나타내는 프로그램 보호신호(PPI, Program Protection Information)와 워터마크를 방송 신호에 삽입하여 수신기에서의 프로그램 보호를 추진한다, 둘째, 인터넷 OSP(Online Service Provider)와의 제휴를 통하여 콘텐츠 필터링 기술을 도입하여 프로그램 불법 업로드, 다운로드를 방지한다. 셋째, KBS 저작물 인터넷 모니터링 시스템을 개발하여 인터넷 상의 불법 프로그램 배포정보를 획득하여 불법배포가 진행되는 사이트에 보호를 요청한다.

  • PDF

A Study on the Information Security System of Fin-Tech Business (핀테크 기업의 정보보안체계 관한 연구)

  • Kang, Young-Mo;Lee, Young-Geun;Kwon, Hyun-Jung;Han, Keyung-Seok;Chung, Hyun-Soo
    • Journal of Convergence Society for SMB
    • /
    • v.6 no.2
    • /
    • pp.19-24
    • /
    • 2016
  • A Study on the Information Security System of Fin-Tech Business In traditional electronic commerce, there have not been severe issues of trading information through documents in paper or the closed EDI. The scale of e-commerce has increased as internet develops, however, turning to the online e-commerce, which caused a number of issues such as authentication, information forgery, and non-repudiation between the parties. To prevent conflicts from such troubles and perform the post management, security technologies are applied throughout the process of e-commerce, certificates intervening. Lately, meanwhile, FinTech has been creating a sensation around the mobile payment service. Incidents of information leakage from card corporations and hackings imply the need of securing safety of the financial service. Development and evolution of FinTech industry must be accompanied by information protection. Therefore, this research aims to inquire into the information security system of leading FinTech company in a foreign country.

A Study on Security Capability of IDPS (침입 탐지 및 차단 시스템의 보안능력에 관한 연구)

  • Woo, Sung-Hee
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.49 no.4
    • /
    • pp.9-15
    • /
    • 2012
  • With the rise of internet and e-commerce, this is more applicable now than ever. People rely on computer networks to provide them with news, stock prices, e-mail and online shopping. People's credit card details, medical records and other personal information are stored on computer systems. Many companies have a web presence as an essential part of their business. The research community uses computer systems to undertake research and to disseminate findings. The integrity and availability of all these systems have to be protected against a number of threats. Amateur hackers, rival corporations, terrorists and even foreign governments have the motive and capability to carry out sophisticated attacks against computer systems. Therefore, the field of information and communication security has become vitally important to the safety and economic well being of society as a whole. This paper provides an overview of IDS and IPS, their functions, detection and analysis techniques. It also presents comparison of security capability and characteristics of IDPS techniques. This will make basis of IDPS(Intrusion Detection and Protection System) technology integration for a broad-based IDPS solutions

Encryption/Decryption and Enterprise Security Management of Stock Trading Packets (증권거래 패킷의 암복호화와 통합보안관제 분석)

  • Oh, Won-Gyeom;Park, Dae-Woo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2013.05a
    • /
    • pp.227-230
    • /
    • 2013
  • Financial transactions using a mobile terminal and the Internet is activated, it is a stock exchange enabled using mobile devices and the Internet. Koscom in charge of IT operations of securities transaction-related in (securities ISAC), to analyze the vulnerability of information security related to securities transactions, which corresponds to running the integrated security control system. Online stock trading is a subject to the Personal Information Protection Act, electronic systems of related, has been designated as the main information and communication infrastructure to, damage financial carelessness of the user, such as by hacking is expected to are. As a result, research on the key vulnerabilities of information security fields related to securities business cancer decoding of the Securities and Exchange packet, through the analysis of security events and integrated security control is needed.

  • PDF