• Title/Summary/Keyword: Party School

Search Result 265, Processing Time 0.028 seconds

New Multi-Party Information Services in the Medical Industry: A Case Study on HNIP's Baro-One Services (의료 산업 융합 서비스 구현의 성과와 시사점: HNIP의 바로ONE 서비스를 중심으로)

  • Kim, Beom-Soo;Goo, Mi-Kyung
    • 한국IT서비스학회:학술대회논문집
    • /
    • 2010.05a
    • /
    • pp.9-16
    • /
    • 2010
  • 대한민국의 의료보험은 크게 국가에서 운영하는 국민건강보험과 국민이 선택적으로 가입하는 민간의료보험으로 나눌 수 있다. 국민건강보험과는 달리 민간의료보험 청구와 정산은 각 보험사별로 이루어지고, 또한 그 절차도 각자 독자적인 방법과 순서를 따라 진행되어 보험가입자의 불편 해소 및 업무의 효과적 추진을 위한 방안이 모색되어왔다. 이에 민간의료보헙협의체(KPPO)에서는 2009년부터 HNIP의 바로One 서비스를 통하여 병원, 보험회사, 보험가입자를 연계하는 보험 청구 및 지원서비스를 개발하여 운영하고 있다. 의료기관-보험사-보험가입자를 연계하는 전략적 협력 융합 서비스 구축을 토대로, 기존에 서로 연계되지 않고 오프라인으로 진행되던 보험금 청구 프로세스를 효과적이고 체계적인 관계로 발전시켰다. 그리고, 다자간의 새로운 정보 유통망의 구축 및 융합 서비스를 통하여 업무의 표준화, 다자간의 관련 업무 프로세스의 효율화를 도모하였다. 이러한 융합서비스를 통하여 규모의 경제, 고객의 편의 및 만족 증대, 기업의 사회적 책임 달성, 신뢰의 구축 등 융합서비스 구축의 다양한 시너지효과를 기대한다.

  • PDF

A Survey about Consensus Algorithms Used in Blockchain

  • Nguyen, Giang-Truong;Kim, Kyungbaek
    • Journal of Information Processing Systems
    • /
    • v.14 no.1
    • /
    • pp.101-128
    • /
    • 2018
  • Thanks to its potential in many applications, Blockchain has recently been nominated as one of the technologies exciting intense attention. Blockchain has solved the problem of changing the original low-trust centralized ledger held by a single third-party, to a high-trust decentralized form held by different entities, or in other words, verifying nodes. The key contribution of the work of Blockchain is the consensus algorithm, which decides how agreement is made to append a new block between all nodes in the verifying network. Blockchain algorithms can be categorized into two main groups. The first group is proof-based consensus, which requires the nodes joining the verifying network to show that they are more qualified than the others to do the appending work. The second group is voting-based consensus, which requires nodes in the network to exchange their results of verifying a new block or transaction, before making the final decision. In this paper, we present a review of the Blockchain consensus algorithms that have been researched and that are being applied in some well-known applications at this time.

Feature Selection to Mine Joint Features from High-dimension Space for Android Malware Detection

  • Xu, Yanping;Wu, Chunhua;Zheng, Kangfeng;Niu, Xinxin;Lu, Tianling
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.9
    • /
    • pp.4658-4679
    • /
    • 2017
  • Android is now the most popular smartphone platform and remains rapid growth. There are huge number of sensitive privacy information stored in Android devices. Kinds of methods have been proposed to detect Android malicious applications and protect the privacy information. In this work, we focus on extracting the fine-grained features to maximize the information of Android malware detection, and selecting the least joint features to minimize the number of features. Firstly, permissions and APIs, not only from Android permissions and SDK APIs but also from the developer-defined permissions and third-party library APIs, are extracted as features from the decompiled source codes. Secondly, feature selection methods, including information gain (IG), regularization and particle swarm optimization (PSO) algorithms, are used to analyze and utilize the correlation between the features to eliminate the redundant data, reduce the feature dimension and mine the useful joint features. Furthermore, regularization and PSO are integrated to create a new joint feature mining method. Experiment results show that the joint feature mining method can utilize the advantages of regularization and PSO, and ensure good performance and efficiency for Android malware detection.

A Privacy-Preserving Health Data Aggregation Scheme

  • Liu, Yining;Liu, Gao;Cheng, Chi;Xia, Zhe;Shen, Jian
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.8
    • /
    • pp.3852-3864
    • /
    • 2016
  • Patients' health data is very sensitive and the access to individual's health data should be strictly restricted. However, many data consumers may need to use the aggregated health data. For example, the insurance companies needs to use this data to setup the premium level for health insurances. Therefore, privacy-preserving data aggregation solutions for health data have both theoretical importance and application potentials. In this paper, we propose a privacy-preserving health data aggregation scheme using differential privacy. In our scheme, patients' health data are aggregated by the local healthcare center before it is used by data comsumers, and this prevents individual's data from being leaked. Moreover, compared with the existing schemes in the literature, our work enjoys two additional benefits: 1) it not only resists many well known attacks in the open wireless networks, but also achieves the resilience against the human-factor-aware differential aggregation attack; 2) no trusted third party is employed in our proposed scheme, hence it achieves the robustness property and it does not suffer the single point failure problem.

Combinatorial Auction-Based Two-Stage Matching Mechanism for Mobile Data Offloading

  • Wang, Gang;Yang, Zhao;Yuan, Cangzhou;Liu, Peizhen
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.6
    • /
    • pp.2811-2830
    • /
    • 2017
  • In this paper, we study the problem of mobile data offloading for a network that contains multiple mobile network operators (MNOs), multiple WiFi or femtocell access points (APs) and multiple mobile users (MUs). MNOs offload their subscribed MUs' data traffic by leasing the unused Internet connection bandwidth of third party APs. We propose a combinatorial auction-based two-stage matching mechanism comprised of MU-AP matching and AP-MNO matching. The MU-AP matching is designed to match the MUs to APs in order to maximize the total offloading data traffic and achieve better MU satisfaction. Conversely, for AP-MNO matching, MNOs compete for APs' service using the Nash bargaining solution (NBS) and the Vickrey auction theories and, in turn, APs will receive monetary compensation. We demonstrated that the proposed mechanism converges to a distributed stable matching result. Numerical results demonstrate that the proposed algorithm well capture the tradeoff among the total data traffic, social welfare and the QoS of MUs compared to other schemes. Moreover, the proposed mechanism can considerably offload the total data traffic and improve the network social welfare with less computation complexity and communication overhead.

An Enhanced Privacy-Aware Authentication Scheme for Distributed Mobile Cloud Computing Services

  • Xiong, Ling;Peng, Daiyuan;Peng, Tu;Liang, Hongbin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.12
    • /
    • pp.6169-6187
    • /
    • 2017
  • With the fast growth of mobile services, Mobile Cloud Computing(MCC) has gained a great deal of attention from researchers in the academic and industrial field. User authentication and privacy are significant issues in MCC environment. Recently, Tsai and Lo proposed a privacy-aware authentication scheme for distributed MCC services, which claimed to support mutual authentication and user anonymity. However, Irshad et.al. pointed out this scheme cannot achieve desired security goals and improved it. Unfortunately, this paper shall show that security features of Irshad et.al.'s scheme are achieved at the price of multiple time-consuming operations, such as three bilinear pairing operations, one map-to-point hash function operation, etc. Besides, it still suffers from two minor design flaws, including incapability of achieving three-factor security and no user revocation and re-registration. To address these issues, an enhanced and provably secure authentication scheme for distributed MCC services will be designed in this work. The proposed scheme can meet all desirable security requirements and is able to resist against various kinds of attacks. Moreover, compared with previously proposed schemes, the proposed scheme provides more security features while achieving lower computation and communication costs.

Cheonan Frigate Incident and Yeonpyeongdo Shelling by North Korea: Changing Public Opinion; Strategic Consideration (천안함·연평도 도발 이후 국민의식 변화와 대책)

  • Sohn, Kwang-Joo
    • Strategy21
    • /
    • s.34
    • /
    • pp.93-127
    • /
    • 2014
  • During the four years following the sinking of the Cheonan frigate in 2010, the South Korean public opinion has seen changes in four basic ways. First, public polls with respect to the cause of the sinking show that 70% of the people consider North Korea as the culprit, while 20% maintain that it was not an act carried out by North Korea. Second, the opinions relative to the cause of the incident seem to vary according to age difference, generational difference, and educational difference. From 2011, people in their 20s showed 10% increase in regarding North Korea as the responsible party. People in their 30s and 40s still have a tendency not to believe the result of the investigation carried out by the combined military and civilian group. Third, the most prominent issue that arose aftermath of the Cheonan incident is the fact that political inclination and policy preference are influencing the scientific determination of the cause. In other words, scientific and logical approach is lacking in the process of determining the factual basis for the cause. This process is compromised by the inability of the parties concerned in sorting out what is objective and what is personal opinion. This confused state of affairs makes it difficult to carry on a healthy, productive debate. Fourth, rumors, propaganda, and disinformation generated by pro-North Korea Labor Party groups in the internet and SNS are causing considerable impact in forming the public opinion. Proposed Strategy 1. The administration can ascertain public trust by accurately determining the nature of the provocation based on accurate information in the early stages of the incident. 2. Education in scientific, logical, rational methodologyis needed at home, school, and workplace in order toenhance the people's ability to seek factual truths. 3. In secondary education, the values of freedom, human rights, democracy, and market economy must be reinforced. 4. It is necessary for the educational system to teach the facts of North Korea just as they are. 5. Fundamental strength of free democratic system must be reinforced. The conservative, mainstream powers must recognize the importance of self-sacrifice and societal duties. The progressive political parties must sever themselves from those groups that take instructions from North Korea's Labor Party. The progressives must pursue values that are based on fundamental human rights for all. 6. Korean unification led by South Korea is the genuine means to achieve peace in a nuclear-free Korean peninsula. The administration must recognize that this unification initiative is the beginning of the common peace and prosperity in the Far East Asia, and must actively pursue international cooperation in this regard.

A Study on the Factors Affecting the Intention to Adapt PMO in Public Sectors (공공부문 PMO도입 의도에 영향을 미치는 요인에 관한 연구)

  • Suh, Bai-Sun;Hwang, Gee-Hyun;Kim, Sung-Kun
    • Journal of Digital Convergence
    • /
    • v.12 no.5
    • /
    • pp.159-169
    • /
    • 2014
  • The purpose of PMO (Project Management Office) systems implementation in public sectors is to prevent the potential risks of IT projects with the project management for the electronic government, and to improve the quality of the project. As a leading country in software areas, PMO systems will play an important role to lead the best smart electronic government in the global world. This study suggested an operating model of PMO systems in public sectors in advance to use the PMO systems in public sectors by conducting a research investigating the key organizational role as the major factor which affects the behavioral intention of PMO systems implementation. We tested a hypothesis that Effort Expectancy factors and Facilitating Condition among the interested party groups will influence the Behavioral Intention of PMO systems implementation, and the result have given no difference to the Control Effect among the interested party groups. This study have shown that the interested party groups have common recognition about the Behavioral Intention of PMO systems implementation in the public sectors.

Antecedents of the Independence of Standing Auditor: An Empirical Analysis in the Perspective of Ownership Structure (전문경영인의 지분율과 소유구조상의 특성이 상근감사의 독립성에 미치는 영향에 대한 연구)

  • Lee, Eun-Hwa;Yoo, Jae-Wook
    • Management & Information Systems Review
    • /
    • v.38 no.3
    • /
    • pp.35-53
    • /
    • 2019
  • A standing auditor can perform the monitoring and control activities for the opportunistic behaviors of top manager. However, for this purpose she/he must have the independence from top manager. Thus, this study is designed to analyze the factors that influences the independence of standing auditor. The independence of standing auditor as dependent variable was measured in terms of school and company ties to top manager. The relationship between the shareholding of professional top manager and independence of standing auditor, and the moderating effects of the shareholdings of related-party, institutional investors, and foreign investors were examined by implementing multiple regression and conditional moderating effect analyses. The findings present a negative relationship between the shareholding of professional top managers and the independence of standing auditor. They also reveal a positive moderating effect of the shareholding of related-party on that relationship. On the other hand, the shareholdings of foreign and institutional investors did not significant change the relationship between the shareholding of professional top manager and the independence of standing auditor. The findings imply that professional manager might be able to lower the controlling mechanism by appointing a standing auditor having low independence. Related-party as an internal control mechanism might be beneficial to reduce this effect while institutional investors or foreign investors as an external control mechanisms might not. This is the first study that examine the antecedents of the independence of standing auditor in terms of the characteristics of ownership structure. It provides a guideline for selecting an effective standing auditor with the consideration for ownership structure.

Malicious App Discrimination Mechanism by Measuring Sequence Similarity of Kernel Layer Events on Executing Mobile App (모바일 앱 실행시 커널 계층 이벤트 시퀀스 유사도 측정을 통한 악성 앱 판별 기법)

  • Lee, Hyung-Woo
    • Journal of the Korea Convergence Society
    • /
    • v.8 no.4
    • /
    • pp.25-36
    • /
    • 2017
  • As smartphone users have increased in recent years, various applications have been developed and used especially for Android-based mobile devices. However, malicious applications developed by attackers for malicious purposes are also distributed through 3rd party open markets, and damage such as leakage of personal information or financial information of users in mobile terminals is continuously increasing. Therefore, to prevent this, a method is needed to distinguish malicious apps from normal apps for Android-based mobile terminal users. In this paper, we analyze the existing researches that detect malicious apps by extracting the system call events that occur when the app is executed. Based on this, we propose a technique to identify malicious apps by analyzing the sequence similarity of kernel layer events occurring in the process of running an app on commercial Android mobile devices.