• Title/Summary/Keyword: Personal Security

Search Result 1,613, Processing Time 0.024 seconds

A Study on Establishment and Management of Training Curriculum Integrated Information Network (훈련과정종합정보망 구축 및 운영 방안에 관한 연구)

  • Rha, Hyeon-Mi
    • Journal of Engineering Education Research
    • /
    • v.13 no.1
    • /
    • pp.78-86
    • /
    • 2010
  • Training Curriculum Integrated Information Network is allowed to searching the all curriculums and courses related with training but also is a one stop handling integrated learning system to cover a course registration, learning and analysis of learning performance. Through developing and managing the Training Curriculum Integrated Information Network, it is available to get the various curriculum thus it is for trainers able to enforce the self oriented course choice and then high quality of training could be proposed by the diverse training curriculums and competitions. To manage Training Curriculum Integrated Information Network more effectively, active public relations marketing activities, high reliable correct information service and rich contents are required. It is essential to manage the learner and learning contents supplier, stable financial resources, personal security issue and protecting a copyright of training curriculum to be a successful network system.

  • PDF

A Study on the Classification of Cyber Dysfunction and the Social Cognition Analysis in the Intelligent Information Society (지능정보사회의 사이버 역기능 분류와 사회적 인식 분석)

  • Lim, Gyoo Gun;Ahn, Jae Ik
    • Journal of Information Technology Services
    • /
    • v.19 no.1
    • /
    • pp.55-69
    • /
    • 2020
  • The Internet cyber space has become more important as it enters the intelligent information society of the 4th Industrial Revolution beyond the information age through the development of ICT, the expansion of personalized services through mobile and SNS, the development of IoT, big data, and artificial intelligence. The Internet has formed a new paradigm in human civilization, but it has focused only on the efficiency of its functions. Therefore, various side effects such as information divide, cyber terrorism, cyber violence, hacking, and personal information leakage are emerging. In this situation, facing the intelligent information society can lead to an uncontrollable chaos. Therefore, this study classifies the cyber dysfunction of intelligent information society and analyzes social cognition, suggests cyber dysfunction standard of intelligent information society, and examines the seriousness of dysfunction, and suggests technical research directions for future technologies and services. The dysfunctional classification of the intelligent information society was classified into five areas of cyber crime and terrorism, infringement of rights, intelligent information usage culture, intelligent information reliability, and social problems by FGI methodology. Based on the classification, the social perception of current and future cyber dysfunction severity was surveyed and it showed female is more sensitive than male about the dysfunction. A GAP analysis confirmed social awareness that the future society would be more serious about AI and cyber crime

Role Expectation on Spouse of Married Women in Korea (기성여성의 배우자에 대한 역할 기대)

  • Chang, Soon-Bok;Tak, Young-Ran
    • Women's Health Nursing
    • /
    • v.2 no.1
    • /
    • pp.40-52
    • /
    • 1996
  • This study sought to investigate the spousal role expectation of married childbearing women in the social milieu. The purpose of this study was to determine the spouse's role expectation which influences marital quality and marital satisfaction, thereby contributing to married women's psychological well-being and family health. Data collection was done in the prenatal care center of 212 early adult, married, middle class women living in the urban area by interview. Using content analysis, 701 answers were recoded by 12 categories of role expectation as family integration, health maintenance, father role taking, personal maturity, communication and respect, social confidence, division of domestic labor, relationship with extended family, recreation and hobby, social support for wife's self actualization, faith in sexual relationship, and security in economic status. The influence of the altered gender role in modern society, women's expectation is derived from somewhat masculinity and feminity in role expectation. The results are discussed in relation to prototype of gender role and relationships. These finding will assist nurse in the understanding and intervening the marital problem and women's health.

  • PDF

Development of OPAMP in an A/D Converter for Pressure Measurement (압력측정용 A/D변환기의 OPAMP 개발)

  • Chai, Yong-Yoong
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.5 no.4
    • /
    • pp.435-442
    • /
    • 2010
  • The efficiency of the car's wiper blade has a great contribution to the guarantee of security. To guarantee the wiper blade's ability of getting rid of dust sticking on the glass surface, the qualities of lubricant, durability, heat resistant, low temperature, ozone resistant, chemical resistant must be good as well as it being noiseless. Like this, in order to improve the wiper's skills, it is essential to have a system that is able to assess and analyse the properties of the wiper. In this paper, to create a system that measures the car's wiper pressure, an analog/digital converter (ADC) that receives signals generated from the pressure sensor and transmits it to a personal computer is proposed. The designed ADC is one of the pipeline ADCs that can obtain fast movement rate and also a structure that can optimize the entire system's area as well as the consumption of strength.

Assessment Criteria of Information Security Training Centers for Personnels of Educational Institutions (교육기관 종사자 대상의 정보보호교육센터 평가를 위한 지표 개발)

  • Jun, Hyo-Jung;Kim, Tae-Sung;Kim, Yeon-Bok
    • The Journal of the Korea Contents Association
    • /
    • v.13 no.12
    • /
    • pp.455-462
    • /
    • 2013
  • As the protection of personal information has been appeared as a main issue in educational institutions, the Ministry of Education, Science and Technology (currently the Ministry of Education) opened InfoSec Training Center to train personnels of educational institutions in 2012. To achieve the purpose of the establishment of the centers, each center needs to identify training target, make training roadmap and design specialized training curriculum. The paper aims to develop criteria to evaluate training and operating levels of InfoSec Training Centers using AHP.

Individual, Family and Industrial Factors Related to Injured Workers' Motivation for Change : Application of the Transtheoretical Model (산업재해 근로자의 변화동기에 영향을 미치는 개인, 가족, 산업재해 요인 : 범이론 모형의 적용)

  • Song, Moon-Hee;Kwon, Hee-Kyung
    • The Journal of the Korea Contents Association
    • /
    • v.17 no.2
    • /
    • pp.258-268
    • /
    • 2017
  • The purpose of this research was to examine the factors affecting motivation for change of injured workers. Data from 305 injured workers were anlayzed using hierarchical regression Factors associated with injured workers' motivation for change were: multiple psychological security, acceptability of injury, and independence at personal level, family support at family level, and perceptive severity of injury, job, and return to job.

A Lightweight Authentication Mechanism for Acknowledgment Frame in IEEE 802.15.4 (IEEE 802.15.4에서 확인 프레임을 위한 경량 인증 메커니즘)

  • Heo, Joon;Hong, Choong-Seon
    • Journal of KIISE:Information Networking
    • /
    • v.34 no.3
    • /
    • pp.175-185
    • /
    • 2007
  • In IEEE 802.15.4 (Low-Rate Wireless Personal Area Network) specification, a successful reception and validation of a data or MAC command frame can be confirmed with an acknowledgment. However, the specification does not support security for acknowledgment frame; the lack of a MAC covering acknowledgments allows an adversary to forge an acknowledgment for any frame. This paper proposes an identity authentication mechanism at the link layer for acknowledgment frame in IEEE 802.15.4 network. With the proposed mechanism there is only three bits for authentication, which can greatly reduce overhead of device. The encrypted bit stream for identity authentication will be transmitted to device by coordinator within association process. Statistical method and simulation results prove that our mechanism is successful in handling MAC layer attack.

Availability Verification of Integration OTP Framework using Biometrics Information (바이오매트릭스 정보를 이용한 모바일 기반의 통합 OTP 프레임워크의 유효성 검증)

  • Cha, Byung-Rae;Kim, Nam-Ho;Kim, Jong-Won
    • Journal of Advanced Navigation Technology
    • /
    • v.15 no.1
    • /
    • pp.39-53
    • /
    • 2011
  • As the applications within Mobile devices becoming more extensive, the mobile communication security issues of these applications and researches are appearing to be the most important concern. In this paper, we propose new integration OTP framework technique which uses the fingerprint and voice features of biometrics in order to generate Mobile One Time Passwords (OTPs) Token. The fingerprint and voice are considered to be one of the powerful personal authentication factors of biometrics and it can be used for generating variable passwords based on mobile environments for one time use. However, we performed a simulation of homomorphic variability of fingerprint and voice feature points using dendrogram and distribution of fingerprint and voice feature points for proposed password generation method, and verified validation of availability.

An Investigative Treatise on the Success Story of Women Entrepreneurs in Tribal Areas of India

  • POTLURI, Rajasekhara Mouly;JOHNSON, Sophia;ULLAH, Rahat
    • The Journal of Industrial Distribution & Business
    • /
    • v.11 no.9
    • /
    • pp.17-24
    • /
    • 2020
  • Purpose: The purpose of this research is to explore the continuum of reasons and skills employed by tribal Indian women entrepreneurs to establish their successful businesses in terrorist affected areas. Research design, data and methodology: After an extensive literature review on women's entrepreneurship and their situations in disturbed areas, a qualitative research method was applied, and researchers conducted well-structured personal interviews to collect data from fifty respondents selected by using random and convenience sampling. Results: This study has identified the range of reasons for the successes of tribal women entrepreneurs. These are strict compliance with tribal culture and restrictions imposed by different stakeholders and the establishment of social networks and support from local communities and with their indefatigable and indomitable perseverance to proffer basic sustenance for their families. Conclusions: A minimum sample was selected from the Andhra-Odisha Border (AOB) areas due to security concerns. The research depicts the tribal Indian women entrepreneurs' grit and remorseless nature in overcoming impediments from the socio-cultural, economic, political, and legal framework of the country. This research is a gallant effort taken up by the authors, which is the first of its kind to visit as well as to conduct primary research in disturbed areas like the Andhra-Odisha Border in India.

A Study on Value Systems of Police Officers in Korea (우리나라 경찰관의 가치관에 대한 연구)

  • Sin, Seong-Won
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2009.05a
    • /
    • pp.543-548
    • /
    • 2009
  • The aim of this study is to make use of the theory of human values developed by Rokeach as a theoretical framework to evaluate value preferences among police officers in Korea and have a thorough grasp of the point of sameness and difference with two studies. In this study, I analyze data and make a comparative study of values with preceding studies. I find that police officers regard personal values as more important than social values. A noticeable finding of this study is the middle ranking of the value of equality among police officers. It's different result with other studies. And, the value of national security is the low ranking among police officers. It's the same result with preceding studies.

  • PDF