• 제목/요약/키워드: Policy Applications

검색결과 806건 처리시간 0.024초

정보통신망법 스팸 규제 개선 방안 연구 (Analysis of Anti-SPAM Regulations in Korean IT Law)

  • 김성준;김범수
    • 한국IT서비스학회지
    • /
    • 제10권1호
    • /
    • pp.21-34
    • /
    • 2011
  • Spam refers to any unwanted or unauthorized commercial messages. Spam may violate individuals' privacy or other personal rights. Spam often overloads network traffic, wastes individuals' time, lowers productivity and quality of life, and limits the trustworthiness of Internet businesses. As the use of mobile messaging services and social networking services both on mobile communication networks and on the Internet increase, newer and more complex types of IT applications and services are often used as new means of spam. In this research, the characteristics and impact of new and future forms of spam, and anti-spam related policies and regulations are surveyed. To improve the effectiveness of anti-spam policies and regulations in Korea, adding a definition of spam in the law, changing policies to focus on the 'type of services' rather on the medium of transmission, and redefining the scope of 'commercial purposes' in Korean law are suggested.

연산 특성을 고려한 향상된 적응적 가비지 컬렉션 정책 (An Advanced Adaptive Garbage Collection Policy by Considering the Operation Characteristics)

  • 박송화;이정훈;이원오;김현우
    • 대한임베디드공학회논문지
    • /
    • 제13권5호
    • /
    • pp.269-277
    • /
    • 2018
  • NAND flash memory has widely been used because of non-volatility, low power consumption and fast access time. However, it suffers from inability to provide update-in-place and the erase cycle is limited. The unit of read/write operation is a page and the unit of erase operation is a block. Moreover erase operation is slower than other operations. We proposed the Adaptive Garbage Collection (called "AGC") policy which focuses on not only reducing garbage collection process time for real-time guarantee but also wear-leveling for a flash memory lifetime. The AGC performs better than Cost-benefit policy and Greedy policy. But the AGC does not consider the operation characteristics. So we proposed the Advanced Adaptive Garbage Collection (called "A-AGC") policy which considers the page write operation count and block erase operation count. The A-AGC reduces the write operations by considering the data update frequency and update data size. Also, it reduces the erase operations by considering the file fragmentation. We implemented the A-AGC policy and measured the performance compared with the AGC policy. Simulation results show that the A-AGC policy performs better than AGC, specially for append operation.

금융회사 정보보안정책의 위반에 영향을 주는 요인 연구 : 지각된 고객정보 민감도에 따른 조절효과 (A Study on the Factors for Violation of Information Security Policy in Financial Companies : Moderating Effects of Perceived Customer Information Sensitivity)

  • 이정하;이상용
    • Journal of Information Technology Applications and Management
    • /
    • 제22권4호
    • /
    • pp.225-251
    • /
    • 2015
  • This paper analyzed factors for employees to violate information security policy in financial companies based on the theory of reasoned action (TRA), general deterrence theory (GDT), and information security awareness and moderating effects of perceived sensitivity of customer information. Using the 376 samples that were collected through both online and offline surveys, statistical tests were performed. We found that the perceived severity of sanction and information security policy support to information policy violation attitude and subjective norm but the perceived certainty of sanction and general information security awareness support to only subjective norm. Also, the moderating effects of perceived sensitivity of customer information against information policy violation attitude and subjective norm were supported. Academic implications of this study are expected to be the basis for future research on information security policy violations of financial companies; Employees' perceived sanctions and information security policy awareness have an impact on the subjective norm significantly. Practical implications are that it can provide a guide to establish information security management strategies for information security compliance; when implementing information security awareness training for employees to deter violations by emphasizing the sensitivity of customer information, a company should make their employees recognize that the customer information is very sensitive data.

소프트웨어정의네트워크 기반의 서비스 오버레이 네트워킹을 위한 네트워크 정책 제어기 (A Centralized Network Policy Controller for SDN-Based Service Overlay Networking)

  • 조진용;이소연;공정욱;김종원
    • 한국통신학회논문지
    • /
    • 제38B권4호
    • /
    • pp.266-278
    • /
    • 2013
  • 본 논문은 인터넷과 같은 다중제공자(multi-provider) 네트워크 환경 하에서 패킷 플로우를 효과적으로 제어하기 위한 SDN(Software Defined Networking) 기반의 정책 제어기를 소개한다. 제안된 정책 제어기는 네트워크 가시성 정보를 이용해 가상링크 및 가상포트 등을 직관적으로 제어함으로써 효과적인 서비스 오버레이 네트워킹(service overlay networking) 환경을 실현한다. 또한, 논리적으로 구분된 다수의 주문형 가상망을 신속히 구성하고 동적으로 관리함으로써 응용에 최적화된 네트워킹 환경을 사용자에게 제공한다. 본 논문에서는 정책 제어기의 구조 및 특징을 소개한 후, 멀티캐스트를 위한 두 가지 서비스 응용을 예시한다. 또한, 해당 응용들을 이용한 네트워크 서비스의 구성 시간을 성능 평가함으로써 정책 제어기의 적용 가능성을 확인한다.

은행 IT 인력의 정보보호 정책 준수에 영향을 미치는 정보보호 대책에 관한 연구 (A Study on the Information Security Measures Influencing Information Security Policy Compliance Intentions of IT Personnel of Banks)

  • 심준보;황경태
    • Journal of Information Technology Applications and Management
    • /
    • 제22권2호
    • /
    • pp.171-199
    • /
    • 2015
  • This study proposes the practical information security measures that help IT personnel of banks comply the information security policy. The research model of the study is composed of independent variables (clarity and comprehensiveness of policy, penalty, dedicated security organization, audit, training and education program, and top management support), a dependent variable (information security policy compliance intention), and moderating variables (age and gender). Analyses results show that the information security measures except 'clarity of policy' and 'training and education program' are proven to affect the 'information security policy compliance intention.' In case of moderating variables, age moderated the relationship between top management support and compliance intention, but gender does not show any moderating effect at all. This study analyzes information security measures based solely on the perception of the respondents. Future study may introduce more objective measurement methods such as systematically analyzing the contents of the information security measures instead of asking the respondents' perception. In addition, this study analyzes intention of employees rather than the actual behavior. Future research may analyze the relationship between intention and actual behavior and the factors affecting the relationship.

Optimal Software Release Policy for Random Cost Model

  • Kim, Hee-Soo;Shin, Mi-Young;Park, Dong-Ho
    • Communications for Statistical Applications and Methods
    • /
    • 제12권3호
    • /
    • pp.673-682
    • /
    • 2005
  • In this paper, we generalize the software reliability growth model by assuming that the testing cost and maintenance cost are random and adopt the Bayesian approach to determine the optimal software release time. Numerical examples are provided to illustrate the Bayesian method for certain parametric models.

Optimal replacement strategy under repair warranty with age-dependent minimal repair cost

  • Jung, K.M.
    • International Journal of Reliability and Applications
    • /
    • 제12권2호
    • /
    • pp.117-122
    • /
    • 2011
  • In this paper, we suggest the optimal replacement policy following the expiration of repair warranty when the cost of minimal repair depends on the age of system. To do so, we first explain the replacement model under repair warranty. And then the optimal replacement policy following the expiration of repair warranty is discussed from the user's point of view. The criterion used to determine the optimality of the replacement model is the expected cost rate per unit time, which is obtained from the expected cycle length and the expected total cost for our replacement model. The numerical examples are given for illustrative purpose.

  • PDF

여러 임베디드 장치의 통합 관리를 위한 프레임워크 개발 (A Framework Development for Total Management of Various Embedded Devices)

  • 배현철;김상욱
    • 대한임베디드공학회논문지
    • /
    • 제1권2호
    • /
    • pp.56-63
    • /
    • 2006
  • In this paper, we propose the integrated security management framework supporting the trust for the ubiquitous environments. The proposed framework provides the gathering and analysis of the security related information including the location of mobile device and then dynamically configures the security policy and adopts them. More specially, it supports the authentication and delegation service to support the trusted security management for the ubiquitous networks. This system also provides the visible management tools to give the convenient view for network administrator.

  • PDF