• 제목/요약/키워드: Protection of Research Information

검색결과 1,326건 처리시간 0.024초

Personal Information Management System (PIMS) improvement research using cloud computing security (개인정보관리체계계(PIMS)를 이용한 클라우드컴퓨팅 개인정보 보안 개선 방안 연구)

  • Jeong, Hyein;Kim, Seongjun
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • 제12권3호
    • /
    • pp.133-155
    • /
    • 2016
  • Recently, in the adoption of cloud computing are emerging as locations are key requirements of security and privacy, at home and abroad, several organizations recognize the importance of privacy in cloud computing environments and research-based transcription and systematic approach in progress have. The purpose of this study was to recognize the importance of privacy in the cloud computing environment based on personal information security methodology to the security of cloud computing, cloud computing, users must be verified, empirical research on the improvement plan. Therefore, for existing users of enhanced security in cloud computing security consisted framework of existing cloud computing environments. Personal information protection management system: This is important to strengthen security for existing users of cloud computing security through a variety of personal information security methodology and lead to positive word-of-mouth to create and foster the cloud industry ubiquitous expression, working environments.

A Study on the Evaluation Consulting Methodology of Important Information Communication Base Facility (주요 정보통신기반시설의 평가컨설팅 방법론에 대한 연구)

  • Lee, Young-Ro;Cho, Jae-Wan
    • Journal of Digital Convergence
    • /
    • 제5권1호
    • /
    • pp.55-68
    • /
    • 2007
  • It soaks but 2001 July information communication base step law enforcement and the Enforcement Ordinance are published to follow, in order to support the establishment of evaluation and protective measure in order the vulnerability analysis against the facility of the agency which manages an important information communication base hour opinion to designate information protection specialty enterprise. As information protection specialty enterprise being revealed evacuation laboratory back 12 enterprises from information communication department become designation as the consulting enterprise and they do an enterprise activity actively. It follows in diffusion of the IT and information reconciliation level the other side where our country belongs in the world-wide first group, the research against the disfunction plan of preparation comparison the fact that law it is come negligently all actuality. The network as it will give management coat fatal effect even at obstacle occurrence hour of instant for of case and IT facility of the cyber transactions which leads, in the future there to be to corporate management, there is a possibility the stable civil official of information Facilities for communications very seeing in the portion which is important. Present condition and important propulsion contents of information communication base step law enforcement after, against a vulnerability analysis of information protection relation field and evaluation consulting methodological application situation to sleep it researches from the dissertation which it sees consequently and it does.

  • PDF

A Study on the Improvement of Information Security Model for Precision Medicine Hospital Information System(P-HIS) (정밀의료 병원정보시스템(P-HIS) 정보보호모델 개선 방안에 관한 연구)

  • Dong-Won Kim
    • Convergence Security Journal
    • /
    • 제23권1호
    • /
    • pp.79-87
    • /
    • 2023
  • Precision Medicine, which utilizes personal health information, genetic information, clinical information, etc., is growing as the next-generation medical industry. In Korea, medical institutions and information communication companies have coll aborated to provide cloud-based Precision Medicine Hospital Information Systems (P-HIS) to about 90 primary medical ins titutions over the past five years, and plan to continue promoting and expanding it to primary and secondary medical insti tutions for the next four years. Precision medicine is directly related to human health and life, making information protecti on and healthcare information protection very important. Therefore, this paper analyzes the preliminary research on inform ation protection models that can be utilized in cloud-based Precision Medicine Hospital Information Systems and ultimately proposes research on ways to improve information protection in P-HIS.

A Study on the Information Protection Intention of Digital Healthcare Service Providers (디지털 헬스케어 서비스 제공자의 정보보호의도에 관한 연구)

  • Yang, Chang-Gyu
    • Asia-Pacific Journal of Business Venturing and Entrepreneurship
    • /
    • 제17권4호
    • /
    • pp.163-172
    • /
    • 2022
  • This study investigates the IPI (Information Protection Intention) of DHS (Digital Healthcare Service) providers by introducing PMT (Protection Motivation Theory). This study examines the effects of protection motivation, such as threat appraisal and coping appraisal, on IPI, such as ICI(Induction Control Intention) and SDI(Self Defense Intention). The research model, based on the PMT, adopted severity, vulnerability, reaction efficacy and self-efficacy as independent variables. The research model was validated through quantitative research, a survey of 222 DHS providers in South Korea, using structural equation modeling. The results show that (1) a clear awareness of the consequences of security threats increases the understanding of DHS providers on the severity of closure of healthcare information, and thus may decreases abuse of DHS by providers; (2) user confidence and satisfaction on the security system may make them be confident that they can handle the closure of healthcare information by themselves; and (3) although DHS providers are realizing the consequences of closure of healthcare information, they think that they are unlikely to encounter such situations. As a result of this study, venture companies that provide DHS need to provide contents that can continuously increase providers' security level in order to increase providers' information protection intention. It suggests that IPI is important through trust of healthcare service providers.

Research about Evaluation Scoping Analysis for Composition TOE (합성 TOE에 대한 평가범위 분석에 관한연구)

  • Kim, Seok-Soo
    • Convergence Security Journal
    • /
    • 제7권3호
    • /
    • pp.45-50
    • /
    • 2007
  • The creation of information protection system which solely do detection and solely do prevention will have less protection for information. This research paper is a study of Information Protection System which aims to fulfill security reeds in a more powerful way by combining detection and prevention that is in the context of TOE via ISO/IEC TR 19791. The Creation of Composition ST will be a big help in the establishment of security policy.

  • PDF

The effect of dental hygiene students' professional self-concept and ethical propensity on the willingness to performance of private patient information protection (치위생(학)과 학생들의 전문직 자아개념과 윤리적 성향이 환자 개인정보보호 실천의지에 미치는 영향)

  • Kim, Seon-Yeong
    • Journal of Korean society of Dental Hygiene
    • /
    • 제22권5호
    • /
    • pp.443-450
    • /
    • 2022
  • Objectives: This study was conducted to investigate the effect of professional self-concept and ethical awareness of dental hygiene (department) students attending a university located in Gwangju and Jeollanam-do on patients' willingness to protect personal information. Methods: Professional self-concept, ethical disposition, and patients' personal information protection intention according to general characteristics were analyzed using t-tests and one-way ANOVA. After confirming the correlation through Pearson's correlation analysis, the effect on the patient's personal information protection intention was confirmed using multiple regression analysis. Results: Professional self-concept, ethical disposition, and the patients' willingness to protect personal information all showed positive correlations. The higher the communication skills of professional self-concept and the higher the idealism of ethical orientation, the higher the patients' willingness to protect personal information. Conclusions: This study, ascertained the effect of dental hygiene students' professional self-concept and ethical consciousness on patients' personal information protection practices. The results suggest that it is necessary to develop an educational program that can enhance the practice of dental hygienists to protect patients' personal information, and to develop and conduct continuous policy development and research.

Automatic Classification of Objectionable Videos Based on GoF Feature (GoF 특징을 이용한 유해 동영상 자동 분류)

  • Lee, Seung-Min;Lee, Ho-Gyun;Nam, Taek-Yong
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 한국정보처리학회 2005년도 추계학술발표대회 및 정기총회
    • /
    • pp.197-200
    • /
    • 2005
  • 본 논문은 유해한 동영상을 실시간으로 분석하고 차단하기 위하여, 동영상의 비주얼 특징으로서 그룹 프레임(Group of Frame) 특징을 추출하여 SVM 학습모델을 활용하는 유해 동영상 분류에 관한 것이다. 지금까지 동영상 분류에 관한 연구는 주로 입력 동영상을 뉴스, 스포츠, 영화, 뮤직 비디오, 상업 비디오 등 사전에 정의한 몇 개의 장르에 자동으로 할당하는 기술이었다. 그러나 이러한 분류 기술은 미리 정의한 장르에 따른 일반적인 분류 모델을 사용하기 때문에 분류의 정확도가 높지 않다. 따라서, 유해 동영상을 실시간으로 자동 분류하기 위해서는, 신속하고 효과적인 동영상 내용분석에 적합한 유해 동영상 특화의 특징 추출과 분류 모델 연구가 필요하다. 본 논문에서는 유해 동영상에 대하여 신속하고, 정확한 분류를 위하여 유해 동영상의 대표 특징으로서 그룹프레임 특징을 정의하고, 이를 추출하여 SVM 학습 모델을 생성하고 분류에 활용하는 매우 높은 성능의 분석 방법을 제시하였다. 이는 최근 인터넷 뿐만 아니라 다양한 매체를 통하여 급속도로 번지고 있는 유해 동영상 차단 분야에 적극 활용될 수 있을 것으로 기대된다.

  • PDF

Enhanced Electron Emission of Carbon Nanotube Arrays Grown Using the Resist-Protection-assisted Positioning Technique

  • Ryu, Je-Hwang;Kim, Ki-Seo;Yu, Yi-Yin;Lee, Chang-Seok;Lee, Yi-Sang;Jang, Jin;Park, Kyu-Chang
    • Journal of Information Display
    • /
    • 제9권4호
    • /
    • pp.30-34
    • /
    • 2008
  • Field emitter arrays (FEAs) were developed using carbon nanotubes (CNTs) as electron emission sources. The CNTs were grown using a selective-positioning technique with a resist-protection layer. The light emission properties were studied through the electron emission of the CNTs on patterned islands, which were modulated with island diameter and spacing. The electron emission of CNT arrays with $5{\mu}m$ diameters and $10{\mu}m$ heights increased with increased spacing (from $10{\mu}m$ to $40{\mu}m$). The electron emission current of the $40-{\mu}m$-island-spacing sample showed a current density of 1.33 mA/$cm^2$ at E = 11 V/${\mu}m$, and a turn-on field of 7 V/${\mu}m$ at $1{\mu}A$ emission current. Uniform electron emission current and light emission were achieved with $40{\mu}m$ island spacing and $5{\mu}m$ island diameter.

An Exploratory Study on 3D-based Building Information Management for Multi-User Fire Protection System

  • Kim, Dahee;Cha, Heesung
    • International conference on construction engineering and project management
    • /
    • The 9th International Conference on Construction Engineering and Project Management
    • /
    • pp.1162-1169
    • /
    • 2022
  • As buildings become more and more complicated, the importance of developing and managing facility management information is increasing. In a building fire situation, various information is generated and needed to be quickly shared among participants. However, the current fire response system fails to monitor the relevant information in a real time basis. This study aims to develop a system prototype for fire protection management which can quickly and accurately manage and effectively deliver the pertinent information to the target participants. The research contributes to the efficiency of fire protection endeavors by interpreting both dynamic and static fire information in an appropriate manner.

  • PDF

Research a Study on Awareness and Practice of Personal Information Protection in Students (대학생들의 개인정보 보호인식과 실천에 대한 인지도 조사연구)

  • Lee, Hye-Seung;Kim, Hwan-Hui
    • Journal of Korea Entertainment Industry Association
    • /
    • 제13권6호
    • /
    • pp.53-67
    • /
    • 2019
  • This study is expected to be of significance in that it attempted to examine the personal information protection awareness of college students and the state of their personal information protection as prospective information processors and private information owners to boost their will to put private information protection in practice. As a result of making an analysis, the most common average time that the students spent in doing every online activity on weekdays was fewer than two or three hours, and the most dominant activities that they did over the Internet were for entertainment or hobbies. As for awareness of the nature of the Internet, they looked upon it as a quite open public space. Regarding the state of private information protection, they thought that changing passwords on a regular basis would be beneficial to personal information protection, and many thought that it's needed to withdraw from or shut down web sites that weren't used for a long time. In terms of actual practice, however, they didn't change their e-mail passwords regularly on the grounds that it's a hassle, and even the students who had experience of personal information leakage didn't report it or didn't ask for counsel on the grounds that they didn't want to be bothered as well. The majority of the students weren't cognizant of how to report or seek counsel. In the future, personal information protection should be educated on a continual basis as part of curriculum to raise awareness of it among students and boost their will to practice it with a sense of responsibility in an effort to prevent the occurrence of collateral damages triggered by personal information leakage.