• Title/Summary/Keyword: SAFE Framework

Search Result 136, Processing Time 0.024 seconds

Safe clinical photography: best practice guidelines for risk management and mitigation

  • Chandawarkar, Rajiv;Nadkarni, Prakash
    • Archives of Plastic Surgery
    • /
    • v.48 no.3
    • /
    • pp.295-304
    • /
    • 2021
  • Clinical photography is an essential component of patient care in plastic surgery. The use of unsecured smartphone cameras, digital cameras, social media, instant messaging, and commercially available cloud-based storage devices threatens patients' data safety. This paper Identifies potential risks of clinical photography and heightens awareness of safe clinical photography. Specifically, we evaluated existing risk-mitigation strategies globally, comparing them to industry standards in similar settings, and formulated a framework for developing a risk-mitigation plan for avoiding data breaches by identifying the safest methods of picture taking, transfer to storage, retrieval, and use, both within and outside the organization. Since threats evolve constantly, the framework must evolve too. Based on a literature search of both PubMed and the web (via Google) with key phrases and child terms (for PubMed), the risks and consequences of data breaches in individual processes in clinical photography are identified. Current clinical-photography practices are described. Lastly, we evaluate current risk mitigation strategies for clinical photography by examining guidelines from professional organizations, governmental agencies, and non-healthcare industries. Combining lessons learned from the steps above into a comprehensive framework that could contribute to national/international guidelines on safe clinical photography, we provide recommendations for best practice guidelines. It is imperative that best practice guidelines for the simple, safe, and secure capture, transfer, storage, and retrieval of clinical photographs be co-developed through cooperative efforts between providers, hospital administrators, clinical informaticians, IT governance structures, and national professional organizations. This would significantly safeguard patient data security and provide the privacy that patients deserve and expect.

Introduction Plans of Japanese AEO System for the Trade Security and Trade Facilitation (무역의 안전과 원활화를 위한 일본기업의 AEO 제도 도입방안에 관한 연구)

  • Woo, Sung-Koo;Kim, Jae-Myeong
    • THE INTERNATIONAL COMMERCE & LAW REVIEW
    • /
    • v.47
    • /
    • pp.263-298
    • /
    • 2010
  • The global trading system is vulnerable to terrorist exploitation while the international trade is an essential element for the economic development. Customs has a unique role in the international trade to provide increased security while ensuring facilitation of the legitimate flow of goods and the role of Customs has become more and more indispensable these days. In response to this trend, the World Customs Organization(WCO), the organization of more than 170 Customs administrations all over the world, adopted an international framework("SAFE Framework") in 2005, which includes the Authorized Economic Operator(AEO) concept, whereby a party involved in the international movement of goods would be approved by Customs as complying with the supply chain security standards, and given benefits, such as simplified Customs procedure and less Customs intervention. In this stream, the Japanese government has developed and promoted AEO Program in close cooperation with the business sector, aiming at ensuring security while facilitating legitimate trade. For that purpose, Japan Customs, as a main entity in the field of international trade, has developed comprehensive AEO program with combination of programs for importers, exporters, warehouse operators, Customs brokers and logistics operators, such as forwarders and carriers, which are consistent with the "SAFE Framework" developed by the WCO. The purpose of this paper aims to analyse the introduction plans of AEO program for the trade security and trade facilitation with Japanese AEO system.

  • PDF

A Study on the Metaverse Framework Security Service (메타버스 서비스를 위한 보안 모델 연구 )

  • Do-Eun Cho
    • Journal of Platform Technology
    • /
    • v.10 no.4
    • /
    • pp.82-90
    • /
    • 2022
  • emerging. And it shows numerous possibilities and tremendous potentials in the virtual world. This metaverse is not limited to one type, but it is evolving and developing into a service in the form of a virtual convergence economy by breaking down boundaries. As a result, various security issues in metaverse are emerging. Metaverse performs all activities in the virtual space, so various problems such as privacy infringement, virtual asset theft, or fraud can occur. In this paper, a service security model is proposed to provide safe services on metaverse. To this end, we analyze security threats in the metaverse framework and propose a security service model to prevent threats. By evaluating the security of the proposed model, it was shown that safe services are effectively possible on the metaverse.

A Formal Specification of Reusable Framework of Embedded System (임베디드 시스템의 재사용 프레임워크에 대한 정형명세)

  • Cho, Eun-Sook;Kim, Chul-Jin;Song, Chee-Yang
    • The KIPS Transactions:PartD
    • /
    • v.17D no.6
    • /
    • pp.431-442
    • /
    • 2010
  • Because embedded system is combined system of hardware and software, we should design by considering elements such as real-time, reactive, small size, low weight, safe, reliable, harsh environment, low cost, and so on. However, those are poorly reflected on current embedded system development. Especially, there is few existed framework-based embedded system development. As a result, there are many internal codes which is not related with system operation in currently developed embedded system, and reusability or variability is not considered into embedded system development. Therefore we propose a formal specification technique using Z language to guarantee completeness or consistency of design of reusability framework proposed for improving reusability of embedded system. Also we assure correctness of framework design by checking Z model through Z-Eves Tool.

Development of RCM Framework for Implementation on Safety Systems of Nuclear Power Plant

  • Kim, Tae-Woon;Brijendra Singh;Park, Chang K.;Chang, Tae-Whee;Song, Jin-Bae
    • Proceedings of the Korean Nuclear Society Conference
    • /
    • 1996.05b
    • /
    • pp.631-636
    • /
    • 1996
  • This paper presents a Reliability Centered Maintenance (RCM) framework for implementation on safety system of nuclear power plant (NPP). RCM is a systematic methodology to optimize the surveillance and maintenance tasks for critical components which provides efficiently and effectively reliability of system and safety of plant. Maintenance of the safety systems is essential for its safe and reliable operation. Reliability Centered Maintenance at NPP is the program which assure that plant system remains within original design criteria and that is not adversely affected during the plant life time. Aim of this paper is to provide the RCM framework to implement it on safety systems. RCM framework is described in four major steps.

  • PDF

NBR-Safe Transform: Lower-Dimensional Transformation of High-Dimensional MBRs in Similar Sequence Matching (MBR-Safe 변환 : 유사 시퀀스 매칭에서 고차원 MBR의 저차원 변환)

  • Moon, Yang-Sae
    • Journal of KIISE:Databases
    • /
    • v.33 no.7
    • /
    • pp.693-707
    • /
    • 2006
  • To improve performance using a multidimensional index in similar sequence matching, we transform a high-dimensional sequence to a low-dimensional sequence, and then construct a low-dimensional MBR that contains multiple transformed sequences. In this paper we propose a formal method that transforms a high-dimensional MBR itself to a low-dimensional MBR, and show that this method significantly reduces the number of lower-dimensional transformations. To achieve this goal, we first formally define the new notion of MBR-safe. We say that a transform is MBR-safe if a low-dimensional MBR to which a high-dimensional MBR is transformed by the transform contains every individual low-dimensional sequence to which a high-dimensional sequence is transformed. We then propose two MBR-safe transforms based on DFT and DCT, the most representative lower-dimensional transformations. For this, we prove the traditional DFT and DCT are not MBR-safe, and define new transforms, called mbrDFT and mbrDCT, by extending DFT and DCT, respectively. We also formally prove these mbrDFT and mbrDCT are MBR-safe. Moreover, we show that mbrDFT(or mbrDCT) is optimal among the DFT-based(or DCT-based) MBR-safe transforms that directly convert a high-dimensional MBR itself into a low-dimensional MBR. Analytical and experimental results show that the proposed mbrDFT and mbrDCT reduce the number of lower-dimensional transformations drastically, and improve performance significantly compared with the $na\"{\i}ve$ transforms. These results indicate that our MBR- safe transforms provides a useful framework for a variety of applications that require the lower-dimensional transformation of high-dimensional MBRs.

A Study on the Benefit and Expected Effect of Introducing an AEO Programmes (우리나라 수출입기업의 AEO 인증제도 도입에 따른 혜택 및 기대효과에 대한 연구)

  • Kim, Jin-Kyu;Kim, Hyun-Jee
    • THE INTERNATIONAL COMMERCE & LAW REVIEW
    • /
    • v.49
    • /
    • pp.167-188
    • /
    • 2011
  • The World Customs Organization (WCO) has designed standards to secure and to facilitate the ever-growing flow of goods in international commerce since 9.11 terrorism in U.S.A. These standards are set forth in the SAFE Framework of Standards, which was adopted by the WCO Council at its 2005 Sessions and the SAFE Framework incorporates the concept of the Authorized Economic Operator (AEO), and the Council directed the WCO to develop more detailed implementing provisions for the AEO concept. It is considered to be reliable in customs-related operations and ensures an equivalent level of protection in customs controls for goods brought into or out of the customs territory, whereas it is difficult for many Korean companies to make a decision of introducing the AEO certification programs because of a lack of cost and benefit information. In this article, We have reviewed the definition and the developing status of an AEO programmes and have studied the benefit and expected effect through documentary research methods. Therefore, it is essential for Korean companies to be certified the AEO programmes from Korea customs service for increasing security in international supply chains through risk management and customs compliance, in addition, the key-driver in the future will be expectations from the business community to work with AEO partners.

  • PDF

A Design of Secure Communication Framework for Device Management and User Authentication in Wireless Network Environment (무선 네트워크 환경에서 기기 관리 및 사용자 인증을 위한 안전한 통신 프레임워크 설계)

  • Park, JungOh
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.15 no.2
    • /
    • pp.43-52
    • /
    • 2019
  • The recent technological developments of smart devices, multiple services are provided to enhance the users' quality of life including smart city, smart energy, smart car, smart healthcare, smart home, and so on. Academia and industries try to provide the users with convenient services upon seamless technological research and developments. Also, whenever and wherever a variety of services can be used without any limitation on the place and time upon connecting with different types of devices. However, security weaknesses due to integrations of multiple technological elements have been detected resulting in the leakage of user information, account hacking, and privacy leakage, threats to people's lives by device operation have been raised. In this paper, safer communication framework is suggested by device control and user authentication in the mobile network environment. After implementations of registration and authentication processes by users and devices, safe communication protocol is designed based on this. Also, renewal process is designed according to the safe control of the device. In the performance evaluation, safety was analyzed on the attack of protocol change weakness occurred in the existing system, service halt, data leakage, illegal operation control of message, and so on, which confirmed the enhanced speed approximately by 8% and 23% in the communication and verification parts, respectively, compared to the existing system.

A Framework for Establishing Cloud Service Certification Systems (클라우드 서비스 인증제도 수립을 위한 프레임워크)

  • Seo, Kwang-Kyu
    • Informatization Policy
    • /
    • v.18 no.1
    • /
    • pp.24-44
    • /
    • 2011
  • The evolution of cloud computing over the past few years is potentially one of the major advances in information technology. However, if cloud computing is to achieve its potential, there needs to be a clear identification and understanding of the various issues involved, both from the perspectives of the providers and the consumers of the technology. While a lot of research is currently taking place in the technology itself, there is an equally urgent need for understanding the business-related issues surrounding cloud computing service. As more and more information on individuals and companies are placed in the cloud service, concerns are beginning to grow about just how safe and reliable an environment it is. For successful implementation of cloud services, it is necessary to establish the certification systems to ensure the safety and reliability of cloud services. This paper provides a safe and reliable framework for cloud service certification systems. In order to develop it, the critical issues related to service quality and certification of cloud services have been identified and the systematic framework for certification systems of cloud services and service provider domains have been developed. An evaluation method for the developed certification systems is also proposed.

  • PDF

A Case Study of Adapting Disciplined Agile Framework for Large-scale IT Projects (대규모 IT 프로젝트에서 학습기반 애자일 프레임워크 적용사례 연구)

  • Park, HeeWon;Choi, Jin-Young
    • KIISE Transactions on Computing Practices
    • /
    • v.23 no.7
    • /
    • pp.424-427
    • /
    • 2017
  • In an early stage, many people think that agile development methodology cannot be applied i large-scale IT projects. Nevertheless, agile development methodology has recently been introduced in variety of successful large-scale IT projects. In this paper, I compare two enterprise agile methodologies and introduce a case of Disciplined Agile Delivery (DAD) Framework, an enterprise agile development methodology. I compare and quantitatively measure the productivity of the development of two projects using Disciplined Agile Delivery framework and waterfall development methodology with a similar development scope.