• Title/Summary/Keyword: SIM(Security Information Management)

Search Result 25, Processing Time 0.03 seconds

The information of the businesses and the protection of information human rights (기업정보화와 정보인권보호)

  • 하우영
    • Proceedings of the Korea Institutes of Information Security and Cryptology Conference
    • /
    • 2003.12a
    • /
    • pp.543-559
    • /
    • 2003
  • The information drive of the businesses requires new alternatives in that the promotion of business efficiency through information process technologies ends up conflicting with the protection of information human rights on laborers’side. Nevertheless, apathy on information protection has a tendency to be distorted by the efficiency of the businesses. Should the capital and mass media warn economic red lights, political circles with uneasiness would ignore the significance of information protection on the behalf of business efficiency. Therefore, the importance of information protection is considered a smaller interest than that of business efficiency with the infringements of human rights on laborers’side arising. Informatization of the businesses along with the developments of information process technologies has enabled the management to monitor and control the behaviors of laborers. This new problem needs to establish both information protection mechanism and institutional devices to regulate those labor controls. The security of business activity without human rights infringement warrants both basic rights of the public and spirit of the Constitution. The study suggests the establishment and revision of laws suitable to the period of information human rights. On top of that, the establishment of the basic law for information protection of individuals’with the common principle that integrates the related laws and rules on-off line is needed. This will warrant the active participation of labor unions and create specific alternatives for information protection.

  • PDF

Low Space Complexity Bit Parallel Multiplier For Irreducible Trinomial over GF($2^n$) (삼항 기약다항식을 이용한 GF($2^n$)의 효율적인 저면적 비트-병렬 곱셈기)

  • Cho, Young-In;Chang, Nam-Su;Kim, Chang-Han;Hong, Seok-Hie
    • Journal of the Institute of Electronics Engineers of Korea SD
    • /
    • v.45 no.12
    • /
    • pp.29-40
    • /
    • 2008
  • The efficient hardware design of finite field multiplication is an very important research topic for and efficient $f(x)=x^n+x^k+1$ implementation of cryptosystem based on arithmetic in finite field GF($2^n$). We used special generating trinomial to construct a bit-parallel multiplier over finite field with low space complexity. To reduce processing time, The hardware architecture of proposed multiplier is similar with existing Mastrovito multiplier. The complexity of proposed multiplier is depend on the degree of intermediate term $x^k$ and the space complexity of the new multiplier is $2k^2-2k+1$ lower than existing multiplier's. The time complexity of the proposed multiplier is equal to that of existing multiplier or increased to $1T_X(10%{\sim}12.5%$) but space complexity is reduced to maximum 25%.

The Development of Exhibition Grounds Management System Using the Ubiquitous Computing (Ubiquitous Computing을 이용한 전시회장 관리 시스템 개발)

  • Sim, Gab-Sig;Jang, Jae-Hyuk
    • Journal of the Korea Society of Computer and Information
    • /
    • v.13 no.7
    • /
    • pp.149-156
    • /
    • 2008
  • In this paper, we develope the Exhibition Grounds Management System utilizing the ubiquitous computing which integrates the RFID ubiquitous main technology, existing use technology Bar-code, the Mobile communication technology for IT main technology field. The developed system consists of the program for exhibition information. the visitor registration program, manager program and mobile program for the visitor's current location inquiry and the exhibition management. This system is realized and designed based on database, web program, mobile program, wireless telecommunication technology. The automation technology utilizing the developed RFID system and the Exhibition Grounds Management System integrated with the wireless packet telecommunication using the mobile telecommunication technology could have a ripple effect on whole information industrial application fields.

  • PDF

A Study on Facilitators and Inhibitors to the Introduction of Outsourcing in the Hospital Information Systems in Korea (병원 정보시스템 아웃소싱 도입의 촉진 요인과 저해 요인에 관한 연구)

  • Choy, Soon;Shin, Hyeong-Sik;Choi, In-Young;Kim, Suk-Il
    • Journal of Preventive Medicine and Public Health
    • /
    • v.40 no.1
    • /
    • pp.64-70
    • /
    • 2007
  • Objectives : This study was conducted to investigate the current status of outsourcing in Korean hospital information systems and the factors influencing its introduction. Methods : The authors surveyed 136 hospitals located in Seoul and its surrounding vicinities from June 7 to June 23, 2006. The facilitators and inhibitors to outsourcing in hospital information systems were derived from literature and expert reviews. Multiple logistic regression analysis was applied to identify the major influencing factors on outsourcing in hospital information systems. Results : Eighty-six (63.2%) of the 136 hospitals surveyed, which were mainly tertiary hospitals, responded to using outsourcing for their hospital information systems. "Hardware and software maintenance and support," "application development," and "management of service and staff" were the major areas of outsourcing. Outsourcing had been employed for $4\sim7$ years by 45.5% of the hospitals and the proportion of the budget used for outsourcing was less than 20%. A need for an extension in outsourcing was agreed on by 76.5% of the hospitals. The multiple logistic regression analysis showed that both consumer satisfaction and security risk have an influence on hospital information system outsourcing. Conclusions : Outsourcing in hospital information systems is expected to increase just as in other industries. One primary facilitator to outsourcing in other industries is consumer satisfaction. We found that this was also a facilitator to outsourcing in hospital information systems. Security risk, which is usually considered an inhibitor to information technology outsourcing, was proven to be an inhibitor here as well. The results of this study may help hospital information systems establish a strategy and management plan for outsourcing.

Expanded Workflow Development for OSINT(Open Source Intelligence)-based Profiling with Timeline (공개정보 기반 타임라인 프로파일링을 위한 확장된 워크플로우 개발)

  • Kwon, Heewon;Jin, Seoyoung;Sim, Minsun;Kwon, Hyemin;Lee, Insoo;Lee, Seunghoon;Kim, Myuhngjoo
    • Journal of Digital Convergence
    • /
    • v.19 no.3
    • /
    • pp.187-194
    • /
    • 2021
  • OSINT(Open Source Intelligence), rapidly increasing on the surface web in various forms, can also be used for criminal investigations by using profiling. This technique has become quite common in foreign investigative agencies such as the United States. On the other hand, in Korea, it is not used a lot, and there is a large deviation in the quantity and quality of information acquired according to the experience and knowledge level of investigator. Unlike Bazzell's most well-known model, we designed a Korean-style OSINT-based profiling technique that considers the Korean web environment and provides timeline information, focusing on the improved workflow. The database schema to improve the efficiency of profiling is also presented. Using this, we can obtain search results that guarantee a certain level of quantity and quality. And it can also be used as a standard training course. To increase the effectiveness and efficiency of criminal investigations using this technique, it is necessary to strengthen the legal basis and to introduce automation technologies.

Development of Evaluation System for Defense Informatization Level

  • Sim, Seungbae;Lee, Sangho
    • Journal of Multimedia Information System
    • /
    • v.6 no.4
    • /
    • pp.271-282
    • /
    • 2019
  • There is a description that you cannot manage what you do not measure. The Korea Ministry of National Defense (MND) is conducting evaluations in various fields to obtain meaningful effects from IT investments, and views that the evaluation of the defense informatization sector is divided into defense informatization policy evaluation and defense informatization project evaluation. The defense informatization level evaluation can measure the informatization level of MND and the armed forces or organizations. Since the evaluation system being studied to measure the level of defense informatization is composed mainly of qualitative metrics, it is necessary to reconstruct it based on quantitative metrics that can guarantee objectivity. In addition, for managing the level of change by evaluation objects, the evaluation system should be designed with a focus on homeostasis of metrics so that it can be measured periodically. Moreover, metrics need to be promoted in terms of performance against targets. To this end, this study proposes to measure the level of defense informatization by dividing it into defense information network, computer systems, interoperability and standardization, information security, information environment, and information system use, and suggests their metrics.

A Design of Decentralized Social Network for Data Web Search (데이터 웹 검색을 위한 분산형 소셜네트워크 설계)

  • Sim, In-Soo;Lee, Hong-Chul
    • Proceedings of the KAIS Fall Conference
    • /
    • 2010.11a
    • /
    • pp.398-401
    • /
    • 2010
  • 오늘날 개방형 플랫폼과 정보공유공간인 소셜네트워크 서비스(Social Network)의 사용이 증가하면서 관련 웹사이트와 어플리케이션이 많이 생겨났다. 기존의 시스템은 소셜네트워크 사이트가 개인 데이터의 소유권을 가지고 있어서 정보 보호에 문제가 있고, 웹 사이트 간 정보공유가 제한되었다. 그래서 소셜네트워크의 데이터를 개인이 원하는 다른 관리 영역에서 소유할 수 있고 서로 다른 소셜네트워크에서도 자유로이 정보를 공유할 수 있는 분산형 소셜네트워크에 대한 연구가 활발히 이루어지고 있다. 본 논문에서는 시맨틱 웹 기술을 이용하여 이종 소셜네트워크 서비스, 다른 관리 영역의 데이터, 사용자들과의 관계, 데이터의 연관성들을 구조화 시키고, 데이터 웹 검색의 사용성을 높이는 데이터 웹 검색기반 분산형 소셜네트워크를 설계 하였다.

  • PDF

KISIA가 말하는 보안기업 이야기 - 위협 수집기 TMS

  • Kim, Ji-Suk
    • 정보보호뉴스
    • /
    • s.136
    • /
    • pp.56-59
    • /
    • 2009
  • 국내 정보보호 기업의 약 60%는 벤처 창업 붐이 최고조에 달했던 1999년$\sim$2003년 사이에 설립됐다. '정보보호기술' 역시 약 10년 전인 2000년에 창업한 기업 중 하나다. 2000년 전후로 국내 IDS 시장이 활성화되던 당시 '테스(TESS) IDS'로 정보보호 제품을 선보인 정보보호기술은 기술력을 바탕으로 비교적 짧은 시간 내 정보보호 분야에서 탄탄한 기반을 다지게 된다. IDS를 통해 시장 점유율을 높이던 정보보호기술은 2004년 자체 IDS 개발 기술을 바탕으로 당시에는 생소했던 '위협관리시스템'을 내놓으며 신선한 바람을 일으켰다. 보안산업의 새로운 분야로 떠오른 위협관리시스템은 사후 대응이 아닌 위협요소에 대한 사전대응을 목표로 한 예/경보 시스템. 정보보호기술의 위협관리시스템 'TESS TMS(Threat Management System)'은 기존 IDS가 가진 분석기능과 모니터링 기능에서 출발했다.

  • PDF

Effects of Personal Characteristics and Public Hospitals Awareness by Community Residents on use-experience of Public Hospitals (지역주민 특성과 인지도가 공공병원 이용경험에 미치는 영향)

  • Sim, In Ok;Hwang, Eun Jeong
    • Korea Journal of Hospital Management
    • /
    • v.19 no.4
    • /
    • pp.45-56
    • /
    • 2014
  • Purpose: This study aims to explore the effects of personal characteristics, satisfaction, quality of care, role performance, image, awareness level of public hospitals perceived by community residents on use-experience of public hospitals. Methods: A cross-sectional survey was conducted with 2,100 community residents around 39 district public hospitals. The questionnaire was designed to collected information on personal characteristics and community awareness of public hospitals. The community awareness consists of 5 factors and 15 items. The data were collected utilizing call-interview by a survey company. Results: The personal characteristic and community awareness were shown significant differences between having use-experience and not-having use-experience of public hospitals (p<.001), except gender. As the results of multiple logistic regression, the significant variables of use-experience of public hospitals were satisfaction (OR=1.06 95%CI=1.010-1.116), quality of care (OR=1.07, 95%CI=1.016-1.134, level of awareness to public hospitals (OR=1.50, 95%CI=1.378-1.632), age (OR=0.43, 95%CI=0.236-0.785), education (OR=1.62, 95%CI=1.013-2.590), type of medical security (OR=0.37, 95%CI=0.142-0.945). Conclusions: Public hospitals have to effort to improve community awareness through providing quality of care, and role performance. It is possible to support them by the Central and Local Government.

  • PDF

Basic System Architecture Design for Airport GIS Service Models (Airport GIS 구축을 위한 서비스모델 설계에 관한 연구)

  • Sim, Jae-Yong;Lee, Tong-Hoon;Park, Joo-Young
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.7 no.3
    • /
    • pp.82-94
    • /
    • 2008
  • Airport GIS is a comprehensive information system to improve security and efficiency of airport. At the initial stage to make it real, the current status of domestic and international regulations along with relevant standardization bas been reviewed. Gimpo Airport becomes a test-bed to get some ideas about how to bring the airport GIS into workflow by building service model and basic design based on current status and demand analysis of the airport. The 6 service models primarily brought into the project are as follows: (1) Local vehicles safety management in airside, (2) Intelligent traffic control between flights and vehicles at main cross points, (3) Dynamic safety management against FOD in airside and breakage on pavement, (4) Special support vehicle management such as deicing remotely controlled, (5) Response and support for fire vehicles and ambulances of signatory institutions in emergency. The upcoming research topic aims at drawing a specific design and building integrated system in the future.

  • PDF