• Title/Summary/Keyword: School security

Search Result 3,327, Processing Time 0.044 seconds

Extracting of Interest Issues Related to Patient Medical Services for Small and Medium Hospital by SNS Big Data Text Mining and Social Networking (중소병원 환자의료서비스에 관한 관심 이슈 도출을 위한 SNS 빅 데이터 텍스트 마이닝과 사회적 연결망 적용)

  • Hwang, Sang Won
    • Korea Journal of Hospital Management
    • /
    • v.23 no.4
    • /
    • pp.26-39
    • /
    • 2018
  • Purposes: The purpose of this study is to analyze the issue of interest in patient medical service of small and medium hospitals using big data. Methods: The method of this study was implemented by data mining and social network using SNS big data. The analysis tool were extracted key keywords and analyzed correlation by using Textom, Ucinet6 and NetDraw program. Findings: In the results of frequency, the network-centered and closeness centrality analysis, It was shown that the government center is interested in the major explanations and evaluations of the technology, information, security, safety, cost and problems of small and medium hospitals, coping with infections, and actual involvement in bank settlement. And, were extracted care for disabilities such as pediatrics, dentistry, obstetrics and gynecology, dementia, nursing, the elderly, and rehabilitation. Practical Implications: Future studies will be more useful if analyzed the needs of customers for medical services in the metropolitan area and provinces may be different in the small and medium hospitals to be studied, further classification studies.

Evolution of PKI Internet Banking in Korea

  • Park, Seungchul
    • International journal of advanced smart convergence
    • /
    • v.8 no.1
    • /
    • pp.44-57
    • /
    • 2019
  • Most banks in Korea have provided Internet banking services based on PKI(Public Key Infrastructure) certificates since the early 2000s when Internet banking began in Korea. To support PKI Internet banking, the Korean government backed the electronic signature law and supported the rapid spread of PKI-based Internet banking by regulating the application of PKI certificates to be compulsory in Internet banking until 2015. PKI Internet Banking in Korea has been developed as a pioneer in this field through many challenges and responses until its present success. Korea's PKI banking, which started with soft-token-based closed banking, has responded to various types of cyber attack attempts and promoted the transition to open banking by accepting various criticisms due to lack of compatibility with international standards. In order to improve the convenience and security of PKI Internet banking, various attempts have been made, such as biometric-integrated smartphone-based PKI authentication. In this paper, we primarily aim to share the experience and lessons of PKI banking by analyzing the evolution process of PKI Internet banking in Korea. It also has the purpose of presenting the challenges of Korea's PKI Internet banking and sharing its development vision.

Analysis on Mobile Forensic of Smishing Hacking Incident (Smishing 사고에 대한 Mobile Forensic 분석)

  • Park, Dea-Woo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2014.05a
    • /
    • pp.207-210
    • /
    • 2014
  • Damage is increasing by (Smishing) hacking attack Smishing you use a smart phone after entering 2013. Takeover of personal information and direct financial damage in collaboration with graphics sewing machine hacking attack has occurred. Monetary damage that leads to Internet payment service (ISP) and secure payment system in conjunction with graphics sewing machine hacking attack on a smartphone has occurred. In this paper, I will study analysis in the laboratory examples of actual infringement vinegar sewing machine hacking attack. It is a major power security measures to prevent damage to the secure payment system that a case analysis and practical principle technical nest sewing machine hacking attack, using Smishing. In this paper, I will be to research to be able to through a smart phone, to the online payment safer and more convenient.

  • PDF

Application Study of Vessel Traffic Service: Dynamic Analysis of AIS for Shocheongcho Ocean Research Station (해상교통관제정보 활용 연구: 빅데이터 기반 해양 공간 선박 활동 특성 해석)

  • Park, Ju-Han;Kim, Seung-Ryong;Yang, Chan-Su
    • Proceedings of the Korean Institute of Navigation and Port Research Conference
    • /
    • 2019.05a
    • /
    • pp.206-207
    • /
    • 2019
  • 우리나라에서 해상교통관제시스템(Vessel Traffic Service, VTS) 구역을 설정하여, 관제사를 중심으로 한 VTS와 선박사이의 해상교통상황 등의 교환을 통해 항만의 안전과 항만운영의 효율을 높이고 있다. 향후, 연안으로 확대될 예정이다. 더 넓은 해역에 대해서는 해양안전종합정보시스템(GICOMS)이 있으며, 선박자동식별장치 (AIS), 장거리위치추적시스템 (LRIT) 등에서 송신하는 선박의 운항정보를 수신하여 전자해도에 표시하고 있다. 이와 같은 선박관제정보는 빅데이터로 향후 자동화된 분석과 제원체계가 요구된다. 여기서는 해상교통관제정보 기초 활용 연구로, 소청초 종합해양과학기지주변의 AIS (Automatic Identification System)정보를 사용하여 선박 활동 특성 해석을 진행하였다.

  • PDF

Binomial Distribution Based Reputation for WSNs: A Comprehensive Survey

  • Wei, Zhe;Yu, Shuyan
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.10
    • /
    • pp.3793-3814
    • /
    • 2021
  • Most secure solutions like cryptography are software based and they are designed to mainly deal with the outside attacks for traditional networks, but such soft security is hard to be implemented in wireless sensor networks to counter the inside attacks from internal malicious nodes. To address this issue, reputation has been introduced to tackle the inside malicious nodes. Reputation is essentially a stimulating mechanism for nodes' cooperation and is employed to detect node misbehaviors and improve the trust-worthiness between individual nodes. Among the reputation models, binomial distribution based reputation has many advantages such as light weight and ease of implementation in resource-constraint sensor nodes, and accordingly researchers have proposed many insightful related methods. However, some of them either directly use the modelling results, apply the models through simple modifications, or only use the required components while ignoring the others as an integral part of the whole model, this topic still lacks a comprehensive and systematical review. Thus the motivation of this study is to provide a thorough survey concerning each detailed functional components of binomial distribution based reputation for wireless sensor networks. In addition, based on the survey results, we also argue some open research problems and suggest the directions that are worth future efforts. We believe that this study is helpful to better understanding the reputation modeling mechanism and its components for wireless sensor networks, and can further attract more related future studies.

A Study on the Resident Recognition of Common Space in Apartment (공동주택 거주자의 공유공간 인식에 대한 조사 연구)

  • Han, Min-Seung;Whang, Hee-Joon
    • Journal of the Architectural Institute of Korea Planning & Design
    • /
    • v.35 no.4
    • /
    • pp.45-52
    • /
    • 2019
  • The most ordinary form of residential type in Korea is a plate-type apartment, and the common space in these apartment is attracting as an important factor for enhancing social exchanges among neighbors and forming community consciousness. In addition, it provides a sense of psychological security by enabling natural exchanges and communication in contemporary society. It is desirable to plan the flow of space in such a way that private, semi-private, semi-public, and public spaces are linked. Semi-private and semi-public spaces can be defined as common spaces. Semi-private spaces are strongly recognized in the order of unit household entrance, main entrance, elevator, corridor, staircase, playground, bench, trail, walkway and parking lot, exercise space, main/back gate, the ability to gratify is increased sense of belonging, ownership consciousness formation, defensive function. Semi-public space is strongly recognized in the order of playground, bench, exercise space, trail, main entrance, walkway and parking lot, unit household entrance, main/back gate, corridor, staircase, elevator, the ability to gratify is increase of social contact, Secondary activity space function. In addition, the function to gratify in the common space differs according to gender and age group among resident characteristics, and differs according to corridor type, parking lot type and main entrance type. Therefore, differentiated planning of common space is needed in consideration of these differences in the design of common space in future.

Real 3D Property Integral Imaging NFT Using Optical Encryption

  • Lee, Jaehoon;Cho, Myungjin;Lee, Min-Chul
    • Current Optics and Photonics
    • /
    • v.6 no.6
    • /
    • pp.565-575
    • /
    • 2022
  • In this paper, we propose a non-fungible token (NFT) transaction method that can commercialize the real 3D property and make property sharing possible using the 3D reconstruction technique. In addition, our proposed method enhances the security of NFT copyright and metadata by using optical encryption. In general, a conventional NFT is used for 2D image proprietorial rights. To expand the scope of the use of tokens, many cryptocurrency industries are currently trying to apply tokens to real three-dimensional (3D) property. However, many token markets have an art copyright problem. Many tokens have been minted without considering copyrights. Therefore, tokenizing real property can cause significant social issues. In addition, there are not enough methods to mint 3D real property for NFT commercialization and sharing property tokens. Therefore, we propose a new token management technique to solve these problems using integral imaging and double random phase encryption. To show our system, we conduct a private NFT market using a test blockchain network that can demonstrate the whole NFT transaction process.

A Brief Scrutiny of Malawi's Policy on Nuclear Power

  • Katengeza, Estiner Walusungu
    • Journal of Radiation Protection and Research
    • /
    • v.45 no.4
    • /
    • pp.147-153
    • /
    • 2020
  • Background: Malawi's 2018 National Energy Policy includes nuclear power as an energy option with an operational 100 MW targeted for 2035. Materials and Methods: This paper challenges the scope of the policy on nuclear power by reviewing its implementation strategy and comparing it to: the strategy established for coal in the same policy; some experiences from other countries; and documents by the International Atomic Energy Agency (IAEA) relating to establishing a national position on nuclear power and infrastructural requirements for a nuclear power program. Results and Discussion: It is found that the pro-nuclear position is uninformed, and targets are unrealistic owing to a lack of understanding of nature of nuclear power including the requirements for safety, security and safeguards, and nuclear infrastructure. It is apparent that neither consultation nor a proper analysis were comprehensively conducted for nuclear. Though the national energy policy suggests a national position for nuclear energy, the content does not demonstrate that the position was arrived at knowledgeably. Conclusion: Thus, nuclear power may presently be viewed as a potential energy option that is yet to be seriously considered. It is important to build an appropriate level of literacy on nuclear science and technology for policy makers, key stakeholders, and the public to be better positioned for strategizing on nuclear power.

The Exploratory Study on the Impact of the Professional Contingent Workers on Team Members' Acceptance and Creative Team Performance (전문직 비정규직이 팀 내 수용 및 창의적 팀 성과에 미치는 영향에 관한 탐색적 연구: 경계 없는 비정규직과 과도기적 비정규직을 중심으로)

  • Chae, Hee-Sun;Park, Ji-Sung
    • Asia-Pacific Journal of Business
    • /
    • v.11 no.2
    • /
    • pp.145-158
    • /
    • 2020
  • Purpose - To understand the growing interests in the professional temporary workforce, this study aimed to examine the different types of professional temporary workers and their different effects on creative performance. Design/methodology/approach - By sub-classifying professional temporary workers as boundaryless workers and transitional workers, this study developed propositions to provide comprehensive framework for directing meaningful topics for future research on professional temporary workers. Findings - This study suggested that two types of professional temporary workers may differ significantly in terms of their work efforts for getting approval or acceptance from the team members and for achieving creative contributions in teams. Specifically, drawing on expectance theory, social identity theory and resource-based theory, this study discussed the relationship between acceptance(task-oriented vs. relational-oriented acceptance), employment duration(short-term status vs. long-term status), contract security(volition being temporary worker) and creative performance for boundaryless workers versus transitional workers. Research implications or Originality - This study have implications for increasing our understanding of professional temporary workers by showing that creative performance may vary by employment types.

A study on the analysis of bus public Wi-Fi security access trends (버스 공공와이파이 보안 접속 동향 분석에 관한 연구)

  • Choi, Hong-Ju
    • Design & Manufacturing
    • /
    • v.15 no.4
    • /
    • pp.14-23
    • /
    • 2021
  • In this study, we have analyzed the access status and the data usage trend of the public Wi-Fi on the bus, which has not been carried out in the previous studies. The analysis period of this study is 5 months from Nov. 2020 to Mar. 2021. When we compared the access status of Seoul metropolitan and the non-metropolitan region against each region's deployment status ratio, the access ratio of the metropolitan region was higher than the non-metropolitan region, of which the gap was 4.53%. The access for each region showed the growing trend, which was 43.5% on average. The data usage also showed the growing trend, 2.7% on average. Weekly data usage showed the growing trend irrespective of weekdays or weekends. The data usage of the weekdays was 695GB higher than weekends. The data usage during commuting hours including school (7:00~9:00 a.m. and 4:00~6:00 p.m.) was higher than 3,000GB. We can conclude that bus public Wi-Fi was used more actively in non-metropolitan region than Seoul metropolitan region by the office workers and students. The secure access also showed the growing trend. And the secure data usage also showed the growing trend.