• 제목/요약/키워드: Security Concepts

검색결과 266건 처리시간 0.031초

The Effect of Security Information Sharing and Disruptive Technology on Patient Dissatisfaction in Saudi Health Care Services During Covid-19 Pandemic

  • Beyari, Hasan;Hejazi, Mohammed;Alrusaini, Othman
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제16권10호
    • /
    • pp.3313-3332
    • /
    • 2022
  • This study is an investigation into the factors affecting patient dissatisfaction among Saudi hospitals. The selected factors considered for analysis are security of information sharing, operational practices, disruptive technologies, and the ease of use of EHR patient information management systems. From the literature review section, it was clear that hardly any other studies have embraced these concepts in one as was intended by this study. The theories that the study heavily draws from are the service dominant logic and the feature integration theory. The study surveyed 350 respondents from three large major hospitals in three different metropolitan cities in the Kingdom of Saudi Arabia. This sample came from members of the three hospitals that were willing to participate in the study. The number 350 represents those that successfully completed the online questionnaire or the limited physical questionnaires in time. The study employed the structural equation modelling technique to analyze the associations. Findings suggested that security of information sharing had a significant direct effect on patient satisfaction. Operational practice positively mediated the effect of security of information sharing on patient dissatisfaction. However, ease of use failed to significant impact this association. The study concluded that to improve patient satisfaction, Saudi hospitals must work on their systems to reinforce them against the active threats on the privacy of patients' data by leveraging disruptive technology. They should also improve their operational practices by embracing quality management techniques relevant to the healthcare sector.

21세기 미주대륙과 대서양 해양안보의 딜레마: 미4함대의 등장과 남미지역과 갈등 (Ocean Security and its Dilemma among the OAS countries in the 21st Century: Conflict between the Re-establishment of the 4th Fleet and Emerging of UNASUR in S. America)

  • 하상섭
    • 국제지역연구
    • /
    • 제14권2호
    • /
    • pp.449-476
    • /
    • 2010
  • 이 논문은 오늘날 미국과 라틴아메리카를 중심으로 대서양 지역에서 빠르게 변화 발전하고 있는 해양안보 개념의 변천과 주요 해양안보를 일으키는 갈등 이슈들을 조망해 보는 것을 목적으로 연구되었다. 지정학적으로 유럽과 라틴아메리카 그리고 미국을 둘러싸고 있는 대서양 지역에서의 해양안보 중점 이슈에 대한 전반적인 역사적 고찰과 더불어 오늘날 다양한 해양안보 개념의 발전과 갈등 현안들을 특히 미국과 라틴아메리카 국가들을 축으로 살펴보는 데 그 의의가 있다. 이에 더하여 영토 분쟁 및 해양안보를 둘러싼 라틴아메리카 역내 국가 간 갈등의 역사 탐색뿐만 아니라 21세기 들어 새롭게 떠오르고 있는 미국-라틴아메리카 지역 간 해양안보 갈등의 중요 배경과 이슈들을 조명해 봄으로서 오늘날 대서양 지역에서 발생하고 있는 새로운 안보갈등 딜레마를 조명해 보고자 한다. 특히 남대서양 해양안보를 위한 미국 제4함대의 재등장은 이러한 해양안보 딜레마의 중심축에 놓여있다. 본 논문은 미 해군 4함대를 둘러싼 대서양 지역의 안보갈등을 국제정치학적 '해양안보' 개념을 통해 갈등 원인을 분석하고, 21세기 대서양 지역에서 안보개념의 변화를 구체적인 사례 분석과 더불어 새롭게 분석 평가해 보는데 의의가 있다.

인터넷 뱅킹에서 오프라인 신뢰와 온라인 거래의 관계 (The Relationship between Offline Trust and Online Transaction in Internet Banking)

  • 이웅규
    • Asia pacific journal of information systems
    • /
    • 제17권2호
    • /
    • pp.29-47
    • /
    • 2007
  • Owing to the rapid growth of using the Internet, not only click-and-mortar companies but also brick-and-mortar ones have been expanding their distribution channels into online, Moreover, since online channels are more attractive than offline ones in control and maintenance, switching customers into online ones is emerged as one of very important managerial issues in a view of reduction of cost as well as expansion of services. However, the switched customers should be faced by uncertainties which could not have been experienced in offline. Specifically, in online channels, buyers and sellers are separated temporally and spacially and there are always so many kinds of threat for security as well as not enough systems and conventions for them yet. Therefore, trust has been considered as one of the most critical mechanisms for resolution of such uncertainties in online transactions. However, it is not easy to build and maintain the relationships in online since most of them are virtual and indirect generally. Therefore, in order to switch offline customers into online ones, it is very important to make strategies based on identification of the relationship between online transaction and offline trust which has been built in offline business. Generally offline trust, which has been built independent of online, could not include trust for online-dependent activities such as payment security during or after transactions, while most of online trust include it. Therefore, a customer with high offline trust does not always perceive high security and assure safe transactions. Accordingly, while online trust, where technical capabilities for online security is one of main bases, includes control trust implicitly or explicitly, offline trust does not. However. in spite of such clear discrimination and independence between offline trust and perceived security, there can be the significant dependency between these two beliefs. The customers with high offline trust believe that the company would do some activities for online security for customers' safe transactions since it has been believed of doing well for customers' trust. Theoretically, users' perception of security is interpreted as a kind of control trus, which is trust for company's technical control capacities in order to resolve technical uncertainties in online. Therefore, the relationship between two beliefs can be considered as transference from offline trust to another type trust. that is, control trust. The objective of this study is to analyze the effect of offline trust on online transaction uses mediated by perceived security. For this purpose, we suggest a research model based on technology acceptance model (TAM). Reuse intention is adopted as a dependent variable and TAM is modified by adding perceived risk (PR) as well as two beliefs of using Internet banking, perceived usefulness (PU) and perceived ease of use (PEOU). Moreover, perceive security (PS) is adopted as an external variable for PR and PU, while offline trust (OT) is an antecedent of PS. For an empirical test, sampling from 108 visitors to the banks in Daegu, Korea, we analyze our model by partial least square (PLS) approach. In result, our model is shown to explain 51.4% of the variance in reuse intention and all hypothesis are supported statistically. A theoretical implication of this study is to identify a role of PS between offline trust and reuse intention of using online transaction services. According to our result, PS can be considered as a mediation variable for bridging between two different concepts: trust that explains social aspects of customers and companies, and TAM that explains customers' reuse intention.

Design of Cloud Service Platform for eGovernment

  • LEE, Choong Hyong
    • International Journal of Internet, Broadcasting and Communication
    • /
    • 제13권1호
    • /
    • pp.201-209
    • /
    • 2021
  • The term, eGovernmen or e-Government, uses technology communications devices such as computers and the Internet to provide public services to citizens and others. The eGovernment or e-government provides citizens with new opportunities to access the government directly and conveniently, while the government provides citizens with directservices. Also, in these days, cloud computing is a feature that enables users to use computer system resources, especially data storage (cloud storage) and on-demand computing power, without having to manage themselves. The term is commonly used to describe data centers that are available to many users over the Internet. Today, the dominant Big Cloud is distributed across multiple central servers. You can designate it as an Edge server if it is relatively close to the user. However, despite the prevalence of e-government and cloud computing, each of these concepts has evolved. Research attempts to combine these two concepts were not being made properly. For this reason, in this work, we aim to produce independent and objective analysis results by separating progress steps for the analysis of e-government cloud service platforms. This work will be done through an analysis of the development process and architectural composition of the e-government development standard framework and the cloud platform PaaS-TA. In addition, this study is expected to derive implications from an analysis perspective on the direction and service composition of the e-government cloud service platform currently being pursued.

한국 해군의 전략 수립 방향 연구 - 미군의 JOAC, ASB 개념 분석과 한국 해군에의 함의- (This paper asks whether the Republic of Korea (ROK) Navy should Study on ROK Navy's Strategy Planning - Concerning to JOAC, ASB Concept of US Armed Forces -)

  • 나성민
    • Strategy21
    • /
    • 통권32호
    • /
    • pp.5-35
    • /
    • 2013
  • The purpose of this thesis is to suggest how to plan ROK(Republic of Korea) Navy's strategy concerning to JOAC(Joint Operation Access Concept) and ASB(Air-Sea Battle) concept of US(United States) armed forces. Since 2006, US armed forces has been developing CONOPS(Concepts of Operations), JOAC & ASB. These concepts will not only affect security environment for Korea Peninsula and West Pacific Area, but also will be affected to ROK Navy's Strategy. Therefore, Korea Navy has to consider and review those concepts and should discuss the way to secure peace of Korea Peninsula. JOAC & ASB have been developed for securing operational access ability of US armed forces against enemy forces. A2/AD(Anti-Access, Area-Denial) is the strategy of possible enemy forces against US forces' approaching into the operation area and impede operations within area. US forces had to overcome enemy's A2/AD strategy in coming century to protect national interest and sustain global leadership. The main concept of JOAC & ASB is "Cross-domain Synergy", which means 'to eliminate duplicate and improve joint operability containing space and cyber operation area.' Korea Navy's acceptance of JOAC & ASB without any revising is not a rational choice. Without the amendment some problems can be occurred by the Korea navy's acceptance for the original version of JOAC & ASB. Those are "Missing differences of operation environment between Korea and US", "Impediment from neighbor nations, especially PRC (People's Republic of China)", and "Impediment inside from Korea armed forces". Therefore, Korea Navy has to evaluate and find out the way to solve for JOAC & ASB to apply for their strategy and minimise those possible problems above. This thesis is expected to be the solution.

  • PDF

국방기획관리체계 개선을 위한 임무공학 적용방안에 관한연구-소요기획과 획득체계를 중심으로- (A Study on the Mission Engineering Applications for Improving the Defense Planning Management System -Focusing on the Requirement Planning and Acquisition -)

  • 이상승;최근하;황승현
    • 문화기술의 융합
    • /
    • 제10권5호
    • /
    • pp.181-188
    • /
    • 2024
  • 본 연구는 급변하는 안보환경에 대응하기 위해 미국에서 적용 중인 임무공학(Mission Engineering) 개념과 방법론을 한국의 국방기획관리체계에 도입하는 방안을 모색하였다. 이를 위해 문헌연구와 선행연구 분석, 사례분석, 심층그룹인터뷰(FGI) 등을 통해 임무공학의 핵심요소를 도출하고, 이를 바탕으로 한국군의 소요기획과 신속 획득체계 개선방안을 제시하였다. 연구 결과, 운용개념, 요구성능(능력), 획득이 임무공학 적용을 위한 3대 핵심요소로 식별되었다. 개선방안으로는 임무 중심의 소요기획 체계로의 전환, 운용개념 작성 시 임무공학 방법론 적용, 의사결정 지원을 통한 획득기간 단축, 신속 획득을 위한 예산 배정 및 소요군 역량 강화 등이 제안되었다. 본 연구는 임무공학의 필요성과 적용 가능성을 확인하고, 향후 국방기획관리체계 발전을 위한 기초자료로 활용될 수 있을 것으로 기대된다.

Access Management Using Knowledge Based Multi Factor Authentication In Information Security

  • Iftikhar, Umar;Asrar, Kashif;Waqas, Maria;Ali, Syed Abbas
    • International Journal of Computer Science & Network Security
    • /
    • 제21권7호
    • /
    • pp.119-124
    • /
    • 2021
  • Today, both sides of modern culture are decisively invaded by digitalization. Authentication is considered to be one of the main components in keeping this process secure. Cyber criminals are working hard in penetrating through the existing network channels to encounter malicious attacks. When it comes to enterprises, the company's information is a major asset. Question here arises is how to protect the vital information. This takes into account various aspects of a society often termed as hyper connected society including online communication, purchases, regulation of access rights and many more. In this research paper, we will discuss about the concepts of MFA and KBA, i.e., Multi-Factor Authentication and Knowledge Based Authentication. The purpose of MFA and KBA its utilization for human.to.everything..interactions, offering easy to be used and secured validation mechanism while having access to the service. In the research, we will also explore the existing yet evolving factor providers (sensors) used for authenticating a user. This is an important tool to protect data from malicious insiders and outsiders. Access Management main goal is to provide authorized users the right to use a service also preventing access to illegal users. Multiple techniques can be implemented to ensure access management. In this paper, we will discuss various techniques to ensure access management suitable for enterprises, primarily focusing/restricting our discussion to multifactor authentication. We will also highlight the role of knowledge-based authentication in multi factor authentication and how it can make enterprises data more secure from Cyber Attack. Lastly, we will also discuss about the future of MFA and KBA.

Formation of Resilience in the Context of Volunteer Activities Using Information and Communications Technology

  • Lazarenko, NataLiia;Sabat, Nataliia;Sabat, Nadiia;Sylenko, Nadiia;Rundong, Wang;Duchenko, Anna;Shuppe, Liudmyla
    • International Journal of Computer Science & Network Security
    • /
    • 제22권6호
    • /
    • pp.374-381
    • /
    • 2022
  • The article identifies and theoretically substantiates the trends of national resilience in the context of establishing the security of the country and its civilizational subjectivity. The strategy of development of the pedagogical university in the conditions of European integration into the European educational and scientific space based on certain characterological features of the personality of the volunteer in the context of allocation of personal resilience is developed. The analysis of both external and internal challenges and threats to the civilization of the country needs to be understood in the context of economic, socio-political, legal, military-political, spiritual-cultural, educational-scientific and network-information resilience. The concepts of "national resilience" and "national security" are quite close - at first glance, even identical. However, a deeper understanding clarifies the differences: national security is a state of protection of the country identity and its very existence, the realization of its national interests. In turn, resilience is a fairly effective strategy and a fundamental guarantee of national security. At the same time, it is extremely important to understand that both national security as a state and national resilience as a strategy are only means of achieving and developing a strong and humanistic civilizational subjectivity of the country. After all, such subjectivity opens for citizens the opportunity for development, dignified self-realization and a proper life. The restructuring of the volunteer's motivational sphere is due to the dominance of such leading motives, which are focused mainly on maintaining and restoring health, which leads to distorted meaningful life goals: isolation, alienation, passivity, inertia, reduced activity, limited communication, etc. The characteristics of relatively stable human behavior include several primary and secondary properties. The primary (relevant) properties include patience, trust, hope, faith, confidence, determination, perseverance, and love; the secondary - punctuality, neatness, obedience, honesty, loyalty, justice, diligence, thrift, accuracy, conscientiousness, obligation, etc. The restructuring of the volunteer's motivational sphere is due to the dominance of such leading motives, which are focused mainly on maintaining and restoring health, which leads to distorted meaningful life goals: isolation, alienation, passivity, inertia, reduced activity, limited communication, etc. The characteristics of relatively stable human behavior include several primary and secondary properties. The primary (relevant) properties include patience, trust, hope, faith, confidence, determination, perseverance, and love; the secondary - punctuality, neatness, obedience, honesty, loyalty, justice, diligence, thrift, accuracy, conscientiousness, obligation, etc. The use of information and communication technologies in volunteering will contribute to the formation of resilience traits in the structure of personality formation. Directly to the personal traits of resilience should be included methodological competencies, which include methodological knowledge, skills and abilities (ability to define ultimate and intermediate goals, plan, conduct and analyze knowledge, establish and implement interdisciplinary links with disciplines of medical-psychological-pedagogical cycles, etc.). All these competencies form the professional resilience of the volunteer.

산업혁신정책의 주요 담론들과 그 정책목표의 국제 비교: 한국에의 시사점 (Several Concepts of Industrial Innovation Policy and their Weights in Diverse Countries: Policy Implications for Korea)

  • 이근;김준엽
    • 기술혁신연구
    • /
    • 제31권2호
    • /
    • pp.1-27
    • /
    • 2023
  • 본 연구는 최근 세계 주요국(미국, 중국, 독일, 일본, 대만)의 산업혁신정책의 목표를 3대 분야 6개 세부목표로 분류하여 평가한다. 3대 분야의 첫째는 '기존산업과 미래성장'이라는 전통적 산업정책 목표인데 이는 다시 '기존산업 경쟁력 강화'와 '미래 성장산업의 육성'이라는 두 세부 목표로 나뉜다. 둘째는 '환경과 삶의 질' 분야인데 이는 '국민의 삶의 질 개선'과 '환경과 지속가능성'으로 구분된다. 셋째는 '공급망과 경제안보'인데, 이는 '공급망 안정성 확보'와 '경제안보'로 세분된다. 미국은 미·중 패권경쟁 상황 속에서 상대적으로 공급망과 경제안보를 중시하는 반면, 중국은 전통적 산업정책을 추구하여 왔으나 최근 공급망과 경제안보도 고려하기 시작했다. 독일과 일본은 전통적 산업정책과 함께 환경과 삶의 질뿐만 아니라 기술주권 및 공급망 안정도 중시함에 따라 산업정책의 3대 분야를 골고루 중시한다고 볼 수 있다. 대만도 비슷하다고 볼 수 있으나, 최근 중국의 위협에 따라 경제안보를 중시하기 시작했다. 한국의 경우, 경제패권국인 미·중과 달리 '경제안보'가 최우선 순위가 아닐 수 있다. 오히려 독일과 같이 국가 간 연대와 협력에 기반한 '공급망 안정성', '기술주권' 확보가 더 적절하여 보인다. 즉, 미국이나 독일 및 일본과의 기술격차를 줄이고 넘어서기 위한 '미래 성장산업과 기술의 육성'이 여전히 중요하다. 결론적으로 한국은 3대 분야에 대해서 비슷한 수준으로 가중치를 두어 기존산업과 미래산업을 중시하는 '전통적 산업정책'을 지속하면서, 일단 리스크 관리 차원에서 '공급망 안정성 확보'에 단기적으로 가중치를 둘 필요가 있다. 한국적 상황에서 안보란 방위산업 육성이나 식량안보가 더 적절하다.

역난독화를 위한 바이너리 프로그램 슬라이싱 (Program Slicing for Binary code Deobfuscation)

  • 목성균;전현구;조은선
    • 정보보호학회논문지
    • /
    • 제27권1호
    • /
    • pp.59-66
    • /
    • 2017
  • 해커들이 자신들이 만든 악성코드의 분석을 어렵게 하기 위하여 코드 난독화 기법을 적용하고 있다. 최근의 난독화 기법은 가상화 난독화 기법을 통해 원래의 코드를 바이트코드로 만들고 가상머신이 이를 실행시키는 방식으로, 실행시키기 전에는 원래의 코드를 알 수가 없다. 프로그램 슬라이싱은 프로그램 분석기술 중 하나로 슬라이싱 기준을 정하고 그와 관련된 문장을 추출해내는 기술이다. 본 논문에서는 슬라이싱 기법을 사용하여 난독화를 해제하는 방법을 제시한다.