• Title/Summary/Keyword: Security Level Management

Search Result 802, Processing Time 0.024 seconds

A Study on the Activation Way for Citizens to Participate in Police administration - Centering on PCRM Utilization - (경찰행정의 시민참여 활성화방안에 관한 연구 - PCRM활용을 중심으로 -)

  • Lee, Jong-Yup;Lee, Seung-Chal
    • Korean Security Journal
    • /
    • no.16
    • /
    • pp.283-304
    • /
    • 2008
  • The development of IT technology help citizens demand information and public services through internet that they want, and the changes also help the government converge public opinions and become important measures for citizens to participate in deciding governmental policies. So, this thesis makes an overture of a possibility for utilizing PCRM, a way for citizens to participate in Police Administration, by utilizing IT technologies in which everybody can participate without difficulty. The utilization ways are, on a large scale, classified with a macroscopic aspect and microscopic aspect. One of the macroscopic aspects is, first, the consideration of access to services and convenience in utilization. Second, services should have a both-sidedproperty. Ultimately, citizens'participation should have a positive mutual participation level. One of the microscopic aspects is, first, that the police organizations have to establish a strategy to analyze and fractionate customers. Second, the police organizations have to make an effort to develop policy services and P.R strategies. Third, police organizations have to make an effort to manage customers. Fourth, police organizations have to execute customer management in general. So, all of the police organizations have to maintain unity, to some extent, about citizen participation plazas. In addition, at the same time, consciousness aspects have to be accompanied for the reasonable utilization of PCRM. Citizens have to cultivate citizen consciousness, ownership consciousness for society, and positive participation consciousness to solve social problems.

  • PDF

Gender Differences in Entrepreneurship: The Impact of Social Context (기업가정신의 성별 차이: 사회적 맥락의 영향)

  • Choo, Seungyoup
    • Journal of Digital Convergence
    • /
    • v.19 no.10
    • /
    • pp.119-132
    • /
    • 2021
  • This study focused on examining the impact of the social context that causes gender differences in entrepreneurship, not the phenomenon itself. Specifically, this study verified the moderating effect of the social context on the relationship between gender and entrepreneurship using data from 20 countries in the Global Entrepreneurship Trend Report (GETR). In order to test hypotheses involving social context implications, Hofstede's cultural dimension factors such as power distance, individualism, masculinity, and uncertainty avoidance variables, and institutional factors such as gender equality and social security are used as specific variables reflecting the social context. Empirical analysis through GLM found that gender did not independently influence entrepreneurship, and gender had a significant effect by interacting with power distance, individualism, uncertainty avoidance, gender equality, and social security variables, respectively. Such empirical results show that the gender difference in entrepreneurship is not due to the unique characteristics inherent in each gender but on the level of the country's social context to which the individual belongs.

Design and Analysis of Technical Management System of Personal Information Security using Web Crawer (웹 크롤러를 이용한 개인정보보호의 기술적 관리 체계 설계와 해석)

  • Park, In-pyo;Jeon, Sang-june;Kim, Jeong-ho
    • Journal of Platform Technology
    • /
    • v.6 no.4
    • /
    • pp.69-77
    • /
    • 2018
  • In the case of personal information files containing personal information, there is insufficient awareness of personal information protection in end-point areas such as personal computers, smart terminals, and personal storage devices. In this study, we use Diffie-Hellman method to securely retrieve personal information files generated by web crawler. We designed SEED and ARIA using hybrid slicing to protect against attack on personal information file. The encryption performance of the personal information file collected by the Web crawling method is compared with the encryption decryption rate according to the key generation and the encryption decryption sharing according to the user key level. The simulation was performed on the personal information file delivered to the external agency transmission process. As a result, we compared the performance of existing methods and found that the detection rate is improved by 4.64 times and the information protection rate is improved by 18.3%.

Investigating Non-Laboratory Variables to Predict Diabetic and Prediabetic Patients from Electronic Medical Records Using Machine Learning

  • Mukhtar, Hamid;Al Azwari, Sana
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.9
    • /
    • pp.19-30
    • /
    • 2021
  • Diabetes Mellitus (DM) is one of common chronic diseases leading to severe health complications that may cause death. The disease influences individuals, community, and the government due to the continuous monitoring, lifelong commitment, and the cost of treatment. The World Health Organization (WHO) considers Saudi Arabia as one of the top 10 countries in diabetes prevalence across the world. Since most of the medical services are provided by the government, the cost of the treatment in terms of hospitals and clinical visits and lab tests represents a real burden due to the large scale of the disease. The ability to predict the diabetic status of a patient without the laboratory tests by performing screening based on some personal features can lessen the health and economic burden caused by diabetes alone. The goal of this paper is to investigate the prediction of diabetic and prediabetic patients by considering factors other than the laboratory tests, as required by physicians in general. With the data obtained from local hospitals, medical records were processed to obtain a dataset that classified patients into three classes: diabetic, prediabetic, and non-diabetic. After applying three machine learning algorithms, we established good performance for accuracy, precision, and recall of the models on the dataset. Further analysis was performed on the data to identify important non-laboratory variables related to the patients for diabetes classification. The importance of five variables (gender, physical activity level, hypertension, BMI, and age) from the person's basic health data were investigated to find their contribution to the state of a patient being diabetic, prediabetic or normal. Our analysis presented great agreement with the risk factors of diabetes and prediabetes stated by the American Diabetes Association (ADA) and other health institutions worldwide. We conclude that by performing class-specific analysis of the disease, important factors specific to Saudi population can be identified, whose management can result in controlling the disease. We also provide some recommendations learnt from this research.

Authenticated Handoff with Low Latency and Traffic Management in WLAN (무선랜에서 낮은 지연 특성을 가지는 인증유지 핸드오프 기법과 트래픽 관리 기법)

  • Choi Jae-woo;Nyang Dae-hun;Kang Jeon-il
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.15 no.2
    • /
    • pp.81-94
    • /
    • 2005
  • Recently, wireless LAN circumstance is being widely deployed in Public spots. Many People use Portable equipments such as PDA and laptop computer for multimedia applications, and also demand of mobility support is increasing. However, handoff latency is inevitably occurred between both APs when clients move from one AP to another. To reduce handoff latency. in this paper, we suggest WFH(Weighted Frequent Handoff) using effective data structure. WFH improves cache hit ratio using a new cache replacement algorithm considering the movement pattern of users. It also reduces unessential duplicate traffics. Our algorithm uses FHR(Frequent Handoff Region) that can change pre-authentication lesion according to QoS based user level, movement Pattern and Neighbor Graph that dynamically captures network movement topology.

Secure Contents Access Control System in IPTV Flexible-PPC Model (IPTV Flexible-PPC 환경에서의 안전한 콘텐츠 접근 제어 시스템)

  • Kang, Yong-Goo;Lim, Ji-Hwan;Oh, Hee-Kuck
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.21 no.1
    • /
    • pp.93-104
    • /
    • 2011
  • A conditional access system is an essential element in IPTV services enabling service providers to allow authorized access to their services only to paid subscribers. Currently, there are two types of IPTV service models, namely PPC (pay-per-channel) and PPV (pay-per-view). However, a more desirable model would be the flexible PPC model, in which subscribers are free to choose any combination of preferred channels and add/remove channels independently. In this paper, we first point out that a previously proposed key management scheme for F-PPC is not secure. We then propose a new conditional access system using 4-level key hierarchy to realize secure F-PPC services. Compared to existing schemes, the proposed system is very efficient, just requiring O(1) communication for key update.

Improving Efficiency of Encrypted Data Deduplication with SGX (SGX를 활용한 암호화된 데이터 중복제거의 효율성 개선)

  • Koo, Dongyoung
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.11 no.8
    • /
    • pp.259-268
    • /
    • 2022
  • With prosperous usage of cloud services to improve management efficiency due to the explosive increase in data volume, various cryptographic techniques are being applied in order to preserve data privacy. In spite of the vast computing resources of cloud systems, decrease in storage efficiency caused by redundancy of data outsourced from multiple users acts as a factor that significantly reduces service efficiency. Among several approaches on privacy-preserving data deduplication over encrypted data, in this paper, the research results for improving efficiency of encrypted data deduplication using trusted execution environment (TEE) published in the recent USENIX ATC are analysed in terms of security and efficiency of the participating entities. We present a way to improve the stability of a key-managing server by integrating it with individual clients, resulting in secure deduplication without independent key servers. The experimental results show that the communication efficiency of the proposed approach can be improved by about 30% with the effect of a distributed key server while providing robust security guarantees as the same level of the previous research.

Development of Competency Model for Police' Digital Forensic Examiner (경찰 디지털증거분석관 역량모델 개발)

  • Oh SoJung;Jeong JunSeon;Cho EunByul;Kim GiBum
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.33 no.4
    • /
    • pp.647-659
    • /
    • 2023
  • As digital evidence becomes more important in criminal investigations, disputes are increasing in court. As media diversifies and the scope of analysis expands, the level of expertise in digital forensics is also increasing. However, no competency model has been developed to define the capabilities of digital evidence examiners or to judge their expertise. There have been some studies that have derived the capabilities necessary for digital evidence examiner, but they are still insufficient. Therefore, in this study, 25 competency evaluation factors in a total of 9 competency groups were defined using methodologies such as expert FGI and Delphi survey. Specifically, it was defined as Digital Forensics Theory, Digital Evidence Collection&Management, Disk Forensics, Mobile Forensics, Video Forensics, infringement forensics, DB Forensics, Embedded(IoT) Forensics, and Cloud Forensics. The digital evidence examiner competency model is expected to be used in various fields such as recruitment, education and training, and performance evaluation in the future.

Smart Radar System for Life Pattern Recognition (생활패턴 인지가 가능한 스마트 레이더 시스템)

  • Sang-Joong Jung
    • Journal of the Institute of Convergence Signal Processing
    • /
    • v.23 no.2
    • /
    • pp.91-96
    • /
    • 2022
  • At the current camera-based technology level, sensor-based basic life pattern recognition technology has to suffer inconvenience to obtain accurate data, and commercial band products are difficult to collect accurate data, and cannot take into account the motive, cause, and psychological effect of behavior. the current situation. In this paper, radar technology for life pattern recognition is a technology that measures the distance, speed, and angle with an object by transmitting a waveform designed to detect nearby people or objects in daily life and processing the reflected received signal. It was designed to supplement issues such as privacy protection in the existing image-based service by applying it. For the implementation of the proposed system, based on TI IWR1642 chip, RF chipset control for 60GHz band millimeter wave FMCW transmission/reception, module development for distance/speed/angle detection, and technology including signal processing software were implemented. It is expected that analysis of individual life patterns will be possible by calculating self-management and behavior sequences by extracting personalized life patterns through quantitative analysis of life patterns as meta-analysis of living information in security and safe guards application.

A Study on the development plan for the smooth fixation of the RNTC (부사관학군단(RNTC)의 원활한 정착을 위한 발전방안 연구)

  • Eung-woo Nam;Jong-Hyun Park
    • Convergence Security Journal
    • /
    • v.22 no.4
    • /
    • pp.53-63
    • /
    • 2022
  • The Ministry of National Defense reintroduced the non-commissioned officer corps (RNTC) system for colleges from 2015 and has been testing it for five years. The reason for this is that the acquisition of non-commissioned officers in the military is low and the level of manpower management is low. Through the implementation of the NCO(RNTC) system, the military expected that the colleges would stably acquire non-commissioned officers with excellent resources in various major fields, and the colleges expected positive results in entrance exams and employment. However, when analyzing the results of the pilot operation, it can be evaluated that the expected results have not been achieved. It was found that the system needs to be supplemented and improved to achieve the purpose of the system implementation in the promotion of recruitment of district candidates, selection evaluation, operation and the cooperative system between the military and colleges. Therefore, in this study, a development plan was presented to supplement the system and operation system so that the non-commissioned officer corps system can be smoothly established at universities and obtain the expected results from the military and colleges.