• Title/Summary/Keyword: confidentiality

Search Result 694, Processing Time 0.021 seconds

Research on Emergency CAS Mission asset scoring for cyber battle damage assesment (사이버 전투 피해평가를 위한 긴급 CAS 임무 자산 스코어링 연구)

  • Kim, Jaekeun;Kim, Seongjung;Kim, Kookjin;Lee, Donghwan;Shin, Dongil;Shin, Dongkyoo
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2020.05a
    • /
    • pp.157-160
    • /
    • 2020
  • 사이버 공격은 조직과 국가에 큰 피해를 주려는 목적으로 정보를 가로채고 파괴하는 의도적인 행동으로 빚어지는 경우가 많다. 이에 따라 국제 표준화 기구(ISO)는 ISO/IEC 27000 시리즈 등 정보 자산의 보호를 위한 표준 문서를 지침으로 제공한다. 하지만 지침만 제공할 뿐 자산 보호를 위한 구체적인 방법이나 절차가 포함되어 있지 않다. 본 연구에서는 공군의 긴급 CAS(Close Air Support) 작전을 대상으로 추후 사이버 전투 피해평가를 위해 사이버 공격에 의한 정보 자산에 대한 점수를 가산화 한다. 긴급 CAS 작전 시뮬레이션 진행 후 도출된 요소를 가지고 객관적인 수치라고 할 수 있는 CIA(Confidentiality, Integrity, Availability)지표들과 군 정보를 접목시켜 자산의 중요성을 계산하고 나아가 가중치를 주어 차별성을 가지게 된다.

Suicide Prevention Policy Guideline Model Considering Privacy Law in Korea

  • Do-Hyun Kwon
    • Korean Journal of Biological Psychiatry
    • /
    • v.30 no.1
    • /
    • pp.7-16
    • /
    • 2023
  • Objectives This study aimed to review the Korean Constitution articles 14 and 20 of the "Law on suicide prevention" and investigate public perceptions of specific improvements to suicide prevention policies using results from the Korean 2018 National Survey on Suicide. Methods The questionnaire was designed to analyzing the act restricts sharing of patient information between hospitals, making it difficult to track suicide attempts. The questionnaire was also designed to suggest further medical and normative criteria for objective judgment of continuous follow-up utilizing suicide risk evaluations and proportional principle review that consider patients' and medical staff's basic rights. Results This study identified the result of the 1500 respondents, 79.1% believed that Korea should allow suicide prevention management to be implemented without requiring individual consent to protect suicide attempters. Conclusions According the results, I propose the following criteria for policy improvement: use of anonymized information and non-profit research for technical and ethical considerations, access to medical information only for therapeutic purposes, and use of surgical severity assessment criteria appropriate for Korea.

Research Ethics on the Psychological and Clinical Study Targeting Children and Adolescents

  • Seong-Gon KIM
    • Journal of Research and Publication Ethics
    • /
    • v.4 no.1
    • /
    • pp.15-21
    • /
    • 2023
  • Purpose: Psychological and clinical studies targeting children and adolescents have become increasingly important in recent years as researchers strive to understand better the psychological and physiological development of children and teens. The purpose of the study is to explore significant research ethics on the psychological and clinical study targeting children and adolescents. In addition to these ethical considerations, international and national codes of ethics and regulatory bodies guide ethical research practices with children and adolescents. Research design, data, and methodology: The present study used the qualitative textual collection through investigating the past and current literature review. Numerous prior studies have conducted this research design to obtain the right prior studies. Results: Previous Research has indicated there are four research ethics on the psychological and clinical study targeting children and adolescents. (1) Respect for autonomy, (2) Respect for privacy and confidentiality, (3) Respect for vulnerability, (4). Respect for beneficence. Conclusions: In conclusion, research ethics are essential for protecting children and adolescents when conducting psychological and clinical studies. In the future, research should focus on developing innovative methods to ensure the safety of children and adolescents while still allowing them to participate in research.

Creating an e-Benchmarking Model for Authentic Learning: Reflections on the Challenges of an International Virtual Project

  • LEPPISAARI, Irja;HERRINGTON, Jan;IM, Yeonwook;VAINIO, Leena
    • Educational Technology International
    • /
    • v.12 no.1
    • /
    • pp.21-46
    • /
    • 2011
  • International virtual teamwork offers new opportunities for the professional development of teachers. In this paper, we examine the initial experiences in an ongoing international virtual benchmarking project coordinated by the Finnish Online University of Applied Sciences. What challenges does an international context present for project construction and collaboration? Data from five countries, in the form of participant reflections and researchers' observations, were analysed according to four types of barriers: language, time, technical and mental barriers. Initial data indicates that trust is an essential starting point, as there is neither time nor possibilities to build mutual trust by traditional means. Organisational confidentiality issues, however, can complicate the situation. The project introduces 'collision' as a method of professional development, in which physical and organisational borders are crossed and the skills and competencies needed in global learning environments are acquired.

Enhancing cloud computing security: A hybrid machine learning approach for detecting malicious nano-structures behavior

  • Xu Guo;T.T. Murmy
    • Advances in nano research
    • /
    • v.15 no.6
    • /
    • pp.513-520
    • /
    • 2023
  • The exponential proliferation of cutting-edge computing technologies has spurred organizations to outsource their data and computational needs. In the realm of cloud-based computing environments, ensuring robust security, encompassing principles such as confidentiality, availability, and integrity, stands as an overarching imperative. Elevating security measures beyond conventional strategies hinges on a profound comprehension of malware's multifaceted behavioral landscape. This paper presents an innovative paradigm aimed at empowering cloud service providers to adeptly model user behaviors. Our approach harnesses the power of a Particle Swarm Optimization-based Probabilistic Neural Network (PSO-PNN) for detection and recognition processes. Within the initial recognition module, user behaviors are translated into a comprehensible format, and the identification of malicious nano-structures behaviors is orchestrated through a multi-layer neural network. Leveraging the UNSW-NB15 dataset, we meticulously validate our approach, effectively characterizing diverse manifestations of malicious nano-structures behaviors exhibited by users. The experimental results unequivocally underscore the promise of our method in fortifying security monitoring and the discernment of malicious nano-structures behaviors.

A Novel Methodology for Auditing the Threats in Cloud Computing - A Perspective based on Cloud Storage

  • Nasreen Sultana Quadri;Kusum Yadav;Yogesh Kumar Sharma
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.2
    • /
    • pp.124-128
    • /
    • 2024
  • Cloud computing is a technology for delivering information in which resources are retrieved from the internet through a web-based tools and applications, rather than a direct connection with the server. It is a new emerging computing based technology in which any individual or organization can remotely store or access the information. The structure of cloud computing allows to store and access various information as long as an electronic device has access to the web. Even though various merits are provided by the cloud from the cloud provides to cloud users, it suffers from various flaws in security. Due to these flaws, data integrity and confidentiality has become a challenging task for both the storage and retrieval process. This paper proposes a novel approach for data protection by an improved auditing based methodology in cloud computing especially in the process of cloud storage. The proposed methodology is proved to be more efficient in auditing the threats while storing data in the cloud computing architecture.

A Novel encrypted XML streaming technique for indexing data on multiple channels

  • Vinay K. Ahlawat;Gaurav Agarwal;Vikas Goel;Kueh Lee Hui;Mangal Sain
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.18 no.7
    • /
    • pp.1840-1867
    • /
    • 2024
  • In this study, we focus on addressing the functional domain of research related to indexing XML data in wireless networks, emphasizing ensuring data confidentiality. The abstract outlines a novel indexing method designed for broadcasting encrypted XML data over wireless networks. The proposed technique involves two channels: one for indexing and another for transmitting the actual XML data. The method ensures data security by encrypting the XML stream, allowing mobile devices to access only authorized bits based on their access permissions. Despite an increase in data access time and device tuning time, the study concludes that the proposed indexing technique significantly enhances the security of transmitting XML data over mobile wireless networks.

A Study on the Utilization and Problems of Online Dispute Resolution : Focusing on the Online Arbitration (온라인분쟁해결의 활용과 문제점에 관한 연구 - 온라인중재를 중심으로 -)

  • Yu, Byoung-Yook
    • THE INTERNATIONAL COMMERCE & LAW REVIEW
    • /
    • v.19
    • /
    • pp.191-223
    • /
    • 2003
  • Electronic commerce and the Internet offer unprecedented opportunities. The explosive expansion of the use of the Internet makes it possible for businesses to expand their markets and render services. Global transaction costs are easy to cut off using Internet and transaction speed is faster than before. Where cyberspace is not free from claims, Offline transaction can lead to problems and disputes the same is for cyberspace transactions. However ADR is not meet for the online transaction for speed, cost and open network system, ODR methods to resolve electronic commerce conflicts is crucial for building confidence and permitting access to justice in an online business environment. The use of the Internet and the network in dispute resolution has an impact on the types of communication implied in the relevant processes such as automated negotiation, online mediation and online arbitration and involves new technological issues such as the integrity and confidentiality of data and communication used to transmit and store data. Among the ODR systems Online Arbitration is currently binding both parties disputed and can achieve the aim of dispute award the same as the traditional arbitration. Arbitration is based on the New York Convention 1958, Arbitration Model law 1985 and national Arbitration Act that are founded on territorial area and rested on arbitration agreement, constitution of the arbitral tribunal, due process, final and binding award and enforcement of the arbitration award. To compare with this issues Online arbitration has unnecessarily legal unstability and risk. ODR is the burgeoning field and has created a new issues. All such issues which have been debated in the ADR are composed with ODR. But these are not limited Some of issues are further complicated by the nature of the online environment such as confidentiality and principle of parties. It is true that online arbitration should comply with legal provisions, but which is impossible to adhere of the law. Flexible translation and functional equivalence of legal provisions are needed for acceptance of electronic commerce disputes. Finally electronic commerce now takes place on the Internet, it is inevitable that the commercial world wants access to dispute resolution process that best suits the new commercial environment. ODR methods are processing for development and legal issues are considered by both national and international authorities. Introduction of new Conventions or amend Convention and Model law of ODR comes near.

  • PDF

Development of Win32 API Message Authorization System for Windows based Application Provision Service (윈도우 기반 응용프로그램 제공 서비스를 위한 Win32 API 메시지 인가 시스템의 개발)

  • Kim, Young-Ho;Jung, Mi-Na;Won, Yong-Gwan
    • The KIPS Transactions:PartC
    • /
    • v.11C no.1
    • /
    • pp.47-54
    • /
    • 2004
  • The growth of computer resource and network speed has increased requests for the use of remotely located computer systems by connecting through computer networks. This phenomenon has hoisted research activities for application service provision that uses server-based remote computing paradigm. The server-based remote computing paradigm has been developed as the ASP (Application Service Provision) model, which provides remote users through application sharing protocol to application programs. Security requirement such as confidentiality, availability, integrity should be satisfied to provide ASP service using centralized computing system. Existing Telnet or FTP service for a remote computing systems have satisfied security requirement by a simple access control to files and/or data. But windows-based centralized computing system is vulnerable to confidentiality, availability, integrity where many users use the same application program installed in the same computer. In other words, the computing system needs detailed security level for each user different from others, such that only authorized user or group of users can run some specific functional commands for the program. In this paper, we propose windows based centralized computing system that sets security policies for each user for the use of instructions of the application programs, and performs access control to the instructions based on the security policies. The system monitors all user messages which are executed through graphical user interface by the users connecting to the system. Ail Instructions, i.e. messages, for the application program are now passed to authorization process that decides if an Instruction is delivered to the application program based on the pre-defined security polices. This system can be used as security clearance for each user for the shared computing resource as well as shared application programs.

A Study for Deducing the Problems and Improvements of Health Safety and Welfare Policy for Korean Firefighters by Delphi (델파이 기법을 통한 소방공무원 보건안전정책의 문제점 및 개선방안 도출)

  • Park, Chanseok
    • Journal of the Society of Disaster Information
    • /
    • v.16 no.1
    • /
    • pp.34-43
    • /
    • 2020
  • Purpose: In this study, we will try to find out problems and improvements of the policies in order to verify whether the plans contribute to the health and welfare of the firefighters properly. Method: By the Delphi analysis by experts. Result: There are problems such as absence of Firefighters' hospital, insufficient mental health education program in fire department, lack of on-site risk assessment system, problem on ineffectiveness of mental and physical health care business, lack of substantiality on mental and physical stability program, absence of mental health education, ensuring the confidentiality for users of mental health programs, lack of support for parent firefighters, lack of firefighters' retirement design and insufficient treatment for female firefighters. Conclusion: There are Improvements such as establishing Firefighters' hospital, improving mental health education and training CISD leaders in the fire department, preparing disaster risk assessment system, effectiveness measurement for visiting psychological counseling projects, improving the program through customer satisfaction surveys, establishment of mental health education system, ensuring confidentiality by improving personnel systems, encourage childcare leave and introduce childcare facilities at fire stations, revitalizing retirement Firefighters and policy development for female firefighters.