• Title/Summary/Keyword: confidentiality

Search Result 694, Processing Time 0.021 seconds

Study on Token based KMS for Information Sharing (정보 공유를 위한 토큰 기반 KMS 연구)

  • Sung-Hwa Han;Hoo-Ki Lee
    • Convergence Security Journal
    • /
    • v.23 no.5
    • /
    • pp.29-34
    • /
    • 2023
  • KMS (Knowledge Management System) is used by various organizations to share information. This KMS includes important information as well as basic information used by each organization. To protect infortant information stored in KMS, many KMS use user identification and authentication features. In such a KMS security environment, if the account information of a user who can access the KMS is leaked, a malicious attacker using the account information can access the KMS and access all authorized important information. In this study, we propose KMS with user access control function that can protect important information even if user account information is leaked. The KMS with the user access control function proposed in this study protects the stored files in the KMS by applying an encryption algorithm. Users can access important documents by using tokens after logging in. A malicious attacker without a Token cannot access important files. As a result of checking the unit function for the target user access control function for effectiveness verification, it was confirmed that the access control function to be provided by KMS is normally provided.

A Study of Quantitative Characterization of Physically Uncloanble Functions (물리적 복제 불가능 회로 정량적 특성 평가 방법 연구)

  • Moon-Seok Kim
    • Convergence Security Journal
    • /
    • v.23 no.5
    • /
    • pp.143-150
    • /
    • 2023
  • Applications on physically unclonable circuits (PUFs) for implementing and utilizing security protocols with hardware is on the rise. PUFs have the capability to perform functions such as authentication, prevention of replication, and secure storage of critical information in integrated circuits and security systems. Through the implementation of physically unclonable circuits, a wide range of security features, including confidentiality, integrity, and availability, can be applied. Therefore, PUFs are promising candidate to build secure integrated circuits and hardware systems. However, in order that PUFs possess security features, PUFs should possess characteristics such as unpredictability, uniqueness, and robustness characteristics. This study provides a detailed explanation and introduction of the methods to characterize the PUF properties. By applying the results, it becomes possible to quantitatively evaluate the characteristics of implemented PUFs and assess their availabilities for security system applications.

User Experience (UX) in the Early Days of Generative AI : The benefits and concerns of employees in their 30s and 40s through the Q-methodology (생성형 인공지능 초기 단계의 사용자경험(UX): Q-방법론을 통해 살펴본 30-40대 직장인의 편의와 우려)

  • Yi, Eunju;Yun, Ji-Chan;Lee, Junsik;Park, Do-Hyung
    • The Journal of Information Systems
    • /
    • v.33 no.1
    • /
    • pp.1-30
    • /
    • 2024
  • Purpose The purpose of this study is to examine the customer experience of generative AI among office workers aged 30 to 40, investigating usability, usefulness, and affect, and understanding concerns and expectations. Design/Methodology/Approach This research used Q methodology to assess the customer experience of generative AI. Users are engaged in a problem-solving journey, and data is collected by having participants rank 36 statements based on usability, usefulness, and affect, referred to as the three goals of User Experience. Participants use a forced distribution table with a scale from -5 to +5 to indicate the subjective importance of each statement. The results identified four groups, reflecting different perspectives and attitudes toward generative AI. Findings Participants express overall comfort with generative AI, perceive AI as more knowledgeable in unfamiliar domains, but harbor doubts about AI's understanding. Disagreements emerge on AI replacing humans, the value of unique human roles, data confidentiality, fears of AI advancement, and emotional impacts. Identified four groups: Users who treat AI as a soulless assistant and are active in business use, Uncle users who want to use new technologies properly and are not afraid of technology, users who recognize the limits of AI despite its efficiency, and users who require strong verification in the future. It has the potential to guide future guidelines, ethical codes, and regulations for the appropriate use of AI. In addition, this approach lays the groundwork for future empirical analyses of generative AI.

Methodology to Verify the Unpredictability of True Random Number Generators (실난수 발생기 통계적 예측 불가능성 확인 방법)

  • Moon-Seok Kim;Seung-Bae Jeon
    • Convergence Security Journal
    • /
    • v.24 no.2
    • /
    • pp.123-132
    • /
    • 2024
  • In the era of the Internet of Things, 7 billion diverse devices have been interconnected worldwide. Ensuring information security across these varied devices is crucial in this hyper-connected age. To achieve essential security functions such as confidentiality, integrity, and authentication, it is imperative to implement true random number generators (TRNGs). Therefore, this study proposes a method to rapidly characterize the randomness of TRNGs. While there are international standards for formally characterizing the randomness of TRNGs, adhering to these standards often requires significant time and resources. This study aims to help TRNG developers enhance efficiency in both time and cost by characterizing rough randomness and unpredictability. Firstly, we propose applying auto-correlation and cross-correlation metrics for analog signals. Secondly, we suggest adopting joint entropy and mutual information metrics for digital signals.

A Study on Expected Dispute Arbitration in Supply Chain ESG Management: Focusing on the cases of POSCO and NAVER (공급망 ESG 관리에서 예상되는 분쟁 중재에 관한 연구 - 포스코와 네이버 사례를 중심으로 -)

  • Lee, Geonwoo;Lee, Jungeun;Lee, Hunjong
    • Journal of Arbitration Studies
    • /
    • v.34 no.1
    • /
    • pp.75-101
    • /
    • 2024
  • "ESG management" guides companies to prioritize corporate social responsibility and sustainable development as key management objectives, going beyond mere financial performance pursuits. This approach involves creating a sustainable and robust supply chain by urging companies, acting as 'supply chain managers', to implement ESG management practices alongside their 'supply chain partners'. The domestic business community has been quick to respond to this trend, recognizing that failure to adhere to ESG standards set by organizations such as the EU and SEC could lead to severe repercussions, including exclusion from international trade and reputational damage. POSCO and NAVER, two leading Korean companies, are at the forefront of practicing ESG management effectively. They have both produced and publicly disclosed ESG management reports, showcasing their success in enhancing supply chain ESG management. However, as supply chain managers enforce ESG-related obligations on their suppliers, the likelihood of disputes between the parties may increase. In scenarios where supply chain ESG management leads to conflicts between supply chain managers and suppliers, commercial arbitration emerges as a viable solution for dispute resolution. This method offers several advantages, including the arbitrators' expertise, time and cost efficiency, the binding nature of decisions akin to a court's final judgment, international recognition under the New York Convention, confidentiality, and ample opportunity for parties to be heard. Our analysis focuses on the emerging disputes between supply chain managers and suppliers within the context of supply chain ESG management, particularly examining the cases of POSCO and NAVER. By categorizing the expected types of disputes and assessing the appropriateness of commercial arbitration for their resolution, we highlight the effectiveness of this approach. Furthermore, we propose leveraging the Korean Commercial Arbitration Board's role to enhance the use of arbitration in resolving supply chain ESG disputes, underscoring its potential as a strategic tool for maintaining sustainable and harmonious supply chain relationships.

IPsec VPN Encrypted Packet Analysis Method for Contents Auditing (콘텐츠 감사를 위한 IPsec VPN 패킷 분석 기술 연구)

  • Junghyung Park;Jaenam Yoon;Jaecheol Ryou
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.34 no.1
    • /
    • pp.41-52
    • /
    • 2024
  • Security audits of IPsec VPNs are crucial for identifying vulnerabilities caused by implementation flaws or misconfigurations, as well as investigating incidents. Nevertheless, auditing IPsec VPN presents noteworthy challenge due to the encryptiong of network contents which ensere confidentiality, integrity, authentications and more. Some researchers have suggested using man-in-the-middle(MITM) techniques to overcome this challenge. MITM techniques require direct participation in the network and prior knowledge of the pre-shared key for authentication. This causes temporary network disconnection for security audits, and it is impossible to analyse data collected before the audit. In this paper, we present an analysis technique aimed at ensuring network continuity without relying on a specific IPsec VPN topologies or authentication method. Therefore, it is anticipated that this approach will be effective, practical and adaptable for conducting IPsec VPN security

Developing and Utilizing of a Social Workers' Ethical Sensitivity Test(SWEST) (사회복지사 윤리적 민감성 검사도구(SWEST) 개발 및 활용에 관한 연구)

  • Choi, Myung-Min
    • Korean Journal of Social Welfare
    • /
    • v.60 no.2
    • /
    • pp.5-28
    • /
    • 2008
  • This study tried to develop an test tool of social workers' ethical sensitivity(SWEST) on base of realization about the importance of ethical sensitivity of social worker who are required more ethicalities than the other professionals. Nevertheless, there has been no tool that can measure ethical sensitivity of social workers in our country up to now. Through analysis of existing ethical sensitivity tests in other professions, a paper and pencil method about unstructured question with cases including ethical issues and structured scoring system was chosen as an appropriate method for the SWEST. This study progressed in order : 1st collecting cases, 2nd composing cases, 3rd consulting cases, 4th pilot study, 5th making scoring standards, 6th determining case examples and scoring standards. With the result, the tool consists of 3 case examples with ethical issues : 1) self-determination and confidentiality, 2) equality and double relationship, 3) informed consent and conflict interest. And ethical sensitivities of social work major students and social workers were measured with the SWEST, to see practical utility of this test. The agreement degrees between two independent raters were above 90%. And respondent's ethical sensitivity displayed the most definite difference according to taking or not taking a course 'Social work values and ethics'. Through these results, it can be drawn that the SWEST is reliable and valid to test relevant differences in Korean social workers' ethical sensitivity. The SWEST is expected to activate studying, educating, and practicing ethics in social work.

  • PDF

Analysis on job specification characteristics of dietitians in self - operated vs. contracted employee foodservice (직영 및 위탁 사업체 급식소 영양사 직무 명세 특성 분석)

  • Yang, Il-Seon;Cha, Jin-A
    • Journal of the Korean Dietetic Association
    • /
    • v.3 no.2
    • /
    • pp.141-158
    • /
    • 1997
  • The purpose of this study were to investigate the job analysis questionnaire was mailed to 250 dietitians who are members of The Korean dietetic association practice group in self-operated foodservices(hereafter group A)and 250 dietitians who are employed in contracted foodservice companies(hereafter group B). Completed questionnaires were received from 285 dietitians(121 in self-operated, 164 in contracted) ; a response rate of 57%. Statistical data analysis was completed using the SAS/win packages for descriptive analysis, t-test, $x^2$-test, The results of this study can be summarized as follows. 1. The dietetic training or internship experiences were significantly different between the two sample group(p<.001), but the perceptions of needs for training or internship were not different between and they thought one to six month training would be needed for the job. 2. The question about the time needed in order to perform an expert job was answered significantly differently(p<.001) 3. Group A usually took part in obligatory continuing education and short-term training courses, and group B usually took part in obligatory continuing education and on-the-job trainings, respectively. However both group perceived all three types of educations would be needed for performing the job better. 4. As for the physical demands of the job, a certain degree of accuracy and dexterity for physical tasks and equipment operations was needed for the job. Concerning the mental demands, they answered that their job needs considerable creativity and judgement for planning and performing their tasks was needed. 5. As for responsibilities, group B's responsibilities were heavier than group A’s(p<.001) and need for confidentiality was also greater for group B than for group A(p<.001). 6. As for the supervising role differences, group A rarely received supervision from others and they were given directions only in essential situations, whereas group B was usually supervised when planning and performing their job and tasks, showing significant difference in positions between the two sample groups(p<.001). But each group supervised co-workers and employees in their department. 7. With regard to personal contact, both groups frequently contacted people in their department and other departments at the company and sometimes people outside the company. 8. Concerning the work environment, there were some risks and discomforts in the physical environment and there was no significant difference between the two sample groups.

  • PDF

The Challenge of Personal Information Act for Oral History Project (구술자료의 수집과 서비스에 대한 개인정보 보호법의 도전)

  • Lee, Hosin
    • Journal of Korean Society of Archives and Records Management
    • /
    • v.17 no.1
    • /
    • pp.193-216
    • /
    • 2017
  • The purpose of this study is to understand issues related to the Personal Information Act recently emerging in the field of oral history, and to prepare countermeasures for oral history academics and archives. The Personal Information Act is intended to protect the confidentiality and freedom of the constitutional privacy, and to assure the right to self-determination of information, thereby realizing the dignity and value of the individual. Oral history is intended for living persons; therefore, strict ethical standards are needed to protect the morality of the person behind the sound recordings and appears as the subject of oral history. However, if the uniform application of the Personal Information Act is made, it is a requirement to make the process of consenting and notifying excessively complex and almost impossible to realize, making collection and service of oral history resource improbable. The mechanical and strict application of the Personal Information Act does not come into being because it has the aspect of undermining the inherent intrinsic value of oral history resources and making it difficult to maintain the authenticity of the records. To solve these problems, it is necessary to revise Article 58 (4) of the Personal Information Act of Korea. In addition, it is necessary to establish a guideline for the establishment of independent ethical standards of oral history itself, especially for the protection of the moral rights of third parties.

Design, Analysis, and Equivalent Circuit Modeling of Dual Band PIFA Using a Stub for Performance Enhancement

  • Yousaf, Jawad;Jung, Hojin;Kim, Kwangho;Nah, Wansoo
    • Journal of electromagnetic engineering and science
    • /
    • v.16 no.3
    • /
    • pp.169-181
    • /
    • 2016
  • This work presents a new method for enhancing the performance of a dual band Planer Inverted-F Antenna (PIFA) and its lumped equivalent circuit formulation. The performance of a PIFA in terms of return loss, bandwidth, gain, and efficiency is improved with the addition of the proposed open stub in the radiating element of the PIFA without disturbing the operating resonance frequencies of the antenna. In specific cases, various simulated and fabricated PIFA models illustrate that the return loss, bandwidth, gain, and efficiency values of antennas with longer optimum open stub lengths can be enhanced up to 4.6 dB, 17%, 1.8 dBi, and 12.4% respectively, when compared with models that do not have open stubs. The proposed open stub is small and does not interfere with the surrounding active modules; therefore, this method is extremely attractive from a practical implementation point of view. The second presented work is a simple procedure for the development of a lumped equivalent circuit model of a dual band PIFA using the rational approximation of its frequency domain response. In this method, the PIFA's measured frequency response is approximated to a rational function using a vector fitting technique and then electrical circuit parameters are extracted from it. The measured results show good agreement with the electrical circuit results. A correlation study between circuit elements and physical open stub lengths in various antenna models is also discussed in detail; this information could be useful for the enhancement of the performance of a PIFA as well as for its systematic design. The computed radiated power obtained using the electrical model is in agreement with the radiated power results obtained through the full wave electromagnetic simulations of the antenna models. The presented approach offers the advantage of saving computation time for full wave EM simulations. In addition, the electrical circuit depicting almost perfect characteristics for return loss and radiated power can be shared with antenna users without sharing the actual antenna structure in cases involving confidentiality limitations.