• Title/Summary/Keyword: confidentiality

Search Result 698, Processing Time 0.025 seconds

Selectively Partial Encryption of Images in Wavelet Domain (웨이블릿 영역에서의 선택적 부분 영상 암호화)

  • ;Dujit Dey
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.28 no.6C
    • /
    • pp.648-658
    • /
    • 2003
  • As the usage of image/video contents increase, a security problem for the payed image data or the ones requiring confidentiality is raised. This paper proposed an image encryption methodology to hide the image information. The target data of it is the result from quantization in wavelet domain. This method encrypts only part of the image data rather than the whole data of the original image, in which three types of data selection methodologies were involved. First, by using the fact that the wavelet transform decomposes the original image into frequency sub-bands, only some of the frequency sub-bands were included in encryption to make the resulting image unrecognizable. In the data to represent each pixel, only MSBs were taken for encryption. Finally, pixels to be encrypted in a specific sub-band were selected randomly by using LFSR(Linear Feedback Shift Register). Part of the key for encryption was used for the seed value of LFSR and in selecting the parallel output bits of the LFSR for random selection so that the strength of encryption algorithm increased. The experiments have been performed with the proposed methods implemented in software for about 500 images, from which the result showed that only about 1/1000 amount of data to the original image can obtain the encryption effect not to recognize the original image. Consequently, we are sure that the proposed are efficient image encryption methods to acquire the high encryption effect with small amount of encryption. Also, in this paper, several encryption scheme according to the selection of the sub-bands and the number of bits from LFSR outputs for pixel selection have been proposed, and it has been shown that there exits a relation of trade-off between the execution time and the effect of the encryption. It means that the proposed methods can be selectively used according to the application areas. Also, because the proposed methods are performed in the application layer, they are expected to be a good solution for the end-to-end security problem, which is appearing as one of the important problems in the networks with both wired and wireless sections.

A Study on Presidential Security Activities of Military Intelligence Investigation Agency - Since the Korean War, from 1950 to the present - (군(軍) 정보수사기관의 대통령 경호활동 고찰: 1950년 한국전쟁 이후부터 현재까지)

  • Choi, Jong-Young;Jung, Ju-Ho
    • Korean Security Journal
    • /
    • no.53
    • /
    • pp.63-79
    • /
    • 2017
  • Defence Security Command is the only military intelligence and investigation agency which is in charge of safeguarding military information and investigating specific crimes such as subversion and disloyalty in military. While the presidential security provided by Defence Security Command, along with Presidential Security Service(PSS) and the police, forms one of three pillars sustaining presidential security, its works and activities have been rarely known to the public due to the military confidentiality. This study looks into some data specialized into the presidential security among works of Defense Security Command by using various resources such as biographies of key people, media reports, and public materials. It reviews the presidential security works in a historical sense that the works have developed and changed in accordance with the historical changes of Defense Security Command, which was rooted in Counter-Intelligence Corps (Teukmubudae in Korean) in 1948 and leads to the present. The study findings are as follows. First, when the Korean War broke out in 1950 and since then the South Korea was under the threat of the North Korean armed forces and left wing forces, Counter-Intelligence Corps(Bangcheopdudae in Korean) took the lead in presidential security more than the police who was in charge of it. Secondly, even after the Presidential Security Office has founded in 1963, the role of the military on presidential security has been extended by changing its titles from Counter-Intelligence Corps to Army Security corps to Armed Forces Security Command. It has developed their provision of presidential security based on the experience at the president Rhee regime when they could successfully guard the president Rhee and the important government members. Third, since the re-establishment into Defence Security Command in 1990, it has added more security services and strengthened its legal basis. With the excellent expertise, it played a pivotal role in the G20 and other state-level events. After the establishment of the Moon Jaeinin government, its function has been reduced or abolished by the National Defense Reform Act. However, the presidential security field has been strengthening by improving security capabilities through reinforcing the organization. This strengthening of the security capacity is not only effective in coping with the current confrontation situation with the hostile North Korean regime, but also is important and necessary in conducting constant monitoring of the military movement and security-threat factors within military during the national security events.

  • PDF

Brief Observation on Arbitration Agreement and Arbitral Award - Focusing on Construction Disputes - (중재합의와 중재판정에 관한 소고 -건설분쟁을 중심으로-)

  • Cho Dae-Yun
    • Journal of Arbitration Studies
    • /
    • v.14 no.1
    • /
    • pp.273-314
    • /
    • 2004
  • There is a belief in the construction industry that the traditional court system may not be an ideal forum to effectively and efficiently resolve construction disputes due to the protracted proceedings and the three tier appeal system resulting in a long delay in the final and conclusive settlement of the dispute, relatively high costs involved, the lack of requisite knowledge and experience in the relevant industry, etc. Hence, they assert that certain alternative dispute resolution ('ADR') methods, such as mediation, conciliation, arbitration or a new system for dispute settlement in the form of any combination thereof should be developed and employed for construction disputes so as to resolve them more promptly and efficiently to the satisfaction of all the disputants concerned. This paper discusses certain merits of such assertions and the need for additional considerations for effective resolution of the construction disputes in light of the complexity of the case, importance of expert witnesses, parties' relationship and non-level playing field of the construction industry and so on. At the same time, however, given the inherent nature of disputes rendering the parties involved in an adversarial position, it would rather be difficult, if not practically impossible, to satisfy all the parties concerned in the dispute. Accordingly, in this study, it is also purported to address the demerits of such assertions by studying the situation from a more balanced perspective, in particular, in relation to the operation of such ADRs. In fact, most of such ADRs as stipulated by special acts, such as the Construction Industry Basic Act of Korea, in the form of mediation or conciliation, have failed to get support from the industry, and as a result, such ADRs are seldom used in practice. Tn contrast, the court system has been greatly improved by implementing a new concentrated review system and establishing several tribunals designed to specialize in the review and resolution of specific types of disputes, including the construction disputes. These improvements of the court system have been warmly received by the industry. Arbitration is another forum for settlement of construction disputes, which has grown and is expected to grow as the most effective ADR with the support from the construction industry. In this regard, the Korean Commercial Arbitration Board ('KCAB') has established a set of internal rules end procedures in operation to efficiently handle construction disputes. Considering the foregoing, this paper addresses the most important elements of the arbitration, i.e., arbitration agreement and arbitral award, primarily focusing on the domestic arbitrations before the KCAB. However, since this parer is prepared for presentation at the construction disputes seminar for the public audience, it is not intended for academic purposes, nor does it delve into any specific acadcmic issues. Likewise, although this paper addresses certain controversial issues by way of introduction, it mainly purports to facilitate the understanding of the general public, including the prospective arbitrators on the KCAB roster without the relevant legal education and background, concerning the importance of the integrity of the arbitration agreement and the arbitral award. In sum, what is purported in this study is simply to note that there are still many outstanding issues with mediation, conciliation and arbitration, as a matter of system, institutional operation or otherwise, for further study and consideration so as to enhance them as effective means for settlement of construction disputes, in replacement of or in conjunction with the court proceeding. For this purpose, it is essential for all the relevant parties, including lawyers, engineers, owners, contractors and social activists aiming to protect consumers' and subcontractors' interests, to conduct joint efforts to study the complicated nature of construction works and to develop effective means for examination and handling of the disputes of a technical nature, including the accumulation of the relevant industrial data. Based on the foregoing, the parties may be in a better position to select the appropriate dispute resolution mechanism, a court proceeding or in its stead, an effective ADR, considering the relevant factors of the subject construction works or the contract structure, such as the bargaining position of the parties, their financial status, confidentiality requirements, technical or commercial complexity of the case at hand, urgency for settlements, etc.

  • PDF

Comparative Analysis of ViSCa Platform-based Mobile Payment Service with other Cases (스마트카드 가상화(ViSCa) 플랫폼 기반 모바일 결제 서비스 제안 및 타 사례와의 비교분석)

  • Lee, June-Yeop;Lee, Kyoung-Jun
    • Journal of Intelligence and Information Systems
    • /
    • v.20 no.2
    • /
    • pp.163-178
    • /
    • 2014
  • Following research proposes "Virtualization of Smart Cards (ViSCa)" which is a security system that aims to provide a multi-device platform for the deployment of services that require a strong security protocol, both for the access & authentication and execution of its applications and focuses on analyzing Virtualization of Smart Cards (ViSCa) platform-based mobile payment service by comparing with other similar cases. At the present day, the appearance of new ICT, the diffusion of new user devices (such as smartphones, tablet PC, and so on) and the growth of internet penetration rate are creating many world-shaking services yet in the most of these applications' private information has to be shared, which means that security breaches and illegal access to that information are real threats that have to be solved. Also mobile payment service is, one of the innovative services, has same issues which are real threats for users because mobile payment service sometimes requires user identification, an authentication procedure and confidential data sharing. Thus, an extra layer of security is needed in their communication and execution protocols. The Virtualization of Smart Cards (ViSCa), concept is a holistic approach and centralized management for a security system that pursues to provide a ubiquitous multi-device platform for the arrangement of mobile payment services that demand a powerful security protocol, both for the access & authentication and execution of its applications. In this sense, Virtualization of Smart Cards (ViSCa) offers full interoperability and full access from any user device without any loss of security. The concept prevents possible attacks by third parties, guaranteeing the confidentiality of personal data, bank accounts or private financial information. The Virtualization of Smart Cards (ViSCa) concept is split in two different phases: the execution of the user authentication protocol on the user device and the cloud architecture that executes the secure application. Thus, the secure service access is guaranteed at anytime, anywhere and through any device supporting previously required security mechanisms. The security level is improved by using virtualization technology in the cloud. This virtualization technology is used terminal virtualization to virtualize smart card hardware and thrive to manage virtualized smart cards as a whole, through mobile cloud technology in Virtualization of Smart Cards (ViSCa) platform-based mobile payment service. This entire process is referred to as Smart Card as a Service (SCaaS). Virtualization of Smart Cards (ViSCa) platform-based mobile payment service virtualizes smart card, which is used as payment mean, and loads it in to the mobile cloud. Authentication takes place through application and helps log on to mobile cloud and chooses one of virtualized smart card as a payment method. To decide the scope of the research, which is comparing Virtualization of Smart Cards (ViSCa) platform-based mobile payment service with other similar cases, we categorized the prior researches' mobile payment service groups into distinct feature and service type. Both groups store credit card's data in the mobile device and settle the payment process at the offline market. By the location where the electronic financial transaction information (data) is stored, the groups can be categorized into two main service types. First is "App Method" which loads the data in the server connected to the application. Second "Mobile Card Method" stores its data in the Integrated Circuit (IC) chip, which holds financial transaction data, which is inbuilt in the mobile device secure element (SE). Through prior researches on accept factors of mobile payment service and its market environment, we came up with six key factors of comparative analysis which are economic, generality, security, convenience(ease of use), applicability and efficiency. Within the chosen group, we compared and analyzed the selected cases and Virtualization of Smart Cards (ViSCa) platform-based mobile payment service.

A Study on the Korea Future Internet Promotion Plan for Cyber Security Enhancement (사이버 보안 강화를 위한 한국형 미래 인터넷 추진 방안에 관한 연구)

  • Lim, Gyoo-Gun;Jin, Hai-Yan;Ahn, Jae-Ik
    • Informatization Policy
    • /
    • v.29 no.1
    • /
    • pp.24-37
    • /
    • 2022
  • Amid rapid changes in the ICT environment attributed to the 4th Industrial Revolution, the development of information & communication technology, and COVID-19, the existing internet developed without considering security, mobility, manageability, QoS, etc. As a result, the structure of the internet has become complicated, and problems such as security, stability, and reliability vulnerabilities continue to occur. In addition, there is a demand for a new concept of the internet that can provide stability and reliability resulting from digital transformation-geared advanced technologies such as artificial intelligence and IoT. Therefore, in order to suggest a way of implementing the Korean future internet that can strengthen cybersecurity, this study suggests the direction and strategy for promoting the future internet that is suitable for the Korean cyber environment through analyzing important key factors in the implementation of the future internet and evaluating the trend and suitability of domestic & foreign research related to future internet. The importance of key factors in the implementation of the future internet proceeds in the order of security, integrity, availability, stability, and confidentiality. Currently, future internet projects are being studied in various ways around the world. Among numerous projects, Bright Internet most adequately satisfies the key elements of future internet implementation and was evaluated as the most suitable technology for Korea's cyber environment. Technical issues as well as strategic and legal issues must be considered in order to promote the Bright Internet as the frontrunner Korean future internet. As for technical issues, it is necessary to adopt SAVA IPv6-NID in selecting the Bright Internet as the standard of Korean future internet and integrated data management at the data center level, and then establish a cooperative system between different countries. As for strategic issues, a secure management system and establishment of institution are needed. Lastly, in the case of legal issues, the requirement of GDPR, which includes compliance with domestic laws such as Korea's revised Data 3 Act, must be fulfilled.

Biasing Factors in Self-Report Assessment of Bullying/Victimization: Examining Variability in Involvement Rates by Testing Conditions (자기보고식 괴롭힘 경험률 평가의 편향요인 탐색: 평가조건 변인을 중심으로)

  • Lee, Donghyung
    • Korean Journal of School Psychology
    • /
    • v.15 no.3
    • /
    • pp.459-488
    • /
    • 2018
  • The self-report assessment has been most commonly used to estimate bullying/victimization (B/V) rates in most domestic and international prevalence studies. However, the presence of many potential biasing factors in such an assessment method, including specific operationalization/measurement strategies and testing conditions, has become an issue due to a considerable variability in reported involvement rates across studies. This study analyzed self-reported B/V involvement rates on Olweus Bullying Questionnaire (OBQ) among 690 Korean middle school students by gender and two different cut-offs (generous vs. strict cut-offs) and examined if the involvement rates were significantly varied by testing conditions such as presentation vs. omission of a precise definition of B/V, anonymous vs. non-anonymous/confidential administration, and the use of global vs. specific questions. Chi-square analyses revealed that boys displayed higher involvement rates on global measures of B/V and on items related to direct forms of B/V, with no significant gender differences on specific measures of relational B/V rates. It was also found that a global rate of bullying and specific rates of verbal B/V were 111% to 157% higher when no definition was provided. However, anonymous vs. non-anonymous administration had no significant impacts on rates of involvement, except for one item; there were also no significant differences in reported degrees of frankness and perceived confidentiality of their responses across two adminstration conditions. Finally, when involvement rates were assessed by using specific vs. global items, they were 68% to 148% higher with binominal correlations in low to moderate ranges. Findings also indicated that global items had a high specificity but a relatively low sensitivity. Implications of these findings were fully discussed for researchers and practitioners in the field of B/V assessment.

Consumer Awareness and Evaluation of Retailers' Social Responsibility: An Exploratory Approach into Ethical Purchase Behavior from a U.S Perspective (소비자인지도화령수상사회책임(消费者认知度和零售商社会责任): 종미국시각출발적도덕구매행위적탐색성연구(从美国视角出发的道德购买行为的探索性研究))

  • Lee, Min-Young;Jackson, Vanessa P.
    • Journal of Global Scholars of Marketing Science
    • /
    • v.20 no.1
    • /
    • pp.49-58
    • /
    • 2010
  • Corporate social responsibility has become a very important issue for researchers (Greenfield, 2004; Maignan & Ralston, 2002; McWilliams et al., 2006; Pearce & Doh 2005), and many consider it necessary for businesses to define their role in society and apply social and ethical standards to their businesses (Lichtenstein et al., 2004). As a result, a significant number of retailers have adopted CSR as a strategic tool to promote their businesses. To this end, this study sought to discover U.S. consumers' attitudes and behavior in ethical purchasing and consumption based on their subjective perception and evaluation of a retailer. The objectives of this study include: 1) determine the participants awareness of retailers corporate social responsibility; 2) assess how participants evaluate retailers corporate social responsibility; 3) examine whether participants evaluation process of retailers CSR influence their attitude toward the retailer; and 4) assess if participants attitude toward the retailers CSR influence their purchase behavior. This study does not focus on actual retailers' CSR performance because a consumer's decision making process is based on an individual assessment not an actual fact. This study examines US college students' awareness and evaluations of retailers' corporate social responsibility (CSR). Fifty six college students at a major Southeastern university participated in the study. The age of the participants ranged from 18 to 26 years old. Content analysis was conducted with open coding and focused coding. Over 100 single-spaced pages of written responses were collected and analyzed. Two steps of coding (i.e., open coding and focused coding) were conducted (Esterberg, 2002). Coding results and analytic memos were used to understand participants' awareness of CSR and their ethical purchasing behavior supported through the selection and inclusion of direct quotes that were extracted from the written responses. Names used here are pseudonyms to protect confidentiality of participants. Participants were asked to write about retailers, their aware-ness of CSR issues, and to evaluate a retailer's CSR performance. A majority (n = 28) of respondents indicated their awareness of CSR but have not felt the need to act on this issue. Few (n=8) indicated that they are aware of this issue but not greatly concerned. Findings suggest that when college students evaluate retailers' CSR performance, they use three dimensions of CSR: employee support, community support, and environmental support. Employee treatment and support were found as an important criterion in evaluation of retailers' CSR. Respondents indicated that their good experience with a retailer as an employee made them have a positive perception and attitude toward the retailer. Regarding employee support four themes emerged: employee rewards and incentives based on performance, working environment, employee education and training program, and employee and family discounts. Well organized rewards and incentives were mentioned as an important attribute. The factors related to the working environment included: how well retailers follow the rules related to working hours, lunch time and breaks was also one of the most mentioned attributes. Regarding community support, three themes emerged: contributing a percentage of sales to the local community, financial contribution to charity organizations, and events for community support. Regarding environments, two themes emerged: recycling and selling organic or green products. It was mentioned in the responses that retailers are trying to do what they can to be environmentally friendly. One respondent mentioned that the company is creating stores that have an environmentally friendly design. Information about what the company does to help the environment can easily be found on the company’s website as well. Respondents have also noticed that the stores are starting to offer products that are organic and environmentally friendly. A retailer was also mentioned by a respondent in this category in reference to how the company uses eco-friendly cups and how they are helping to rebuild homes in New Orleans. The respondents noticed that a retailer offers reusable bags for their consumers to purchase. One respondent stated that a retailer uses its products to help the environment, through offering organic cotton. After thorough analysis of responses, we found that a participant's evaluation of a retailers' CSR influenced their attitudes towards retailers. However, there was a significant gap between attitudes and purchasing behavior. Although the participants had positive attitudes toward retailers CSR, the lack of funds and time influenced their purchase behavior. Overall, half (n=28) of the respondents mentioned that CSR performance affects their purchasing decisions making when shopping. Findings from this study provide support for retailers to consider their corporate social responsibility when developing their image with the consumer. This study implied that consumers evaluate retailers based on employee, community and environmental support. The evaluation, attitude and purchase behavior of consumers seem to be intertwined. That is, evaluation is based on the knowledge the consumer has of the retailers CSR. That knowledge may influence their attitude toward the retailer and thus influence their purchase behavior. Participants also indicated that having CSR makes them think highly of the retailer, but it does not influence their purchase behavior. Price and convenience seem to surpass the importance of CSR among the participants. Implications, recommendations for future research, and limitations of the study are also discussed.

Chinese Communist Party's Management of Records & Archives during the Chinese Revolution Period (혁명시기 중국공산당의 문서당안관리)

  • Lee, Won-Kyu
    • The Korean Journal of Archival Studies
    • /
    • no.22
    • /
    • pp.157-199
    • /
    • 2009
  • The organization for managing records and archives did not emerge together with the founding of the Chinese Communist Party. Such management became active with the establishment of the Department of Documents (文書科) and its affiliated offices overseeing reading and safekeeping of official papers, after the formation of the Central Secretariat(中央秘書處) in 1926. Improving the work of the Secretariat's organization became the focus of critical discussions in the early 1930s. The main criticism was that the Secretariat had failed to be cognizant of its political role and degenerated into a mere "functional organization." The solution to this was the "politicization of the Secretariat's work." Moreover, influenced by the "Rectification Movement" in the 1940s, the party emphasized the responsibility of the Resources Department (材料科) that extended beyond managing documents to collecting, organizing and providing various kinds of important information data. In the mean time, maintaining security with regard to composing documents continued to be emphasized through such methods as using different names for figures and organizations or employing special inks for document production. In addition, communications between the central political organs and regional offices were emphasized through regular reports on work activities and situations of the local areas. The General Secretary not only composed the drafts of the major official documents but also handled the reading and examination of all documents, and thus played a central role in record processing. The records, called archives after undergoing document processing, were placed in safekeeping. This function was handled by the "Document Safekeeping Office(文件保管處)" of the Central Secretariat's Department of Documents. Although the Document Safekeeping Office, also called the "Central Repository(中央文庫)", could no longer accept, beginning in the early 1930s, additional archive transfers, the Resources Department continued to strengthen throughout the 1940s its role of safekeeping and providing documents and publication materials. In particular, collections of materials for research and study were carried out, and with the recovery of regions which had been under the Japanese rule, massive amounts of archive and document materials were collected. After being stipulated by rules in 1931, the archive classification and cataloguing methods became actively systematized, especially in the 1940s. Basically, "subject" classification methods and fundamental cataloguing techniques were adopted. The principle of assuming "importance" and "confidentiality" as the criteria of management emerged from a relatively early period, but the concept or process of evaluation that differentiated preservation and discarding of documents was not clear. While implementing a system of secure management and restricted access for confidential information, the critical view on providing use of archive materials was very strong, as can be seen in the slogan, "the unification of preservation and use." Even during the revolutionary movement and wars, the Chinese Communist Party continued their efforts to strengthen management and preservation of records & archives. The results were not always desirable nor were there any reasons for such experiences to lead to stable development. The historical conditions in which the Chinese Communist Party found itself probably made it inevitable. The most pronounced characteristics of this process can be found in the fact that they not only pursued efficiency of records & archives management at the functional level but, while strengthening their self-awareness of the political significance impacting the Chinese Communist Party's revolution movement, they also paid attention to the value possessed by archive materials as actual evidence for revolutionary policy research and as historical evidence of the Chinese Communist Party.