• Title/Summary/Keyword: convergence of information protection

Search Result 429, Processing Time 0.03 seconds

Data Transmission over Power Line with Lightning Protection Devices

  • Kim, Sungeon;Jeon, Taehyun
    • International journal of advanced smart convergence
    • /
    • v.2 no.1
    • /
    • pp.27-29
    • /
    • 2013
  • This paper discusses comparative analysis of the effects of surge protection devices (SPD) upon the power line communication channels. The quality of the data transmission channel is measured based on the data rate for the various channel parameters which include channel length and application method of the lightning protection device. The performance measurements are also carried out for various lengths of the communication channel. Experiment results show that specific combination of SPDs applied in the network causes severe degradation of the channel quality which is associated with the combination of grade levels and channel lengths.

The Video Mosaic Streaming Service Design for Privacy Protection (개인정보 보호를 위한 영상 모자이크 스트리밍 서비스 설계)

  • Eun-Gyeom Jang;Young-Gi Heo;Ho-Geun Byeon;Jeong-Min Lee
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2023.07a
    • /
    • pp.431-432
    • /
    • 2023
  • 본 연구는 초상권을 보호할 수 있는 실시간 영상 모자이크 서비스이다. 실시간 모자이크 서비스에서는 모자이크 처리를 제외하기 위한 이용자 얼굴 등록 기능을 갖고 있다. 이렇게 등록된 얼굴정보는 실시간 영상 스티리밍 서비스에서 모자이크가 되지 않도록 한다. 즉, 모자이크를 원하지 않는 정보를 미리 시스템에 등록하여 실시간 서비스에 어떠한 부분을 모자이크에서 제외 할 것인지 세팅하여 실시간 스트리밍 서비스를 제공한다. 기존 기술과의 차이점은 사람의 얼굴뿐만 아니라 방송에 나오면 안 되는 흉기나 담배 등을 모자이크 처리해 줄 수 있는 기능을 제공하고, 실시간으로 모자이크된 영상 스트리밍 서비스를 제공할 수 있는 장점을 갖는다.

  • PDF

Audit Method for Personal Information Protection in On-line Games (온라인게임에서 개인정보보호 감리 모형)

  • Kim, Hee-Wan;Shin, Joong-Won;Kim, Dong-Soo
    • Journal of Digital Convergence
    • /
    • v.10 no.3
    • /
    • pp.23-37
    • /
    • 2012
  • Illegal game players' hacking and propagation of malignant code in online game exposes privacy of online game customers. So, online game companies have to support the standardized systems and operations of customers' privacies. Since online game companies implement authentication of information protection, which focuses on assets or physical, systemic security, they need a more professional system that is related to protection of individual privacy. We analyzed the individual information protection system, which includes ISO27001, ISMS of KISA, GMITS, ePrivacy, online game privacy protection guide, and BS10012. Using the suggested systems, we proposed the systemic tools that measure the level of individual information protection, which includes process and check items of each phase.

The Effect of Ethical Values on the Patient's Personal Information Protection of College Students Majoring in Healthcare Administration (보건행정 전공 대학생들의 윤리적 가치관이 환자 개인정보 보호인지에 미치는 영향)

  • Jung, Eun-Young
    • Journal of Digital Convergence
    • /
    • v.18 no.10
    • /
    • pp.345-352
    • /
    • 2020
  • This study was conducted to investigate 820 university students in C and G areas to analyze the effects of ethical values of health administration major college students on the perception of patient personal information protection and to present important basic data for the development of education programs. The data were analyzed through SPSS/WIN 18.0 Program. As a result of analysis, the average of personal information protection of college students majoring in health administration was low at 2.04 ± 0.24, and ethical values were idealistic tendency 2.51 ± 0.32 points, and relativistic tendency was 2.34 ± 0.34 points, which showed a high idealistic tendency. Ethical values were also significantly related to idealistic ethics and relativistic ethics in terms of the level of awareness of patient personal information protection and the perception of patient personal information protection exposure. Therefore, in order to increase the protection of patients' personal information of university students majoring in health administration, the correct ethical values should be established, and systematic and continuous education is needed for this purpose.

Research on the Development of SLA Indicators for Personal Information Protection of Public IT Maintenance Business (공공정보화분야 유지관리사업의 개인정보보호를 위한 SLA 지표 개발에 대한 연구)

  • Lee, Kyung-Hwan;Ryu, Gab-Sang
    • Journal of the Korea Convergence Society
    • /
    • v.11 no.6
    • /
    • pp.37-42
    • /
    • 2020
  • In the field of public informatization maintenance business, the attacks of external illegal users such as unauthorized leakage, destruction, and alteration due to intentional or inadequate management of personal information are increasing. In order to prevent such security incidents in advance, it is necessary to develop and quantitatively manage SLA indicators. This study presents the privacy SLA indicators and suggests specific methods such as information collection method and timing of the privacy SLA indicators. In order to confirm the validity and reliability of the proposed SLA indicators, an online survey was conducted with a group of experts. As a result, it was evaluated that compliance rate of personal information destruction and compliance rate of personal information protection system would be effective when applied to new and revised SLA indicators in terms of importance and validity. In the future, using SLA indicators for personal information protection as a standard for public information maintenance will contribute to improving SW quality and securing safety.

Analysis of Patent Trends in Industrial Information and Communication Technology Convergence: Personal Protection and Convenience Equipment Applicable to Agriculture (농업분야에 적용이 가능한 산업용 ICT 융합 개인보호 및 편이장비 특허동향 분석)

  • Kim, Insoo;Kim, Kyungsu;Chae, Hye-Seon;Kim, Hyo-Cher;Kim, Kyung-Ran
    • The Korean Journal of Community Living Science
    • /
    • v.28 no.3
    • /
    • pp.377-390
    • /
    • 2017
  • This study identified technological trends through an analysis of patents for the industrialization of personal protection and convenience equipment using information and communication technology (ICT) as a part of efforts to prevent farm work-related disasters. The analysis was conducted on patents registered and published between January 1974 and May 2016 by the world's five largest intellectual property offices, including the KIPO, USPTO, JPO, EPO, and SIPO. The results of the analysis indicate that the US (36.8%) and South Korea (30.9%) led technological research and development (R&D) with frequent patent applications. An analysis of the technological market revealed that these countries are in the growth and maturity stages, in which the number of patents and number of patent applicants grow rapidly. In terms of the technological market shares of major countries, the US recorded the highest market shares in the field of sensing systems for workers' dangerous conditions and convenience protection equipment based on the internet of things (IoT) convergence. South Korea marked the highest share of 41.8% in the field of sensing devices for dangerous conditions in the working environment. An analysis of the trend of patent applications by specific technologies disclosed the following results: sensing systems for workers' dangerous conditions accounted for the highest share (49.2%), followed by IoT convergence-based convenience protection equipment (26.3%) and sensing devices for dangerous conditions in the working environment (24.6%). Based on this study, ICT-based personal protection and convenience equipment technologies are expected to be actively developed in the future. It will be necessary to secure national competitiveness through R&D investments and commercialization in personal protection and convenience equipment appropriate for farm work as well as through the acquisition of patent technologies and intellectual property rights.

A Study on Models for Technical Security Maturity Level Based on SSE-CMM (SSE-CMM 기반 기술적 보안 성숙도 수준 측정 모델 연구)

  • Kim, Jeom Goo;Noh, Si Choon
    • Convergence Security Journal
    • /
    • v.12 no.4
    • /
    • pp.25-31
    • /
    • 2012
  • The SSE-CMM model is how to verify the level of information protection as a process-centric information security products, systems and services to develop the ability to assess the organization's development. The CMM is a model for software developers the ability to assess the development of the entire organization, improving the model's maturity level measuring. However, this method of security engineering process improvement and the ability to asses s the individual rather than organizational level to evaluate the ability of the processes are stopped. In this research project based on their existing research information from the technical point of view is to define the maturity level of protection. How to diagnose an information security vulnerabilities, technical security system, verification, and implementation of technical security shall consist of diagnostic status. The proposed methodology, the scope of the work place and the current state of information systems at the level of vulnerability, status, information protection are implemented to assess the level of satisfaction and function. It is possible that measures to improve information security evaluation based on established reference model as a basis for improving information security by utilizing leverage.

An Analysis of Recognition on Personal Information Protection among Healthcare Administration Students in the Information Society (정보사회에서 보건행정 전공 대학생들의 개인정보보호에 대한 인지 분석)

  • Kim, Ji-On;Park, Ji-Kyeong
    • Journal of Digital Convergence
    • /
    • v.12 no.5
    • /
    • pp.325-334
    • /
    • 2014
  • The purpose of this study was to examine the recognition of health administration students on personal information protection in an effort to be of use for raising awareness of personal information protection in students and for having them practice it in the right way. The subjects in this study were 687 college students who majored in health administration. A survey was conducted from December 3, 2012, to June 21, 2013. As a result, it's found that just 17.2 percent were cognizant of the personal information protection act. As for recognition and practice of personal information protection domain, the students who were aware of the personal information protection act significantly excelled the others who weren't in every area of recognition and practice, and there was a positive correlation between the level of practice, as better recognition led to better practice. The awareness rate of information for a personal identification stood at 57.0 percent, and the awareness rate of personal information to be managed stood at 53.7 percent, which were both at an intermediate level. To raise awareness of the personal information protection act in health administration students, a course that can deal with this act should separately be offered so that they could have the right understanding of personal information protection and practice it properly.

Personal Information Protection in Digital Era -Reviewing Personal information protection Act- (디지털시대의 개인정보보호 - 새로운 개인정보보호법을 중심으로)

  • Yoo, Jong-Lak
    • Journal of Digital Convergence
    • /
    • v.9 no.6
    • /
    • pp.81-90
    • /
    • 2011
  • Companies using internet as a kind of marketing means are increasing rapidly according to the expansion trend of e-commerce through internet and consumers also use internet as the common means of purchasing necessary articles. E-commerce using internet has advantages without limitation to temporal and spatial accessibility and general consumers and unspecified individuals also use internet to purchase their goods as well as general transactions such as advertisement, contract, payment and claim settlement. 'In the age of information, invasion of personal information resulted from the development of information and communication technology is one of the greatest problems all the countries in the world face. Therefore, Personal information protection Act is one of basic laws to protect personal information and rights and it is also an essential law in the age of information. In that sense, new Personal information protection Act is the advanced act containing various items to minimize the national damages from the leaking of private information and protect right to informational self-determination in the information society. It is expected that this legislation contributes to reduce the leaking of private information, enhance the level of privacy protection and develop privacy related industries. However, active participation of all members of our society and improvement of their recognition should be preceded for the rational and legal use of private information and the settlement of its protection culture. While the purpose of Personal information protection Act can protect privacy from collection, leaking, misuse and abuse of private information and enhance national interests and protect personal dignity and value, it also must perform the roles of balancing privacy protection with liberal information flow.

Analysis of the effects of digital privacy security awareness and digital civic engagement on digital privacy protection behavior : focusing on volition and horizontality (디지털 개인 보안 인식과 디지털 시민 참여의식이 디지털 개인 정보보호 행동에 미치는 영향 분석: 자의성과 수평성을 중심으로)

  • Lee, Ryo-whoa;Hu, Sung-ho
    • Journal of the Korea Convergence Society
    • /
    • v.13 no.4
    • /
    • pp.349-358
    • /
    • 2022
  • The aim of this study to analyze the effect of person and situation on digital privacy protection behaviors. The research method design is a factorial design of volition and horizontality. The measurement variables used in the investigation are digital privacy security awareness, digital civic engagement, and digital privacy protection behavior. As a result, the volition had a significant effect on digital privacy protection behavior, and it was found that influence of the high-volition-based condition was greater than the low-volition-based condition. The horizontality had a significant effect on digital privacy security awareness, digital civic engagement, and it was found that influence of the high-horizontality-based condition was greater than the low-horizontality-based condition. In addition, the discussion explains the suitable contents of information security usability based on these research results.