• Title/Summary/Keyword: cyber electronic

Search Result 304, Processing Time 0.023 seconds

An Empirical Study of User Perceptions on EMR Standardization Leading Medical & IT Convergence (의료·IT융합을 이끄는 EMR 표준화에 대한 이용자 인식 연구)

  • Lee, Ji-Eun;Nah, Suk-Gyu
    • Journal of Digital Convergence
    • /
    • v.13 no.5
    • /
    • pp.111-118
    • /
    • 2015
  • Electronic Medical Record(EMR) is medical record that has been saved electronically onto a computer. The standardization activities for EMR is actively underway as it may not only improve the overall quality of the medical services but as the value of medical big data (medical & IT convergence area) is being considered very important. One of the most important issues is ensuring the necessary and effectiveness of EMR standardization to the stakeholder. Researchers did an empirical study to find out how the doctors perceived the EMR standardization from both technical and economical perspective. The results of the empirical analyses showed that system quality and an economical value had a positive effect on perceived usefulness and intention to adopt EMR standardization, yet interoperability have only affected the perceived usefulness. Additionally, the economical value seemed to be the most important variable in forming a consensus in the need of EMR standardization.

A Study on The Protection of Intellectual Property Right about The Electronic Commerce - Focusing on the Domain Name And the Trademark Infringement - (전자상거래상(電子商去來上) 지식재산권(知識財産權)의 보호문제(保護問題)에 관한 연구(硏究) - Domain Name과 상표권(商標權) 침해여부(侵害與否)를 중심(中心)으로 -)

  • Lee, Han-Sang
    • THE INTERNATIONAL COMMERCE & LAW REVIEW
    • /
    • v.13
    • /
    • pp.1013-1032
    • /
    • 2000
  • At present, the scale of Electronic Commerce through internet has been rapidly increasing due to the development of information & communication technology, and aggregated to 2.4 billion dollar in America last year (1998). The market scale of worldwide electronic commerce is also presumed to be about 130 billion dollar in 2000, and to occupy more than 20% of the whole world trade in world 2020. Since the right of trademark, despite of being effective only in registered nations on the principle of territorialism, is unified on the cyber space of internet without domestic barrier or local limitation which make it easier to conduct the distribution of information rapidly through the address-internet domain name, those are very important that the systematic dispute-solving plan on problems such as decision of its Act and international jurisdiction to be established, in an effort to prevent the newly emerging dispute instances such as trademark infringement and improper competitiveness. In addition, it is natural that on the threshold of the electronic commerce age which formed with an unified area without the worldwide specific regulation, each country including us makes haste with the enactment of "electronic commerce Act" aiming at coming into force in 1999, in keeping with getting through "non-tariff law on electronic commerce" by U. S. parliament on May, 1998. In view of the properties of electronic commerce transactions through internet, there are the large curtailment of distributive channel, surmounting of restrictions on transaction area, space and time and the easy feedback with consumer and the cheap-required capital, from which the problems may arise - registration of trademark, the trademark infringement of domain name and the protection of prestigious trademark. Therefore, it is necessary to take the counter-measure, with a view of reviewing the infringement of trademark and domain name and the instances of each national precedent and to preventing the disputes. The improvement of the persistent system should be needed to propel the harmonious protection of those holding trademark right's credit and demanders' expectant profit by way of the righteous use of trademark.

  • PDF

The Impact of Social Network Service, Trust and Cognition on Customer Loyalty in Internet Shopping

  • Sun, Han-Gil
    • Journal of Information Management
    • /
    • v.42 no.2
    • /
    • pp.211-234
    • /
    • 2011
  • The development of information technology improves the globalization of the world economy. This change was able to expand the cyber space, and the online community known as the cyber community is made within the existing offline community. From the cyber community's activity, the concept of social network services created, and recently developed social computing. Social computing is the current situation and the next step in the online community. Currently, most CIOs are using social computing for workplace empowerment. As online transactions become more active, the strategy to increase customer loyalty in Internet shopping is an effective tool to increase profit for the company, and as a method to maintain competitive. With the growth of electronic commerce, through insurance of customer loyalty on the Internet, a company can establish a long-term relationship with customers, so for this, it is important to have reliable relationship with customers. Also, through advertisement and commercial information, the cognition of Internet shopping looks can be effective in retaining customers. In this study, it explores how social computing and trust and cognition of Internet shopping are effective in maintaining customer loyalty. As the result of study, the trust and cognition of Internet shopping are significantly effective on customer loyalty, but the sense of social computing. Still, social computing has not matured enough to be as effective in retaining customer loyalty. However, it does indicate that social computing has significantly increased the trust and cognition in Internet shopping. In this study, as the concepts of the social network service and social computing are applied in Internet shopping, which are actively discussed by scholars, it is expected that the basis of the study could improve and present the idea of social shopping.

DDoS Attack Response Framework using Mobile Code (DDoS 공격 대응 프레임워크 설계 및 구현)

  • Lee, Young-seok
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.3 no.3
    • /
    • pp.31-38
    • /
    • 2010
  • It has become more difficult to correspond an cyber attack quickly as patterns of attack become various and complex. However, current security mechanisms just have passive defense functionalities. In this paper, we propose new network security architecture to respond various cyber attacks rapidly and to chase and isolate the attackers through cooperation between security zones. The proposed architecture makes it possible to deal effectively with cyber attacks such as IP spoofing or DDoS(Distributed Denial of Service), by using active packet technology including a mobile code on active network. Also, it is designed to have more active correspondent than that of existing mechanisms. We implemented these mechanisms in Linux routers and experimented on a testbed to verify realization possibility of attacker response framework using mobile code. The experimentation results are analyzed.

  • PDF

Study on Establishment of Internet ethics expressed through Language convert in computer games (컴퓨터 게임에서의 언어 표현변화를 통한 인터넷 윤리 확립에 관한 연구)

  • Park, Koo Rack
    • Journal of the Korea Society of Computer and Information
    • /
    • v.17 no.11
    • /
    • pp.47-52
    • /
    • 2012
  • Today the Internet is being used in all areas. However, part of everyday life, the lack of ethics on the Internet, the Internet lies in state. Especially the youth, should exploit the anonymity. As a result, has caused many problems. Fps online game from young people enjoy the use of profanity and slang, and increasing the damage of cyber violence has also increased. The damage type of cyber violence, abusive and slang, and the age, the lower the investigation was to increase the damage. Lot of publicity and public service advertising is in progress in order to prevent problems, but its expected effects is lacking. In addition, using abusive and slang words, This is a fundamental and provide a service to handle deleted or blinds, but if you can not see the solution. In this paper suggests the language convert that can be applied to Fps online games. Language the conversion process, if applicable to the game, the abusive and slang language, helps to purify. Proposed language the conversion process is expected to reduce cyber violence used abusive and slang.

Mathematical Modelling and Chaotic Behavior Analysis of Cyber Addiction (사이버 중독의 수학적 모델링과 비선형 거동 해석)

  • Kim, Myung-Mi;Bae, Young-Chul
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.24 no.3
    • /
    • pp.245-250
    • /
    • 2014
  • Addiction can be largely divided into two categories. One is called medium addiction in which medium itself causes an addiction. Another is called cause addiction that brings addiction through combination of sensitive self and latent personal action. The medium addiction involves addiction phenomena directly caused by illegal drugs, alcohol and various other chemicals. The cause addiction is dependent on personal sensitivities as a sensitive problem of personal and includes cyber addictions such as shopping, work, game, internet, TV, and gambling. In this paper we propose two-dimensional addiction model that are equivalent to using an R-L-C series circuit of Electrical circuit and a Spring-Damper-mass of mechanical system. We also organize a Duffing equation that is added a nonlinear term in the proposed two-dimensional addiction model. We represent periodic motion and chaotic motion as time series and phase portrait according to parameter's variation. We confirm that among parameters chaotic motion had addicted state and periodic motion caused by change in control coefficient had pre-addiction state.

Traffic Analysis Architecture for Secure Industrial Control System (안전한 제어시스템 환경을 위한 트래픽 분석망 설계)

  • Lee, Eun-Ji;Kwak, Jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.26 no.5
    • /
    • pp.1223-1234
    • /
    • 2016
  • The Industrial control system is adopted by various industry field and national infrastructure, therefore if it received cyber attack, the serious security problems can be occured in the public sector. For this reason, security requirements of the industrial control system have been proposed, in accordance with the security guidelines of the electronic control system, and it is operated by separate from the external and the internal network. Nevertheless, cyber attack by malware (such as Stuxnet) targeting to control system have been occurred continuously, and also the real-time detection of untrusted traffic is very difficult because there are some difficulty of keeping up with quickly evolving the advent of new-variant malicious codes. In this paper, we propose the traffic analysis architecture for providing secure industrial control system based on the analyzed the security threats, the security requirements, and our proposed architecture.

Cyber-Salesman : An Agent negotiating with Customers (가상점원 : 고객과의 협상을 위한 에이전트)

  • 조의성;조근식
    • Proceedings of the Korea Database Society Conference
    • /
    • 1999.06a
    • /
    • pp.217-225
    • /
    • 1999
  • 협상은 상거래에 있어서 매우 중요한 요소 중 하나이다. 현재의 웹 기반 전자상거래 시스템은 이러한 중요한 협상 구조를 상거래에 잘 반영하지 못하는 문제점을 가지고 있다. 이러한 문제점중 기업과 소비자간의 미비한 협상 구조를 보안하기 위해 실세계 상거래에서 존재하는 점원을 전자상거래상의 가상점원으로 모델링하여 회사의 정책과 구매자의 특성을 반영하여 구매자와 전략적으로 자동 협상을 수행할 수 있는 에이전트의 구조를 설계하고 구현하였다. 협상은 매우 복잡한 구조를 가지고 있다. 이러한 협상 구조를 지원하기 위해서는 상호간의 제안을 표현하고, 그 제안에 대한 평가 내용과 결정사항을 전달할 수 있는 언어적인 조가 필요하며, 협상의 대상이 되는 사안들의 특성을 반영할 수 있는 표현 구조도 요구된다. 또한 이러한 협상에서 전략을 세우고 알맞은 제안을 제시하며 상대의 제안에 대하여 전략적으로 반응할 수 있는 의사결정 모델이 요구된다. 본 논문에서는 회사의 정책 모델과 구매자의 모델을 정의하고 이를 이용한 협상 모델을 설계 구현하였다. 협상 구조의 모델링을 위해 KQML(Knowledge Query Manipulation Language)을 기반으로 전자상거래 프로토콜로 설계하고, 논쟁 기반 협상 모델을 기초로 협상언어를 설계하였다. 또한 협상에서의 전략적인 의사결정을 위해 게임이론을 이용하고, 규칙 기반 시스템으로 이를 보충하였다. 마지막으로 가상점원 모델을 바탕으로 조립 컴퓨터 판매를 위한 가상점원을 구현하였고, 이에 대한 실험을 통하여 가상점원의 유용성을 보였다.

  • PDF

A Design and Implementation of the Similarity Evaluation System for Program Assignments (프로그램 과제물의 유사도 평가 시스템 설계 및 구현)

  • 김영철;조용윤;박호병
    • Journal of the Korea Computer Industry Society
    • /
    • v.4 no.10
    • /
    • pp.685-694
    • /
    • 2003
  • This paper has been studied on the prevent of "program reproduce" and "partial modification" in computer programming. The system is made for the improvement for the prevention of prevailing "program reproduce" and "program partial modification", this research will be helpful to the student who is interested in depth study programmer. The research using AST will do the work such as finding errors of program and will evaluate how much each program is similar to each other. The research using AST will show you, on the screen, by using pictures how much each programs are assimilated. This system supports all of technique available in various forms on the areas of cyber education at present, cyber university, lecture on demand, electronic library, etc. It is expected that the new system can be contributed to opening the new chapter of computer education.g the new chapter of computer education.

  • PDF

A Study of The Binary Code to Intermediate Language Translator for Analysis of Software Weakness (소프트웨어 보안약점 분석을 위한 바이너리 코드-중간언어 변환기에 관한 연구)

  • Lee, Tae-Gue;Lim, Jung-Ho;Baik, Do-Woo;Son, Yunsik;Jeong, Junho;Ko, Kwangman;Oh, Seman
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2017.04a
    • /
    • pp.276-279
    • /
    • 2017
  • 오늘날 사회 전반적인 부분에서 소프트웨어의 비중은 지속적으로 증가하고 있다. 또한 소프트웨어는 점차 대규모화되고 있고 동시에 개인의 중요한 정보 등을 다루는 경우도 매우 늘어나고 있기에 소프트웨어의 보안성 검증은 매주 중요한 문제이다. 그러나 소스코드가 존재하지 않는 라이브러리의 경우 보안성 검증은 매우 어려운 문제로, 이를 해결하기 위해 바이너리 내에 존재하는 보안약점을 검사하기 위한 기술의 개발이 매우 요구되는 상황이며, 이를 위해 중간언어를 활용하여 보안약점을 분석하는 기술이 활발히 논의되고 있다. 본 논문에서는 바이너리 코드내에 존재하는 보안약점을 효과적으로 분석하기 위해서 바이너리 코드로부터 보안약점 분석에 효과적인 중간언어로 변환하는 시스템을 제안한다.