• Title/Summary/Keyword: digital risk

Search Result 825, Processing Time 0.029 seconds

Implementation of Digital Document Management DRM System with OMA Structure (OMA 구조를 이용한 안전한 전자문서 관리를 위한 DRM 시스템 구현)

  • Shin Young-Chan;Choi Hyo-Sik;Kim Yong-Goo;Choi Seoko-Jin;Ryou Jae-Cheol
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.16 no.2
    • /
    • pp.45-54
    • /
    • 2006
  • As widespread of using digital documents in various fields, control the usage of digital document is needed. So, Digital Rights Management(DRM) will become a key component of digital document system, but absence of proper digital document DRM system, there is a real risk to lose important information when a hacker achieved intrusion in important system. This paper designs and implements digital document DRM system based on OMA(Open Mobile Alliance) DRM model and OpenOffice. We considered being a digital document DRM system to contain appropriate solution of security and document compatibility.

The Effects of Digital Therapy for Stroke Patients in Korea: Meta-analysis (국내 뇌졸중 환자를 위한 디지털 치료의 효과: 메타분석)

  • Jae-Hun Jung
    • Journal of The Korean Society of Integrative Medicine
    • /
    • v.11 no.4
    • /
    • pp.1-15
    • /
    • 2023
  • Purpose : This study investigates the effectiveness of digital therapy for stroke patients in Korea. Methods : A comprehensive database search was performed using KCI, Science on, e-article, RISS, KISS and Korea OpenMed databases for randomized controlled trials (RCTs) that studied the effects of digital therapy on patients who had a stroke. This study includes RCTs published from January 2000 to July 15, 2022, which fulfilled the inclusion and exclusion criteria. A total 697 studies were screened and 30 studies were included in the final analysis. Methodological quality was assessed with the Cochrane's RoB (risk of bias) tool. Meta-analysis was performed using CMA 4.0 software. Results : A total of 56 effect sizes were calculated from the 30 selected studies. As a result of the analysis, the overall effect size of digital therapy was .59 (95 % CI=.43-.74). When classified according to type of intervention, VR (virtual reality) (g=.58, 95 % CI=.40-.75), and CACR (computer assisted cognitive rehabilitation) (g=.62, 95 % CI=.30-.95) were statistically significant. VR showed medium to large effect sizes in cognitive function (g=.78, 95 % CI=.20-1.37), psychosocial function (g=.63, 95 % CI=.20-1.07), and physical function (g=.61, 95 % CI=.38-.83). In the CACR, there was a large effect size in cognitive function (g=.84, 95 % CI=.52-1.15), but there was no significant difference in psychosocial function. Also, there was no significant difference between the two interventions in activities of daily living and no significant difference in the effect size of both interventions according to the intervention session. Furthermore, medium to large effect sizes were found for subacute and chronic stroke patients according to the duration of disease. Conclusion : This study presents evidence that digital therapy has a positive effect on various functions of stroke patients in Korea. The researchers expect to actively accept the new paradigm of digital therapy and continue to apply digital therapy in clinical practice.

Evaluation of Obstructive Pulmonary Function Impairment Risks in Pulmonary Emphysema Detected by Low-Dose CT: Compared with Simple Digital Radiography (단순 디지털 촬영과 저선량 CT의 폐기종 소견으로부터 폐쇄성 폐기능 장애 위험 비교)

  • Lee, Won-Jeong;Lee, Jeong-Oh;Choi, Byung-Soon
    • Tuberculosis and Respiratory Diseases
    • /
    • v.71 no.1
    • /
    • pp.37-45
    • /
    • 2011
  • Background: Pulmonary emphysema (PE) is major cause of obstructive pulmonary function impairment (OPFI), which is diagnosed by spirometry. PE by high resolution CT is known to be correlated with OPFI. Recently, low dose CT (LDCT) has been increasingly used for screening interstitial lung diseases including PE. The aim of this study was to evaluate OPFI risks of subjects with PE detected by LDCT compared with those detected by simple digital radiography (SDR). Methods: LDCT and spirometry were administered to 266 inorganic dust exposed retired workers, from May 30, 2007 to August 31, 2008. This study was approved by our institutional review board and informed consent was obtained. OPFI risk was defined as less than 0.7 of forced expiratory volume in one second (FEV1)/forced vital capacity (FVC), and relative risk (RR) of OPFI of PE was calculated by multiple logistic regression analysis. Results: Of the 266 subjects, PE was found in 28 subjects (10.5%) by LDCT and in 11 subjects (4.1%) by SDR; agreement was relatively low (kappa value=0.32, p<0.001). FEV1 and FEV1/FVC were significantly different between PE and no PE groups determined by either SDR or LDCT. The differences between groups were larger when the groups were divided by the findings of SDR. When PE was present in either LDCT or SDR assays, the RRs of OPFI were 2.34 and 8.65, respectively. Conclusion: LDCT showed significantly higher sensitivity than SDR for detecting PE, especially low grade PE, in which pulmonary function is not affected. As a result, the OPFI risks in the PE group by LDCT was lower than that in the PE group by SDR.

MTD (Moving Target Detection) with Preposition Hash Table for Security of Drone Network (드론 네트워크 보안을 위한 해시표 대체 방식의 능동 방어 기법)

  • Leem, Sungmin;Lee, Minwoo;Lim, Jaesung
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.23 no.4
    • /
    • pp.477-485
    • /
    • 2019
  • As the drones industry evolved, the security of the drone network has been important. In this paper, MTD (Moving Target Detection) technique is applied to the drone network for improving security. The existing MTD scheme has a risk that the hash value is exposed during the wireless communication process, and it is restricted to apply the one-to-many network. Therefore, we proposed PHT (Preposition Hash Table) scheme to prevent exposure of hash values during wireless communication. By reducing the risk of cryptographic key exposure, the use time of the cryptographic key can be extended and the security of the drone network will be improved. In addition, the cryptographic key exchange is not performed during flight, it is advantageous to apply PHT for a swarm drone network. Through simulation, we confirmed that the proposed scheme can contribute to the security of the drone network.

A Basic Study on the Development of Network Security Equipment to Support MASS Operation in Digital Maritime-Communication System Environment (디지털 해상통신시스템 환경에서 자율운항선박 운용 지원을 위한 네트워크 보안장비 개발 기초연구)

  • Yunja Yoo;Sang-Won Park;Jin-Hyuk Jung;David Kwak
    • Proceedings of the Korean Institute of Navigation and Port Research Conference
    • /
    • 2021.11a
    • /
    • pp.72-73
    • /
    • 2021
  • As discussions of the International Maritime Organization for the introduction of the Marine Autonomous Surface Ship (MASS) began in earnest, discussions were conducted to prioritize cybersecurity (Cyber Risk Management) when developing a system to support MASS operation at the 27th ENAV Committee Working Group (WG2). Korea launched a technology development project for autonomous ships in 2020, and has been promoting detailed tasks for cybersecurity technology development since 2021. MASS operation in a digital maritime communication system environment requires network security of various digital equipment that was not considered in the existing maritime communication environment. This study introduces the basic concept of network security equipment to support MASS operation in the detailed task of cybersecurity technology development, and defines the network security equipment interface for MASS ship application in the basic stage.

  • PDF

Process Analysis of Digital Right Management for Web-Based Multicast Contents

  • Toyib, Wildan;Park, Man-Gon
    • Journal of Korea Multimedia Society
    • /
    • v.14 no.12
    • /
    • pp.1601-1612
    • /
    • 2011
  • In recent years, advanced in digital technologies have created significant changes in the way we reproduce, distribute and market Intellectual Property (IP). DRM for multicast contents is complicated risk, the further technology development and human demand, this approaching is still being researched by the scientist and all by the company which is conducting in piracy management reduced, and every country has national policy to make this consortium to limit piracy properties, based on this paper research development, just only two approaching to reduce piracy in DRM they are Industrial Property (IP) and Copyright. In this paper, we are not only figuring and analyzing about the processes to reduce and limit the piracy and unprotected copy law but also describing about the encryption process, watermarking and digital signature process algorithms. The basic concepts of this encryption process for web-based multicast content in DRM are implemented in Java. We conduct this method is a computerized through web based application system approaching to reduce unprotected copy and piracy. Which is used in DRM for multicast content in every section, by providing a fundamental in information technology development, we believe this research is reliable to prove that is unprotected copy, and piracy can be reduced by protecting with this paradigm.

development plan of nuclear cyber security system (원전 사이버보안 체계 개발 방안에 대한 연구)

  • Han, Kyung-Soo;Lee, Gang-Soo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.23 no.3
    • /
    • pp.471-478
    • /
    • 2013
  • Industrial control system was designed mainly in the form of analog in early days. However, necessity of digital system engineering is increasing recently because systems become complicated. Consequently, stability of digital systems is improved so most industrial control systems are designed with digital. Because Using digital design of Industrial control system is expanded, various threatening possibilities such as penetration or destruction of systems are increasing enormously. Domestic and overseas researchers accordingly make a multilateral effort into risk analysis and preparing countermeasures. In this paper, this report chooses common security requirement in industrial control system and nuclear control system through relevant guidelines analysis. In addition, this report suggests the development plan of nuclear cyber security system which will be an essential ingredient of planning approvals.

Cybersecurity Threats and Responses of Safety Systems in NPPs (원전 안전계통의 사이버보안 위협 및 대응)

  • Jung, Sungmin
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.16 no.1
    • /
    • pp.99-109
    • /
    • 2020
  • In the past, conservative concepts have been applied in terms of the characteristic of nuclear power plants(NPPs), resulting in analog-based equipment and closed networks. However, as digital technology has recently been applied to the design, digital-based facilities and communication networks have been used in nuclear power plants, increasing the risk of cybersecurity than using analog-based facilities. Nuclear power plant facilities are divided into a safety system and a non-safety system. It is essential to identify the difference and cope with cybersecurity threats to the safety system according to its characteristics. In this paper, we examine the cybersecurity regulatory guidelines for safety systems in nuclear power plant facilities. Also, we analyze cybersecurity threats to a programmable logic controller of the safety system and suggest cybersecurity requirements be applied to it to respond to the threats. By implementing security functions suitable for the programmable logic controller according to the suggested cybersecurity requirements, regulatory guidelines can be satisfied, and security functions can be extended according to other system requirements. Also, it can effectively cope with cybersecurity attacks that may occur during the operation of nuclear power plants.

A Study on the Liberalization of Digital Trade and Trade Restrictiveness Factors of Data Privacy : Focusing on EU GDPR (디지털무역 자유화와 개인정보보호의 무역 제한적 요소에 대한 연구 : EU GDPR을 중심으로)

  • Ki-Hooon Woo;Sung-Shik Shin
    • Korea Trade Review
    • /
    • v.45 no.3
    • /
    • pp.71-89
    • /
    • 2020
  • This study was carried out to identify the impact of EU GDPR on international trade amid the ongoing digital trade liberalization. To do this, we first looked at the current trend of digital trade liberalization, the role of data in it, and the trade-restrictive elements of EU GDPR. This allowed us to identify the negative impact of GDPR on free trade. It then conducted an interview survey on Korean companies operating in the EU to verify the conclusions reached. The result of this survey showed that the level of GDPR risk perceived by Korean firms was very low compared with those of American, Japanese and Chinese firms. In particular, the impact of GDPR is not clear for Korea's SMEs. It can be assumed that the reason for this is that Korean SMEs are not using data as a major business tool while the capability of SMEs is sufficient to cope with GDPR. In this regard, the government's appropriate policies and further research for SMEs are needed.