• Title/Summary/Keyword: disclosure system

Search Result 275, Processing Time 0.031 seconds

A Study on the State of Classified Records Management in Korea (우리나라의 비밀기록 관리현황에 관한 연구)

  • Seo, Won-Kyoung
    • Journal of Korean Society of Archives and Records Management
    • /
    • v.6 no.1
    • /
    • pp.93-112
    • /
    • 2006
  • As information disclosure is actively requested, loopholes of the government's Records Management System have exposed. Important documents of government have been disposed, lost, and closed to the public by the reason that they are 'classified'. This study starts from the recognition of these problems. Researches on classified records are necessary to reveal the historical truth. The purpose of this study is to examine the organization of Records Management System and the management of classified documents of the government institutions. Through the analysis of actual condition of classified records management, it is found that the classified records management is poorly implemented in Korea. This study especially deals with the classified records management system in special records management institutions such as legislative, judiciary, and military agencies. Though this study deals with a specific part of government, it may contribute to improvement of classified records management in government as a whole.

A Study on Reliable Electronic Medical Record Systems (신뢰할 수 있는 전자의무기록에 관한 연구)

  • Kim, Yong-Young;Shin, Seung-Soo
    • Journal of Digital Convergence
    • /
    • v.10 no.2
    • /
    • pp.193-200
    • /
    • 2012
  • The existing EMR method placing computer servers in hospitals could expose patients' personal information to hospital officers and people for wrong purposes. In addition, if medical malpractice occurs, the possibility of distorting medical records might be higher because patients' medical records are stored in hospitals. This study provides an electronic medical record with a security system to solve patients' information disclosure. The electronic medical record system could be utilized as an important information when medical malpractice occurs. This system can provide higher security services certifying patients safely and efficiently as well as protecting patients' personal information.

Efficient and Security Enhanced Evolved Packet System Authentication and Key Agreement Protocol

  • Shi, Shanyu;Choi, Seungwon
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.13 no.1
    • /
    • pp.87-101
    • /
    • 2017
  • As people increasingly rely on mobile networks in modern society, mobile communication security is becoming more and more important. In the Long Term Evolution/System Architecture Evolution (LTE/SAE) architecture, the 3rd Generation Partnership (3GPP) team has also developed the improved Evolved Packet System Authentication and Key Agreement (EPS AKA) protocol based on the 3rd Generation Authentication and Key Agreement (3G AKA) protocol in order to provide mutual authentication and secure communication between the user and the network. Unfortunately, the EPS AKA also has several vulnerabilities such as sending the International Mobile Subscriber Identity (IMSI) in plain text (which leads to disclosure of user identity and further causes location and tracing of the user, Mobility Management Entity (MME) attack), man-in-middle attack, etc. Hence, in this paper, we analyze the EPS AKA protocol and point out its deficiencies and then propose an Efficient and Security Enhanced Authentication and Key agreement (ESE-EPS AKA) protocol based on hybrid of Dynamic Pseudonym Mechanism (DPM) and Public Key Infrastructure (PKI) retaining the original framework and the infrastructure of the LTE network. Then, our evaluation proves that the proposed new ESE-EPS AKA protocol is relatively more efficient, secure and satisfies some of the security requirements such as confidentiality, integrity and authentication.

우리나라 토양오염부지관련 정보관리체계의 문제점 - 법ㆍ제도를 중심으로 -

  • 황상일;이양희
    • Proceedings of the Korean Society of Soil and Groundwater Environment Conference
    • /
    • 2004.04a
    • /
    • pp.5-11
    • /
    • 2004
  • The objectives of this study is to find problems in the legal and institutional background on our information system for soil contaminated sites. To achieve this abjective, we compared our system with those of federal and New Jersey state governments of the United States. We found that we have no comprehensive guideline on how various information from the contaminated sites should be manipulated. In our system, some regulations on information management were found only in a few prescriptions on detection, detailed investigation, and remediation phases. However, we found that provisions, detailed procedures, and related guidelines for the information management are provided in tile case of the federal and New Jersey state governments. Also, public involvement and disclosure of tile information for the remediation procedure are designated in their legal systems.

  • PDF

Analysis of Personal Information Protection System in Korea - Focus on Certification & Evauation System and Personal Identification Number - (우리나라의 개인정보 보호제도 분석 - 인증 및 평가제도와 개인식별번호를 중심으로 -)

  • Kim, Min-Chen
    • Informatization Policy
    • /
    • v.23 no.4
    • /
    • pp.38-58
    • /
    • 2016
  • The ever-evolving Internet environment along with changes in the mass media has been creating a new way of communicating in the virtual cyber world. The Internet users have more services at their disposal to communicate with ease. Such a new way of communication styles, however, makes them vulnerable to personal information leakage, increasing the concerns of cyber security. A thorny issue is how we can control the disclosure of personal information. Lately, the Korean government implemented privacy policies to resolve and prevent personal information leakage incidents that incur social problems. Here, we seek to identify problems in the privacy policies for better solutions.

Threat Issues of Intelligent Transport System in the V2X Convergence Service Envrionment (V2X 융합서비스 환경에서 지능형차량시스템의 위협 이슈)

  • Hong, Jin-Keun
    • Journal of the Korea Convergence Society
    • /
    • v.6 no.5
    • /
    • pp.33-38
    • /
    • 2015
  • In a V2X convergence service environment, the principal service among infotainment services and driver management services must be supported centering on critical information of the driver, maintenance manager, customer, and anonymous user. Many software applications have considered solutions to be satisfied the specific requirements of driving care programs, and plans. This paper describes data flow diagram of a secure clinic system for driving car diagnosis, which is included in clinic configuration, clinic, clinic page, membership, clinic request processing, driver profile data, clinic membership data, and clinic authentication in the V2X convergence service environment. It is reviewed focusing on security threat issue of ITS diagnostic system such as spoofing, tampering, repudiation, disclosure, denial of service, and privilege out of STRIDE model.

A Study on the Effective Strategy of Electronic Paper Resources Management (전자문서자원의 효율적 관리방안에 관한 연구)

  • 김은정
    • Journal of the Korea Society of Computer and Information
    • /
    • v.3 no.4
    • /
    • pp.145-153
    • /
    • 1998
  • Electronic paper resources management becomes an important alternative to overcome the inefficiency of various dysfunctions and pathologies dependent upon bureaucratic paperworks and to enhance organizational competitiveness. Korean government and enterprises have less recognized the importance of electronic document management and ignored the merits of introducing information technology into organizations. By means of document and paper exchange, decision making and signature, mail and bulletin board systems, information disclosure and sharing using electronic technology, however, electronic document management system can enhance organizational performance on a considerable degree. In this sense, it is necessary to introduce the system as soon as possible. Several measures are required : revising related laws and regulations, reforming the sense and behavior of personnel, establishing technological basis of the system, standardizing word processors and document formats.

  • PDF

An Empirical Study on the Determinants of the Proportion of Franchised Outlet in Franchise Systems (프랜차이즈시스템에서 직영점대 가맹점 비율의 결정요인에 관한 연구)

  • Kim, Hyun-Soon;Park, Ju-Young;Lim, Young-Kyoon
    • Journal of Information Technology Services
    • /
    • v.9 no.4
    • /
    • pp.1-18
    • /
    • 2010
  • Plural governance system in which firms use vertical integration and market governance simultaneously are widely used across various marketing context. Typical examples of plural governance include franchise systems, in which firms own and operate some unit themselves while licensing the operation of some of their units to franchisees. Despite many scholars have attempted to explore the structure of plural governance over decades, there are few insights into its determinants. In this study, we examine the relationship between the proportion of outlets franchised and several franchisor's characteristics based on the perspectives of transaction cost analysis, resource scarcy theory and agency theory. Using franchisor data in Korean Franchise Disclosure Document over the 2006-2009 period, we test the effect of franchisor size, system growth rate, franchise fee, initial investment, and risk sharing on the proportion of outlets franchised. Except for the effect of system growth rate, the results of a series of multiple regression analysis supported the negative effects of franchisor size, franchise fee, initial investment and risk sharing on the proportion of outlets franchised.

Sharing and Privacy in PHRs: Efficient Policy Hiding and Update Attribute-based Encryption

  • Liu, Zhenhua;Ji, Jiaqi;Yin, Fangfang;Wang, Baocang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.1
    • /
    • pp.323-342
    • /
    • 2021
  • Personal health records (PHRs) is an electronic medical system that enables patients to acquire, manage and share their health data. Nevertheless, data confidentiality and user privacy in PHRs have not been handled completely. As a fine-grained access control over health data, ciphertext-policy attribute-based encryption (CP-ABE) has an ability to guarantee data confidentiality. However, existing CP-ABE solutions for PHRs are facing some new challenges in access control, such as policy privacy disclosure and dynamic policy update. In terms of addressing these problems, we propose a privacy protection and dynamic share system (PPADS) based on CP-ABE for PHRs, which supports full policy hiding and flexible access control. In the system, attribute information of access policy is fully hidden by attribute bloom filter. Moreover, data user produces a transforming key for the PHRs Cloud to change access policy dynamically. Furthermore, relied on security analysis, PPADS is selectively secure under standard model. Finally, the performance comparisons and simulation results demonstrate that PPADS is suitable for PHRs.

The New Paradigm of Parent-Child Health: The Information System of Parent-Child Health Nursing (부모-자녀건강의 새로운 패러다임 : 부모-자녀건강간호의 정보체계)

  • Kim, Jeong-Soo
    • Korean Parent-Child Health Journal
    • /
    • v.3 no.1
    • /
    • pp.27-34
    • /
    • 2000
  • In recent years, there has been a proliferation of consumer health information available on the internet related to parent-child health. More and more, parents are accessing information about child ca re through the Internet and computer at home. But there is no guarantee that the information is current, unbiased, or accurate. Several researchers have suggested some criteria for evaluating internet sites; source, accuracy, disclosure, currency, accessibility. As more consumer search the World Wide Web for parenting information, nurses have to learn more about this technology. Because nurses can assist parents in identifying how to locate information they can trust. It is also needed to for nurses to document the criteria for information selection on internet and to evaluate outcome of cyberspace intervention of parenting.

  • PDF