• Title/Summary/Keyword: information Protection

Search Result 4,475, Processing Time 0.039 seconds

RSA Algorithm for User Authentication System

  • Song, Byung-Ho;Bae, Sang-Hyun
    • Proceedings of the KAIS Fall Conference
    • /
    • 2003.11a
    • /
    • pp.207-210
    • /
    • 2003
  • For the effective use of information in the information society, information should be protected and outflow of information by illegal users should be prevented. This study sets up user authentication policy, user authentication regulations and procedures for information protection and builds information protection key distribution center and encryption user Authentication system, which can protect information from illegal users.

  • PDF

The Improvement Plan for Personal Information Protection for Artificial Intelligence(AI) Service in South Korea (우리나라의 인공지능(AI)서비스를 위한 개인정보보호 개선방안)

  • Shin, Young-Jin
    • Journal of Convergence for Information Technology
    • /
    • v.11 no.3
    • /
    • pp.20-33
    • /
    • 2021
  • This study is to suggest improvements of personal information protection in South Korea, according to requiring the safety of process and protection of personal information. Accordingly, based on data collection and analysis through literature research, this study derived the issues and suitable standards of personal information for major artificial intelligence services. In addition, this cases studies were reviewed, focusing on the legal compliance and porcessing compliance for personal information proection in major countries. And it suggested the improvement plan applied in South Korea. As the results, in legal compliance, it is required reorganization of related laws, responsibility and compliance to develop and provide AI, and operation of risk management for personal information protection laws in AI services. In terms of processing compliance, first, in pre-processing and refining, it is necessary to standardize data set reference models, control data set quality, and voluntarily label AI applications. Second, in development and utilization of algorithm, it is need to establish and apply a clear regulation of the algorithm. As such, South Korea should apply suitable improvement tasks for personal information protection of safe AI service.

The Awareness and the Challenges about Protection and Access Control of Record (기록정보의 안전한 보호와 접근통제에 관한 인식과 과제)

  • Lim, Mi-Hyun;Yim, Jin-Hee
    • Journal of the Korean Society for information Management
    • /
    • v.38 no.1
    • /
    • pp.191-219
    • /
    • 2021
  • The development of IT technology that has come to symbolize the fourth industrial revolution, the introduction of online government, and the change in environment has caused radical changes in record management. Most public institutions under the government make use of information systems that are objects of information protection such as electronic document system, document management system, and Onnara system. Further, protection and access control of record information through physical environment and electronic system in a user-centered record management environment is an essential component. Hence, this study studies how professional records management professionals in public institutions recognize safe protection and access management of record information, deriving areas that require improvement and providing a discussion and suggestions to bring about such improvement. This study starts by examining laws and policies on information protection in Korea, analyzing items on access control to compare them with laws and policies, as well as the current situation on records management and derive implications. This study is meaningful in that it aims to substantialize records management by suggesting areas of improvement necessary for the protection and management of record information in public institutions and providing professionals with tangible authority and control.

A Study on the Legal Protection of Science and Technology Databases on the Copyright Law and Online Digital Contents Industry Development Law (저작권법과 온라인 디지털 콘텐츠 산업발전법에 의한 과학기술 데이터베이스 법적보호에 관한 연구)

  • Jang, Tae-Jong;Yoo, Jae-Young;Jeong, Eui-Seob
    • Journal of Information Management
    • /
    • v.36 no.2
    • /
    • pp.153-172
    • /
    • 2005
  • Currently the copyright law and the online digital contents industry development law aim to protect the producers of databases and digital contents. A report on databases in the United States describes that an additional protection of databases is needed as databases get more significant in terms of science and economy and become a key factor on Internet. At this moment, Korea does not recognize the importance of databases of science and technology when we look into any public or civil organizations. Accordingly this paper deals in depth with overall issues surrounding the regal protection of science and technology databases, key contents for science and technology databases protection by current laws, and additional protection problems. Considering that the industry of science and technology databases plays a pivotal role in the securement of national competitiveness, the preparation of legal measures to properly protect databases as one of the policies for the continuing development of databases should not be overlooked.

Development of the digital protection relay which displays the trip area in real time (실시간 사고영역을 표현하는 디지털 보호계전기 개발)

  • Cho, Chul-Hee;Lee, Byeong-Ho;Kim, Yoon-Hoe
    • Proceedings of the KIEE Conference
    • /
    • 2007.07a
    • /
    • pp.499-500
    • /
    • 2007
  • The existing digital protection relay is continuously growing with an improvement in technology. In this paper, we propose the development of the digital protection relay which displays the trip area in real time. In most of the digital protection relays monitor whether analog signal enters into the pre-determined trip area, but those aren't provide the trip area information for a operator in real time. Therefore, if the digital protection relay continuously displays the trip area in real time, the operator analysis power system status easily. This paper particularly introduces selective ground protective relay and differential protective relay with trip area and presents a method of providing the trip area information to operator in real time.

  • PDF

Literature Review and Current Trends of Automated Design for Fire Protection Facilities (화재방호 설비 설계 자동화를 위한 선행연구 및 기술 분석)

  • Hong, Sung-Hyup;Choi, Doo Chan;Lee, Kwang Ho
    • Land and Housing Review
    • /
    • v.11 no.4
    • /
    • pp.99-104
    • /
    • 2020
  • This paper presents the recent research developments identified through a review of literature on the application of artificial intelligence in developing automated designs of fire protection facilities. The literature review covered research related to image recognition and applicable neural networks. Firstly, it was found that convolutional neural network (CNN) may be applied to the development of automating the design of fire protection facilities. It requires a high level of object detection accuracy necessitating the classification of each object making up the image. Secondly, to ensure accurate object detection and building information, the data need to be pulled from architectural drawings. Thirdly, by applying image recognition and classification, this can be done by extracting wall and surface information using dimension lines and pixels. All combined, the current review of literature strongly indicates that it is possible to develop automated designs for fire protection utilizing artificial intelligence.

The method for protecting contents on a multimedia system (멀티미디어 시스템에서 콘텐츠를 보호하기 위한 방법)

  • Kim, Seong-Ki
    • Journal of the Korea Society of Computer and Information
    • /
    • v.14 no.7
    • /
    • pp.113-121
    • /
    • 2009
  • As a DRM is recently being removed from many sites, the content protection on a video server becomes important. However, many protection methods have their own limitations, or aren't used due to the deterioration of the streaming performance. This paper proposes a content protection method that uses both the eCryptFS and the SELinux at the same time, and measures the performance of the proposed method by using various benchmarks. Then, this paper verifies that the method doesn't significantly decrease the streaming performance although the proposed method decreases the other performances, so it can be used for the content protection in a multimedia system.

Create smart healthcare information app (스마트 헬스 케어 정보 앱(APP) 개발)

  • Hwang, Ji Hwan;Noh, Bong Seong;Kim, Hyun Hee;Yoo, Sang Oh
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2017.11a
    • /
    • pp.1176-1178
    • /
    • 2017
  • 영상, 음성, 환자의 가정용 의료기기, 라즈베리파이를 이용하여 라즈베리파이 7인치 터치스크린과 카메라로 사용자의 의료진과 영상통화를 할 수 있고, 환자의 의료기기 측정을 하여 의료진과 언제 어디서든 피드백을 주고받을 수 있으며 Application을 통한 환자는 주치의, 보호자, 긴급호출 119로 자신의 위급함을 알릴 수 있으며 주치의는 환자목록[이름, 나이, 성별, 주소, 환자에 대한 정보(평소 지병, 복용중인 약)]환자의 상태 등을 관리 하며 긴급 상황 발생 시 사용자의 위치를 추적하여 지도로 표시해주며 주치의는 구급대원과 의사소통을 할 수 있는 헬스 케어이다.

ESD Protection Circuits with Low-Voltage Triggered SCR for RF Applications

  • Kim, San-Hong;Park, Jae-Young;Kim, Taek-Soo
    • Proceedings of the IEEK Conference
    • /
    • 2008.06a
    • /
    • pp.24-25
    • /
    • 2008
  • An Electrostatic discharge (ESD) protection has been a very important reliability issue in microelectronics, especially for RF (Radio Frequency) integrated circuits (ICs). This paper reviews design and analysis of on-chip ESD (electrostatic discharge) protection circuits for RF applications. Key issues in RF ESD protection, design methods, and RF ESD protection solutions are discussed.

  • PDF

A study of the User Privacy Protection Behavior in Online Environment: Based on Protection Motivation Theory (인터넷상에서의 개인정보 보호행동에 관한 연구: 보호동기이론을 중심으로)

  • Park, Chanouk;Lee, Sang-Woo
    • Journal of Internet Computing and Services
    • /
    • v.15 no.2
    • /
    • pp.59-71
    • /
    • 2014
  • This study applied customer perspective to find out ways how to protect customers' privacy by themselves. It does so by examining the factors which affect customer privacy protection behaviors. Based on the Privacy Act, this study developed the construct of Privacy Rights awareness and finds the law's effect on privacy awareness and behavioral change. The study finds that there exists a significant difference in privacy protection behavior according to privacy rights awareness. Independent variables are as follows: Five variables (Perceived vulnerability, Perceived severity, Perceived response effectiveness, Perceived barriers, Privacy Rights awareness) were tested as critical variables influencing Behavioral Intention in PMT model. Privacy awareness had a moderating effect on the relationship between perceived severity and privacy protection behavior. This study would contribute on theoretical expansion of Protection Motivation Theory and also provide practical implications for effective ways to promote behavioral changes.