• Title/Summary/Keyword: information Protection

Search Result 4,475, Processing Time 0.044 seconds

A Digital Forensic Framework Design for Joined Heterogeneous Cloud Computing Environment

  • Zayyanu Umar;Deborah U. Ebem;Francis S. Bakpo;Modesta Ezema
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.6
    • /
    • pp.207-215
    • /
    • 2024
  • Cloud computing is now used by most companies, business centres and academic institutions to embrace new computer technology. Cloud Service Providers (CSPs) are limited to certain services, missing some of the assets requested by their customers, it means that different clouds need to interconnect to share resources and interoperate between them. The clouds may be interconnected in different characteristics and systems, and the network may be vulnerable to volatility or interference. While information technology and cloud computing are also advancing to accommodate the growing worldwide application, criminals use cyberspace to perform cybercrimes. Cloud services deployment is becoming highly prone to threats and intrusions. The unauthorised access or destruction of records yields significant catastrophic losses to organisations or agencies. Human intervention and Physical devices are not enough for protection and monitoring of cloud services; therefore, there is a need for more efficient design for cyber defence that is adaptable, flexible, robust and able to detect dangerous cybercrime such as a Denial of Service (DOS) and Distributed Denial of Service (DDOS) in heterogeneous cloud computing platforms and make essential real-time decisions for forensic investigation. This paper aims to develop a framework for digital forensic for the detection of cybercrime in a joined heterogeneous cloud setup. We developed a Digital Forensics model in this paper that can function in heterogeneous joint clouds. We used Unified Modeling Language (UML) specifically activity diagram in designing the proposed framework, then for deployment, we used an architectural modelling system in developing a framework. We developed an activity diagram that can accommodate the variability and complexities of the clouds when handling inter-cloud resources.

Factors Affecting the Intention to Invade Privacy on Social Network Service (SNS에서 프라이버시 침해의도에 영향을 미치는 요인)

  • Ahn, Soomi;Jang, Jaeyoung;Kim, Jidong;Kim, Beomsoo
    • Information Systems Review
    • /
    • v.16 no.2
    • /
    • pp.1-23
    • /
    • 2014
  • With side effects such as Phishing and Spam using personal information in Social Network Service, there is a growing need for studies related to harmful behaviors such as the reason for privacy violation. As such, this study assumed privacy violation to be ethical decision, making behavior and used the Theory of Planned Behavior and Motivation Theory, which are mostly used in social science to identify the factors affecting privacy violation. The results suggested that the Perceived Enjoyment and Punishment used in motivation studies affected privacy violation behaviors, and that the factors of the Theory of Planned Behavior such as Attitude toward Privacy Violation, Subjective Norms of Privacy Violation, and Perceived Behavioral Control with regard to Privacy Violation significantly influenced the Intention to Privacy Violation. On the other hand, Perceived Curiosity and Subjective Norms of Privacy Violation did not affect the Intention to Privacy Violation. Therefore, this study confirmed that the Theory of Planned Behavior was appropriate to explain the Intention to Privacy Violation, and that the variables of the Motivation Theory generally influenced the Attitude toward Privacy Violation. This study was significant since it extended the scope of theoretical privacy study from users and victims centered to inflictor and applied the Extended Theory of Planned Behavior using the variables of the Motivation Theory in the study of Intention to Privacy Violation. From the practical aspect, it provided the ground for privacy education based on the fact that the Attitude toward Privacy Violation can be curbed when education on the Privacy Concerns, Perceived Enjoyment, and Punishment with regard to privacy is strengthened. It also cited the need for the punishment of privacy violation and the practical ground to amend the terms and conditions of user license and Personal Information Protection Act to provide policy support.

A Study on Regulation of Video on Demand Advertisements (주문형서비스(Video on Demand) 광고 규제에 관한 연구)

  • Cho, Dae-keun;Kim, Ki-youn
    • Journal of Internet Computing and Services
    • /
    • v.17 no.4
    • /
    • pp.145-159
    • /
    • 2016
  • This study points out the problems of absence of the legislation for standard regulation on Video on Demand(VoD) advertisement which grows so fast lately, for this it recommends making legal references, which have the definition of non-linear broadcasting & VoD advertisement and VoD advertisement standard regulation in the merged Broadcasting Act, and adopting co-regulation system. Pay TV operators providing VoD service have the opportunities to make money as subscribers uses it increasingly. In case of linear service, the Broadcasting Act regulates the advertisement strictly, but not the VoD ads. The reason why is that Korean legislation including the Broadcasting Act does not have legal reference to regulate it, instead of that, it rely on the self-regulation system which is operated by pay-tv players who provide the VoD ads. So, there is the limitation to protect the minors such as children and youth from the harmful VoD ads, to be invulnerable for advertisers to influence to advertising agents, and to ensure the regulatory effectiveness under player-centric self-regulatory regime. In this context, this study analyses the how to regulate VoD ads standard with a three-pronged approach. First, it analyses the VoD ads regulation system in overseas countries, UK, Canada, EU and Ireland. Each country has the legal reference to regulate it in the Broadcasting Act or lower statures and adopts the co-regulatory regime the NRA and the 3rd entity operate together. Second, it reviews the objectives and scope of VoD ads standard. This study recommends that the objective of it is users protection and the scope of it is standard regulation not commercial practice. Third, this study researches how to legislate for regulation of VoD ads standard. Considering VoD service's characteristics(non-linear service) and legal position of Ads agency(i.e. pay tv operators), it suggest that legal reference will be in the integrated Broadcasting bill, which is the general law, not individual. If it is available to regulate VoD ads standard with co-regulatory regime, it expects the enhancement of user protection from the harmful VoD ads and make up sustainability of the pay-tv players' self-regulation.

Home Range Size and Habitat Environment Related to the Parturition of Roe Deer at Warm-Temperate Forest in Jeju Island Using GPS-CDMA Based Wildlife Tracking System (GPS와 CDMA를 이용한 난대림의 출산 전후 암노루 행동권 및 서식환경 조사)

  • Kim, Eun-Mi;Kwon, Jin-O;Kang, Chang-Wan;Song, Kuk-Man;Min, Dong-Won
    • Journal of the Korean Association of Geographic Information Studies
    • /
    • v.16 no.2
    • /
    • pp.65-74
    • /
    • 2013
  • A research program for the roe deer (Capreolus pygargus) has been set up at the Jeju Experimental Forest of Warm-temperate and Subtropical Forest Research Center in Jeju Island. To explore the home range size and habitat environment, 3 males and 3 females have been captured and released with GPS-CDMA based telemetry since 24th April 2012. Among them 2 females were captured at Hannam Forest of Seoguipo, were pregnant and monitored by the tracking system. There are significantly different patterns in behavior around the parturition. After parturition they show recurrence behavior toward one point in the forest, while they have irregular patterns in moving before. To calculate the home range size, the MCP (minimum convex polygon) and Kernel Method are applied through the extension of ESRI ArcView GIS 3.2a. The pregnant female captured 9th May 2012 has the size of MCP=67ha and Kernel 95%=0.5ha and the pregnant female captured 12th July 2012 has the size of MCP=82ha and Kernel 95%=0.9ha. Although a fawn could move immediately just after the birth likely others to avoid any risks, they stay at very narrow space significantly, and the size become wider when more time goes by. Furthermore, they mainly have a home range away from human activity area such as forest tracking roads. The habitat environment for the parturition is summarized as 40years old cryptomeria forests with new sprouting shrubs for foods, which are the controlled forest through the thinning and removing shrubs 2 years ago. This means that forest works could cause positive results for the parturition and survival of young. The period of parturition is earlier than highland in Jeju Island, the size of home range is narrower than other countries, and the habitat environment of the shelter for a fawn is similar to previous research in other countries.

The Risk Assessment of the Fire Occurrence According to Urban Facilities in Jinju-si (진주시 도시시설물별 화재발생 위험도 평가)

  • Bae, Gyu Han;Won, Tae Hong;Yoo, Hwan Hee
    • Journal of Korean Society for Geospatial Information Science
    • /
    • v.24 no.1
    • /
    • pp.43-50
    • /
    • 2016
  • Urbanization in Korea has increased significantly and subsequently, various facilities have been concentrated in urban areas at high speed in accordance with a growing urban population. Accordingly, damages have occurred due to a variety of disasters. In particular, fire damage among the social disasters caused the most severe damage in urban areas along with traffic accidents. 44,432 cases of fire occurred in 2015 in Korea. Due to these accidents, 253 were killed and property damage of 4,50 billion won was generated. However, despite the efforts to reduce a variety of damage, fire danger still remains high. In this regard, this study collected fire data, generated from 2007 to 2014 through the Jinju Fire Department and the National Fire Data System(NFDS) and calculated fire risk by analyzing the clustering of fire cases and facilities in Jinju-si based on the current DB of facilities, offered by the Ministry of Government Administration and Home Affairs. As a result, the risk ratings of fire occurrence were classified as four stages under the standards of the US Society of Fire Protection Engineers(SEPE). Business facilities, entertainment facilities, and automobile facilities were classified as the highest A grade, detached houses, Apartment houses, education facilities, sales facilities, accommodation, set of facilities, medical facilities, industrial facilities, and life service facilities were classified as U grade, and other facilities were classified as EU grade. Finally, hazardous production facilities were classified as BEU grade, the lowest grade. In addition, in the case of setting the standard with loss of life, the highest risk facility was the hazardous production facilities, while in the case of setting the standard with property damage, a set of facilities and industrial facilities showed the highest risk. In this regard, this study is expected to be effectively utilized to establish the fire reduction measures against facilities, distributed in urban space by calculating risk grades regarding the generation frequency, casualties, and property damage, through the classification of fire, occurred in the city, according to the facilities.

Development of Standard Process for Private Information Protection of Medical Imaging Issuance (개인정보 보호를 위한 의료영상 발급 표준 업무절차 개발연구)

  • Park, Bum-Jin;Yoo, Beong-Gyu;Lee, Jong-Seok;Jeong, Jae-Ho;Son, Gi-Gyeong;Kang, Hee-Doo
    • Journal of radiological science and technology
    • /
    • v.32 no.3
    • /
    • pp.335-341
    • /
    • 2009
  • Purpose : The medical imaging issuance is changed from conventional film method to Digital Compact Disk solution because of development on IT technology. However other medical record department's are undergoing identification check through and through whereas medical imaging department cannot afford to do that. So, we examine present applicant's recognition of private intelligence safeguard, and medical imaging issuance condition by CD & DVD medium toward various medical facility and then perform comparative analysis associated with domestic and foreign law & recommendation, lastly suggest standard for medical imaging issuance and process relate with internal environment. Materials and methods : First, we surveyed issuance process & required documents when situation of medical image issuance in the metropolitan medical facility by wire telephone between 2008.6.1$\sim$2008.7.1. in accordance with the medical law Article 21$\sim$clause 2, suggested standard through applicant's required documents occasionally - (1) in the event of oneself $\rightarrow$ verifying identification, (2) in the event of family $\rightarrow$ verifying applicant identification & family relations document (health insurance card, attested copy, and so on), (3) third person or representative $\rightarrow$ verifying applicant identification & letter of attorney & certificate of one's seal impression. Second, also checked required documents of applicant in accordance with upper standard when situation of medical image issuance in Kyung-hee university medical center during 3 month 2008.5.1$\sim$2008.7.31. Third, developed a work process by triangular position of issuance procedure for situation when verifying required documents & management of unpreparedness. Result : Look all over the our manufactured output in the hospital - satisfy the all conditions $\rightarrow$ 4 place(12%), possibly request everyone $\rightarrow$ 4 place(12%), and apply in the clinic section $\rightarrow$ 9 place(27%) that does not medical imaging issuance office, so we don't know about required documents condition. and look into whether meet or not the applicant's required documents on upper 3month survey - satisfy the all conditions $\rightarrow$ 629 case(49%), prepare a one part $\rightarrow$ 416 case(33%), insufficiency of all document $\rightarrow$ 226case(18%). On the authority of upper research result, we are establishing the service model mapping for objective reception when image export situation through triangular position of issuance procedure and reduce of friction with patient and promote the patient convenience. Conclusion : The PACS is classified under medical machinery that mean indicates about higher importance of medical information therefore medical information administrator's who already received professional education & mind, are performer about issuance process only and also have to provide under ID checking process exhaustively.

  • PDF

Conflict of Interests and Analysts' Forecast (이해상충과 애널리스트 예측)

  • Park, Chang-Gyun;Youn, Taehoon
    • KDI Journal of Economic Policy
    • /
    • v.31 no.1
    • /
    • pp.239-276
    • /
    • 2009
  • The paper investigates the possible relationship between earnings prediction by security analysts and special ownership ties that link security companies those analysts belong to and firms under analysis. "Security analysts" are known best for their role as information producers in stock markets where imperfect information is prevalent and transaction costs are high. In such a market, changes in the fundamental value of a company are not spontaneously reflected in the stock price, and the security analysts actively produce and distribute the relevant information crucial for the price mechanism to operate efficiently. Therefore, securing the fairness and accuracy of information they provide is very important for efficiencyof resource allocation as well as protection of investors who are excluded from the special relationship. Evidence of systematic distortion of information by the special tie naturally calls for regulatory intervention, if found. However, one cannot presuppose the existence of distorted information based on the common ownership between the appraiser and the appraisee. Reputation effect is especially cherished by security firms and among analysts as indispensable intangible asset in the industry, and the incentive to maintain good reputation by providing accurate earnings prediction may overweigh the incentive to offer favorable rating or stock recommendation for the firms that are affiliated by common ownership. This study shares the theme of existing literature concerning the effect of conflict of interests on the accuracy of analyst's predictions. This study, however, focuses on the potential conflict of interest situation that may originate from the Korea-specific ownership structure of large conglomerates. Utilizing an extensive database of analysts' reports provided by WiseFn(R) in Korea, we perform empirical analysis of potential relationship between earnings prediction and common ownership. We first analyzed the prediction bias index which tells how optimistic or friendly the analyst's prediction is compared to the realized earnings. It is shown that there exists no statistically significant relationship between the prediction bias and common ownership. This is a rather surprising result since it is observed that the frequency of positive prediction bias is higher with such ownership tie. Next, we analyzed the prediction accuracy index which shows how accurate the analyst's prediction is compared to the realized earnings regardless of its sign. It is also concluded that there is no significant association between the accuracy ofearnings prediction and special relationship. We interpret the results implying that market discipline based on reputation effect is working in Korean stock market in the sense that security companies do not seem to be influenced by an incentive to offer distorted information on affiliated firms. While many of the existing studies confirm the relationship between the ability of the analystand the accuracy of the analyst's prediction, these factors cannot be controlled in the above analysis due to the lack of relevant data. As an indirect way to examine the possibility that such relationship might have distorted the result, we perform an additional but identical analysis based on a sub-sample consisting only of reports by best analysts. The result also confirms the earlier conclusion that the common ownership structure does not affect the accuracy and bias of earnings prediction by the analyst.

  • PDF

Legal Issues on the Collection and Utilization of Infectious Disease Data in the Infectious Disease Crisis (감염병 위기 상황에서 감염병 데이터의 수집 및 활용에 관한 법적 쟁점 -미국 감염병 데이터 수집 및 활용 절차를 참조 사례로 하여-)

  • Kim, Jae Sun
    • The Korean Society of Law and Medicine
    • /
    • v.23 no.4
    • /
    • pp.29-74
    • /
    • 2022
  • As social disasters occur under the Disaster Management Act, which can damage the people's "life, body, and property" due to the rapid spread and spread of unexpected COVID-19 infectious diseases in 2020, information collected through inspection and reporting of infectious disease pathogens (Article 11), epidemiological investigation (Article 18), epidemiological investigation for vaccination (Article 29), artificial technology, and prevention policy Decision), (3) It was used as an important basis for decision-making in the context of an infectious disease crisis, such as promoting vaccination and understanding the current status of damage. In addition, medical policy decisions using infectious disease data contribute to quarantine policy decisions, information provision, drug development, and research technology development, and interest in the legal scope and limitations of using infectious disease data has increased worldwide. The use of infectious disease data can be classified for the purpose of spreading and blocking infectious diseases, prevention, management, and treatment of infectious diseases, and the use of information will be more widely made in the context of an infectious disease crisis. In particular, as the serious stage of the Disaster Management Act continues, the processing of personal identification information and sensitive information becomes an important issue. Information on "medical records, vaccination drugs, vaccination, underlying diseases, health rankings, long-term care recognition grades, pregnancy, etc." needs to be interpreted. In the case of "prevention, management, and treatment of infectious diseases", it is difficult to clearly define the concept of medical practicesThe types of actions are judged based on "legislative purposes, academic principles, expertise, and social norms," but the balance of legal interests should be based on the need for data use in quarantine policies and urgent judgment in public health crises. Specifically, the speed and degree of transmission of infectious diseases in a crisis, whether the purpose can be achieved without processing sensitive information, whether it unfairly violates the interests of third parties or information subjects, and the effectiveness of introducing quarantine policies through processing sensitive information can be used as major evaluation factors. On the other hand, the collection, provision, and use of infectious disease data for research purposes will be used through pseudonym processing under the Personal Information Protection Act, consent under the Bioethics Act and deliberation by the Institutional Bioethics Committee, and data provision deliberation committee. Therefore, the use of research purposes is recognized as long as procedural validity is secured as it is reviewed by the pseudonym processing and data review committee, the consent of the information subject, and the institutional bioethics review committee. However, the burden on research managers should be reduced by clarifying the pseudonymization or anonymization procedures, the introduction or consent procedures of the comprehensive consent system and the opt-out system should be clearly prepared, and the procedure for re-identifying or securing security that may arise from technological development should be clearly defined.

Market Success factors of Mobile Games: Differences by Genres and Changes over Time (모바일 게임의 시장 성공 요소: 게임 장르별 차이와 출시 후 시간 경과에 따른 변화)

  • Yi, Sang-Yoon;Kim, Moon-Yong;Han, Sung-Don;Ahn, Jae-Hyeon
    • Information Systems Review
    • /
    • v.10 no.3
    • /
    • pp.21-38
    • /
    • 2008
  • After the introduction stage, Korean mobile game market is approaching to the growing stage leading mobile contents market. The environment for the mobile contents business is getting better by the expansion of the 3G mobile networks and the enhancement of the mobile devices. In this research, at a content level, not a service level, market success factors of mobile games and the differences by genres and their changes over time were investigated through the analysis of the real market data of mobile games launched by a Korean mobile carrier. The most important factors for market success, especially for the genres of RPG/Tycoon/Simulation and Shooting/Action/Arcade, were found to be the 'design' factor and its effect turned to be getting stronger as time goes by after the launch. Consumers' purchase rate was actually higher for the mobile games of popular genres or in relation with socially popular subject matters. Also 'design' and 'creativity' factors which are related to the quality of contents, have gotten more important over time. One of the most interesting results was that there existed a "blue ocean" genres like Sports/Racing/Leisure which had a steady demand but not many competing games. In the analysis of the 'convenience' factor, one interesting implication for mobile game producers was that there exists a trade off between the ease of initial adoption and the steady sales of a mobile game.

Understanding the Watchdog Concept in South Korea: Focused on the Media as Watchdog (언론의 파수견 개념의 발전과 적용: 한국 판례분석을 중심으로)

  • Lee, Jae-Jin
    • Korean journal of communication and information
    • /
    • v.41
    • /
    • pp.108-144
    • /
    • 2008
  • This study examines how the watchdog concert in journalism field has been created and develope4 Related studies found that the watchdog is related not so muck with free press theory as with a privilege awarded to the press because the press serves for the public interests. It was found that in the U.S., the watchdog concept was derived from the a lot of libel cases in the late 1890s. At the time, the newspaper owners and editors continuously claimed the very protection over vulnerability of newspaper's collecting, reporting, and printing news. While, in Korea, the concept of watchdog emerged in the late 1990s after the establishment of the Constitution Court. Even though the watchdog concert was accepted very late by the Korean courts, it is believed to be a kind of special privilege to prevent the press from being recklessly regulated in libel cases. Rather, the Korean courts expand the extent of the role of the press as a watchdog by deciding that not only the public officials and politicians but also other socially influential public figures could be included in the criticism from the press. However, how these court decisions can be practically implemented depends upon how the court apply the probability of the press to believe the news true and intention of malice in writing and publishing the stories.

  • PDF