• Title/Summary/Keyword: outflow of information

Search Result 142, Processing Time 0.029 seconds

Inflow and outflow analysis of double majors using social network analysis (사회 연결망 분석을 이용한 복수전공 유입 및 유출 분석)

  • Cho, Jang-Sik
    • Journal of the Korean Data and Information Science Society
    • /
    • v.23 no.4
    • /
    • pp.693-701
    • /
    • 2012
  • Recently, the number of students who get double majors has tended to increase in many universities. As results, many problems occur because immoderate inflow of double-major students is concentrated in a specific popular department. In this paper, we study the characteristic of inflow and outflow of double majors using social network analysis and decision tree analysis. According to the results, SAT score affected the inflow of double majors the most. Additionally, department category, course evaluation score, employment rate also affected the inflow of double majors in the order named. On the other hand, department category affected the outflow of double majors the most. Additionally, SAT score, employment rate, course evaluation score also affected the outflow of double majors in the order named.

A Study on Pattern Extraction and Complete Elimination Method of Private Information (개인정보의 패턴 추출과 완전삭제방법에 관한 연구)

  • Seo, Mi-Suk;Park, Dea-Woo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2012.10a
    • /
    • pp.143-146
    • /
    • 2012
  • Enforcement of private information preservation law the infringement accident which is still caused by despite with private information outflow occurs. The private information outflow avoids finance and to become the fire tube. Analyzes the pattern of private information from search of private information and detection process and the research which it extracts and the research is necessary in about perfection elimination of the private information which is unnecessary. From the research which it sees it researched a pattern extraction research and a complete elimination method in about private information protection and it did the pattern extraction and a complete elimination experiment of private information.

  • PDF

Information Outflow interception Method and It's implementation Based in Web (Web 기반의 내부 정보유출 차단기법 및 프로토콜 설계)

  • 백승엽;이극
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2004.10a
    • /
    • pp.403-405
    • /
    • 2004
  • 본 논문에서는 내부로의 정보유출 보호를 위해 패킷의 이동경로를 분석함으로써 내부적으로 노출되어 있는 패킷에 송수신량을 측정하여 패킷 도청을 차단하는 기법을 제안한다. 서버와 클라이언트로 구현하여 웹을 통하여 실시간으로 패킷의 도청을 탐지 및 차단할 수 있도록 설계 및 구현하였다.

  • PDF

Design and Implementation of Applet for Multi-Users File Access based on Java Card (자바카드기반 다중 사용자 파일접근에 대한 애플릿 설계 및 구현)

  • Shin, Sang-Jun;Song, Young-Sang;Shin, In-Chul
    • Proceedings of the IEEK Conference
    • /
    • 2005.11a
    • /
    • pp.1201-1204
    • /
    • 2005
  • Whereas conveniences deriving from the development of information and telecommunication technology increase, information outflow and illegal data use are also rapidly on the rise. Consequently, many studies to prevent illegal information outflow are currently under way, and the use of Smart Card is in steep jump. Recently, Java Card is diffused fast as an alternative to complement the technical problems of the Smart Card. This paper designed and materialized the system for multi-users authentication and file access control by user through designing a Java Card applet that is used for information protection and in various application fields. For allowing a file access competence, each user's file access competence is processed via drawing up the access condition table in the applet. Therefore, illegal correction, exposure and destruction of information, which become the concerns when multi-users have an access, can be prevented. In addition, its application becomes possible in the system requiring multi-users certifications.

  • PDF

RSA Algorithm for User Authentication System

  • Song, Byung-Ho;Bae, Sang-Hyun
    • Proceedings of the KAIS Fall Conference
    • /
    • 2003.11a
    • /
    • pp.207-210
    • /
    • 2003
  • For the effective use of information in the information society, information should be protected and outflow of information by illegal users should be prevented. This study sets up user authentication policy, user authentication regulations and procedures for information protection and builds information protection key distribution center and encryption user Authentication system, which can protect information from illegal users.

  • PDF

The Study of Protective Solution and People in Technology Outflow about SMEs (중소기업 기술유출 및 기술인력 방지제도에 관한 연구)

  • Chung, Jason
    • International Commerce and Information Review
    • /
    • v.17 no.3
    • /
    • pp.133-152
    • /
    • 2015
  • Cause of the technology leakage and trade secrets can be leaked to the lack of infrastructure, lack of coping skills of SMEs. In addition, small businesses can avoid technology outflow and re-experience the same half of the damage, even when the external leak developed after the fact and does not demonstrate such technology leakage time for the technology and situation which did not take any action, security, infrastructure investments difficult, work-related knowledge, lack of security, trade secret protection dedicated staff, inadequate legal and institutional measures have been identified as such complaints to date. For subcontracting, etc. mid-sized transactions, hinder the growth of SMEs, SME cross-technology leakage to the increase in unfair practices, including useful, and this has been accompanied by growth-based business-to-business it weakened.

  • PDF

The Industrial Security along with the International Transfer of Technology (국제기술이전계약에서의 산업보안에 관한 연구)

  • SEO, Jung-Doo
    • THE INTERNATIONAL COMMERCE & LAW REVIEW
    • /
    • v.76
    • /
    • pp.1-20
    • /
    • 2017
  • The industrial technology (including trade secrets), which is commonly understood as systematic and applied technical knowledge, can be transferred to third parties by contracting for the transfer of technology or by granting of a licence. The activity of industrial espionage, due to the gradual increase of the economic interests of intellectual property, is displaying intensively in order to gain advanced technology information. With our outstanding high technology, but compared to the level of the advanced countries, the technical protection systems, the legal protection measures and the systematic management thereof may still be insufficient. Our industrial technology outflow abroad, due to the vulnerability to the security control system in our country, has been increasing since the 2000. Computer software and SNS, such as smart devices, appear as a rapid change in the technical information environment. In order to minimize the dead zone of a new industrial security, the country's organic activity is being conducted. In 2006, Industrial Technology Outflow Prevention and Protection Law was enacted, which emphasized the responsibilities of the country. In this paper for the economic entity's efforts to prevent technology leakage oversea, I have looked to how the industrial technology can be protected in terms of national security and economic benefits of our enterprises. To solve the above-mentioned problems hereof, Korean government should willingly establish a reliable legal system for supporting to enterprise's operations, and Korean companies should autonomously introduce a synthetic technology protection system and incorporate the confidentiality clauses in an international transfer of technology agreement with third parties.

  • PDF

The Pattern Search and Complete Elimination Method of Important Private Data in PC (PC에서 중요개인정보의 패턴 검색과 완전삭제방법 연구)

  • Seo, Mi-Suk;Park, Dea-Woo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2013.05a
    • /
    • pp.213-216
    • /
    • 2013
  • Big data, the use of privacy has been increasing to the development of wireless network infrastructure or technology development and wired Internet. By the way, Enforcement of private data preservation law the infringement accident which is still caused by despite with private data outflow occurs. The private data outflow avoids finance and to become the fire tube. Analyzes the pattern of private data from search of private data and detection process and the research which it extracts and the research is necessary in about perfection elimination of the private data which is unnecessary. From the research which it sees it researched a pattern extraction research and a complete elimination method in about private data protection and it did the pattern extraction and a complete elimination experiment of private data.

  • PDF

A Study of External Storage Device File Outflow (외장형 저장장치의 파일유출에 관한 연구)

  • Song, Yu-Jin;Lee, Jae-Yong
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.16 no.2
    • /
    • pp.59-64
    • /
    • 2011
  • A lot of computer users use external memory device. But, same time file efflux incidents are also increasing. There are two ways people use for efflux file. One is moving it after checking file which is running on computer and the other is checking file name only. Checking from running file case, we can identify vestige with running information of applied program but, the case of moving as external device without running file there is no evidence running applied program. So there are a lot of difficulty with forensic investigation. In this paper we suggest the way to help forensic investigation which is method of getting external memory device information of volume and time through its awareness method and connection information and moving to external device without running file after compare the external memory device volume information through link file analysis and getting information of link file formation & access time from link file.