• Title/Summary/Keyword: personal computer

Search Result 2,617, Processing Time 0.043 seconds

A Collaborative Approach to Situational Awareness for Endpoint Personal Data Protection (엔드포인트 개인정보보호를 위한 복합적 상황인지 방식)

  • Yong, SeungLim;Kim, Sangoh
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2018.07a
    • /
    • pp.173-174
    • /
    • 2018
  • EU의 GDPR(General Data Protection Regulation) 발효로 인해 유럽국가의 개인 정보 데이터를 활용하는 다국적 기업들이 규정에 맞는 데이터 보호정책을 수립하고 보안 투자를 강화하고 있다. 그러나 대다수의 기업들은 해커 등에 의한 사이버 보안을 위해서는 천문학적인 투자를 하고 있지만 기업 내 많은 직원들에 의한 실수나 고의에 의한 개인 정보 유출 방지에 대해서는 대처를 하고 있지 않다. 본 논문에서는 디지털 포렌식 기반의 앤드 포인트 실시간 모니터링 및 인간 행위 분석을 통한 앤드 포인트 개인 정보 보호 기능을 제공하여 기존의 사이버 보안에 국한된 통합 보안 관제의 효율성을 높이는 방안을 제안한다.

  • PDF

Drawing of penetrating lines using personal computer (個人용 컴퓨터를 利용한 相貫線의 圖示)

  • 채희창
    • Transactions of the Korean Society of Mechanical Engineers
    • /
    • v.12 no.1
    • /
    • pp.173-182
    • /
    • 1988
  • A program for drawing of penetrating lines was developed in personal computer. PROLOG, a language of Artificial Intelligence, was used and a data structure using relational data base was designed. An algorithm for finding the penetrating lines in the real space was developed. The program can be applied at any types of penetrating problems like curve-surface, surface-surface, curve-object, surface-object, object-object, etc. In developing the program, the following results were obtained. (1) Relational data base built in PROLOG and the function of backtracking are helpful in Computer Graphics. (2) In spite of increasing the number of edges, assigning direction to the edges makes it possible to represent the polygon meshes as the non ordered sets of directional half edges. (3) Topologicaly the penetrating lines of a polygon can be represented as the edge-pairs in the edge list of the polygon,

Automatic Generation of Dynamic Equations for Robotic Manipulators using Personal Computer (개인용 컴퓨터를 이용한 로보트 매니퓨레이터의 동적 방정식의 자동새성에 관한연구)

  • 황창선;최영규;원태현;서종일
    • The Transactions of the Korean Institute of Electrical Engineers
    • /
    • v.37 no.4
    • /
    • pp.226-231
    • /
    • 1988
  • A program is developed for generating the dynamic equations for the robotic manipulators using the symbolic language muSIMP/ MATH. The muSIMP/ MATH is a LISP-based computer. algebra package, devoted to the manipulation of algebraic expressions including numbers, variables, functions, and matrices. The muSIMP-MATH can operate on personal computer such as IBM-PC. The program is developed, based on the Lagrange-Euler formulation. This program is applicable to the manipulators with any number of degrees of freedom, and maximum number of degrees of freedom is set to be six in this program.

  • PDF

Development of A Personal Computer-Based Industrial Accident Information Management System: AIMS (퍼스날 컴퓨터용(用) 산업재해정보(産業災害情報) 시스템 AIMS의 개발(開發))

  • Chung, Min-Keun;Lee, Joong-Han;Kang, Dong-Seok
    • IE interfaces
    • /
    • v.2 no.2
    • /
    • pp.1-13
    • /
    • 1989
  • In this study, we have developed the personal computer-based industrial accident information management system(AIMS) which produces the industrial accident reports, various statistical reports and graphic charts such as pie, bar and trent charts. Recognizing the fact that computer systems are an integral part of today's business environment, the computerized industrial accident information management system serves as tools to help safety professionals accurately and rapidly obtain the information necessary to make decisions. The system can be used for the prevention of industrial accidents by early detection of potential hazards and by scientific and systematic analysis of causal factors.

  • PDF

Analysis of Articles published in the Korean Journal of Thoracic and Cardiovascular Surgery - Use of personal computer in storage and inquiry of article data - (대한 흉부외과학회지에 발표된 논문의 분석 고찰 - 개인용 콤퓨터를 이용한 논문자료의 저장과 조회의 실례 -)

  • Kim, Eung-Jung;Lee, Jeong-Ryeol;Na, Myeong-Hun
    • Journal of Chest Surgery
    • /
    • v.23 no.3
    • /
    • pp.423-429
    • /
    • 1990
  • Authors designed a computer-based article data management system using a 16 bit IBM personal computer and dBASE IV program and applied it to the management of article data of the Korean Journal of Thoracic and Cardiovascular Surgery. In this system, authors developed a coding system for systemic classification of form and subject of articles and this coding system made the storage and inquiry of data easy and convenient. Using the coding system in this article management system, total 1476 sheets of articles in the Korean Journal of Thoracic and Cardiovascular Surgery were analyzed and briefly described according to their forms and subjects. If this article data management system including the coding system is applied to other Journals related to the department of thoracic and cardiovascular surgery, we can utilize them easily and conveniently for the save of time and effort in the data inquiry or article preparation.

  • PDF

Design of Personal Health Records Encryption and Decryption System Using Elliptic Curve Cryptography Algorithm (타원곡선암호 알고리즘을 이용한 개인건강기록 암·복호화 시스템 설계)

  • Shim, Jae-Sung;Yun, Sung-Yeol;Park, Seok-Cheon
    • Annual Conference of KIPS
    • /
    • 2012.11a
    • /
    • pp.958-960
    • /
    • 2012
  • 본 논문에서는 사용자에게 PHR(PHR : Personal Health Record) 서비스를 제공 할 때 발생 가능한 개인정보변조 및 유출에 대한 위협에 대응하기 위하여 PHR과 ECC(ECC : Elliptic Curve Cryptosystem)에 대한 연구 및 안전한 개인정보 전송을 위한 XML 형식의 PHR 서비스 메시지 구조설계와 ECC 알고리즘 기법을 이용한 PHR 암 복호화 시스템을 설계하였다.

IoT Adoption by the Young Consumer: An Extended ASE Perspective

  • Arif Mahmud;Mohd Najwadi Yusoff;Mohd Heikal Husin
    • Asia pacific journal of information systems
    • /
    • v.32 no.4
    • /
    • pp.857-889
    • /
    • 2022
  • Home theft and burglary are prevalent in Dhaka city. Internet of things (IoT), in contrast, is commonly recognized as among the most advanced home security systems. However, the factors that attract young people to use IoT for household security have yet to be examined. Consequently, the purpose of this article is to validate the attitude-social influence-self-efficacy (ASE) model with personal innovativeness and perceived trust. We collected data from Dhaka citizens aged 15 to 24 using a purposive sample technique and 370 valid responses were chosen for the study. According to the analysis, all of our proposed hypotheses were found significant with a 73.6% variance. Furthermore, the effects of attitude and social influence were shown to be the highest and lowest, respectively, and trust and innovativeness were both nearly strong main predictors of ASE. Significantly, since this is one of the few studies in the technology adoption domain using this model, a solid foundation for IoT adoption for security purposes is established.

Fraud Detection in E-Commerce

  • Alqethami, Sara;Almutanni, Badriah;AlGhamdi, Manal
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.6
    • /
    • pp.312-318
    • /
    • 2021
  • Lack of knowledge and digital skills is a threat to the information security of the state and society, so the formation and development of organizational culture of information security is extremely important to manage this threat. The purpose of the article is to assess the state of information security of the state and society. The research methodology is based on a quantitative statistical analysis of the information security culture according to the EU-27 2019. The theoretical basis of the study is the theory of defense motivation (PMT), which involves predicting the individual negative consequences of certain events and the desire to minimize them, which determines the motive for protection. The results show the passive behavior of EU citizens in ensuring information security, which is confirmed by the low level of participation in trainings for the development of digital skills and mastery of basic or above basic overall digital skills 56% of the EU population with a deviation of 16%. High risks to information security in the context of damage to information assets, including software and databases, have been identified. Passive behavior of the population also involves the use of standard identification procedures when using the Internet (login, password, SMS). At the same time, 69% of EU citizens are aware of methods of tracking Internet activity and access control capabilities (denial of permission to use personal data, access to geographical location, profile or content on social networking sites or shared online storage, site security checks). Phishing and illegal acquisition of personal data are the biggest threats to EU citizens. It have been identified problems related to information security: restrictions on the purchase of products, Internet banking, provision of personal information, communication, etc. The practical value of this research is the possibility of applying the results in the development of programs of education, training and public awareness of security issues.

Personal Information Management in Korea National Long-Term Ecological Research Community (국가장기생태연구 커뮤니티의 개인정보 관리)

  • Huh, Taesang;Jung, Hoekyung
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.20 no.12
    • /
    • pp.2274-2281
    • /
    • 2016
  • In the long-term ecological research community, personal information is an important factor for the collaboration of data management and data usage in international long-term ecological research as well as on the national level. If lots of personal information was disclosed, collaborative researchers are useful to carry out research cooperation, whereas, information providers tend to be burdened to disclose it. LTER system should be considered to provide both maximum personal information required by a community and minimum personal information to be provided to unrelated people due to the scale of personal information and a number of the constraints on disclosure in the aspect of information distribution of the laws associated with personal information protection. In this article, we analyze international ecological metadata standard, EML, and trends in personal information management throughout international long-term ecological research platforms and propose a system model capable of managing personal information based on related domestic laws for the international data exchange through design and implementation.

Design and Analysis of Technical Management System of Personal Information Security using Web Crawer (웹 크롤러를 이용한 개인정보보호의 기술적 관리 체계 설계와 해석)

  • Park, In-pyo;Jeon, Sang-june;Kim, Jeong-ho
    • Journal of Platform Technology
    • /
    • v.6 no.4
    • /
    • pp.69-77
    • /
    • 2018
  • In the case of personal information files containing personal information, there is insufficient awareness of personal information protection in end-point areas such as personal computers, smart terminals, and personal storage devices. In this study, we use Diffie-Hellman method to securely retrieve personal information files generated by web crawler. We designed SEED and ARIA using hybrid slicing to protect against attack on personal information file. The encryption performance of the personal information file collected by the Web crawling method is compared with the encryption decryption rate according to the key generation and the encryption decryption sharing according to the user key level. The simulation was performed on the personal information file delivered to the external agency transmission process. As a result, we compared the performance of existing methods and found that the detection rate is improved by 4.64 times and the information protection rate is improved by 18.3%.