• Title/Summary/Keyword: personal information manager

Search Result 81, Processing Time 0.023 seconds

An IPIMS Design for Efficient Personal Information Management (효율적인 개인정보 관리를 위한 IPIMS 설계)

  • Jeon, Byung-Jin;Shin, Seung-Soo;Lee, Jun-Yeon
    • Journal of Convergence for Information Technology
    • /
    • v.7 no.3
    • /
    • pp.83-90
    • /
    • 2017
  • The purpose of this study is to solve the limitations that the information security manager of company should recognize the personal information of all employees. In this study, we propose efficient personal information retention status management system to minimize information retention status of personal information and department by information security manager and departmental information security officer. To do this, we study the method of transferring the check result from the PVA system to the efficient personal information retention management system, also study ways to minimize the amount of personal information we hold. It is possible to minimize the possession of personal information by changing the one channel method managed by the information security administrator of the existing PVA system to the two channel method so that the information security manager and the information security officer can manage it.

Secure Communication Schemes over ISO/IEEE 11073-20601 for Smart Healthcare Service

  • Kim, Sang Kon;Kim, Tae Kon
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.16 no.7
    • /
    • pp.2225-2238
    • /
    • 2022
  • For advanced healthcare services, a variety of agents should maintain reliable connections with the manager and communicate personal health and medical information. The ISO/IEEE 11073 standards provide convenient interoperability and the optimized exchange protocol (OEP) supports efficient communication for devices. However, the standard does not specify secure communication, and sensitive personal information is easily exposed through attacks. Malicious attacks may lead to the worst results owing to service errors, service suspension, and deliberate delays. All possible attacks on the communication are analyzed in detail, and the damage is specifically identified. In this study, novel secure communication schemes over the 20601 OEP are proposed by introducing an authentication process while maintaining compatibility with existing devices. The agent performs a secure association with the manager for mutual authentication. However, communication with mutual authentication is not completely free from attacks. Message encryption schemes are proposed for concrete security. The authentication process and secure communication schemes between the secure registered agent (SRA) and the secure registered manager (SRM) are implemented and verified. The experimental analysis shows that the complexities of the SRA and SRM are not significantly different from those of the existing agent and manager.

A Design and Implementation of Personal VOD System using Multi-thread (다중 스래드를 이용한 개인용 VOD 시스템의 설계와 구현)

  • Park, Sung-Sik;Lee, Ho-Suk
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.6 no.3
    • /
    • pp.299-310
    • /
    • 2000
  • In this paper, we designed and implemented a personal VOD server using multi-thread for the real-time services of video data to the users. The system consists of service manager, disk manager, and network manager. The service manager controls the user admission to the system using the VBR(Variable Bit Rate) characteristics of MPEG (Moving Picture Experts Group) video data. The disk manager provides the functions for VCR-like operations. The disk manager reads blocks from the disk by the size of GOP(Group of Pictures) and buffers the data to the user's thread. The network manager uses TCP/IP for the communication between the server and the client. The communication starts from the client and the VOD server must respond to this request. The implemented personal VOD system shows an acceptable performance.

  • PDF

Factors Affecting Utilization of Clinical Nurses' Hospital Information System (병원간호사의 병원정보시스템 활용정도에 영향을 미치는 요인)

  • Kim, Sam-Sook;Ju, Hyeon-Ok;Park, In-Sook
    • Journal of Korean Academy of Nursing Administration
    • /
    • v.14 no.4
    • /
    • pp.440-447
    • /
    • 2008
  • Purpose: This study was to identify the factors affecting utilization of clinical nurses' hospital information system. Method: Using a convenient sampling, 450 nurses from 9 secondary or tertiary university hospitals in B metropolitan city were selected. Results: The extent that nurses utilize the hospital information system was 3.22 point on average. The hospital information system utilization was positively correlated with personal information utilization skill, information-oriented education, attitude toward computer, and support of the chief manager, while as negatively correlated with the organizational atmosphere. The causal factors of influencing on the hospital information system utilization were personal information technology, education experience of the hospital information system, age, attitude toward computers, education level and support of the chief manager. The total eigenvalue of the variables was 38%. The major variables of influencing on the hospital information system utilization were the personal information technology and education experience of the hospital information system. Conclusions: Thus, nurse managers should provide training courses to improve personal information technology of nurses, and consistently promote them so that nurses can readily apply the hospital information system which have been recently introduced in various ways and thus improve the efficiency of nursing.

  • PDF

Improvement of Wireless Connectivity and Efficiency in E-Healthcare Service System Using a Proxy in Body Area Device

  • Kim, Sang Kon;Kim, Tae Kon;Koh, Jinhwan
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.3
    • /
    • pp.991-1013
    • /
    • 2020
  • E-health services have provided interoperability between personal health devices in personal area network, based the ISO/IEEE 11073 standard. In the healthcare system, the manager handles most agents concurrently through wireless communication. However, due to the distance limitation and the increased number of agents, it may be difficult to provide continuous connectivity. Recently, body area devices have been equipped with various applicable agents, which can even handle agents on behalf of the manager. A BAD may act as an intermediary device to increase system efficiency and performance. In this study, a device called "proxy", which can be installed as software on BAD devices, is proposed. The data measured by an agent can be sent to the proxy first, and subsequently be sent to the manager again. Agents and the manager are not aware of the proxy existence and work normally without the proxy. Furthermore, a new smart proxy and modified manager are proposed. The smart proxy acts as one agent handling measurement data from several agents, which can transmit a significant amount of data at once. The proxy and smart proxy maintain compatibility with existing devices that conform to the 20601 standard. The proposed schemes are verified and the complexities of devices are analyzed. The analysis shows no significant difference among the proxy, smart proxy, and manager. Simulations exhibit that the proposed schemes can improve the system performance.

Personal Information System risk analysis standard supporting tool development (개인정보시스템 위험도 분석 기준 지원 도구 개발 연구)

  • Han, Kyung-Su;Jung, Hyun-Mi;Lee, Gang-Soo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2012.05a
    • /
    • pp.663-666
    • /
    • 2012
  • Since September 30 2011, depending on Personal Information Protection Act article 29 and Act standard securing personal information safety the fifth clause of article 7, in case personal information manager of public and private enterprise saves unique indentifying information to internal network, the manager can enforce that decide checking of cryptographic application and a range of application following risk analysis criteria result. Until December 31 2012, enterprises complete the application of cryptographic technology or the equivalent. The paper is research and development on supporting tool that suggest risk analysis criteria based on personal information risk analysis criteria that be provided by MOPAS(Ministry Of Public Administration and Security) and KISA(Korea Internet Security Agency) for personal information processing.

  • PDF

Communication Manager Design and Implementation of Individual Location Information for Social Learning in N-Screen (N-스크린 환경에서 소셜 러닝을 위한 개인 위치정보 지원 커뮤니케이션 매니저 설계 및 구현)

  • Kim, Kyung-Rog;Byeon, Jae-Hee;Moon, Nam-Mee
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.48 no.3
    • /
    • pp.27-35
    • /
    • 2011
  • Social network services are developed which is based on interaction and collaboration between users. This used to teaching-learning and integrate personal experience based on constructivism and social learning has developed into. In order to use which better to support the N-Screen communication model is needed. Communication model is to support the interaction between learner-instructor- the system. However, until now, There are a lot of web-based communications research. In this study, Social Learning Services environment to extended to N-Screen. For seamless service, Location information of individuals to use to learning activities. To support this, the communication manager is to design and implement. Communications manager for the N-Screen services draw students use cases and define the required functions. Based on this, Communication function is designed. In addition, Considering the characteristics of each device, personal location information to be reflected.

Factors Influencing the Provision of Personal Information in Electronic Government Services (전자정부서비스에 대한 개인정보제공의 영향요인)

  • Park, Jung Ae;Son, Dal Ho
    • The Journal of Information Systems
    • /
    • v.26 no.1
    • /
    • pp.53-73
    • /
    • 2017
  • Frequent outbreak of intrusion of private information is occurring recently not only at portal sites but also in electronic information service of public agencies. Due to these intrusions, it is observed that the citizens tend to avoid providing their private information even to the service for public agencies. Therefore, the object of this research can be explained as demonstrating the influence of the intention of provision for private information to foster the selectronic information ervice of the public agencies. In order to achieve this, this research intends to demonstrate how the experience of the intrusion of the private information affects the concern about the privacy and how the information factor from the public electronic information service has influence on the reliability toward the public. The results showed that the experience of intrusion of privacy, awareness of the danger of privacy, and the sense protection of the information from the manager at public agencies have direct influence on the concern of privacy. Meanwhile, it has been verified that the awareness of information protection of a manager, the systemicity of information protection, and the surveillance and punishment of information protection have influence on the reliability of public agencies.

Development and Application of the Park Tree Management Information System (공원수목관리정보체계 구축 및 활용)

  • 이규석;김광식;황국웅;심경구
    • Journal of the Korean Institute of Landscape Architecture
    • /
    • v.21 no.3
    • /
    • pp.89-98
    • /
    • 1993
  • It is necessary for the park tree manager to have the current information about the status of trees, which can help him with right decisions. However, there are many problems in the existing management method such as huge amount of data, tedious work, and the difficult update work due to the lack of necessary data or the inappropriate data record and management method. The sole use of database management system(DBMS) cannot slove these problems because it cannot handle graphic data based on the locational information. So, it is imperative for the park manager to have locational data as well as attribute data of the park tree concerned. Therefore, the purpose of this study is to develop the personal computer-based, user friendly park tree management information system, which deals with attribute data(DBMS) and graphic data(using the CAD) together within the integrated environment. The park tree management information system developed in this study provides a complete operating environment for data input, update, query, delete, and retrieve. The major advantages of this system are as follows: 1) To search the location and distribution of trees. 2) To record, store, and manage data easily. 3) When the manager is changed, delivery of the park tree work is convenient. 4) The system can help the manager with the correct information for the efficient park tree management.

  • PDF

A Proposal of Enhanced Personal Information Security management Framework of Consigning of Personal Information (개인정보보호 강화를 위한 위탁 업무 보안관리 프레임웍 제안)

  • Ko, Youngdai-Dai;Lee, Sang-Jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.2
    • /
    • pp.383-393
    • /
    • 2015
  • Recently, the number of companies consigning their personal information management work has been increasing; they consign the work for various reasons and purposes, for example, in order to reduce costs related to personal information managers, improve efficiency through professional performance and to improve service quality. As such, since the cases where an consigning agency - not the personal information manager - handles personal information are increasing due to the increase of consigning of the personal information management work, we need to concerned with and pay attention to how much such agency makes efforts for personal information protection. In this regard, this study suggests a plan for efficient management of the agency during the course of consigning work as well as a list of requirements for personal information protection to be considered in each phase of the following; establishment of personal information protection framework for all consigning work processes, selection of consigning agency, execution of consigning contract, operation and management of consigning work, and termination of contract.