• Title/Summary/Keyword: personal integrity

Search Result 111, Processing Time 0.024 seconds

Design and Estimation of a Session Key based Access Control Scheme for Secure Communications in IoT Environments (IoT 환경에서 안전한 통신을 위한 세션 키 기반 접근 제어 기법의 설계 및 평가)

  • Jin, Byungwook;Jung, Dongwoog;Cha, Siho;Jun, Moonseog
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.12 no.1
    • /
    • pp.35-41
    • /
    • 2016
  • Internet of Things (IoT) services are widely used in appliances of daily life and industries. IoT services also provide various conveniences to users and are expected to affect value added of all industries and national competitiveness. However, a variety of security threats are increased in IoT environments and lowers reliability of IoT devices and services that make some obstacles for commercialization. The attacks arising in IoT environments are making industrial and normal life accidents unlike existing information leak and monetary damages, and can expand damage scale of leakage of personal information and privacy more than existing them. To solve these problems, we design a session key based access control scheme for secure communications in IoT environments. The proposed scheme reinforces message security by generating session key between device and access control network system. We analyzed the stability of the proposed access scheme in terms of data forgery and corruption, unauthorized access, information disclosure, privacy violations, and denial of service attacks. And we also evaluated the proposed scheme in terms of permission settings, privacy indemnity, data confidentiality and integrity, authentication, and access control.

Designing and Implementing a PKI-based Safety Protocol for Electronic Medical Record Systems (공개키 기반의 안전한 전자의무기록에 관한 프로토콜 설계 및 구현)

  • Jin, Gang-Yoon;Jeong, Yoon-Su;Shin, Seung-Soo
    • Journal of Digital Convergence
    • /
    • v.10 no.4
    • /
    • pp.243-250
    • /
    • 2012
  • This study proposes new protocol protecting patients' personal record more safely as well as solving medical dispute smoothly by storing the record not into a computer server in hospitals but into the National Health Insurance Corporation computer server. The new protocol for electronic medical record is designed using RSA public key algorithm and DSA digital signature. In addition, electronic medical record systems are built up with more safety and reliability through certificate authority. The proposed medical information systems can strengthen trust between doctors and patients. If medical malpractice occurs, the systems can also provide evidence. Furthermore, the systems can be helpful to reduce medical accidents. The systems could be also utilized efficiently in various applied areas.

Does Entrepreneurial Leadership Matter for Micro-Enterprise Development?: Lesson from West Java in Indonesia

  • RUSLIATI, Ellen;MULYANINGRUM, Mulyaningrum;WIBOWO, Agus;NARMADITYA, Bagus Shandy
    • The Journal of Asian Finance, Economics and Business
    • /
    • v.7 no.8
    • /
    • pp.445-450
    • /
    • 2020
  • This research investigates the role of entrepreneurial leadership in micro-enterprise development in the district of Majalengka in West Java, Indonesia. This study applied a qualitative content analysis method to understand the phenomenon of micro-enterprises comprehensively. The data of this research was collected using surveys, interviews, and a group discussion. The findings indicated that technological information adaptation plays a crucial role in the development of micro-enterprise development. Since the group of millennials dominated the leadership, it has provided more creativity by implementing technological information instead of the previous generation that faced difficulties in adopting the technology. This study noted that inadequate technology adaptation makes micro-business gradually lose customers, and the business was threatened to close. Meanwhile, the role of leadership drives the business development, sales have risen, the number of products has been increasingly diverse, and business capital and number of employees have grown. The establishment of an entrepreneur group could facilitate peer-to-peer contact, knowledge transfer, training, and intervention to enhance leadership and business development. This finding pointed out that the leadership will successfully influence business development when supported by several characteristics such as manage the business, capture opportunities, confidence, firmness, personal integrity, communication, and social and technical expertise.

In Search of a Definition of Successful Aging: A Review of Literature (성공적인 노화 정의를 위한 문헌연구)

  • 홍현방;최혜경
    • Journal of Families and Better Life
    • /
    • v.21 no.2
    • /
    • pp.145-154
    • /
    • 2003
  • As the life-expectancy is ever-increasing, and the proportion of the elderly population is growing steadily in every society of the world, it is ever more important to establish what factors allow certain elderly people to age successfully and remain relatively independent while others grow old less successfully and require extensive intervention. However, there is no consensus yet as to what successful aging means. Researchers have defined successful aging in a variety of ways. This study attempted to define the concept of successful aging and to clarify some dimensions of it through literature review. Previous approaches of studying successful aging and related themes were examined. Early perspectives including activity, disengagement, and continuity theories, Selective Optimization with Compensation (SOC) model by Baltes and Baltes, three different conceptions of successful aging, that is, psychological well-being, physical health, and wisdom, and MacArthur research on successful aging have been reviewed for this study. The definition derived from the review is: Keeping up continuous developmental processes to achieve wisdom or ego-integrity, without suffering any major disabilities in either physical or mental functioning, while maintaining psychological well-being and employing SOC strategies, and participating in positive relationships with significant others. The dimensions of successful aging are 1) personal resources, including physical health, cognitive competences, self esteem, and social support 2) adaptation process of SOC, and 3) psychological aspects, including psychological well-being and wisdom.

Development of a Simulation Tool to Evaluate GNSS Positioning Performance in Urban Area

  • Wu, Falin;Liu, Gang-Jun;Zhang, Kefei;Densley, Liam
    • Proceedings of the Korean Institute of Navigation and Port Research Conference
    • /
    • v.2
    • /
    • pp.71-76
    • /
    • 2006
  • With the rapid development of spatial infrastructure in US, Europe, Japan, China and India, there is no doubt that the next generation Global Navigation Satellite System (GNSS) will improve the integrity, accuracy, reliability and availability of the position solution. GNSS is becoming an essential element of personal, commercial and public infrastructure and consequently part of our daily lives. However, the applicability of GPS in supporting a range of location-sensitive applications such as location based services in an urban environment is severely curtailed by the interference of the 3D urban settings. To characterize and gain in-depth understanding of such interferences and to be able to provide location-based optimization alternatives, a high-fidelity 3D urban model of Melbourne CBD built with ArcGIS and large scale high-resolution spatial data sets is used in this study to support a comprehensive simulation of current and future GNSS signal performance, in terms of signal continuity, availability, strength, geometry, positioning accuracy and reliability based on a number of scenarios. The design, structure and major components of the simulator are outlined. Useful time-stamped spatial patterns of the signal performance over the experimental urban area have been revealed which are valuable for supporting location based services applications, such as emergency responses, the optimization of wireless communication infrastructures and vehicle navigation services.

  • PDF

Development of field programmable gate array-based encryption module to mitigate man-in-the-middle attack for nuclear power plant data communication network

  • Elakrat, Mohamed Abdallah;Jung, Jae Cheon
    • Nuclear Engineering and Technology
    • /
    • v.50 no.5
    • /
    • pp.780-787
    • /
    • 2018
  • This article presents a security module based on a field programmable gate array (FPGA) to mitigate man-in-the-middle cyber attacks. Nowadays, the FPGA is considered to be the state of the art in nuclear power plants I&C systems due to its flexibility, reconfigurability, and maintainability of the FPGA technology; it also provides acceptable solutions for embedded computing applications that require cybersecurity. The proposed FPGA-based security module is developed to mitigate information-gathering attacks, which can be made by gaining physical access to the network, e.g., a man-in-the-middle attack, using a cryptographic process to ensure data confidentiality and integrity and prevent injecting malware or malicious data into the critical digital assets of a nuclear power plant data communication system. A model-based system engineering approach is applied. System requirements analysis and enhanced function flow block diagrams are created and simulated using CORE9 to compare the performance of the current and developed systems. Hardware description language code for encryption and serial communication is developed using Vivado Design Suite 2017.2 as a programming tool to run the system synthesis and implementation for performance simulation and design verification. Simple windows are developed using Java for physical testing and communication between a personal computer and the FPGA.

A Hybrid Digital Watermarking Technique for Copyright Protection and Tamper Detection on Still images (정지영상에서 저작권 보호 및 위변조 검출을 위한 하이브리드 디지털 워터마킹 기법)

  • Yoo Kil-Sang;Song Geun-Sil;Choi Hyuk;Lee Won-Hyung
    • Journal of Internet Computing and Services
    • /
    • v.4 no.4
    • /
    • pp.27-34
    • /
    • 2003
  • Digital image manipulation software is now readily available on personal computers. It is therefore very simple to tamper with any image and make it available to others. Therefore. copyright protection of digital contents and insurance of digital image integrity become major issues. In this paper, we propose a hybrid watermarking method to identify locations of tampered region as well as copyright. Our proposed algorithms embed the PN-sequence into low frequency sub-band of the wavelet transform domain and it doesn't need the original image in extraction procedure. The experimental results show good robustness against any signal processing with tamper detection on still image.

  • PDF

Exploring Interpersonal Trust Online

  • Ahn, Soo-kyoung
    • Journal of Fashion Business
    • /
    • v.21 no.6
    • /
    • pp.31-46
    • /
    • 2017
  • This study views the people's propensity to rely on others' evaluations as the interpersonal trust online despite a lack of personal interactions. Therefore, this study explores the underlying dimensions of interpersonal trust and examines how interpersonal trust influences trust in the e-tailer and behavioral intent. Data of 395 adults who had purchased apparel goods online were collected nationwide using an online questionnaire. Exploratory and confirmative factor analysis identified five underlying constructs of interpersonal trust online such as peer identification, ability, integrity, shared lifegoals, and benevolence. A structural equation modeling test was conducted to examine the relationships between interpersonal trust, trust in the e-tailer, and behavioral intent. Interpersonal trust influenced on trust in the e-tailer, specifically on trust in the e-tailer's competence which subsequently increased a customer's behavioral intent such as attitude toward the e-tailer and shopping intention. Although no direct effect of interpersonal trust on the behavioral intent was found, interestingly, the effects of the interpersonal trust on the e-tailer trust which derived the behavioral intent to purchase. This result suggests that marketers devise a more effective system and environment that can encourage the interpersonal trust between customers to build a strong trust in e-tailers. It also provides a theoretical framework of online trust in the way of classifying interpersonal trust and trust in e-tailers.

A Study of Program Execution Control based on Whitelist (화이트리스트 기반 프로그램 실행 통제 방안 연구)

  • Kim, Chang-hong;Choi, Dae-young;Yi, Jeong-hyun;Kim, Jong-bae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2014.10a
    • /
    • pp.346-349
    • /
    • 2014
  • Currently, the growing cyber threat continues, the damage caused by the evolution of malicious code incidents become more bigger. Such advanced attacks as APT using 'zero-day vulnerability' bring easy way to steal sensitive data or personal information. However it has a lot of limitation that the traditional ways of defense like 'access control' with blocking of application ports or signature base detection mechanism. This study is suggesting a way of controlling application activities focusing on keeping integrity of applications, authorization to running programs and changes of files of operating system by hardening of legitimate resources and programs based on 'white-listing' technology which analysis applications' behavior and its usage.

  • PDF

Modeling and simulation of large crowd evacuation in hazard-impacted environments

  • Datta, Songjukta;Behzadan, Amir H.
    • Advances in Computational Design
    • /
    • v.4 no.2
    • /
    • pp.91-118
    • /
    • 2019
  • Every year, many people are severely injured or lose their lives in accidents such as fire, chemical spill, public pandemonium, school shooting, and workplace violence. Research indicates that the fate of people in an emergency situation involving one or more hazards depends not only on the design of the space (e.g., residential building, industrial facility, shopping mall, sports stadium, school, concert hall) in which the incident occurs, but also on a host of other factors including but not limited to (a) occupants' characteristics, (b) level of familiarity with and cognition of the surroundings, and (c) effectiveness of hazard intervention systems. In this paper, we present EVAQ, a simulation framework for modeling large crowd evacuation by taking into account occupants' behaviors and interactions during an emergency. In particular, human's personal (i.e., age, gender, disability) and interpersonal (i.e., group behavior and interactions) attributes are parameterized in a hazard-impacted environment. In addition, different hazard types (e.g., fire, lone wolf attacker) and propagation patterns, as well as intervention schemes (simulating building repellent systems, firefighters, law enforcement) are modeled. Next, the application of EVAQ to crowd egress planning in an airport terminal under human attack, and a shopping mall in fire emergency are presented and results are discussed. Finally, a validation test is performed using real world data from a past building fire incident to assess the reliability and integrity of EVAQ in comparison with existing evacuation modeling tools.