• Title/Summary/Keyword: protection risks

Search Result 294, Processing Time 0.026 seconds

The Study on the Enhanced User Authentication using the Combination of Individual Attribute (개인속성 정보의 결합을 통한 강화된 인증방안에 대한 연구)

  • Kim, Tae Kyung
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.10 no.2
    • /
    • pp.83-89
    • /
    • 2014
  • An increasing number of children are now using the Internet. They are starting at a younger age, using a variety of devices and spending more time online. It becomes an important problem to protect the children in online environment. The Internet can be a major channel for their education, creativity and self-expression. However, it also carries a spectrum of risks to which children are more vulnerable than adults. In order to solve these problems, we suggested a binding model of user attributes for enhanced user authentication. We also studied the requirements and prerequisites of a binding model of user attributes. In this paper we described the architecture of binding model of user attributes and showed the effectiveness of the suggested model using simulation. This model can be utilized to enhanced user authentication and service authorization.

Data-Hiding Method using Digital Watermark in the Public Multimedia Network

  • Seo, Jung-Hee;Park, Hung-Bog
    • Journal of Information Processing Systems
    • /
    • v.2 no.2
    • /
    • pp.82-87
    • /
    • 2006
  • In spite of the rapid development of the public network, the variety of network-based developments currently raises numerous risks factors regarding copyright violation, the prohibition and distribution of digital media utilization, safe communication, and network security. Among these problems, multimedia data tend to increase in the distributed network environment. Hence, most image information has been transmitted in the form of digitalization. Therefore, the need for multimedia contents protection must be addressed. This paper is focused on possible solutions for multimedia contents security in the public network in order to prevent data modification by non-owners and to ensure safe communication in the distributed network environment. Accordingly, the Orthogonal Forward Wavelet Transform-based Scalable Digital Watermarking technique is proposed in this paper.

Research for Signal Interfaces between DOORS of DRIVERLESS TRAIN and PSD Control (무인운전 차량의 도어 및 PSD 제어 신호에 대한 연구)

  • Lee, Hee-Chang;Kim, Dong-Il;Chun, Sang-Hun
    • Proceedings of the KSR Conference
    • /
    • 2010.06a
    • /
    • pp.857-865
    • /
    • 2010
  • Recently the demand of the driverless rolling stock is increasing with advancement of the stable communication technique and control technique. The automatic train operating system has advantages which takes low operating cost and is able to dispose elastically in demand. Beside it provides high safety and effectiveness because it will be able to control power, signal and communication system from Operation Control Center and the safety and effectiveness are high. The establishment of PSD, Platform Screen Door, is advanced in the goal which is passenger safety, fire protection, noise and dust reduction etc. When but, two advanced systems also have risks of operation delay and accident when two systems are not controlled smoothly. Thus, I'll introduce control method between onboard controller, door control unit in rolling stock and PSD controller to help system design.

  • PDF

Application of Formal Safety Assessment Methodology to Marine Structural Design (공식안전평가기법의 선박해양구조설계에의 적용)

  • Lee, Joo-Sung
    • Proceedings of the Korea Committee for Ocean Resources and Engineering Conference
    • /
    • 2001.05a
    • /
    • pp.133-138
    • /
    • 2001
  • Formal safety assessment (FSA) is defined as a structured and systematic methodology aimed at enhancing maritime safety including protection of life, health, and the marine environment and property, by using risk and cost/benefit assessment or, more specifically, it is a process of identifying hazard, evaluating risk and deciding on course of action to control those risks. Emphasis is placed on the structural aspect of the failure of cargo hold. This study is expected to illustrate how a new methodology, i.e. the Formal Safety Assessment, can be applied to specific ship safety problems.

  • PDF

Analysis of the Cell Balancing Effect on the ESS Fire by Simulating the Euljiro 3-ga Subway ESS (을지로 3가 지하철 ESS를 모의한 ESS 화재에서 Cell Balancing이 미치는 영향성 분석)

  • Yun, Sang-Sun;Kee, Seok-Cheol
    • The Transactions of the Korean Institute of Power Electronics
    • /
    • v.25 no.3
    • /
    • pp.219-226
    • /
    • 2020
  • Given the change in the energy market, large energy storage systems (ESS) is rapidly entering the market. In this rapid spread, fire accidents are becoming an issue. This study attempts to approach the fire from the system point of view to analyze the problems caused by bonding from different perspectives. Moreover, to conduct this study, the fabrication of real objects is dangerous, which needs to be verified through simulation. In this study, we approach the cause of fire that occurs in large-capacity ESS from the system perspective. We focus on determining the effects of cell balancing performed on the BMS after charging. Thus, we analyze the cell balancing behavior and the linkage risks to the various stacks. The study also explores why no fire occurs during 70% operation.

Research Trends Analysis of Information Security using Text Mining (텍스트마이닝을 이용한 정보보호 연구동향 분석)

  • Kim, Taekyung;Kim, Changsik
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.14 no.2
    • /
    • pp.19-25
    • /
    • 2018
  • With the development of IT technology, various services such as artificial intelligence and autonomous vehicles are being introduced, and many changes are taking place in our lives. However, if secure security is not provided, it will cause many risks, so the information security becomes more important. In this paper, we analyzed the research trends of main themes of information security over time. In order to conduct the research, 'Information Security' was searched in the Web of Science database. Using the abstracts of theses published from 1991 to 2016, we derived main research topics through topic modeling and time series regression analysis. The topic modeling results showed that the research topics were Information technology, system access, attack, threat, risk management, network type, security management, security awareness, certification level, information protection organization, security policy, access control, personal information, security investment, computing environment, investment cost, system structure, authentication method, user behavior, encryption. The time series regression results indicated that all the topics were hot topics.

How should the regulatory defaults be set?

  • Jang, Seung-Cheol
    • Nuclear Engineering and Technology
    • /
    • v.50 no.7
    • /
    • pp.1099-1105
    • /
    • 2018
  • How to choose defaults in risk-informed regulations depends on the conservatism implicated in regulatory defaults. Without a universal agreement on the approaches dealing with the conservatism of defaults, however, the desirability of conservatism in regulatory risk analyses has long been controversial. The opponent views it as needlessly costly and irrational, and the proponent as a form of protection against possible omissions or underestimation of risks. Moreover, the inherent ambiguity of risk makes it difficult to set suitable defaults in terms of risk. This paper, the extension of the previous work [1], focuses on the effects of different levels of conservatism implicated in regulatory defaults on the estimates of risk. According to the postulated behaviors of regulated parties and the diversity of interests of regulators, in particular, various measures for evaluating the effect of conservatism in defaults are developed and their properties are explored. In addition, a simple decision model for setting regulatory defaults is formulated, based on the understanding of the effect of conservatism implicated in them. It can help decision makers evaluate the levels of safety likely to result from their regulatory policies.

A Study on the Risk Management Tools against Infectious Diseases in the Port-Utilizing Semi-Quantitative Bow-Tie Method

  • Lim, Kukhwan;Oh, Yong-Sik
    • Journal of Navigation and Port Research
    • /
    • v.46 no.2
    • /
    • pp.145-157
    • /
    • 2022
  • Due to the global epidemic of infectious diseases, it has become important for all industries to respond to the risk of infectious diseases. Ports in each country are also responding to the risk of infectious diseases, but the occurrence of infectious diseases in ports of various countries is causing a lot of damage to the logistics of ports. Korea is in the same situation, and cases of infectious diseases in ports are steadily being announced. Therefore, this paper conducted semi-quantitative Bow-Tie risk assessment by substituting measures to cope with infectious disease risks in Korean ports into actual cases of port infectious diseases in Korea, deriving improvements and suggesting directions. As a result, it was concluded that it was necessary to standardize some of the countermeasures against infectious diseases and develop more countermeasures.

Blockchain based Online Pharmacy with Customer Privacy Protection

  • Im, Cheon Woon;Kim, Dong Han;Jang, Jung Eun;Shin, Eun Jung;Lee, Hyun Chul;Kim, Tae Hyun;Kim, Seong Whan
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2021.05a
    • /
    • pp.33-36
    • /
    • 2021
  • Corona 19 minimizes face-to-face contact, and online untact platforms are emerging in the medical sector. However, there are potential risks of medicine expiration, medicine misuse, and responsible materials management for secure delivery. In this paper, we investigate three key functional requirements for online pharmacy, and design the blockchain based online pharmacy to meet the requirements. To protect the patient's privacy and to ensure tamper-free traceability, we incorporate the multi-level access authentication scheme for each participant (governments, medical circles, and patients). We show that our system guarantees patient's privacy without further system modification.

A study on the proposed amendment bill of Bioethics and Safety Law (2010): focusing on the meaning of significant contents related to the clinical research ("생명윤리 및 안전에 관한 법률" 전부개정안의 내용과 의의: 임상연구와의 관계를 중심으로)

  • Kim, Eun-Ae
    • The Korean Society of Law and Medicine
    • /
    • v.12 no.1
    • /
    • pp.99-131
    • /
    • 2011
  • To strengthen the protection of human research subjects and human materials, the Korean Ministry of Health and welfare proposed the amendment bill of Bioethics and Safety Law(2010) to the Congress. It includes so many meaningful clauses. According to the bill, the scope that this act shall apply will be expended to the research involving human subjects and human materials. In the bill, there are the principles of this act; the protection of the life, health, and dignity of the human subjects, the obtaining of the adequate informed consent, the protection of the human subject's information confidentiality and the human subject's privacy, the assessment and minimizing of the risks involved and the guarantee of the safety for the human subjects, the preparation of the special protection program for the vulnerable human subjects, and so on. According to the bill, Institutional Bioethics Review Board(the same as Institutional Review Board) will be responsible for the auditing and monitoring on the research that was approved by IBRB, conducting the education program for the researchers, IBRB members and administrative staffs, preparing of the special protection program for the vulnerable human subjects, and forming the guidelines for the researchers as well as the review of the research protocols. And the State and local governments shall take necessary measures to support the expending of the social infrastructure. In addition to, IBRB will have to be assessed and to be gained the accreditation by the Korean Ministry of Health and welfare. So, if Bioethics and Safety Law is amended, it will contribute enormously to enhance the level of the human research subjects protection. Also, if this Law is amended, IBRB will play a major role for the conduct of the ethically, scientifically, and legally proper research. But now, as a matter of fact, the capability of IBRB members and IBRB office members is not enough to charge of this role because some people and some organizations does not know the importance of IBRB exactly. In spite of, IBRB shall be able to this role to protect the human subjects and to develop the level of the research On the international level. Therefore, the State, local governments and the Organization shall back up the administrative and financial terms of the IRB and IRB Office.

  • PDF