• Title/Summary/Keyword: public Information disclosure system

Search Result 62, Processing Time 0.029 seconds

Investigating the Transfer Status and Improvement Strategies for Records from Defunct Elementary, Middle, and High Schools: After the Enactment of the Public Records Management Act (폐교(초·중·고)기록물 이관현황과 개선방안에 관한 연구: 공공기록물법 제정 이후)

  • Dasom Cheon;Jisue Lee
    • Journal of Korean Society of Archives and Records Management
    • /
    • v.23 no.4
    • /
    • pp.113-135
    • /
    • 2023
  • This study explores the transfer of defunct school records (by preservation period, type, and place of transfer) in South Korea since the Public Records Management Act was enacted in 1999 and suggests improvements. Metropolitan and provincial offices of education, totaling 17, were asked to disclose information about the status of defunct school records. Since 1999, 1,411 schools nationwide have closed permanently, predominantly elementary schools, followed by high then middle schools. By preservation period, there were more records in the 1 to 10-year category than in the 30-year to permanent category. By record type, most were electronic records, followed by paper records, archival objects, and audiovisual records. By place of transfer, most nonelectronic records were transferred to integrated schools, and most electronic records were transferred to the Records Management System. In-depth interviews with 10 record managers from local education offices found that the management of defunct school records varies widely by region and institution because of the lack of specified manuals. Participants also reported difficulties in transferring web-based records, archival objects, and audiovisual records, as well as insufficient archival space and computer systems. This study also provides suggestions to improve the management of defunct school records, such as establishing specified manuals, creating a dedicated government department for managing defunct school records, deploying workforces, and improving computer systems.

A Study on the Development Site Security for Embedded Software (임베디드 소프트웨어 개발현장보안에 관한 연구)

  • Yeo, Sang-Soo;Kim, Tai-Hoon;Cho, Sung-Eon;Kouich, Sakurai
    • Journal of Advanced Navigation Technology
    • /
    • v.11 no.3
    • /
    • pp.259-265
    • /
    • 2007
  • Systematic components for implementing ubiquitous computing, for example, electronic devices, electric home appliances, and controllers, etc, are consist of not only circuits but also softwares expected to do some special system-controlling functions, and these softwares used to be called like as embedded software. Because embedded software is a core component controlling systems, the codes or control flows should be protected from being opened to the public or modified. Embedded software security can be divided into 2 parts: first is the unauthorized access to development site and embedded software, second is the unauthorized disclosure or modification. And this research is related to the first aspect of them.This paper proposes some security check requirements related to embedded software development site by analyzing the ALC_DVS.1 of the ISO/IEC 15408 and Base Practices (BPs) of the ISO/IEC 21827. By applying this research, we expect to protect unauthorized modification of embedded software indirectly.

  • PDF

A Study on the Introduction of Electronic Commerce for Purchasing Section in Hospitals - Focused on the Understanding of Purchasing Managers - (병원구매업무에 있어서의 전자상거래 도입에 관한 연구 - 구매부서 관리자의 인식도를 중심으로 -)

  • Hwang, Eun-Bum;Nam, Sang-Yo;Ha, Ho-Uk;Lee, Chang-Eun
    • Korea Journal of Hospital Management
    • /
    • v.6 no.3
    • /
    • pp.69-89
    • /
    • 2001
  • This study is focused that the electronic commerce(EC) on the purchasing section may improve the efficiency and transparency of the hospitals management. After reviewing the purchasing activity of hospitals, I study the introduction, expected effects, and problems of EC. So, I am going to provide basic information for activating EC. The samples are managers of 170 hospitals, which are located on Seoul. As a result of collection this survey, I analyze 79 hospitals. For data analysis, I use $X^2$-test and ANOVA for purchasing management and the relevance of EC according to the level of care. The results of this study are 1. The problems on the management of purchasing section are: firstly, they don't have sufficient time to study market. Secondly, it is difficult to find competitive suppliers. And, lastly, they cannot gather a lot of information about the price of products. 2. There are many answers of the needs on the introduction of B2B. However, some hospitals think they don't need it. But, the most answers are that the EC will be settled within 4 years. So, we can realize that these hospitals are getting interested on the EC. On the other hand, I find that they prefer outside EC companies for the introduction of EC. 3. On the expected effects on EC, first is the effectiveness of the market survey. The next is to collect information of adequate price of products owing to clear transaction, find easier new suppliers and gather useful data. 4. On the external problems of the introduction of EC, there is low credibility related to the security and the weakness of suppliers' information system. Especially, on the Real Transaction Price Payment system, the bigger bed size, the higher understanding on these problems. On the internal problems of the introduction of EC, first is the burden of the introduction of EC and operating cost. Especially, on the burden of the disclosure of revenue source, the smaller bed size, the higher understanding on this problem So, this is a point which deserves my attention statistically. However, this shows relatively little understanding about incomplete the standard of product category and the weak information system of hospital. Through this study, I am going to suggest 3 points for the activation of the introduction of EC on hospitals. 1. The reform of the Real Transaction Price Payment System on medical supplies and materials for medical treatment 2. The establishment of the standard of product category 3. The promotion of information system based on network.

  • PDF

A Study for Acquiring ISO 30301 Standard Certification in Public Institutions (공공기관에서 기록경영시스템 표준(ISO 30301) 인증 획득을 위한 연구)

  • Park, Jeong-joo;Rieh, Hae-young
    • Journal of Korean Society of Archives and Records Management
    • /
    • v.22 no.1
    • /
    • pp.83-107
    • /
    • 2022
  • Although the ISO 30301 Management Systems for Records (MSR) Standard has established a standard system for records management to be promoted at the management level, only a few institutions have been certified, and there are few known cases. The purpose of this study is to present essential requirements for the establishment of MSR suitable for public institutions that want to acquire ISO 30301 standard certification, and through excellent cases of success in practice, various matters related to certification were used to help in the introduction of the ISO 30301 standard. In this study, cases of certified public institutions, local government funding agencies, and certification bodies (CB) were investigated and analyzed. In addition to the analysis of internal documents obtained through information disclosure requests, interviews were conducted with four public agency employees and one certification body auditor to capture the know-how and expertise of the individuals in charge who went through the certification screening process. Through the case study, the scope of the performance was divided into 1 to 5 stages so that organizations that want to acquire the certification can effectively obtain a certification, and the ISO 30301 Standard Certification Process was presented. Lastly, five ways were proposed to ensure that certification could be obtained effectively and practically.

Understanding and Improvement of Best Available Techniques for Waste Incineration Facility (폐기물 소각시설 최적가용기법 (BAT) 기준서의 이해와 개선방향)

  • Shin, Sujeong;Park, Jae-Hong;Park, Sang-Ah;Lee, DaeGyun;Kim, Dai-Gon
    • Journal of Korean Society for Atmospheric Environment
    • /
    • v.33 no.6
    • /
    • pp.533-543
    • /
    • 2017
  • As the public interest in environmental issues increased, the "Act On The Integrated Control Of Pollutant-Discharging Facility" was enacted. Through the integrated environmental pollution prevention act in which 19 industries with large environmental impacts are sequentially applied, pollutants can be managed in a medium-integrated manner and integrated permission of the business unit is possible and BAT can be applied to enable a scientific and proactive environmental management system. In order to facilitate the implementation of integrated environmental pollution prevention act with these advantages, the BAT BREF should be published, modified and revised every 5 years considering the level of scientific development. This study reviewed the issues to be considered in applying BAT and the types of BAT and focused on presenting improvements and development direction when revising and supplementing the standards in the future based on these contents. For this purpose, when revising the standards, it will be necessary to reflect on the domestic situation, to expand the TWG(Technical Working Group) of small-scale workplace experts, and to exchange opinions with business places that have similar processes for each waste type through a systematic total inspection. In addition to these methods, by establishing a resident participation system through information disclosure, it is expected to be used as a guideline for environmental management of business places not subject to integrated permission of less than 3 types as well as those subject to integrated permission.

Big Data Analysis for Public Libraries Utilizing Big Data Platform: A Case Study of Daejeon Hanbat Library (도서관 빅데이터 플랫폼을 활용한 공공도서관 빅데이터 분석 연구: 대전한밭도서관을 중심으로)

  • On, Jeongmee;Park, Sung Hee
    • Journal of the Korean Society for information Management
    • /
    • v.37 no.3
    • /
    • pp.25-50
    • /
    • 2020
  • Since big data platform services for the public library began January 1, 2016, libraries have used big data to improve their work performance. This paper aims to examine the use cases of library big data and attempts to draw improvement plan to improve the effectiveness of library big data. For this purpose, first, we examine big data used while utilizing the library big data platform, the usage pattern of big data and services/policies drawn by big data analysis. Next, the limitations and advantages of the library big data platform are examined by comparing the data analysis of the integrated library management system (ILUS) currently used in public libraries and data analysis through the library big data platform. As a result of case analysis, big data usage patterns were found program planning and execution, collection, collection, and other types, and services/policies were summarized as customizing bookshelf themes for the book curation and reading promotion program, increasing collection utilization, and building a collection based on special topics. and disclosure of loan status data. As a result of the comparative analysis, ILUS is specialized in statistical analysis of library collection unit, and the big data platform enables selective and flexible analysis according to various attributes (age, gender, region, time of loan, etc.) reducing analysis time. Finally, the limitations revealed in case analysis and comparative analysis are summarized and suggestions for improvement are presented.

Searching for Laws and Systems to Revitalize Private Archives (민간 아카이브 활성화를 위한 법·제도 모색)

  • Sohn, Dong You
    • The Korean Journal of Archival Studies
    • /
    • no.69
    • /
    • pp.7-33
    • /
    • 2021
  • From the beginning of the enactment and implementation of the Public Records Management Act, there has been a steady discussion on the establishment of local archives. Local archives include not only administrative records of local governments, but also private archives such as containing the lives of residents. Along with the academic discussion, there have been movements for local autonomy and decentralization. Currently, interest and discussion on private archiving are in the historical flow. In addition, private archiving has become a social concern because of the establishment of systems such as the Public Records Management Act and the Information Disclosure Act, the establishment of a digital environment, and the spread of the meaning and value of village community activities. There are several government agencies related to private archiving, and the grounds for performing their work are different, and there are many central administrative agencies to which they belong. Therefore, I propose that the National Archives take the lead and form a 'Consortium of Private archives Management Institutions'. The organization should promote first, cooperation of collection information and archives, second, coordination of tasks and functions between institutions, and third, establishment of a nationwide private archives management system. Now is our chance. Instead of reacting on an ad hoc basis, respond systematically with a long-term perspective.

Analysis of Blockchain Platforms from the Viewpoint of Privacy Protection (프라이버시 보호 관점에서의 블록체인 플랫폼 분석)

  • Park, Ji-Sun;Shin, Sang Uk
    • Journal of Internet Computing and Services
    • /
    • v.20 no.6
    • /
    • pp.105-117
    • /
    • 2019
  • Bitcoin, which can be classified as a cryptocurrency, has attracted attention from various industries because it is an innovative digital currency and the beginning of a Blockchain system. However, as the research on Bitcoin progressed, several security vulnerabilities and possible attacks were analyzed. Among them, the security problem caused by the transparency of the Blockchain database prevents the Blockchain system from being applied to various fields. This vulnerability is further classified as the weak anonymity of participating nodes and privacy problem due to disclosure of transaction details. In recent years, several countermeasures have been developed against these vulnerabilities. In this paper, we first describe the main features of the public and private Blockchain, and explain privacy, unlinkability and anonymity. And, three public Blockchain platforms, Dash, Zcash and Monero which are derived from Bitcoin, and Hyperledger Fabric which is a private Blockchain platform, are examined. And we analyze the operating principles of the protocols applied on each platform. In addition, we classify the applied technologies into anonymity and privacy protection in detail, analyze the advantages and disadvantages, and compare the features and relative performance of the platforms based on the computational speed of the applied cryptographic mechanisms.

Monitoring system for packet analysis on Wi-Fi environment (Wi-Fi 환경에서 패킷 분석을 위한 모니터링 시스템)

  • Seo, Hee-Suk;Kim, Hee-Wan;Ahn, Woo-Young
    • Journal of the Korea Society of Computer and Information
    • /
    • v.16 no.12
    • /
    • pp.227-234
    • /
    • 2011
  • Many technologies for wireless internet are increasing as more and more laptop computers, net books, smart phone and other terminals, which provide wireless network, are created. IEEE 802.11 is computer wireless network technology that used in small area, called wireless LAN or Wi-Fi. IEEE 802.11 is a set of standards for implementing wireless local area network (WLAN) computer communication in the 2.4, 3.6 and 5 GHz frequency bands. They are created and maintained by the IEEE LAN/MAN Standards Committee (IEEE 802). AP (Access Point) is installed at cafes and public places providing wireless environment. It is more convenient to use wireless internet, however, It can be seen easily around us and possible to communicate with AP. IEEE 802.11 has many vulnerability, such as packet manipulation and information disclosure, so we should pay more attention when using IEEE 802.11. Therefore this paper developing monitoring system which can find out AP and Stations that connect with it, and capturing AP's information to find out vulnerability. This paper suggests monitoring system which traffic analysis in wireless environment.

Hybrid Asymmetric Watermarking using Correlation and Critical Criteria (상관도와 임계치 방식을 이용한 다중검출 비대칭 워터마킹)

  • Li De;Kim Jong-Weon;Choi Jong-Uk
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.30 no.7C
    • /
    • pp.726-734
    • /
    • 2005
  • Traditional watermarking technologies are symmetric method which embedding and detection keys are the same. Although the symmetric watermarking method is easy to detect the watermark, this method has weakness against to malicious attacks remove or modify the watermark information when the symmetric key is disclosure. Recently, the asymmetric watermarking method that has different keys to embed and detect is watched by several researchers as a next generation watermarking technology. In this paper, hybrid asymmetric watermarking algorithm is proposed. This algorithm is composed of correlation detection method and critical criteria method. Each method can be individually used to detect watermark from a watermarked content. Hybrid asymmetric detection is complement between two methods, and more feasible than when each method is used respectively, Private key and public key are generated by secure linear transformation and specific matrix. As a result, we have proved the proposed algorithm is secured than symmetric watermarking algorithms. This algorithm can expand to multi bits embedding watermark system and is robust to JPEG and JPEG2000 compression.