• Title/Summary/Keyword: 개인정보관리체계

Search Result 372, Processing Time 0.031 seconds

A Study on the WBI System Design & Implemented based on the Component (컴포넌트기반의 웹 기반 교육시스템 설계에 관한 연구)

  • Jeon, Ju-Hyeon;Hong, Chan-Gi
    • The KIPS Transactions:PartD
    • /
    • v.8D no.6
    • /
    • pp.673-680
    • /
    • 2001
  • When the developers develop the software, the cost and time of the software development can be reduced by using blocks that are implemented previously. We call these implemented blocks components. In the early stage of Web-based Instruction, it didn't gain preference in spite of it's benefit of convenience. The main reason is, I think, the lack of generality at the education system which eventually results in unsatisfactory facilities compared with the requirement of teachers and students. And the early systems don't make good use of the plenty data in distributed environment, and don't show so good reliablity due to lack of systematic design and development. In this paper, we suggest WBI developing technology using the concept of WBSE. WBI developing is consist of component of pre-developed education software, integration of component using its reusability, and production of more requirement-satisfactory education software.

  • PDF

A Study on the Countermeasures against APT Attacks in Industrial Management Environment (산업경영환경에서 지속적 APT 공격에 대한 대응방안 연구)

  • Hong, Sunghyuck
    • Journal of Industrial Convergence
    • /
    • v.16 no.2
    • /
    • pp.25-31
    • /
    • 2018
  • An APT attack is a new hacking technique that continuously attacks specific targets and is called an APT attack in which a hacker exploits various security threats to continually attack a company or organization's network. Protect employees in a specific organization and access their internal servers or databases until they acquire significant assets of the company or organization, such as personal information leaks or critical data breaches. Also, APT attacks are not attacked at once, and it is difficult to detect hacking over the years. This white paper examines ongoing APT attacks and identifies, educates, and proposes measures to build a security management system, from the executives of each organization to the general staff. It also provides security updates and up-to-date antivirus software to prevent malicious code from infiltrating your company or organization, which can exploit vulnerabilities in your organization that could infect malicious code. And provides an environment to respond to APT attacks.

Investigation on a Way to Maximize the Productivity in Poultry Industry (양계산업에 있어서 생산성 향상방안에 대한 조사 연구)

  • 오세정
    • Korean Journal of Poultry Science
    • /
    • v.16 no.2
    • /
    • pp.105-127
    • /
    • 1989
  • Although poultry industry in Japan has been much developed in recent years, it still needs to be developed , compared with developed countries. Since the poultry market in Korea is expected to be opened in the near future it is necessary to maximize the Productivity to reduce the production costs and to develop the scientific, technologies and management organization systems for the improvement of the quality in poultry production. Followings ale the summary of poultry industry in Japan. 1. Poultry industry in Japan is almost specized and commercialized and its management system is : integrated, cooperative and developed to industrialized intensive style. Therefore, they have competitive power in the international poultry markets. 2. Average egg weight is 48-50g per day (Max. 54g) and feed requirement is 2. 1-2. 3. 3. The management organization system is specialized and farmers in small scale form complex and farmers in large scale are integrated.

  • PDF

Managing Duplicate Memberships of Websites : An Approach of Social Network Analysis (웹사이트 중복회원 관리 : 소셜 네트워크 분석 접근)

  • Kang, Eun-Young;Kwahk, Kee-Young
    • Journal of Intelligence and Information Systems
    • /
    • v.17 no.1
    • /
    • pp.153-169
    • /
    • 2011
  • Today using Internet environment is considered absolutely essential for establishing corporate marketing strategy. Companies have promoted their products and services through various ways of on-line marketing activities such as providing gifts and points to customers in exchange for participating in events, which is based on customers' membership data. Since companies can use these membership data to enhance their marketing efforts through various data analysis, appropriate website membership management may play an important role in increasing the effectiveness of on-line marketing campaign. Despite the growing interests in proper membership management, however, there have been difficulties in identifying inappropriate members who can weaken on-line marketing effectiveness. In on-line environment, customers tend to not reveal themselves clearly compared to off-line market. Customers who have malicious intent are able to create duplicate IDs by using others' names illegally or faking login information during joining membership. Since the duplicate members are likely to intercept gifts and points that should be sent to appropriate customers who deserve them, this can result in ineffective marketing efforts. Considering that the number of website members and its related marketing costs are significantly increasing, it is necessary for companies to find efficient ways to screen and exclude unfavorable troublemakers who are duplicate members. With this motivation, this study proposes an approach for managing duplicate membership based on the social network analysis and verifies its effectiveness using membership data gathered from real websites. A social network is a social structure made up of actors called nodes, which are tied by one or more specific types of interdependency. Social networks represent the relationship between the nodes and show the direction and strength of the relationship. Various analytical techniques have been proposed based on the social relationships, such as centrality analysis, structural holes analysis, structural equivalents analysis, and so on. Component analysis, one of the social network analysis techniques, deals with the sub-networks that form meaningful information in the group connection. We propose a method for managing duplicate memberships using component analysis. The procedure is as follows. First step is to identify membership attributes that will be used for analyzing relationship patterns among memberships. Membership attributes include ID, telephone number, address, posting time, IP address, and so on. Second step is to compose social matrices based on the identified membership attributes and aggregate the values of each social matrix into a combined social matrix. The combined social matrix represents how strong pairs of nodes are connected together. When a pair of nodes is strongly connected, we expect that those nodes are likely to be duplicate memberships. The combined social matrix is transformed into a binary matrix with '0' or '1' of cell values using a relationship criterion that determines whether the membership is duplicate or not. Third step is to conduct a component analysis for the combined social matrix in order to identify component nodes and isolated nodes. Fourth, identify the number of real memberships and calculate the reliability of website membership based on the component analysis results. The proposed procedure was applied to three real websites operated by a pharmaceutical company. The empirical results showed that the proposed method was superior to the traditional database approach using simple address comparison. In conclusion, this study is expected to shed some light on how social network analysis can enhance a reliable on-line marketing performance by efficiently and effectively identifying duplicate memberships of websites.

A Study on the Impact of Security Risk on the Usage of Knowledge Management System : Focus on Parameter of Trust (보안위험 수준이 지식관리시스템의 성공에 미치는 영향 : '신뢰'를 매개변인으로)

  • Ahn, Joong-Ho;Choi, Kyu-Chul;Sung, Ki-Moon;Lee, Jae-Hong
    • The Journal of Society for e-Business Studies
    • /
    • v.15 no.4
    • /
    • pp.143-163
    • /
    • 2010
  • The purpose of this study is to investigate the user's perception of security risk and examine its impact on the usage of Knowledge Management Systems(KMS). The findings of this study are three-fold. First, the overall user's perception of security risk is not high. However, there is a considerably big difference in the perception of security risk among users. This finding means that user's perception of a security risk is not based on the actual security effects but one's individual perception. Another finding is that user's perception of a security risk has a negative impact on the usage of KMS through "trust", which is a mediating variable in our study. This finding corresponds with the existing theory that security risk is oneof the critical sources of trust, and trust is a critical factor of user's acceptance of KMS. Finally, the result of this study reveals that activities devoted to security do not decrease the effectiveness and productivity of KMS. Our long-held cognition that security activity hinders the effectiveness and productivity of an information system is not particularly applied to the KMS.

Development of PDA-Based Software for Forest Geographic Information (PDA기반의 산림지리정보 소프트웨어 개발에 관한 연구)

  • Suk, Sooil;Lee, Heonho;Lee, Dohyung
    • Journal of Korean Society of Forest Science
    • /
    • v.96 no.1
    • /
    • pp.7-13
    • /
    • 2007
  • This study was done to develop PDA based application system for forest geographic information with GPS. The major results obtained in this study were as follows. A PDA based application program was developed to work on $Microsoft^{TM}$ PocketPC 2002 and 2003 operating system. The screen of PDA displays a 1:25,000 digital topographical map adopted DXF format converted from PC, and the map data with 1:2,500 to 1:30,000 on PDA can be zoomed in or out to five levels. Current position and navigating path received from GPS can be displayed on the screen and be saved in PDA. Information selected among layers of digital topographic map in DXF format can be converted into binary files which can be used on forest geographic information software. This can compress DXF files to 90% in size, and the processing speed of PDA was improved. The forest geographic information management system can be used to manage sample plots on which forest inventory is done, with the help of the sub-menus and grid index values with position information received from GPS. Forest workers can in quire forest geographic information such as forest type, location, forest roads, soil erosion control dams using forest geographic information management system in the field. The forest geographic information management system can provide current position and mobile path information to people who enjoy forest related activities like mountain-climbing, sightseeing, and visiting to historic spots.

Job Analysis for IT Security Workers in Defense Industry through DACUM Process (DACUM 기법을 이용한 방위산업체 정보통신보안실무자 직무분석)

  • Woo, Kwang Jea;Song, Hae-Deok
    • Convergence Security Journal
    • /
    • v.14 no.4
    • /
    • pp.73-84
    • /
    • 2014
  • As the society turns into more of an information an technology centric society, the importance of information security is being increased these days. Recently, as the number of leaking accidents of personal information and valuable industrial technology is on the rise, every field of industry endeavors to come up with a security solution. In particular, since defense industry is a field where it establishes national defense power that is essential of national security, it requires higher standards of security solutions than any other ordinary fields of industry. According to Defense Industry Security Work Instructions, defense industry firms from security organizations and employ a security worker corresponding to the firm's scale and conditions. In an environment where essential information and technology are stored and managed in information and communication system or storing media, the duty and role of IT security workers are crucial. However, there is a shortage of systematic analysis on the work of IT security workers and development of curriculum to enhance their professionalism. Thus DACUM process, a job analysis technique, was used to identify IT Security workers' duties and responsibilities and verify the validity and credibility of the deducted results from the survey. The findings of this study will help in development of IT security duty in defense industry and can be used as baseline data for the development of curriculum and amendments of related regulations.

A Study on the Performance Model and Measurement Method of the SMEs Information Security Support Policy (중소기업 정보보호 지원 사업 성과모델 및 측정 방법에 관한 연구)

  • Bae, Young-Sik;Jang, Sang-Soo
    • The Journal of Society for e-Business Studies
    • /
    • v.26 no.4
    • /
    • pp.37-52
    • /
    • 2021
  • Due to the spread of COVID-19, it is rapidly changing from face-to-face to non-face-to-face work environments and is changing to a digital work environment that can be accessed anytime, anywhere, providing convenience to all lives. However, the number of breaches, personal information leakage, and technology leakage targeting SMEs that are vulnerable to security continues to increase. Accordingly, the government has been continuously promoting the information security consulting support project for SMEs every year since 2014. Therefore, this study intends to develop a performance model and measurement methodology for continuous and more systematic support and efficient management of information protection support projects in consideration of the importance of information security for SMEs. It is intended to be used as basic data when setting future operational directions and goals. The main method of this study is to derive performance models and indicators for SME information security support projects based on domestic literature, case studies, and survey results, utilize expert advice to verify the developed performance measurement indicators, and use pilot-test questionnaires. Conduct evaluation through surveys. Based on the verified indicators, we would like to present a performance model and measurement index for the information security support project for SMEs.

Criminal Law Issues and Challenges Due to Changes in the Healthcare Paradigm (헬스케어 패러다임 변화에 따른 형사법적 쟁점과 과제)

  • Sun, JongSoo
    • The Korean Society of Law and Medicine
    • /
    • v.24 no.1
    • /
    • pp.43-65
    • /
    • 2023
  • The healthcare industry is a digital healthcare that combines technology based on the 4th Industrial Revolution, dealing with information on individual health and medical care, and is a fusion of health care services and medical science and technology. It is questionable whether digital healthcare according to the paradigm change can be discussed by the concept of medical practice under the existing Medical Act. There is no clear definition of the concept of medical practice in the Medical Service Act, but the concept is established through precedents. In addition, under the Medical Service Act, the subject of medical practice is limited to medical personnel. However, digital healthcare sometimes diagnoses and treats diseases using digital technology by medical personnel. On the other hand, what is possible by non-medical personnel is digital healthcare. This is because digital healthcare is understood as a concept that includes health care such as exercise, eating habits, and weight control. For this reason, if the concept of medical practice under the "Medical Act" on digital healthcare is included, it is subject to criminal punishment for "unlicensed medical practice" prescribed in Article 27 of the "Medical Act". In the health and medical industry, digital transformation and convergence with information and communication technology are rapidly progressing. As a result, there is a need to newly define it as 'digitalized medical practice' or 'information and communication technology (ICT)-based medical practice' separately from existing medical practices. The concept of medical practice has variability, not a fixed and invariable concept. However, in response to this demand, it is not an infinite expansion of the concept of medical practice, but a request to reset its scope. Therefore, the concept of medical practice should be legislated by reflecting the demand of consumers for the medical service system.

A Study on Effective Establishment of GIS Master Plans in Local Government (지자체 GIS 기본계획의 효과적인 수립방안 연구)

  • 김은형;이창환
    • Proceedings of the Korean Association of Geographic Inforamtion Studies Conference
    • /
    • 2003.04a
    • /
    • pp.247-255
    • /
    • 2003
  • 80년대 초 GIS의 개념이 국내에 도입된 후, 1988년 대구광역시를 필두로 지자체의 GIS 구축이 시작되어 국가에서는 GIS 구축의 체계적인 관리의 필요성에 따라 1995년 제1차 국가GIS 기본계획을 수립하고, 2000년 ‘국가지리정보체계의 구축 및 활용 등에 관한 법률’을 제정, 공포하여 각 지자체의 실정에 맞는 GIS 기본계획을 수립하도록 유도하고 있다. 그러나, 바람직한 지자체 GIS 기본계획 작성의 표준이 제시되지 않아 지자체 GIS 기본계획이 개인의 안목이나 타 지자체의 내용을 참조로 만들어져 형식적이고 획일적인 결과물이 산출되고 있다. 그리하여 기존에 수립된 지자체 GIS 기본계획이 일부의 지자체를 제외하고는 해당 지자체의 GIS 구축 사업에 활용되지 못하고 책장속의 책으로 존재하고 있다. 따라서, 본 논문의 목적은 지자체 GIS 기본계획 표준안을 제시하여 향후 해당 지자체에서 GIS 기본계획을 수립할 때, 구성적인 측면의 틀을 제공하여 일정수준을 만족할 수 있는 지자체 GIS 기본계획의 수립을 지원하고자 한다. 지자체 GIS 기본계획 표준(안)을 도출하기 위해서 정보화전략계획과 해외 관련 연구, 국가GIS 기본계획의 검토를 통하여 지자체 GIS 기본계획의 구성요소를 도출하고, 기존지자체 GIS 기본계획의 목차를 중심으로 분석하여, 문제점을 도출하고, 그에 따른 시사점을 제시하여 지자체 GIS 기본계획 표준(안)의 기반이 되도록 하였다. 제안된 지자체 GIS 기본계획 표준(안)은 향후 각 지자체의 활용가치가 높은 GIS 기본 계획의 수립에 도움이 될 수 있도록 하며, 나아가서는 수립된 지자체 GIS 기본계획이 지자체의 성공적인 GIS 구축을 유도하는 가이드의 역할을 수행할 것으로 기대된다.가 있다. 본 연구의 결과를 통해 지방자치단체 GIS 기본계획에 있어 조직 측면의 장기적 비전의 제시가 가능하며 이를 통해 보다 성숙된 GIS 사업의 추진과 효율적인 시스템의 운영이 가능할 것이다.. 이상의 결과를 종합해볼 때, ${\beta}$-glucan은 고용량일 때 직접적으로 또는 $IFN-{\gamma}$ 존재시에는 저용량에서도 복강 큰 포식세로를 활성화시킬 뿐 아니라, 탐식효율도 높임으로써 면역기능을 증진 시키는 것으로 나타났고, 그 효과는 crude ${\beta}$-glucan의 추출조건에 따라 달라지는 것을 알 수 있었다.eveloped. Design concepts and control methods of a new crane will be introduced in this paper.and momentum balance was applied to the fluid field of bundle. while the movement of′ individual material was taken into account. The constitutive model relating the surface force and the deformation of bundle was introduced by considering a representative prodedure that stands for the bundle movement. Then a fundamental equations system could be simplified considering a steady state of the process. On the basis of the simplifie

  • PDF