• Title/Summary/Keyword: 개인 보호구

Search Result 155, Processing Time 0.022 seconds

An Improved Differentially Private Histogram Publication Algorithm (차분 프라이버시 히스토그램 공개 알고리즘의 개선)

  • Goo, Hanjun;Jung, Woohwan;Shim, Kyuseok
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2018.05a
    • /
    • pp.23-24
    • /
    • 2018
  • 최근 공격자의 사전 지식에 상관없이 개인 정보를 보호할 수 있는 차분 프라이버시 보호 기법에 대한 연구들이 진행되고 있다. 본 논문에서는 차분 프라이버시를 만족시키는 적은 수의 버킷을 가지는 히스토그램 공개 알고리즘을 소개하고 기존 알고리즘이 사용한 휴리스틱 방법의 문제와 개선 방법을 소개한다. 또한, 실험을 통해 개선한 방법이 기존의 알고리즘에 비하여 더 좋은 영역 합 질의 성능을 가지는 것을 보인다.

  • PDF

스파이웨어에 대한 고찰

  • Park, Ho-Jin
    • Review of KIISC
    • /
    • v.18 no.3
    • /
    • pp.17-24
    • /
    • 2008
  • 우리는 언제부터인가 개인용 컴퓨터에 개인정보와 같은 민감한 데이터를 사용자의 동의 없이 수집하거나 성가시게 혹은 불쾌한 광고를 출력하는 프로그램들로 가득차 있는 것을 자주 경험하고 있다. 이러한 모든 행동들은 사용자의 적절한 동의 절차 없이 이루어졌다는 것이 가장 근본적인 문제이고 바로 여기서부터 문제를 해결해 나가야할 것이다. 그러나 법적으로 스파이웨어(Spyware)가 명확히 정의되어 있지 않고 그나마 (구)정보통신부에서 발표한 문건은 하루가 멀다 하고 새롭게 변화하는 스파이웨어들에 법적인 구속력을 적용하기 힘든 것이 현실이다. 이 글에서는 현재 국 내외에서 스파이웨어가 어떻게 정의되고 있는지 알아보고 스파이웨어를 정의하기 위해 필요한 기술적인 배경을 살펴봄으로써 보다 효율적인 법안을 마련하는 데 도움이 되고자 한다.

Analysis of Nursing Students' Educational Needs about Corona19 Infection Control (간호대학생의 코로나19 감염관리 교육에 대한 요구 분석)

  • Yoo, Eun-Young
    • Journal of Digital Convergence
    • /
    • v.18 no.12
    • /
    • pp.335-341
    • /
    • 2020
  • This study aims to identify the importance and degree of performance of COVID19 infection control educational program for 4th grade nursing college students, and to prepare the basic data for developing COVID19 infection control nursing education program based on this study. Data were collected from January 6 to January 30, 2020 by using structured questionnaire from 72 senior nursing students at "A" City Nursing College. The overall average of importance of COVID19 infection control nursing was 4.4 out of 5, and the overall average of performance was 2.4 out of 5. The greatest difference in importance and performance were the sectors of personal protection(equipment dressing & undessing) and collecting safe sample. By analyzing the needs for COVID19 infection control nursing of nursing college students It is used as the basic data for the development of simulation education programs by improving performance of both personal protection and collecting safety samples.

The Threat Analysis and Security Guide for Private Information in Web Log (웹 로그 데이터에 대한 개인정보 위협분석 및 보안 가이드)

  • Ryeo, Sung-Koo;Shim, Mi-Na;Lee, Sang-Jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.19 no.6
    • /
    • pp.135-144
    • /
    • 2009
  • This paper discusses an issue of serious security risks at web log which contains private information, and suggests solutions to protect them. These days privacy is core information to produce value-added in information society. Its scope and type is expanded and is more important along with the growth of information society. Web log is a privacy information file enacted as law in South Korea. Web log is not protected properly in spite of that has private information It just is treated as residual product of web services. Many malicious people could gain private information in web log. This problem is occurred by no classified data and improper development of web application. This paper suggests the technical solutions which control data in development phase and minimizes that the private information stored in web log, and applies in operation environment. It is very efficient method to protect private information and to observe the law.

A study on a curriculum for information protection specialty manpower training (정보보호 전문 인력 양성을 위한 교육과정 모델에 관한 연구)

  • Lee, Moon-Ku
    • Journal of the Korea Computer Industry Society
    • /
    • v.5 no.8
    • /
    • pp.811-818
    • /
    • 2004
  • The spreading of internet, combined with the computerization of industry and the life whole has created an incereased demand on the private life protection and information portection, but due to the lack of specialty manpower on the information protection industry field there are many difficulties. Therefore, in this paper a curriculum for an information protection specialty manpower training is proposed. The proposed curriculum indispensability 1,2 and classified with a selection 1,2 and classified with a selection 1,2. The information protection application field into 9 segments of domains, and to carry out the curriculum in a ring structure. The curriculum based on the information security field's 9 domains and related field practical business, and the course offered after graduation to deepen the specialty, need to be carried out by each domain in order to continuously carry out the information security deepening process.

  • PDF

Actual Vegetation and Plant Community Structure in the W lchulsan National Park (월출산국립공원의 현존식생 및 식물군집구조)

  • 오구균;정승준;김영선
    • Korean Journal of Environment and Ecology
    • /
    • v.13 no.1
    • /
    • pp.49-60
    • /
    • 1999
  • 월출산 국립공원 및 공원보호구역의 현존식생과 식물군집구조를 파악하기 위하여 1997년 7월에 27개의 조사구를 설치하여 조사하였다. 조사대상지의 식생은 난대기후대의 수종과 온대기후대의 수종이 함께 출현하는 추이대 특성을 나타내고, 주로 졸참나무군락, 소나무군락, 낙엽참나무군락이 많이 분포하고 있었다. 총 27개 조사구에 대한 TWINSPAN의 분석결과 낙엽활엽수군집, 굴참나무-졸참나무군집, 신갈나무군집, 신갈나무-낙엽활엽수군집, 굴참나무군집, 소나무-붉가시나무군집, 소나무군집, 조록싸리-조릿대군집으로 8개 군집으로 대별되었다. 월출산국립공원의 식생은 수종간 경쟁이 활발한 천이도중상의 식생구조를 나타내고 있었다.

  • PDF

국내 정보보호시스템 평가.인증제도 발전 방향 연구

  • 이완석;이경구
    • Review of KIISC
    • /
    • v.10 no.3
    • /
    • pp.27-36
    • /
    • 2000
  • 1995년 10월에 제정된 정보화촉진기본법과 동법 시행령에 의거 국내평가·인증 제도가 구축되어 시행되어왔다. 현재 한국정보보호센터에서는 1998년 2월 정보통신부에서 고시하였으며 2000년 2월에 개정한 정보통신망 침입차단시스템 평가기준과 2000년 7월에 고시된 침입탐지시스템 평가기준을 이용하여 두 개의 제품에 대한 평가를 실시하고 있으며 인증기관인 국가정보원에서 인증서를 발급하고 있다 하지만 컴퓨터 및 통신 기술의 발달과 네트워크의 급속한 확산으로 인하여 다양한 정보보호제품이 개발되고 있으며 IT 제품 평가 관련 선진국들은 세계 여러국가들에게 국제표준(ISO/IEC 15408)으로 제정된 국제공통평가 기준에 기반을 둔 국제상호인정협정을 확산시키고 있다 따라서 급변하는 IT 환경과 국제상황을 고려하여 국내 평가·인증제도의 개선점들을 찾아본다.

  • PDF

An Satellite Communication Wireless Package System Using Analysis of Channel Interference between ISM band Systems (ISM 대역 시스템간 채널 간섭 분석을 통한 위성 통신 무선 패키지시스템 적용)

  • Ko, Hojeong;Cha, Jaesang
    • Journal of Satellite, Information and Communications
    • /
    • v.10 no.3
    • /
    • pp.78-83
    • /
    • 2015
  • In this paper, when WLAN repeater of satellite communication package system as a novel wireless disaster communication network connected to LTE D2D mobile terminal, we analyzed radio channel interference from WLAN and WPAN system of adjacent same ISM band using Monte-Carlo method. In this study, WLAN cell radius was determined using Extended Hata Model considering practical environment, and simulated physical protection distance and density in the dense-mode to minimize interference from WLAN, Bluetooth, and ZigBee. Simulation results, WLAN repeater can be operated with 15 WLAN interferer over 130m distance, 23 Bluetooth interferer over 100m distance, and with 62 ZigBee interferer over 83m distance.

The Experimental Research of Protection Behavior depends on Privacy Concern about Personal Information Protection on Privacy Policy for KakaoTalk Users (개인정보 취급방침의 인지가 개인정보보호 행동에 미치는 영향: 카카오톡 이용자를 중심으로)

  • Lee, Eun Suk;Lee, Zoon Ky;Cha, Kyung Jin
    • The Journal of Society for e-Business Studies
    • /
    • v.21 no.2
    • /
    • pp.135-150
    • /
    • 2016
  • As the privacy issues are all around the world, the intrusion into personal privacy is concerning. For that reason, government established the article from the personal information protection law that has to notice the privacy policy to users on the online site. and the matter of privacy invasion make concern toward behavior of online user. Although there are rules to carrying legal binding force in accordance with, because it is full of text and uncomfortable to read so that its readability is low. In the same context, each other has different state of understanding with the policy for personal information has been playing an important role. In this approach, companies and government do not think this over deeply and do just for what their practical use is. That is the reason why this research start, and the result expecting for real. As the result in the participant who cognize the privacy policy display pattern, they have certain type to do. In this article, the certain behavior doing is remarkable with the privacy policy. According to privacy concern, privacy fundamentalist reveals such a compromise reaction to protect their information when they know what information which the privacy manager of service provider collect. This study arrives at the result depending on the gap of privacy group that the group of checking the policy contents, especially the group which has high privacy concern, they move forward to protect their emotion and put a constructive plan into protective action. Otherwise, the group of unchecking the policy contents and following their own thinking of privacy policy are not deemed statistically significant. Therefore, this is considered to support more various implications than the previous issues and alternatives about privacy policy pattern and user protection behavior of privacy.

Relevant Study of Ancient Town Regeneration Construction Based on Theory of Henry Lefebvre -Focused on 'Wu Zhen Ancient Town'- (앙리 르페브르의 이론을 통한 고성구(古城區) 재생구축에 관한 연구 -오진(烏鎭)을 중심으로-)

  • Chen, When-Li;Hong, Kwan-Seon
    • The Journal of the Korea Contents Association
    • /
    • v.18 no.4
    • /
    • pp.388-397
    • /
    • 2018
  • With the continuous expansion and updating of modern cities, the historical and cultural space of ancient city is under increasing impact from the expansion of modern cities. At present, the regeneration and protection of the ancient city has achieved remarkable results together with poor results. Based on this background, this paper has revealed the power operation behind the space production of three regenerated ancient cities with 'spatial practice', 'representation of space' and '"representation of space' as the framework to, and pointed out the influence of stake holders on space shaping and analysis on the construction of regeneration model. From the perspective of specific materials, society, power, and culture, this paper has analyzed the methods of regeneration construction of Wuzhen ancient city, and provided new methods and reference values for how to regenerate and protect ancient cities. Based on these studies and analysis of the regeneration issues in ancient cities and villages, other historical cultural areas, the paper has indicated that it is necessary to coordinate with the government to clarify the issue of property rights, as well as planners and managers, to activate the regional culture and integrate it with modern culture.