• Title/Summary/Keyword: 지식보호

Search Result 550, Processing Time 0.024 seconds

Analysis of the Information in the COVID-19 Emergency Alert : Focusing on Essential Information Factors and Privacy Invasion Information Factors (코로나19 안전안내문자 정보 속성 분석 : 필수 정보 요인과 프라이버시 침해 정보 요인을 중심으로)

  • Kim, Minjin;Kim, Miyea;Kim, Beomsoo
    • Knowledge Management Research
    • /
    • v.22 no.2
    • /
    • pp.227-246
    • /
    • 2021
  • In the context of the global pandemic caused by COVID-19, emergency alert text messages can violate the privacy of confirmed corona positive cases. This study used conjoint analysis to identify the essential information factors and the privacy invasion information factors of local government initiated safety notices. As a result of this study, we found eight essential information factors, including all routes of the confirmed case and ten privacy invasion factors of safety notices. In addition, we found that there is a similarity between the combinations of information perceived to be the most essential and perceived as the most significant privacy invasion; both combinations include the confirmed case's personal and route information. This study ultimately tried to suggest a way to lower the concern about privacy invasion of the confirmed cases without damaging the emergency alert text messages' essential information. We expect that this study will provide researchers and policymakers interested in disaster communication with valuable theoretical and practical implications.

A Study on the Protection and Management System of the Southwestern Coast Tidal Flat for Inscription in the World Heritage List (서남해안 갯벌의 세계유산 등재를 위한 보호 및 관리체계 연구)

  • Moon, Kyong-O
    • Korean Journal of Heritage: History & Science
    • /
    • v.48 no.3
    • /
    • pp.80-95
    • /
    • 2015
  • The purpose of this study is to establish an effective protection and management system for World Heritage (WH) nomination of Southwestern Coast Tidal Flat (SCTF) by proposing a model of protection and management. SCTF has a potential to become a representative best practice to achieve a sustainable development for human society. SCTF has a potential Outstanding Universal Values (OUVs) for WH nomination, thus a harmony between human and nature for wise use of natural resources needs to be pursued. It is required to present the system of SCTF's protection and management and to analyze present status of the regions in the Tentative List by comparing the case which were already inscribed as WH. For better protection of nominated areas, SCTF should expand an area for protection with additional designation. For the management system, two separate management systems such as the Department of Culture & Tourism and the Department of Oceans & Fisheries need to be reconciled. Because of this overlapping management structure, the management of the nominated sites has been inefficient and long-term management plan is lacking. Therefore, it is necessary to integrate conflicting management system of each local government and make a long-term, integrated management plan. To make an efficient and sustainable protection and management, it is essential to set up a collaboration system by integrating various stakeholders such as central and local governments, academic organizations, local residents, and NGOs. As in the case of Wadden Sea, the combined community system of the stakeholders mentioned above should be established. Because it is essential for local residents to understand a basic concepts for protection and management, it is necessary to establish capacity-building of local people. The protection and management structure should be set up by bottom-up processes, that is the proper structure shoud be based on thorough research on local society as well as thorough communication with local residents to make relevant laws and policies. This study also propose the proper plan for better conservation and management of SCTF.

The Framework of Research Network and Performance Evaluation on Personal Information Security: Social Network Analysis Perspective (개인정보보호 분야의 연구자 네트워크와 성과 평가 프레임워크: 소셜 네트워크 분석을 중심으로)

  • Kim, Minsu;Choi, Jaewon;Kim, Hyun Jin
    • Journal of Intelligence and Information Systems
    • /
    • v.20 no.1
    • /
    • pp.177-193
    • /
    • 2014
  • Over the past decade, there has been a rapid diffusion of electronic commerce and a rising number of interconnected networks, resulting in an escalation of security threats and privacy concerns. Electronic commerce has a built-in trade-off between the necessity of providing at least some personal information to consummate an online transaction, and the risk of negative consequences from providing such information. More recently, the frequent disclosure of private information has raised concerns about privacy and its impacts. This has motivated researchers in various fields to explore information privacy issues to address these concerns. Accordingly, the necessity for information privacy policies and technologies for collecting and storing data, and information privacy research in various fields such as medicine, computer science, business, and statistics has increased. The occurrence of various information security accidents have made finding experts in the information security field an important issue. Objective measures for finding such experts are required, as it is currently rather subjective. Based on social network analysis, this paper focused on a framework to evaluate the process of finding experts in the information security field. We collected data from the National Discovery for Science Leaders (NDSL) database, initially collecting about 2000 papers covering the period between 2005 and 2013. Outliers and the data of irrelevant papers were dropped, leaving 784 papers to test the suggested hypotheses. The co-authorship network data for co-author relationship, publisher, affiliation, and so on were analyzed using social network measures including centrality and structural hole. The results of our model estimation are as follows. With the exception of Hypothesis 3, which deals with the relationship between eigenvector centrality and performance, all of our hypotheses were supported. In line with our hypothesis, degree centrality (H1) was supported with its positive influence on the researchers' publishing performance (p<0.001). This finding indicates that as the degree of cooperation increased, the more the publishing performance of researchers increased. In addition, closeness centrality (H2) was also positively associated with researchers' publishing performance (p<0.001), suggesting that, as the efficiency of information acquisition increased, the more the researchers' publishing performance increased. This paper identified the difference in publishing performance among researchers. The analysis can be used to identify core experts and evaluate their performance in the information privacy research field. The co-authorship network for information privacy can aid in understanding the deep relationships among researchers. In addition, extracting characteristics of publishers and affiliations, this paper suggested an understanding of the social network measures and their potential for finding experts in the information privacy field. Social concerns about securing the objectivity of experts have increased, because experts in the information privacy field frequently participate in political consultation, and business education support and evaluation. In terms of practical implications, this research suggests an objective framework for experts in the information privacy field, and is useful for people who are in charge of managing research human resources. This study has some limitations, providing opportunities and suggestions for future research. Presenting the difference in information diffusion according to media and proximity presents difficulties for the generalization of the theory due to the small sample size. Therefore, further studies could consider an increased sample size and media diversity, the difference in information diffusion according to the media type, and information proximity could be explored in more detail. Moreover, previous network research has commonly observed a causal relationship between the independent and dependent variable (Kadushin, 2012). In this study, degree centrality as an independent variable might have causal relationship with performance as a dependent variable. However, in the case of network analysis research, network indices could be computed after the network relationship is created. An annual analysis could help mitigate this limitation.

A Study on the Possibility for Incident Investigation Using PLC Logs (PLC 로그의 사고조사 활용 가능성에 관한 연구)

  • Chang, Yeop;Kim, Taeyeon;Kim, Woo-Nyon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.4
    • /
    • pp.745-756
    • /
    • 2020
  • An ICS(industrial control system) is a complex system that safely and efficiently monitors and controls industrial processes such as electric power, water treatment, transportation, automation plants and chemical plants. Because successful cyber attacks targeting ICS can lead to casualties or serious economic losses, it becomes a prime target of hacker groups sponsored by national state. Cyber campaigns such as Stuxnet, Industroyer and TRITON are real examples of successful ICS attacks, and were developed based on the deep knowledge of the target ICS. Therefore, for incident investigation of ICSs, inspectors also need knowledge of control processes and accident investigation techniques specialized for ICSs. Because there is no applicable technology, it is especially necessary to develop techniques and tools for embedded controllers located at cyber and physical boundaries. As the first step in this research, we reviewed logging capability of 4 PLC(Programmable Logic Controller)s widely used in an ICS area, and checked whether selected PLCs generate logs that can be used for digital investigation in the proposed cyber attack scenario.

Oral health knowledge level on oral care and elder oral hygiene care of the nursing home staff in long-term care facilities (노인요양시설 요양보호사의 구강관리 및 노인구강위생관리에 따른 구강보건지식 수준)

  • Kim, Kyung-Min;Park, Young-Nam;Lee, Min-Kyung;Lee, Jung-Hwa;Yoon, Hyun-Seo;Jin, Hye-Jung;Kim, Hye-Jin
    • Journal of Korean society of Dental Hygiene
    • /
    • v.14 no.5
    • /
    • pp.723-730
    • /
    • 2014
  • Objectives : This research was conducted to investigate geriatric care workers' oral care, and the oral care conditions of residents of elder care facilities in relation to workers' knowledge of oral care. Methods : A survey was conducted from November 2011 to February 2012 with geriatric-care workers in elder care facilities located in Busan and other areas of Gyeongsangnam-do. Results : With regard to their oral self-care practices, 52.5% of the geriatric workers "brushed their teeth from top to bottom" and 58.1% brushed their teeth 3 times a day. Further, 52.0% did not use any oral care products, while 36.5% used Mouthrinese. The workers who brushed their teeth in their own ways or from top to bottom had significantly higher oral care knowledge scores than those who brushed from left to right (p<.05). Concerning oral hygiene care for residents, 72.6% of the geriatric workers recommended that elders visit dentists for oral care, 96.6% helped elders oral wash their teeth every day, and 54.7% used oral care products for the elders. The workers who did not recommend visits to dental clinics scored slightly higher than those who did (p<.05). Additionally, those who did not help elders oral wash their teeth scored significantly higher than those who did (p<.05). Except for oral wash to recuperated old man and recommendation of visiting the dentist, relation between oral care and knowledge about oral health and oral hygiene care is plus mutual relation. Conclusions : To manage the accuracy and quality of oral care work performed by geriatric care workers in elder care facilities, enhancing standard training and education on oral care is necessary. Providing systematic, regular education on such knowledge and practices would also be essential.

The Effects of the Science and Technology Environment on Technology Transfer (과학기술 환경이 기술이전에 미치는 영향: OECD 34개 국가를 중심으로)

  • Back, Seunghee;Park, Young-Il
    • Journal of Technology Innovation
    • /
    • v.22 no.2
    • /
    • pp.131-156
    • /
    • 2014
  • Nowadays, the R&D policy has gradually emphasized the creation of economic values added through technology transfer of R&D performance. Technology transfer plays an important role in making a profit on commercialization of technology, but the performance of technology transfer is a great difference between countries. Therefore, this study analyzes the effects of the science and technology environment on technology transfer from a national point of view. In this study, the science and technology environment largely consists of openness, ease of firms, protection of intellectual property, emphasis of science in schools. We select OECD 34 countries as the subject of this study and collect the data from IMD between 2002 and 2011. The results show that all hypotheses are supported. Openness and ease of firms are related to technology transfer as they help to improve the understanding and willingness about technology transfer nationally. Protection of intellectual property also influences the spread of R&D performance positively, and the environment that is emphasized science in school actively promotes both creation and technology transfer of R&D performance. Although prior studies have focused on technical capabilities to improve the performance of technology transfer, we consider the influence of the science and technology environment from an institutional perspective. This study will do much for formulate the R&D policy.

Motivated Reasoning as Obstacle of Scientific Thinking: Focus on the Cases of Next-Generation Researchers in the Field of Science and Technology (과학적 사고의 걸림돌 동기기반추론 -과학기술 분야 학문후속세대들의 사례를 중심으로-)

  • Shin, Sein;Lee, Jun-Ki;Ha, Minsu
    • Journal of The Korean Association For Science Education
    • /
    • v.38 no.5
    • /
    • pp.635-647
    • /
    • 2018
  • Motivated reasoning refers to biased reasoning that is affected by motivation to achieve a particular result or goal. In this study, we attempted a theoretical study on motivated reasoning that hinders the development of scientific thinking and empirical study on actual context of motivated reasoning in the research experiences of next-generation Korean researchers in the field of science and technology. To be specific, literature reviews were conducted to explore the psychological meaning of motivated reasoning and its negative impact on scientific thinking and science research. To understand the substantial meaning and context of motivated reasoning in the field of real science and technology research, we conducted in-depth interviews with eight graduate students and one young science and technology researcher. As a result of the literature reviews, we found out that motivated reasoning can interfere with the proper theory and data coordination, which is the core process of scientific thinking at the individual level. At the socio-cultural level, it can lead to cessation of constructing scientific knowledge and it can act as a mechanism in the process of using science for specific socio-cultural beliefs or purposes, thereby hindering the development of science and technology based on rationale and objective scientific thinking. Quantitative analysis with in-depth interview data showed that graduate students and the young researcher's experienced motivated reasoning results in trying to protect prior beliefs, make hasty conclusions, protecting socio-cultural belief or rationalizing decisions made by their community. Their motivated reasoning could become an obstacle in constructing valid science and technology knowledge through appropriate theory and evidence coordination. Based on these findings we discussed science education for improving scientific thinking.

대구ㆍ경북지역 대장직장암환자의 식행동 특성

  • 서수원;구보경;이혜성
    • Proceedings of the KSCN Conference
    • /
    • 2003.11a
    • /
    • pp.1089-1090
    • /
    • 2003
  • 본 연구는 대구ㆍ경북지역 대장직장암 환자의 일반 생활 상황과 식행동 특성을 분석 평가하여 지역민의 대장직장암 예방을 위한 영양교육에 활용할 수 있는 식생활 관련 기초 자료를 얻고자 수행되었다. 최근 경북대학교 병원에서 대장직장암 진단을 받고 입원한 수술 전후 환자 123명 (남 79명, 여 44명)을 환자군 대상으로 하였고 대장질환이 없는 정형외과 환자 등 182명(남 117명, 여 65명)을 비교군 대상으로 하였다. 대상자의 일반 특성, 식습관, 식행동 특성, 식품섭취 빈도 등의 내용을 포함한 설문지를 이용하여 개인 면담을 통하여 조사하였다. 현재 BMI와 과거 가장 높았던 체중의 BMI는 남녀 모두 환자군에서 유의하게 높게 나타났다. 환자군의 교육 수준은 비교군에 비해 낮았고 주 거주지역 분포는 농촌이 가장 많았으며 가계 소득은 환자군에서 비교군에 비하여 높은 것으로 나타났다. 주요 일상활동 강도는 비교군에 비해 환자군에서 유의적으로 가벼운 것으로 나타났다. 발병 전 일상생활에서 느끼는 스트레스의 정도가 환자군에서 비교군에 비해 유의적으로 높았던 것으로 나타났다. 자신의 성격 유형을 비관적인 것으로 생각하는 비율과 가족의 암 병력이 환자군에서 유의적으로 높게 나타났다 식사의 규칙성에서도 환자군에서 끼니를 거르는 비율이 유의적으로 높았다. 환자군은 비교군에 비해 육식을 유의적으로 높게 선호하였으며 외식시 고기류를 선호하는 비율이 높았다. 평소 물 섭취량은 환자군에서 비교군에 비해 적었다. 환자군이 비교군에 비해 짠맛에 대한 선호도가 유의적으로 높았고 단 맛과 매운 맛은 비교군에 비해 싫어하는 경향을 보였으며 기름진 맛을 선호하는 경향이 환자군에서 유의하게 높았다. 환자군에서 굽기, 튀기기를 좋아하는 경향이 유의적으로 높았다. 환자군에서 음주 빈도, 음주량 그리고 커피 섭취량이 높게 나타났으며, 1일 흡연량이 많았고, 흡연 시작 연령은 빨랐으며, 금연 연령은 늦어 흡연 기간이 유의적으로 긴 것으로 나타났다. 환자군의 영양지식 정도와 영양태도는 비교군에 비해 유의적으로 낮았고 환자군의 영양지식 수준이 높을수록 좋은 영양태도를 가지는 것으로 나타났다. 과거 10년간 식품 섭취 빈도 조사 결과 환자군은 등푸른 생선류와 콩류 및 된장, 두부를 비교군에 비해 유의적으로 더 많이 섭취하였고 해조류, 생 녹황색채소류, 익힌 녹황색 및 담색채소류와 녹차를 더 적게 섭취한 것으로 나타났다. 본 연구의 결과는 일상생활의 스트레스와 가족의 암 병력 및 비관적 성격 유형이 대장직장암 발병의 위험인자가 될 수 있음을 제시하며 육식 선호, 적은 양의 물 섭취, 짜고 기름진 맛에 대한 높은 기호도, 음주, 흡연, 커피의 섭취 그리고 나쁜 식습관이 대장직장암 발생과 관련된 식생활 위험인자가 될 수 있음을 제시한다. 해조류, 녹황색채소, 담색채소, 녹차가 대장직장암 발생의 보호인자의 가능성도 제시되었다. 따라서 향후 지역적 식문화 특성을 고려한 보다 광범위하고 체계적인 조사 연구를 통해 이 지역의 대장직장암 발생의 위험인자와 보호인자를 재확인할 필요가 있다고 보며 본 연구의 결과는 지역민의 대장직장암 예방을 위한 영양교육 자료로서 활용될 수 있다고 본다.

  • PDF

Rule-base Expert System for Privacy Violation Certainty Estimation (개인정보유출 확신도 도출을 위한 전문가시스템개발)

  • Kim, Jin-Hyung;Lee, Alexander;Kim, Hyung-Jong;Hwang, Jun
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.19 no.4
    • /
    • pp.125-135
    • /
    • 2009
  • Logs from various security system can reveal the attack trials for accessing private data without authorization. The logs can be a kind of confidence deriving factors that a certain IP address is involved in the trial. This paper presents a rule-based expert system for derivation of privacy violation confidence using various security systems. Generally, security manager analyzes and synthesizes the log information from various security systems about a certain IP address to find the relevance with privacy violation cases. The security managers' knowledge handling various log information can be transformed into rules for automation of the log analysis and synthesis. Especially, the coverage of log analysis for personal information leakage is not too broad when we compare with the analysis of various intrusion trials. Thus, the number of rules that we should author is relatively small. In this paper, we have derived correlation among logs from IDS, Firewall and Webserver in the view point of privacy protection and implemented a rule-based expert system based on the derived correlation. Consequently, we defined a method for calculating the score which represents the relevance between IP address and privacy violation. The UI(User Interface) expert system has a capability of managing the rule set such as insertion, deletion and update.

The Necessary Conditions and Deterring Factors of Good Care (좋은 돌봄의 필요조건과 저해요인에 관한 연구 - 노인돌봄을 중심으로 -)

  • Seok, Jaeeun;Noh, Hyejin;Lim, Jeonggi
    • Korean Journal of Social Welfare
    • /
    • v.67 no.3
    • /
    • pp.203-225
    • /
    • 2015
  • Social care service has grown much with the introduction of Long-Term Care Insurance, but it remains difficult to answer in the affirmative to the question: are we providing sufficiently good care? This study has its purpose in figuring out what conditions are necessary to realize good care in our society. The study has used focus group interview (FGI) as a way to acquire realistic knowledge on the conditions that create good care and its deterring factors. The focus group interview, which targeted long-term care workers and facility heads, was conducted three times from January through March 2014, with each session taking about 3 hours. The analysis showed that the components of good care were mutual understanding and recognition through active interaction, making a good relationship based on mutual trust and respect, professionalism of care worker with flexible judgment that provides customized services, professionalism of center manager with appropriate intermediation, and the tripartite partnership among family, elderly, and care worker. Meanwhile, the deterring factors of good care were identified as devaluation of care labor, ambiguous job description and abuse, unprofessionalism of care worker and manager, inappropriate interference and indifference of family, and the structural constraints on long-term care environment.

  • PDF