• Title/Summary/Keyword: Convergence security

Search Result 3,405, Processing Time 0.032 seconds

Proposal Strategy and Performance Analysis of Electronic Human Resources Management Pilot Project (건설근로자공제회 전자인력관리(전자카드제)시범사업 성과 분석 및 추진전략 도출)

  • Kim, Inchie;Chin, Sangyoon;Kim, Seongah;Kim, Yeasang;Lee, Sangjun;Park, Soohun
    • Korean Journal of Construction Engineering and Management
    • /
    • v.19 no.4
    • /
    • pp.3-11
    • /
    • 2018
  • The Construction Workers Mutual Aid Association is carrying out a number of strategic tasks with the goal of "contributing to improving employment and stabilizing the return of workers to construction workers through employment welfare and retirement deduction services." One of them is the retirement deduction system. The retirement allowance system is a system for the retirement income and livelihood security of construction workers who are not adequately protected by the Labor Standards Act, such as retirement allowances due to the nature of day labor. The Construction Workers Mutual Aid Association has promoted the introduction of electronic manpower management. For the efficient management of the pilot sites and the plans for the future, comprehensive evaluation of the pilot sites as well as the evaluation of the status and operation results of each pilot project site are needed. Therefore, in this study, we will develop performance indicators to evaluate the current state of electronic manpower pilot projects and analyze the actual situation of pilot project sites through actual application, and try to derive future implementation strategies.

Consecutive Difference Expansion Based Reversible DNA Watermarking (연속적 차분 확장 기반 가역 DNA 워터마킹)

  • Lee, Suk-Hwan;Kwon, Ki-Ryong
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.52 no.7
    • /
    • pp.51-62
    • /
    • 2015
  • Of recent interests on high capacity DNA storage, DNA watermarking for DNA copyright protection, and DNA steganography for DNA secret communication are augmented, the reversible DNA watermarking is much needed both to embed the watermark without changing the functionality of organism and to perfectly recover the host DNA sequence. In this paper, we address two ways of DE based reversible DNA watermarking using noncoding DNA sequence. The reversible DNA watermarking should consider the string structure of a DNA sequence, the organism functionality, the perfect recovery, and the high embedding capacity. We convert the string sequence of four characters in noncoding region to the decimal coded values and embed the watermark bit into coded values by two ways; DE based multiple bits embedding (DE-MBE) using pairs of neighbor coded values and consecutive DE-MBE (C-DE-MBE). Two ways process the comparison searching to prevent the false start codon that produces false coding region. Experimental results verified that our ways have more high embedding capacity than conventional methods and produce no false start codon and recover perfectly the host sequence without the reference sequence. Especially C-DE-MBE can embed more high two times than DE-MBE.

Privacy Assurance and Consumer Behaviors in e-Business Environments (e-비즈니스 환경에서 기업의 개인정보보호 활동이 소비자 행위에 미치는 영향)

  • Park, JaeYoung;Jung, Woo-Jin;Lee, SangKeun;Kim, Beomsoo
    • The Journal of Society for e-Business Studies
    • /
    • v.23 no.4
    • /
    • pp.1-17
    • /
    • 2018
  • Recently, most online firms are trying to provide personalized services based on customer's data. However, customers are reluctant to give their information to online firm because of concerns about data breach. Online firms are seeking to increase their trust by ensuring the protection of personal information for customers through privacy seal (e.g. e-privacy) or data breach insurance. This research examines the effects of privacy assurance(i.e. privacy seal, data breach insurance) on consumer behavior in online environment. An experiment based on the hypothetical scenario was conducted using a between-subjects 2 (type of privacy assurance) + 1 (control) design. We found that both privacy seal and data breach insurance increased perceived privacy trust. In addition, privacy seal has a positive effect on the intention to provide personal information through perceived privacy trust. Finally, in the case of the group with a high (low) disposition to trust, higher perceived privacy trust is formed through privacy seal (data breach insurance). Theoretical and practical implications are discussed.

A Study on Government Innovation for Realizing Social Value: Focused on A Local Government (사회적 가치실현을 위한 정부혁신에 대한 연구: A 지방자치단체를 중심으로)

  • Lee, Hyangsoo;Lee, Seong-Hoon
    • Journal of Digital Convergence
    • /
    • v.17 no.6
    • /
    • pp.11-17
    • /
    • 2019
  • In this study, we examine the concept of social value which is the main philosophical foundation in government innovation pursued by Moon Jae-In government and analyze the case of government innovation which was promoted by specific local governments. The purpose of this study is to discuss the implications for the government innovation through the case study of local autonomous organizations. The studied local government is an institution that has received excellent evaluation of government innovation for the realization of social value by Ministry of Public Administration and Security. In this study, we conducted in-depth interviews with local governments and youths and examined the success factors of government innovation through active participation in community issues. First of all, institutional support such as ordinances is important for encouraging the participation of community members. It is also important for local governments to lead their own change and listen to their voices from a consumer perspective, not from a supplier perspective. In addition, significant importance of the incentive system that could induce continuous participation in community problems was found. In this way, it is possible to establish a continuous system to approach the problem of local community as consumer perspective, not supplier perspective, and solve the problem together.

The Effect of IT Governance Factors on Local Festival Performance (IT 거버넌스 요인이 지역축제 성과에 미치는 영향)

  • Kim, Young-Dai;Lee, Sun-Young;Lee, Hwansoo
    • Journal of Digital Convergence
    • /
    • v.16 no.12
    • /
    • pp.1-10
    • /
    • 2018
  • For local festivals to be successful, it is important to cooperate with various entities and effectively utilize festival-related resources. Recently, many efforts have been made to improve the operation and management performance of local festivals in Korea, but systematic management and IT support have been insufficient. In this study, the factors affecting the IT governance of local festivals were derived through a literature review and the relationship to the festival performance was analyzed empirically. A survey was conducted with local festival organizers and stake holders, and the research model was verified using the regression analysis with total 109 samples. According to the results of the analysis, it was confirmed that marketing, processes and service management have a significant effect on festival performance within IT governance. The effect of festival performance on resource management was not statistically significant. This study demonstrates that the systematic operation and management of local festivals using IT governance is necessary for local festivals. It will be more meaningful if further study discuss the IT utilization guidelines and success cases through the innovative use of IT for local festivals.

A Comparative Study on the Characteristics of the Core Technology and Future New Technology of the Ground Unmanned System (국방 지상무인체계의 핵심기술과 미래 신기술 특성 비교 연구)

  • Kim, Doe-Hun
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.20 no.3
    • /
    • pp.291-297
    • /
    • 2019
  • The world's leading industrialized nations are improving their national science and technology capacity through the continuous expansion of national R&D investment and the improvement of performance in accordance with the trend of the fourth industrial revolution. As rapid technological development following technological convergence necessitates a preemptive response to a new paradigm, the importance of securing high technology that affects the national competitiveness is increasing day by day. Core technologies and future new technologies that affect national competitiveness can be seen as a measure to upgrade the nation's innovative capabilities. In particular, the core technologies and future new technologies to prepare for changes in a security environment and future battlefields are very important in the defense sector that develops weapons systems. In the defense sector, the core technologies based on the military weapons systems are identified, and future new technologies that use the best technologies of the private sector for national defense, not on the needs of develops weapons systems, are derived. This study examined the characteristics of core technology and future new technology of defense ground unmanned systems, conducted a comparative study through empirical analysis, and concluded that strategic technology planning and research and development are needed according to the core technology and future new technology characteristics.

Analysis of Priority of Technical Factors for Enabling Cloud Computing Services (클라우드 컴퓨팅 서비스 활성화를 위한 기술적 측면 특성요인의 중요도 우선순위 분석)

  • Kang, Da-Yeon;Hwang, Jong-Ho
    • Journal of Digital Convergence
    • /
    • v.17 no.8
    • /
    • pp.123-130
    • /
    • 2019
  • The advent of the full-fledged Internet of Things era will bring together various types of information through Internet of Things devices, and the vast amount of information collected will be generated as new information by the analysis process. To effectively store this generated information, a flexible and scalable cloud computing system is advantageous. Therefore, the main determinants for effective client system acceptance are viewed as motivator factor (economics, efficiency, etc.) and hindrance factor (transitional costs, security issues, etc.) and the purpose of this study is to determine which detailed factors play a major role in making new system acceptance decisions around harm. The factors required to determine the major priorities are defined as the system acceptance determinants from the technical point of view obtained through the literature review, and the questionnaire is prepared based on the factors derived, and the survey is conducted on the experts concerned. In addition, the AHP analysis aims to achieve a final priority by performing a bifurcation between components for measuring a decision unit. Furthermore, the results of this study will serve as an important basis for making decisions based on acceptance (enabling) of technology.

A Study on Knowledge Management Vision and Implications of Ministry of Culture, Sports and Tourism (문화체육관광부의 지식관리 비전과 시사점에 대한 연구)

  • Lee, Hyangsoo;Lee, Seong-Hoon
    • Journal of Digital Convergence
    • /
    • v.17 no.1
    • /
    • pp.29-36
    • /
    • 2019
  • In this study, we analyzed knowledge management cases of the Ministry of Culture, Sports and Tourism and examined knowledge management vision, promotion organization and knowledge management activity system. This study aims to clarify implications for successful knowledge management in government sector. In the case of the Ministry of Culture, Sports and Tourism, which was the subject of the study, it was evaluated as having performed well in the management activities of the government department in the evaluation of "Knowledge Target for 2018" jointly hosted by Maeil Economic Daily and the Ministry of Public Administration and Security. In this study, we conducted an in - depth interview with the knowledge management staff of the Ministry of Culture and Tourism and analyzed the success factors of knowledge management in the government sector. First, the vision of knowledge management and the role of dedicated organization were very important. In addition, knowledge management system was used to effectively acquire, share, and accumulate knowledge and utilize it. In addition, appropriate compensation systems for knowledge management activities are also important success factors. Therefore, in order to encourage knowledge management activities, it is necessary for public institutions to establish an incentive system such as an economic compensation system for personnel sharing activities and HR personnel.

Secure Training Support Vector Machine with Partial Sensitive Part

  • Park, Saerom
    • Journal of the Korea Society of Computer and Information
    • /
    • v.26 no.4
    • /
    • pp.1-9
    • /
    • 2021
  • In this paper, we propose a training algorithm of support vector machine (SVM) with a sensitive variable. Although machine learning models enable automatic decision making in the real world applications, regulations prohibit sensitive information from being used to protect privacy. In particular, the privacy protection of the legally protected attributes such as race, gender, and disability is compulsory. We present an efficient least square SVM (LSSVM) training algorithm using a fully homomorphic encryption (FHE) to protect a partial sensitive attribute. Our framework posits that data owner has both non-sensitive attributes and a sensitive attribute while machine learning service provider (MLSP) can get non-sensitive attributes and an encrypted sensitive attribute. As a result, data owner can obtain the encrypted model parameters without exposing their sensitive information to MLSP. In the inference phase, both non-sensitive attributes and a sensitive attribute are encrypted, and all computations should be conducted on encrypted domain. Through the experiments on real data, we identify that our proposed method enables to implement privacy-preserving sensitive LSSVM with FHE that has comparable performance with the original LSSVM algorithm. In addition, we demonstrate that the efficient sensitive LSSVM with FHE significantly improves the computational cost with a small degradation of performance.

Topic Modeling-Based Domestic and Foreign Public Data Research Trends Comparative Analysis (토픽 모델링 기반의 국내외 공공데이터 연구 동향 비교 분석)

  • Park, Dae-Yeong;Kim, Deok-Hyeon;Kim, Keun-Wook
    • Journal of Digital Convergence
    • /
    • v.19 no.2
    • /
    • pp.1-12
    • /
    • 2021
  • With the recent 4th Industrial Revolution, the growth and value of big data are continuously increasing, and the government is also actively making efforts to open and utilize public data. However, the situation still does not reach the level of demand for public data use by citizens, At this point, it is necessary to identify research trends in the public data field and seek directions for development. In this study, in order to understand the research trends related to public data, the analysis was performed using topic modeling, which is mainly used in text mining techniques. To this end, we collected papers containing keywords of 'Public data' among domestic and foreign research papers (1,437 domestically, 9,607 overseas) and performed topic modeling based on the LDA algorithm, and compared domestic and foreign public data research trends. After analysis, policy implications were presented. Looking at the time series by topic, research in the fields of 'personal information protection', 'public data management', and 'urban environment' has increased in Korea. Overseas, it was confirmed that research in the fields of 'urban policy', 'cell biology', 'deep learning', and 'cloud·security' is active.