• Title/Summary/Keyword: ID management system

Search Result 197, Processing Time 0.034 seconds

Classification of Online Tracking Technology and Implications in User Perspective (온라인 트래킹 기술 분류 및 이용자 관점에서의 시사점)

  • Lee, Bohan;Rha, Jong-Youn
    • Journal of Digital Convergence
    • /
    • v.16 no.9
    • /
    • pp.159-172
    • /
    • 2018
  • This study searched and analyzed online tracking technologies. It tried to understand what to consider when establishing policies related to online tracking. Online tracking technologies were classified into 'general cookies', 'super cookies', 'fingerprinting', 'device ID tracking' and 'cross-device tracking'. Political considerations should include the layers of online tracking, the subjects of tracking technology, purpose of use, duration and storage format of information, and development of technology. The implications of this study are as follows: first, policy makers and industry should be aware that the degree of risk perceived by users may vary according to the characteristics of online tracking technology. Secondly, it is necessary to understand factors that affect the classification of online tracking technology. Finally, in the industry, preemptive measures such as building an integrated privacy system are needed to relieve anxiety of users and to build trust.

A Design of GPS based Personal Location Self-Control Software on Android Platform (안드로이드 기반 GPS 개인위치정보 자기제어 구조 설계)

  • Jang, Won-Jun;Lee, Hyung-Woo
    • Journal of the Korea Convergence Society
    • /
    • v.1 no.1
    • /
    • pp.23-29
    • /
    • 2010
  • The various kinds of application is distributed for the Smart phone user recently. There is the advantage that the open source application on Android operating system based Smart phone supports a multi tasking service. Layar, Wikitude, and Sherpa and the other applications using the GPS location information like an a2b etc. were developed in the Smart phone environment. However, the existing Cell-ID based location information can be directly collected by the mobile ISP unit which the mobile carrier installs, the personal privacy problem occurs. Therefore, the personal location information is possible to be exposed publicly without any access control procedure. Therefore, in this research, the self-control mechanism on the GPS location information at the Smart phone is designed and presented. Through this, it is possible to develop diverse applications providing enhanced access control and GPS location management on the Android based Smart Phone.

New Technologies in Low Pollution Swine Diets : Diet Manipulation and Use of Synthetic Amino Acids, Phytase and Phase Feeding for Reduction of Nitrogen and Phosphorus Excretion and Ammonia Emission - Review -

  • Lenis, Nico P.;Jongbloed, Age W.
    • Asian-Australasian Journal of Animal Sciences
    • /
    • v.12 no.2
    • /
    • pp.305-327
    • /
    • 1999
  • In the paper insight is given in the legislation policy to restrain environmental pollution by pig husbandry, focused on The Netherlands (Mineral Accounting System). Besides, nutritional measures are presented to reduce environmental pollution by lowering excretion of N and P, emphasizing (multi) phase feeding, the use of low protein, synthetic amino acids supplemented diets, phytase and its effect on phosphorus and calcium digestibility, its interaction with phytic acid and proteins, and the environmental impact of the use of phytase in pig diets. Also, nutritional means are indicated to reduce ammonia volatilization from pig operations. It is concluded that nutrition management can substantially contribute to reduction of N and P excretion by pigs, mainly by lowering dietary protein levels, (multi) phase feeding and the use of microbial phytase, and that the use of phytase on a large scale in The Netherlands has a tremendous environmental impact. In 20 years the excretion of P in growing-finishing pigs has more than halved. Ammonia emission from manure of pigs can be reduced substantially by lowering dietary protein content, but also by including additional non-starch polysaccharides in the diet. A very promising method to reduce ammonia emission is to manipulate dietary cation-anion difference, e.g. by adding acidifying salts to the diet, which will lower pH of urine substantially. Further research is desirable. This also applies to determining dietary factors influencing the odour release from manure. Finally, some speculation on the future of pig farming from an environmental viewpoint is presented.

Implementation of commercial digital Forensic Marking systems (디지털 추적표시(For ensic Marking) 시스템 개발)

  • Kim, Jong-An;Kim, Jin-Han;Kim, Jong-Heum
    • 한국정보통신설비학회:학술대회논문집
    • /
    • 2007.08a
    • /
    • pp.142-146
    • /
    • 2007
  • Digital Rights Management (DRM) technology has been widely used for protecting the digital contents over the recent years. But the digital contents protected by DRM are vulnerable to various video memory capture programs when DRM packaged contents are decrypted on the consumers' multimedia devices. To make up for this kind of DRM security holes the Forensic Marking (FM) technology is being deployed into the content protection area. Most leading DRM companies as well as big electronics companies like Thomson and Philips already have commercial FM solutions. Forensic Marking technology uses the digital watermarking to insert the user information such as user id, content playing time and etc. into the decrypted and decoded content at the playback time on the consumer devices. When the content containing watermarked user information (Forensic Mark) is illegally captured and distributed over the Internet, the FM detection system takes out the inserted FM from the illegal contents and informs contents service providers of the illegal hacker's information. In this paper the requirements and test conditions are discussed for the commercial Forensic Marking systems.

  • PDF

Creating a Workplace Handbook of Biologically Hazardous Agents (사업장의 생물학적 유해인자 편람 작성 연구)

  • Rim, Kyung-Taek
    • Journal of Korean Society of Occupational and Environmental Hygiene
    • /
    • v.24 no.1
    • /
    • pp.14-37
    • /
    • 2014
  • Objectives: Since information on biological factors in the workplace are currently lacking, I wanted to create a handbook of these factors that would be viewable at a glance as a means to more effectively prevent occupationally-infected diseases. Proper information on biological hazards in the workplace allowing the appropriate recognition of the harmful factors is desperately needed. Methods and Results: In this study, I intended to create a high-utility handbook of biologically hazardous agents in the workplace. To ensure its effectiveness, information and references about biologically hazardous agents in the workplace were analyzed and classified and pathogen safety data sheets(PSDS) sourced from the Public Health Agency of Canada were included. I intended to make it accessible from the point of view of workers and their employers. A more effective classification system of occupational infectious diseases is presented, and biologically hazardous agents were classified according to occupations, industries, infectious diseases, and so on. The handbook consists of 60 major kinds of biologically infectious occupational factors that are expected to be generated in workplaces in Korea, and are focused on practical utility. The pathogen safety data sheets(PSDS) of 192 species were also included. To allow more effective management, domestic and foreign laws and regulations are presented. Conclusions: This case report presents general information on the history and contents of the handbook and PSDS, it will also be useful in workplaces if download from the homepage of OSHRI, KOSHA(oshri.kosha.or.kr/bridge?menuID=901).

A Secure Identity Management System for Secure Mobile Cloud Computing (안전한 모바일 클라우드 컴퓨팅을 위한 ID 관리 시스템)

  • Brian, Otieno Mark;Rhee, Kyung-Hyune
    • Annual Conference of KIPS
    • /
    • 2014.11a
    • /
    • pp.516-519
    • /
    • 2014
  • Cloud computing is an up-and-coming paradigm shift transforming computing models from a technology to a utility. However, security concerns related to privacy, confidentiality and trust are among the issues that threaten the wide deployment of cloud computing. With the advancement of ubiquitous mobile-based clients, the ubiquity of the model suggests a higher integration in our day to day life and this leads to a rise in security issues. To strengthen the access control of cloud resources, most organizations are acquiring Identity Management Systems (IDM). This paper presents one of the most popular IDM systems, specifically OAuth, working in the scope of Mobile Cloud Computing which has many weaknesses in its protocol flow. OAuth is a Delegated Authorization protocol, and not an Authentication protocol and this is where the problem lies. This could lead to very poor security decisions around authentication when the basic OAuth flow is adhered to. OAuth provides an access token to a client, so that it can access a protected resource, based on the permission of the resource owner. Many researchers have opted to implement OpenlD alongside OAuth so as to solve this problem. But OpenlD similarly has several security flows. This paper presents scenarios of how insecure implementations of OAuth can be abused maliciously. We incorporate an authentication protocol to verify the identities before authorization is carried out.

Design of XML Document Management System based on Schema (스키마 기반의 XML문서 관리 시스템 설계)

  • 조윤기;김영란
    • Journal of the Korea Society of Computer and Information
    • /
    • v.6 no.4
    • /
    • pp.85-93
    • /
    • 2001
  • As progressing rapidly to the information society and increasing greatly the amount of information, many researchers have been made utilizing XML to store and retrieval the information effectively. But, many other existing method could not support various structured retrieval method for specific parent, children and sibling nodes. In this paper, we propose (1)an effective method of representation for structured information and of indexing mechanism using OETID(Ordered Element Type ID) for effective management and structured retrieval of the XML documents. Also it contains another proposal that is (2) a documents integration mechanism for retrieval result and storing technique to store structural information of the XML documents. With our methods, we could effectively represent structural information of XML documents, and could directly access the specific elements and process various queries by simple operations.

  • PDF

Design of an efficient learning-based face detection system (학습기반 효율적인 얼굴 검출 시스템 설계)

  • Kim Hyunsik;Kim Wantae;Park Byungjoon
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.19 no.3
    • /
    • pp.213-220
    • /
    • 2023
  • Face recognition is a very important process in video monitoring and is a type of biometric technology. It is mainly used for identification and security purposes, such as ID cards, licenses, and passports. The recognition process has many variables and is complex, so development has been slow. In this paper, we proposed a face recognition method using CNN, which has been re-examined due to the recent development of computers and algorithms, and compared with the feature comparison method, which is an existing face recognition algorithm, to verify performance. The proposed face search method is divided into a face region extraction step and a learning step. For learning, face images were standardized to 50×50 pixels, and learning was conducted while minimizing unnecessary nodes. In this paper, convolution and polling-based techniques, which are one of the deep learning technologies, were used for learning, and 1,000 face images were randomly selected from among 7,000 images of Caltech, and as a result of inspection, the final recognition rate was 98%.

IMS지향성과 기업문화 적합도가 IMS활동의 이행수준과 성과에 미치는 영향

  • Kim, Gyeong-Il
    • Proceedings of the Korea Database Society Conference
    • /
    • 2010.06a
    • /
    • pp.5-12
    • /
    • 2010
  • With a sample of 147 Korean small and medium size companies, this study examined the relationships among degree of information orientation, corporate culture, degree of information management implementation and selected business performances in the process of implementing IMS improvement programs, such as IMS(Information Management System). Information orientation is defined as company-wide understanding and implementation of the underlying philosophy, principles, approached, and tools of information improvement programs. It is assumed that successful implementation of information improvement programs requires a information-oriented mind-set of the employees. The key elements of information orientation include continious improvement structured processes, organixation-wide participation and customer-focused spirit. Culture id defined as the value and beliefs of em organization that shape its behavior. It is also assumed that successful implementation of information improvement programs require strong support from s corporate culture that emphasizes cintinious improvement. Adopting the competing values model of Quinn and McGrath(1985), corporate culture is classified into 'flexible' versus 'controlled culture' and 'outer-directed' versus 'inner-directed culture'. Fitness was defined through the relationship between levels of information oriented and types of corporate culture. The results were as follows. First, it was found that when a company with high information orientation promoted information innovation programs, such as IMS, it reported higher degree of information management implementation and improvement in business performances. Second, the results showed the importance of 'flexible culture' and 'outer-directed culture' in performing information, innovation. Regarding the types of corporate culture, the analysis found that developmental culture, rational culture and group culture were effective. Third, companies with high information oriented and flexible culture or companies with high information orientation and outer-directed culture reported the highest implementation in Information management activities. Fourth, the results showed that the level of information management implementation had a mediating effect on the relationship between information orientation and business performance. It was also found that enhanced non-financial performance led to the improvement of financial performance. This study attempted to exaime the factor that lead information management program to success. In order to reach success, first, it is suggested that companies have positive mind set toward continious information improvement. Secondly, it is recommended that a flexible and outer-directed culture appropriate for continious information improvement is cultivated.

  • PDF

A Study on Improvement for Identification of Original Authors in Online Academic Information Service (온라인 학술정보 서비스 상 원저작자 식별 개선 방안 연구)

  • Jung-Wan Yeom;Song-Hwa Hong;Sang-Hyun Joo;Sam-Hyun Chun
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.24 no.3
    • /
    • pp.133-138
    • /
    • 2024
  • In the modern academic research environment, the advancement of digital technology provides researchers with increasingly diverse and rich access to information, but at the same time, the issue of author identification has emerged as a new challenge. The problem of author identification is a major factor that undermines the transparency and accuracy of academic communication, potentially causing confusion in the accurate attribution of research results and the construction of research networks. In response, identifier systems such as the International Standard Name Identifier (ISNI) and Open Researcher and Contributor ID (ORCID) have been introduced, but still face limitations due to low participation by authors and inaccurate entry of information. This study focuses on researching information management methods for identification from the moment author information is first entered into the system, proposing ways to improve the accuracy of author identification and maximize the efficiency of academic information services. Through this, it aims to renew awareness of the issue of author identification within the academic community and present concrete measures that related institutions and researchers can take to solve this problem.