• Title/Summary/Keyword: Information Security Strategy

Search Result 474, Processing Time 0.032 seconds

Analyze the Affective and Learning Strategy Difference of Engineering Students under Academic Probation and other College Students (이공계 학사경고 대학생과 일반 대학생의 동기 및 학습전략 차이 분석)

  • Kim, Ock-boon;Cho, Young-bok
    • Journal of Practical Engineering Education
    • /
    • v.11 no.1
    • /
    • pp.25-31
    • /
    • 2019
  • The purpose of this study is to investigate the difference between motivation and learning strategies of students who have received academic probation and who have not while attending engineering college. The subjects of this study were engineering college students in Seoul and they participated in the learning strategy test at the teaching and learning center. The subjects of this study were 553 students, 22 of whom received academic probation and 531 didn't. In order to achieve the purpose of this study, we used MLST (Multi-dimensional Learning Strategy test) learning strategy checklists of Korea Guidance, which is a standardized test. A t-test was conducted to compare motivational and learning strategies between students with and without academic probation. As a result, the motivation score of the students with the academic probation was lower than that of those without the academic probation, and the score of the time management and note taking factors of the students with the academic probation were lower than those of the students without the academic probation.

A Study on Construction of Optimal Wireless Sensor System for Enhancing Organization Security Level on Industry Convergence Environment (산업융합환경에서 조직의 보안성 향상을 위한 센싱시스템 구축 연구)

  • Na, Onechul;Lee, Hyojik;Sung, Soyoung;Chang, Hangbae
    • Journal of the Korea Convergence Society
    • /
    • v.6 no.4
    • /
    • pp.139-146
    • /
    • 2015
  • WSN has been utilized in various directions from basic infrastructure of environment composition to business models including corporate inventory, production and distribution management. However, as energy organizations' private information, which should be protected safely, has been integrated with ICT such as WSN to be informatization, it is placed at potential risk of leaking out with ease. Accordingly, it is time to need secure sensor node deployment strategies for stable enterprise business. Establishment of fragmentary security enhancement strategies without considering energy organizations' security status has a great effect on energy organizations' business sustainability in the event of a security accident. However, most of the existing security level evaluation models for diagnosing energy organizations' security use technology-centered measurement methods, and there are very insufficient studies on managerial and environmental factors. Therefore, this study would like to diagnose energy organizations' security and to look into how to accordingly establish strategies for planning secure sensor node deployment strategies.

Exploring Efficient Solutions for the 0/1 Knapsack Problem

  • Dalal M. Althawadi;Sara Aldossary;Aryam Alnemari;Malak Alghamdi;Fatema Alqahtani;Atta-ur Rahman;Aghiad Bakry;Sghaier Chabani
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.2
    • /
    • pp.15-24
    • /
    • 2024
  • One of the most significant issues in combinatorial optimization is the classical NP-complete conundrum known as the 0/1 Knapsack Problem. This study delves deeply into the investigation of practical solutions, emphasizing two classic algorithmic paradigms, brute force, and dynamic programming, along with the metaheuristic and nature-inspired family algorithm known as the Genetic Algorithm (GA). The research begins with a thorough analysis of the dynamic programming technique, utilizing its ability to handle overlapping subproblems and an ideal substructure. We evaluate the benefits of dynamic programming in the context of the 0/1 Knapsack Problem by carefully dissecting its nuances in contrast to GA. Simultaneously, the study examines the brute force algorithm, a simple yet comprehensive method compared to Branch & Bound. This strategy entails investigating every potential combination, offering a starting point for comparison with more advanced techniques. The paper explores the computational complexity of the brute force approach, highlighting its limitations and usefulness in resolving the 0/1 Knapsack Problem in contrast to the set above of algorithms.

A Study on Invasion of Privacy and Right to be forgotten by Internet Cookie Technology (인터넷 쿠키로 인한 프라이버시 침해와 잊혀질 권리에 관한 연구)

  • Choi, Younsung;Kwon, Oh-Geol;Won, Dongho
    • Journal of Internet Computing and Services
    • /
    • v.17 no.2
    • /
    • pp.77-85
    • /
    • 2016
  • Internet cookie technology is designed for solving unreliable problem of HTTP's inherent property and notifying user's previous activity to web site's server, so it is useful to provide suitable service for individual user. However, the cookie techniques are becoming more sophisticated such as the third cookie and super cookie. And its included information is applied for advertisement and target marketing strategy, so the problem occurs that user's personal information is collected excessively. However, our law does not recognize the internet cookie as personal information so user cannot know where own internet cookie is stored and applicable. Therefore, in this paper, we explain the internet cookie technology, the privacy invasion and right to be forgotten for solving problem due to the internet cookie. And we analysis the relationship between the information of internet cookie and personal information, and then present the improvement requirement on the law and technology to use internet cookie securely and conveniently.

Integration of Blockchain and Cloud Computing in Telemedicine and Healthcare

  • Asma Albassam;Fatima Almutairi;Nouf Majoun;Reem Althukair;Zahra Alturaiki;Atta Rahman;Dania AlKhulaifi;Maqsood Mahmud
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.6
    • /
    • pp.17-26
    • /
    • 2023
  • Blockchain technology has emerged as one of the most crucial solutions in numerous industries, including healthcare. The combination of blockchain technology and cloud computing results in improving access to high-quality telemedicine and healthcare services. In addition to developments in healthcare, the operational strategy outlined in Vision 2030 is extremely essential to the improvement of the standard of healthcare in Saudi Arabia. The purpose of this survey is to give a thorough analysis of the current state of healthcare technologies that are based on blockchain and cloud computing. We highlight some of the unanswered research questions in this rapidly expanding area and provide some context for them. Furthermore, we demonstrate how blockchain technology can completely alter the medical field and keep health records private; how medical jobs can detect the most critical, dangerous errors with blockchain industries. As it contributes to develop concerns about data manipulation and allows for a new kind of secure data storage pattern to be implemented in healthcare especially in telemedicine fields is discussed diagrammatically.

A Study on the Investment Efficiency of Defense Science and Technology R&D (국방과학기술 연구개발 투자 효율화 방안 연구)

  • Gam, Hyemi
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.20 no.11
    • /
    • pp.164-169
    • /
    • 2019
  • Defense R&D investment is expanding. This shows that major countries are preparing for future warfare by securing high-tech technologies and developing new concept weapons systems. In particular, it is expected to accelerate the development of the technology of the 4th Industrial Revolution in the future, and Korea needs its own ability to develop advanced weapons and medium- and long-term investment strategies to prepare for future warfare. The defense science and technology strategy will be established every five years. The strategy-dependent R&D drive has limitations in replacing the rapidly changing security environment and changes in science and technology. This study proposes an investment efficiency process to proactive incorporate information into R&D strategies with a focus on implementing policies and changing security threats, while maintaining continuity in which strategic and focused areas are linked to core technology development. The process can quickly reflect the needs of technological change, the security environment and defense policy. The process can be used to efficiently allocate defense R&D budgets and establish strategic investment directions.

Development of a New Instrument to Measuring Concerns for Corporate Information Privacy Management (국내 기업개인정보보호 측정항목과 관리모형 개발에 관한 연구)

  • Lee, Sung-Joong;Lee, Young-Jai
    • Journal of Information Technology Applications and Management
    • /
    • v.16 no.4
    • /
    • pp.79-92
    • /
    • 2009
  • With the rising reliance on market estimation through customer analysis in customer-centered marketing, there is a rapid increase in the amount of personal data owned by corporations. There has been a corresponding rise in the customers' interest in personal information protection, and the problem of personal information leakage has risen as a serious issue. The purpose of this research is to develop a diagnosis model for personal information protection that is suited to our country's corporate environment, and on this basis, to present diagnostic instruments that can be applied to domestic corporations. This diagnosis model is a structural equation model that schematizes the degree of synthetic effect that administration factors and estimation items have on the protection of personal information owned by corporations. We develop the model- consisting of the administration factors for personal information protection and the measurement items of each factor- using the development method of standardized structural equation model. We then present a tool through which the administration factors and estimation items verified through this model can be used in the diagnosis for personal information protection in corporations. This diagnostic tool can be utilized as a useful instrument to prevent in advance the leakage of personal information in corporations.

  • PDF

Security Strategy in the Cloud Computing (클라우드 컴퓨팅의 보안 전략)

  • Kim, A-yong;Park, Sung-Hyun;HE, YILUN;CHU, XUN;Park, Man-Seub;Kim, Jong-Moon;Jung, Hoe-kyung
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2013.10a
    • /
    • pp.675-677
    • /
    • 2013
  • IT ecosystem is changing with the spread of smart devices and thus, cloud computing fields have been issued to companies. Cloud computing reduces IT costs and aims for eco-friendly Green IT. It also supports all kinds of IT equipment so you can conduct business in real time when moving. With these advantages, many corporations are considering cloud computing but there are security issues when implementing cloud. In this paper, we analyze security problems of clouding service and present the appropriate guidelines. This will be utilized in the fields of cloud computing and service delivery.

  • PDF

Strategic Analysis of the Multilateral Bargaining for the Distribution Channels with Different Transaction Costs (거래비용이 상이한 복수의 유통채널에 대한 다자간 협상전략에 관한 연구)

  • Cho, Hyung-Rae;Rhee, Minho
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.38 no.4
    • /
    • pp.80-87
    • /
    • 2015
  • The proliferation of the Internet and communication technologies and applications, besides the conventional retailers, has led to a new form of distribution channel, namely home sopping through the telephone, TV, catalog or the Internet. The conventional and new distribution channels have different transaction costs perceived by the consumers in the following perspectives: the accessibility to the product information, the traffic cost and the opportunity cost for the time to visit the store, the possibility of 'touch and feel' to test the quality of the product, the delivery time and the concern for the security for the personal information. Difference in the transaction costs between the distribution channels results in the different selling prices even for the same product. Moreover, distribution channels with different selling prices necessarily result in different business surpluses. In this paper, we study the multilateral bargaining strategy of a manufacturer who sells a product through multiple distribution channels with different transaction costs. We first derive the Nash equilibrium solutions for both simultaneous and sequential bargaining games. The numerical analyses for the Nash equilibrium solutions show that the optimal bargaining strategy of the manufacturer heavily depends not only on the degree of competition between the distribution channels but on the difference of the business surpluses of the distribution channels. First, it is shown that there can be four types of locally optimal bargaining strategies if we assume the market powers of the manufacturer over the distribution channels can be different. It is also shown that, among the four local optimal bargaining strategies, simultaneous bargaining with the distribution channels is the most preferred bargaining strategy for the manufacturer.

Relationship between SOA Adoption and Performance of IT Organizations

  • Niknejad, Naghmeh;Ghani, Imran;Hussin, Ab Razak Che;Jeong, Seung Ryul
    • Journal of Internet Computing and Services
    • /
    • v.17 no.4
    • /
    • pp.173-180
    • /
    • 2016
  • SOA has been adopted by enormous number of organizations world-wide. This study has investigated significant factors which affect SOA adoption in positive and negative manner. Unlike the previous similar studies, where they focused on qualitative analysis for SOA adoption, this study conducted a quantitative analysis to investigate the relationship between the adoption of SOA and the performance of IT organizations. In order to conduct the research, an online questionnaire was created and distributed among SOA experts through the social networking platform of professionals, LinkedIn. Total one hundred and four (104) respondents from thirty (30) different countries participated in this study. The results of this study indicate that there are both positive and negative influences upon SOA adoption. The positive influences includes: governance, strategy, culture and communication, business and IT alignment and ROI; whereas complexity, security concerns, and costs have negatively affected SOA adoption.