• Title/Summary/Keyword: Information System Policy Awareness

Search Result 115, Processing Time 0.023 seconds

An Access Control Method considering Semantic Context for Privacy-preserving (개인정보 보호를 위한 의미적 상황을 반영하는 접근제어 방식)

  • Kang, Woo-Jun
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.15 no.1
    • /
    • pp.1-14
    • /
    • 2015
  • To conform to new emerging computing paradigm, various researches and challenges are being done. New information technologies make easy to access and acquire information in various ways. In other side, however, it also makes illegal access more powerful and various threat to system security. In this paper, we suggest a new extended access control method that make it possible to conform to security policies enforcement even with discrepancy between policy based constraints rules and query based constraints rules, based on their semantic information. New method is to derive security policy rules using context tree structure and to control the exceed granting of privileges through the degree of the semantic discrepancy. In addition, we illustrate prototype system architecture and make performance comparison with existing access control methods.

A Study on Information Security Policy in the era of Smart Society (스마트시대 정보보호정책에 관한 연구)

  • Kim, Dong-Wook;Sung, Wook-Joon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.4
    • /
    • pp.883-899
    • /
    • 2012
  • This study will propose the policy priorities of cyber information security by AHP(Analytic Hierarchy Process) survey. The policy categories for AHP survey consist in the foundation of information security and activity of information security(1st hierarchy). In the second hierarchy, the foundation of information security was classified into laws-system, human resources, h/w-s/w technology and sociocultural awareness. And the activity of information security was divided into infrastructure protection, privacy protection, related industry promotion, and national security. Information policy alternatives were composed of 16 categories in the third hierarchy. According to the AHP result, in the perspective of policy importance, the modification of related laws was the first agenda in the policy priority, better treatment of professionals was the second, and the re-establishment of policy system was the third. In the perspective of policy urgency, the re-establishment of policy system was the first item, the modification of related laws was the second, and better treatment of professionals is the third.

Research Trends Analysis of Information Security using Text Mining (텍스트마이닝을 이용한 정보보호 연구동향 분석)

  • Kim, Taekyung;Kim, Changsik
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.14 no.2
    • /
    • pp.19-25
    • /
    • 2018
  • With the development of IT technology, various services such as artificial intelligence and autonomous vehicles are being introduced, and many changes are taking place in our lives. However, if secure security is not provided, it will cause many risks, so the information security becomes more important. In this paper, we analyzed the research trends of main themes of information security over time. In order to conduct the research, 'Information Security' was searched in the Web of Science database. Using the abstracts of theses published from 1991 to 2016, we derived main research topics through topic modeling and time series regression analysis. The topic modeling results showed that the research topics were Information technology, system access, attack, threat, risk management, network type, security management, security awareness, certification level, information protection organization, security policy, access control, personal information, security investment, computing environment, investment cost, system structure, authentication method, user behavior, encryption. The time series regression results indicated that all the topics were hot topics.

The Status of Apartment Informationalization and Inhabitants Awareness The development of Apartment Informationalization system(I) (아파트 정보화의 실태와 주민의식 -아파트 정보화 시스템 개발(I)-)

  • 김한수;임준홍;송흥수
    • Journal of the Korean housing association
    • /
    • v.12 no.1
    • /
    • pp.21-31
    • /
    • 2001
  • This study was conducted to analyze the status of apartment informationalization through the research of distribution of super express network, apartment home pages and Inhabitants awareness. 1st. The construction business launched the full-scale apartment informationalization in 1999. Since then, the infomationalization has been developed multilaterally while the apartment home pages are playing a major role in cooperation with construction business and Internet business. The academic interest and research on the informationalization, however, are not enough. 2nd. The distribution of super express network, which is based on the informationalization is accelerated by the government policy. Especially in our country where the apartment is the major type of housing, we have favorite environment for the informationalization and can create our own housing culture. 3rd. The number of the apartment home pages now is increased to over 6,000, but its contents, know-how, and technique to build the system have not been advanced enough. 4th. So far the home pages have not been able to function well enough to strengthen the community awareness and are likely to result in the unbalanced informationalization. 5th. The study shows that residents interest in the computer and the Internet is fairly high. The utilization of the Internet is varied according to the age, sex, occupation, academic background, income and so forth. Especially they are not as interested in the housing informationalization as in the general information, but the preference of the apartment home pages and the super express network is so tremendous that its distribution will keep the momentum.

  • PDF

A Music Recommendation System based on Context-awareness using Association Rules (연관규칙을 이용한 상황인식 음악 추천 시스템)

  • Oh, Jae-Taek;Lee, Sang-Yong
    • Journal of Digital Convergence
    • /
    • v.17 no.9
    • /
    • pp.375-381
    • /
    • 2019
  • Recently, the recommendation system has attracted the attention of users as customized recommendation services have been provided focusing on fashion, video and music. But these services are difficult to provide users with proper service according to many different contexts because they do not use contextual information emerging in real time. When applied contextual information expands dimensions, it also increases data sparsity and makes it impossible to recommend proper music for users. Trying to solve these problems, our study proposed a music recommendation system to recommend proper music in real time by applying association rules and using relationships and rules about the current location and time information of users. The accuracy of the recommendation system was measured according to location and time information through 5-fold cross validation. As a result, it was found that the accuracy of the recommendation system was improved as contextual information accumulated.

Mobile Device CPU usage based Context-awareness in Mobile Cloud Computing (모바일 클라우드 컴퓨팅에서 상황인지 기반 모바일 장치 CPU사용)

  • Cho, Kyunghee;Jo, Minho;Jeon, Taewoong
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.52 no.3
    • /
    • pp.127-135
    • /
    • 2015
  • Context-aware mobile cloud computing is a new promising paradigm that allows to improve user experience by analyzing contextual information such as user location, time of the day, neighboring devices and current activity. In this paper we provide performance study of context-aware mobile cloud computing system with Volare middleware. Volare monitors the resources and context of the device. and dynamically adapts cloud service requests accordingly, at discovery time or at runtime. This approach allows for more resource-efficient and reliable cloud service discovery, as well as significant cost savings at runtime. We also have studied the performance of context-aware mobile cloud computing for different quality of service (QoS) adaptation policies. Our simulations results show that when battery level is low and CPU usage is high and user cannot maintain the initial QoS, service cost is decreased according to current adaptation policy. In conclusion, the current adaptation policy suggested in this paper may improve user experience by providing a dynamically adapted service cost according to a situation.

Research on Personal Information Safety Condition and Improvements in Welfare Center for the Disabled (장애인복지관 개인정보보호 실태와 개선 방안)

  • Kim, Sung-Jin;Kweon, Jae-Sook
    • The Journal of the Korea Contents Association
    • /
    • v.10 no.11
    • /
    • pp.262-274
    • /
    • 2010
  • In Welfare Center for the disabled, under the Government's information acceleration plan, the computer system has been developed starting from work standardization in 2001 but it has been emphasized only on the technical and customer convenience side leaving out preparation for the side effects of them. Therefore this article will seek the necessity of personal information protection, legal basis in the Welfare Center for the disabled. Additionally after analyzing current status for the personal security of Welfare Center for the disabled, establishing an alternative plan for personal security policy's way could be addressed. Increasing education for awareness stress of personal information security, and preparing institutional protection apparatus from applying life cycle of personal information would be an alternative plan for personal information protection for Welfare Center for the disabled. Also frequent monitoring of accessing personal information from the computerized system should be achieved. It is impossible to recover damage caused by leak of personal information although post actions are progressed. From this essay, awareness of personal information protection should be newly revised for both the Social Welfare Organization and the Disabled welfare center, and also technical, institutional strategy's action should be arranged.

Practitioners' Awareness of Planning Features for Environment-Friendly Apartment unit (공동주택 단위주거의 친환경 계획요소에 대한 전문가 의식조사)

  • Kwon, O-Jin;Lee, Yeun-Sook
    • KIEAE Journal
    • /
    • v.3 no.3
    • /
    • pp.11-18
    • /
    • 2003
  • The purpose of this study was to find out awareness of the environment-friendly planning elements for residential unit space among practitioners. The respondents in this questionnaire survey were 140 practitioners in architecture and interior design field. The major findings of this study were as follows; most of the respondents were aware of the impact of indoor built environment on residents' wellness. In addition, the survey respondents viewed that the factors for planning environment-friendly high-rise apartments were represented by gardening and energy-saving while their perception on the concept excluded comprehensive components affecting residents' life quality. Over 50% of respondents had an experience of applying environment-friendly planning elements in their works, and high frequency appeared on the general planning elements which had been applied special awareness as pro-environmental features. The respondents considered environment-friendly planning elements as important. Specially, space planning and system were considered more likely important in interior design field. In application of environment-friendly planning elements, cost, lack of consumers' awareness of and underdevelopment of environment-friendly materials were of concern. Therefore, the consumer's cognition needs to be improved for wide application about environment-friendly planning element, and then consumers are willing to pay additional construction cost of environment-friendly apartments. At the same time, the current practice that housing developers pass the additional cost on to residents needs to be changed. Then, the quality of life in high-rise residential settings can be improved. More importantly, the exchange and development of the reliable information on environment-friendly planning elements need to be made, and technical support and long-term policy for the development are required. This research showed current status of knowledge and practice in sustainable planning of unit apartment and proved basic information for future direction.

A Comparative Analysis on the Death Toll and the Number of Cremators Using E-Haneul Funeral Information System and Cremation Rate in the Whole Nation Metropolitan Cities

  • Choi, Jae Sil;Nam, Yun Ju
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.12 no.1
    • /
    • pp.95-103
    • /
    • 2020
  • In the study, we show the six metropolitan cities, Incheon Metropolitan City had the highest annual average rate(3.2%) of the death toll, from 2011 to 2018, and the overall annual average rise rate was 2.6%. Also, the annual average rise rate of the number of cremators using E-Haneul funeral information system, Gwangju Metropolitan City had the highest rate(7.6%) and the overall annual average rise rate was 5.6%. The annual average rise rate of the cremation rate, Gwangju Metropolitan City had the highest rate(2.8%) and the overall annual average rise rate was 1.9%. Focusing on the actual state shown in the results of this study above, the policy measures for improving the efficiency of supply & demand policy of funeral facilities in six metropolitan cities in the whole nation could be suggested as follows. First, expanding the supply of cremation facilitiesin consideration of the installation period of cremation facilities. Second, given the increase in the number of cremators using E-Haneul Funeral Information System, it is necessary to expand the infrastructure for meeting the demand of using funeral facilities, such as enshrinement facilities of ash and natural burial sites. Third, in such metropolitan cities, it is difficult to resolve a conflict of location with local residents who recognize cremation facilities as unpleasant facilities. Therefore, it is necessary to devise and implement a plan for improving local residents awareness of cremation facilities and resolving the conflict of location in diversified ways. Fourth, it is predicated that Busan and Daegu Metropolitan City will face a lack of supply of cremation facilities in a short time due to the increased demand for them. Therefore, in order to meet the demand for cremation, it is necessary to construct more cremation furnaces in current cremation facilities or to jointly use and expand cremation facilities with their neighboring local government.

A Study on the Customized Security Policy for Effective Information Protection System (실효적인 정보보호관리 통제를 위한 맞춤형 보안정책 연구)

  • Son, Young-hwan;Kim, In-seok
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.27 no.3
    • /
    • pp.705-715
    • /
    • 2017
  • Today, the world is evolving into a huge community that can communicate with real-time information sharing and communication based on the rapid advancement of scientific technology and information. Behind this information, the adverse effects of information assets, such as hacking, viruses, information assets, and unauthorized disclosure of information assets, are continually increasing as a serious social problem. Each time an infringement of the invasion and personal information leaks occur, many regulatory policies have been announced, including stricter regulations for protecting the privacy of the government and establishing comprehensive countermeasures. Also, companies are making various efforts to increase awareness of the importance of information security. Nevertheless, information security accidents like the leaks of industrial secrets are continuously occurring and the frequency is not lessening. In this thesis, I proposed a customized security policy methodology that supports users with various business circumstances and service and also enables them to respond to the security threats more confidently and effectively through not a monotonous and technical but user-centered security policy.