• 제목/요약/키워드: PROTECTION AND MANAGEMENT

Search Result 3,016, Processing Time 0.031 seconds

A study on an Infrastructure for Virus Protection (바이러스 차단 인프라 구조에 관한 연구)

  • Noh, Si-Choon;Kim, Su-Hee;J. Kim, Kui-Nam
    • Convergence Security Journal
    • /
    • v.5 no.1
    • /
    • pp.53-62
    • /
    • 2005
  • Virus protection infrastructure managementis network infrastructure management, traffic route management, virus protection zone expansion, and virus protection management for gateway area. This research paper provides a diagnosis of characteristics and weaknesses of the structure of existing virus protection infrastructure, and recommends an improved multi-level virus protection infrastructure as a measure for correcting these weaknesses. Improved virus protection infrastructure filters unnecessary mail at the gateway stage to reduce the load on server. As a result, numberof transmission accumulation decreases due to the reduction in the CPU load on the Virus wall and increase in virus treatment rate.

  • PDF

A Case Study on Urban Scenic View Protection Methods in U.S.A. for the Management of Urban Scenic View in Korea (한국 도시의 조망경관 관리를 위한 미국 도시 조망경관 관리기법 사례연구)

  • Mok Jeong-Hun
    • Journal of the Korean Institute of Landscape Architecture
    • /
    • v.33 no.1 s.108
    • /
    • pp.58-70
    • /
    • 2005
  • Management practices and ordinances for urban scenic view protection are varied by cities because they have their distinctive nature and social environment. Therefore landscape management methods for urban scenic views are generally varied by the characteristics of city landscape and ordinance. This case study for scenic view protection practices in U.S.A. is very meaningful and appropriate because cities initiate a plan and/or an ordinance to manage urban scenic view in Korea. Urban scenic view protection methods were analyzed based on followings: 1) how to select scenic view resources and define spatial areas for preserving them, 2) how to control building height, open view corridor and guide landscaping and 3) how to carry out view protection methods and organize them in laws or ordinances. Findings of this study will be applied usefully in the development of urban scenic view protection methods in Korea.

Personal Information Protection Behavior for Information Quality : Health Psychology Theory Perspectives (정보품질을 위한 개인정보 보호행위: 건강심리이론 관점을 중심으로)

  • Jee, Bum-Suk;Fan, Liu;Lee, Sang-Chul;Suh, Yung-Ho
    • Journal of Korean Society for Quality Management
    • /
    • v.39 no.3
    • /
    • pp.432-443
    • /
    • 2011
  • The purpose of this research is to understand users' information protection behavior on personal information security from health psychology theory perspectives. Empirical results indicate that users' information protection behavior on personal information is predicted by perceived threat and perceived responsiveness. Perceived threat is determined by perceived susceptibility and perceived severity. Perceived responsiveness is determined by response efficacy and self-efficacy, but response cost is not significant. These findings provide an enriched understanding about users' information protection behavior on personal information security.

Technical Protection Measures for Personal Information in Each Processing Phase in the Korean Public Sector

  • Shim, Min-A;Baek, Seung-Jo;Park, Tae-Hyoung;Seol, Jeong-Seon;Lim, Jong-In
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.3 no.5
    • /
    • pp.548-574
    • /
    • 2009
  • Personal information (hereinafter referred to as "PI") infringement has recently emerged as a serious social problem in Korea. PI infringement in the public and private sector is common. There were 182,666 cases of PI in 2,624 public organizations during the last three years. Online infringement cases have increased. PI leakage causes moral and economic damage and is an impediment to public confidence in public organizations seeking to manage e-government and maintain open and aboveboard administration. Thus, it is an important matter. Most cases of PI leakage result from unsatisfactory management of security, errors in home page design and insufficient system protection management. Protection management, such as encryption or management of access logs should be reinforced urgently. However, it is difficult to comprehend the scope of practical technology management satisfied legislation and regulations. Substantial protective countermeasures, such as access control, certification, log management and encryption need to be established. It is hard to deal with the massive leakage of PI and its security management. Therefore, in this study, we analyzed the conditions for the technical protection measures during the processing phase of PI. In addition, we classified the standard control items of protective measures suited to public circumstances. Therefore, this study provides a standard and checklist by which staff in public organizations can protect PI via technical management activities appropriate to laws and ordinances. In addition, this can lead to more detailed and clearer instructions on how to carry out technical protection measures and to evaluate the current status.

A Study on the Effects of the Information Asset Protection Performance on the Organization Performance: Management Activity and Control Activity (정보자산보호 성과가 조직성과에 미치는 영향에 관한 연구: 관리활동과 통제활동을 중심으로)

  • Kim, Kyung-Kyu;Shin, Ho-Kyoung;Park, Sung-Sik;Kim, Beom-Soo
    • Journal of Information Management
    • /
    • v.40 no.3
    • /
    • pp.61-77
    • /
    • 2009
  • Recently, enterprises are protecting information assets with the various means of control and management. Nevertheless, they are confronted with the dilemma which the higher securitylevel they request, the lesser efficiency and productivity in short terms they acquire by the inconvenience of business process. In addition, in spite of the steady increase of organization's investment on information protection, the systematic way for the performance measurement of information protection has not been suggested, so that in reality, it is difficult to make the decision to invest on information-protection and elicit the direction to improve it. For this reason, this study intended to establish the concept of the protection and security of information assets of enterprises and to categorize the type of activities to protect information assets into management activity and control activity, and analyze the effects of management activity and control activity for information asset protection on the performance of information asset protection activity and organization. For this research, questionnaire survey was conducted with literature study and the PLS(Partial Least Square) was used to analyze the measurement model and hypotheses testing. The PLS analysis results indicate that management activity for information asset protection affects information asset protection performance. Further, organizational performance is influenced by information asset protection performance. Practical implications of these findings and future research implications are also discussed.

A Improvement Study on the Medical Information Protection Using Personal Information Management System(PIMS) : Focus on medical practitioners (개인정보보호관리체계(PIMS)를 이용한 의료정보보호 개선 방안 연구 : 의료기관 종사자를 중심으로)

  • Min, Kyeongeun;Kim, Sungjun
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.12 no.3
    • /
    • pp.87-109
    • /
    • 2016
  • This study intends to present an effective and efficient development plan about the information protection of medical institutions, by establishing the improvement plan about Personal Information Management System(PIMS) appropriate to the characteristics of medical information focusing on medical institutions generating and using domestic medical information, and doing an empirical study on medical information protection plan. For this, in view of the medical characteristics of the existing Information Security Management System(ISMS), the study presented a study model appropriated to medical institutions based on Personal Information Management Systems index specialized for personal information, and through this, presented the vulnerability diagnosis and vulnerability improvement plan. Based on ISMS index, it designed an improvement index of personal information protection management about each index. The study conducted a survey for executives and employees about PIMS. Accordingly, it presented vulnerability diagnosis items of the current management system indexes from the viewpoint of the people who establish and mange the personal information protection about patients' medical information targeting executives and employees who serve at hospitals and can access medical information.

A Study on the Management Capabilities Enhancement of Consignor's Personal Information Protection (위탁자의 개인정보보호 관리역량 제고에 관한 연구)

  • Cheong, Hwan-Suk;Park, Euk-Nam;Lee, Sang-Joon
    • Journal of Internet Computing and Services
    • /
    • v.17 no.4
    • /
    • pp.95-113
    • /
    • 2016
  • Personal information processing works, including resident registration number is common to be consigned by IT specialized company due to high level expertise and tremendous cost. The accident related to personal information is increasing and most of accidents are caused by the consignee's leaking information. According to the Inspection of personal information protection and the management level diagnosis of personal information protection, public Institutions need to build the consignee's accident prevention and personal information management system as soon as possible. In this paper, the efficient enhancement ways for the personal information protection is studied. We analyze the law of business consignment and select basic management items related with personal information protection, and propose a analysis scheme for management level of personal information protection and a enhancement scheme for management system of personal information protection. This paper suggests consignee's management system of personal information protection for the enhancement way and the three Strengthening ways in law. To compose the a enhancement scheme for management system of personal information protection, we conduct questionnaire survey to 30 consignees(IT maintenance, notice printing, call center, welfare center) related to typical tasks of public organizations, present reference for this scheme, and execute verification of this scheme by focus group interview of consignor and consignee.

A Comparative Study on Protected Area Management in South Korea, Japan and China (한·일·중 3국의 보호지역 관리 비교연구)

  • Lee, Min-Ju;Lee, Gwan-Gyu;Sung, Hyun-Chan;Lee, Dong-Kun;Lee, Hyun-Woo;Kim, Joon-Soon
    • Journal of the Korean Society of Environmental Restoration Technology
    • /
    • v.16 no.1
    • /
    • pp.71-82
    • /
    • 2013
  • This study has been carried out with the purpose of coming up with suggestions for designation of domestic protection areas and improvement of their management through a comparative analysis of the systems of management of the protection areas in South Korea, Japan and China. Starting with the designation of natural reserves in 1962, South Korea has prepared legal systems for preserving ecosystems and biodiversity, while continuing to designate protected areas. As the state has so far monopolized the designation and management of all South Korean protection areas that take up 10.8% of its entire land area (as of Dec. 2011), with such persisting issues as multiple designations of one and the same area for protection, overlapping management authorities, and management of privately owned land in the protection areas. In Japan, which has protected area sizes and relevant legal systems similar to those in South Korea, the state provides the basic framework for management, while delegating most of the duties related to direct operation and management to specific municipalities. China, with an integrated administrative management of protected areas, has related government offices and municipalities responsible for the designation and management of individual protected areas. South Korea needs to provide a legally based support system that would further enhance the value of areal protection and contribute to the promotion of local economy and community.

Research on the Trend of Digital Contents Protection Techniques (디지털 컨텐츠의 보호기술에 관한 기술동향 분석)

  • Park, Jin;Na, Cheol-Hun;Jung, Hoe-Kyung
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • v.9 no.1
    • /
    • pp.1094-1097
    • /
    • 2005
  • It is issued that protecting and managing a copyright are very important to a digitization of multimedia contents. We analyze the trend of a multimedia service, IPMP(Intellectual Property Management and Protection), DMP(Digital Media Project), ENTHRONE(End-to-end Qos through Integrated Management of Content, Networks and Terminals), and DRM(Digital Rights Management). All of these techniques are for developing solution about protection and management of the copyright and media service. These have been at the head of the growth of the whole media service, but cause problems such as a illegal copy and distribution. To solve these problems, researchers are performing many projects.

  • PDF

EMR System and Patient Medical Information Protection (전자의무기록(EMR)의 활용과 환자정보보호)

  • Jeun, Youngl-Ju
    • The Korean Journal of Health Service Management
    • /
    • v.7 no.3
    • /
    • pp.213-224
    • /
    • 2013
  • The purpose of this study is to find out the most successful way for the protection of medical information focusing on the electronic medical record(EMR). In this study, every aspect of the EMR is reviewed in terms of the hospital management. In particular, definitions, major functions, strengths and weaknesses of the EMR are considered. This study also examines the general development of the EMR as well as the current situation of applying the EMR. Important issues such as the protection of patient Medical information, informed consent, and the customer-oriented hospital information system are discussed and interpreted in light of the introduction of the EMR into the area of the hospital management. Finally, in this paper Protection of medical information by major Issues on Patient medical information.