• Title/Summary/Keyword: Protect Management Information System

Search Result 305, Processing Time 0.022 seconds

The Study about The Relation of Environmental Accounting and Accountability (환경회계(環境會計)와 Accountability)

  • Park Lee-Bong
    • Management & Information Systems Review
    • /
    • v.10
    • /
    • pp.95-115
    • /
    • 2002
  • E.U(Europe Union) and I.S.O(International Standard Organization) have promoted environmental problems from an individual enterprise level to international level. E.U have practiced E.M.A.S(Environment Management Audit Scheme), they have explained environmental information to local residents by an environmental statement and they have introduced verification system by identification person. One year later, I.S.O have published ISO 14000 series by environmental audit in 1996. Modem enterprise must go well with profitability and sociality. Environmental accounting was appeared in order to agree with profitability and sociality. Environmental accounting is to solve environmental problems, to protect natural resources, to measure effect of environment, and to transmit information of environment. Accountability's theory must be based social fairness and systemic legality. We need the accountability in order to system of Environmental accounting. But the conception of environmental accounting and accountability are not defined in our country. Therefore the purpose of this study is to established the relation of environmental accounting and accountability.

  • PDF

A Robust Multiple Set-Top Box Authentication Scheme for IPTV Against Smart Card Cloning Attack (IPTV 환경에서 스마트카드 복제에 강건한 다중 셋톱박스 인증기법)

  • Lim, Ji-Hwan;Oh, Hee-Kuck;Kim, Sang-Jin
    • The KIPS Transactions:PartC
    • /
    • v.17C no.1
    • /
    • pp.37-46
    • /
    • 2010
  • In an IPTV system, the rights of the content and service provider can be protected by using Conditional Access System (CAS) and Digital Right Management (DRM). In case of the CAS, only the authorized user who has structured authentication keys can decrypt the encrypted content. However, since the CAS establishes a secure channel only between content provider and Smart Card (SC), it cannot protect the system against McCormac Hack attack which eavesdrops on unsecure channel between SC and Set-Top Box (STB) and SC cloning attack. In this paper, we propose a robust multi-STB assisted SC / STB authentication protocol which can protect the IPTV system against not only McCormac Hack attack, but also SC cloning attack. The previous works which bind a STB and a SC during the SC registration phase against the SC cloning attack does not support multi-STB environments. The proposed system which dynamically updates the STB information in subscriber management system using the bi-directional channel characteristic of IPTV system can support the user's multi-STB device effectively.

A Study on Unified Security Management System for remote data acquisition of New and Renewable Energy Facilities (신.재생에너지 발전설비의 원격 데이터 수집을 위한 통합 보안 관리시스템에 관한 연구)

  • Kim, Hyoung-Ju;Lim, Jung-Yol
    • Journal of IKEEE
    • /
    • v.13 no.2
    • /
    • pp.186-193
    • /
    • 2009
  • Development and diffusion of a new and renewable energy are acutely required at domestic energy actualities to be inferior as industrialization is accelerated, and use of information electric appliance is increased rapidly. For the diessemination and practical use of new and renewable energy, this paper presents an unified security management system that is efficiently able to acquire operational status date and control distributed generation facilities. Also, the unified security management system is suggested to protect gathered operational status date from unpredictable problems such as computer virus, spy ware, and any other network problems.

  • PDF

Design of CEK Distributed Management System for Secure DRM Key Management. (안전한 DRM 키 관리를 위한 비밀 분산 관리 시스템 설계)

  • Sung Kyung
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.9 no.2
    • /
    • pp.390-396
    • /
    • 2005
  • With the spread of computer and development of internet service, the varied contents and digital data has been produced, then provided. The digital contents are more efficiently able to be created, produced, provided as well as distributed, on the other hand, its own copyrights seem to be more easily broken than analogue contents due to the convenience to make copies of original contents. Therefore, protecting copyrights recently become the key issue. DRM(Digital Rights Management) is the current technology to protect digital contents from duplication but it sometimes causes problems in the key-management. In this thesis, we would first like to analyze DRM and find out some trouble in the key-management of it. Finally, we will show CDMS(CEK Distributed Management System) to improve DRM out of the key-management problem and continue to study for better key-management system with it.

Internal and External Characteristics of Information Security Officers Affecting Organization's Information Security Performance (조직 정보보호성과에 영향을 미치는 정보보호담당임원의 내·외적 특성)

  • Oh, Ha-Kyeong;Kim, Tae-Sung
    • Journal of Information Technology Applications and Management
    • /
    • v.27 no.4
    • /
    • pp.1-19
    • /
    • 2020
  • Infringement of information security has caused the corporate image to be damaged and share price to fall, and it is emerging as an organizational risk. The value of information assets in enterprises has led to a higher level of security than in the past. As a result, companies are aware of the need for officers to protect information and to oversee a security management system. However, despite the growing importance of information security officers, there is a lack of research on their roles and characteristics. This study validates the relationship between determinants that affect the performance of information security. And a structural equation model was presented and empirically analyzed to see the impact of the internal and external characteristics of the staff in charge of information security on the organization's information security performance.

Development and Management of Database for School Health Improvement (학교보건 증진을 위한 데이터베이스의 개발 및 관리)

  • Choung Hye Myoung
    • Journal of Korean Public Health Nursing
    • /
    • v.18 no.1
    • /
    • pp.154-166
    • /
    • 2004
  • The purpose of this study was to design and implementation of database for school health activity. This database system was designed stand-alone application for college school health center without a hospital affiliation and the database system was made of relational database management system, Microsoft access 2000 to be made GUI (Graphic user interface) type design and made up 7 tables: patients. symptoms. departments, income and outgo. medical cures. and medicine. The construction of this database system was patient management. code management. medicine management. and statistics management. The results of the database system were as follows; 1) This database system could be used for college school health center. 2) This database system could be made correct statistic data. 3) This database system could be managed income and outgo. 4) This database system could be changed for the better activity of community health service. 5) This database system could be simply attired administrative system. This database system will be used for students and employees to protect and promote health to measure for health level and quality of health service. In conclusion. this database system can be applied for unit health center to manage the college school health activity and advanced data management can be applied for health profession to do quality improvement. cost containment. management information system. and decision support system.

  • PDF

An Structural Model Study on the Effect of KS Certificate and the Enterprise Performance (KS표시 인증과 경영성과와의 영향력에 관한 구조모델연구)

  • Koo Il Seob;Kim Tae Sung;Yim Chun Soon
    • Proceedings of the Korean Society for Quality Management Conference
    • /
    • 2004.04a
    • /
    • pp.618-624
    • /
    • 2004
  • Korean Standard Certificate , suitable for the korean industrial standards is one which was designed not only to spread and utilize the industrial standard established for the industrial standardization but to protect the consumer In this study, the practical effects of the Korean Standard Certificate will be examined in various fields, based on the small medium enterprises which achieved the K.S. Certificate In order to look into how the system has effects on the performance of the management in a company, the method of the actual approach will be used. In the end, the purpose of this study is to find the plan in which KS Certificate can be helpful to the development of the company.

  • PDF

System Design and Implementation for Security Policy Management of Windows Based PC and Weakness Inspection (Windows 기반의 PC 보안 정책 관리 및 취약성 점검을 위한 시스템 설계 및 구현)

  • Park, Byung-Yeon;Yang, Jong-Won;Seo, Chang-Ho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.18 no.1
    • /
    • pp.23-30
    • /
    • 2008
  • Attempt to protect personal computer from hacking, virus, worm, and the troy wooden horse is progressed variously. Nevertheless, it is very difficult fer public users to understand configurations to enhance security stability in windows based personal computer, and many security problem is due to there lack of recognize about information accessability, various kind of configuration, these necessity, and efficiency. Accordingly, it is demandded to develop an efficient system to protect networks and personal computer with automated method. In this paper, we derive problems of personal computer by analyzing various vulnerableness and policy on security, through which we design and implement the system to solve various windows system problem conveniently.

Design of a Private Key Escrow System based on the Fingerprint Identification (지문 인식 기반의 개인키 위탁 시스템의 설계)

  • Shin, Yong-Nyuo;Lee, Yong-Jun
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.4 no.2
    • /
    • pp.21-28
    • /
    • 2008
  • There are some problems on the system that uses a password comprising a digital signature to identify the secret key owner under the public key infrastructure. For example, the password can be difficult to remember or easy to be disclosure, and users should make more complex password to protect it. A number of studies have been proceeded in order to overcome these defects using the fingerprint identification technologies, but they need to change the current standard of public key infrastructure. On the suggested private key escrow system, the private key can be withdrawn only through the enrollment and identification of a fingerprint template after it is saved to a reliable third system. Therefore, this new private key escrow system can remove previous inconveniences of managingthe private key on current public key infrastructure, and it exhibited superior results in terms of the evaluation items when compared with the integrated method of the existing fingerprint identification and public key infrastructure.

A Study on Parking Control System for Fully Automated (완전 자동화를 위한 주차 관제 시스템에 관한 연구)

  • Ock, Injun
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.15 no.3
    • /
    • pp.79-87
    • /
    • 2019
  • The system proposed in this paper is a fully automated parking control system that can even protect users' information through blockchain. Unlike conventional parking control systems, the system consists of a web page that is accessible to people of all ages and ages, directly to the parking lot. Such a system would also benefit managers in the parking lot business. This is because it can reduce soaring labor costs and maximize the sales it can generate by operating 24 hours a day. In order to implement these systems, the web page was first designed using HTML and the API was configured using JAX-RS to invoke the API required by the web page. As a result, it created a web page that was easily accessible to anyone, built a server that could be accessed by more than 200 people at the same time, focused on personal information protection by encrypting the information of users through blockchain grafts, and designed a system that enabled users to complete payments easily. It is planning to add QR codes and GPS functions in the future and implement a function that allows one-touch information on parking lots and their vehicle information.