• Title/Summary/Keyword: Research Information Protection

Search Result 1,353, Processing Time 0.035 seconds

Current Status of the Ecosystem at the Nakdong River Estuary and Management Plan (낙동강하구의 생태계 현황과 관리방안)

  • Sangwook Han;Kwangjin Cho;Pyoungbeom Kim;Haeseon Shin
    • Journal of Environmental Science International
    • /
    • v.32 no.12
    • /
    • pp.943-953
    • /
    • 2023
  • This study analyzed the ecological characteristics of the wetland protection area at tthe Nakdong River through vegetation and biota surveys, which showed that brackish water meets fresh water, a unique ecological environment has been created, biodiversity is high, and diverse habitats are distributed. Eleven plant communities, including four woody communities and seven grass communities, are distributed along the coast, and a total of 514 species, including 11 endangered wildlife species, were identified in terms of species diversity. Among them, the species diversity of the Eulsuk-do area was found to be relatively higher than that of other Barreir Islands areas. The presence of a population of Sterna albifrons on Sinja-do and a population of Eremias argus on Jinwo-do, an area outside the boundaries of the wetland protection area, confirmed the conservation value of the wetlands and the need to expand the boundaries of the wetland protection area. It is judged that this information can be used as basic information for a systematic conservation and management plan for the wetland protection area at the Nakdong River Estuary and as basic data to support the establishment of a policy.

Research on Framework and Inspection Method to Strengthen Personal Information Protection of Trustees (수탁사 개인정보보호 강화를 위한 프레임워크 및 점검방법 연구)

  • Yurim Bak;Yongtae Shin
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.12 no.11
    • /
    • pp.329-336
    • /
    • 2023
  • This paper analyzes the Personal Information Protection Act and related legal guides revised in 2023, proposes a framework for a consignment contract through the items necessary in the consignment relationship for personal information work, and inspects the status of personal information protection for consignees that are absent in Korea. By proposing common items that must be included, we prevent the occurrence of personal information leakage incidents by strengthening the basic personal information protection capabilities of trustees handling personal information work and alleviating the burden of essential personal information protection inspections. I want to do it.

Improvement Issues of Personal Information Protection Laws through Meta-Analysis (메타분석을 통한 개인정보보호법의 개선과제)

  • Cho, Myunggeun;Lee, Hwansoo
    • Journal of Digital Convergence
    • /
    • v.15 no.9
    • /
    • pp.1-14
    • /
    • 2017
  • As we enter the era of big data, the value of personal information is becoming ever more important. However, personal information protection laws in Korea have several issues. Furthermore, existing research are limited in their ability to facilitate a comprehensive understanding of measures to improve personal information protection laws. Accordingly, this study analyzes improvements to be made in the current personal information protection laws based on existing research. A total of 39 research articles discussing the problems of the personal information protection law were selected and analyzed by applying the meta - analysis technique. According to the results, the various issues such as the meaning and scope of personal information, the role and obligations of relevant parties, provision of personal information to third parties, and redundant and imbalanced regulations in special acts in each field. that exist in the current personal information protection laws were confirmed. This study contributes to the improvement of inconsistency between information protection laws and related special laws in each field in practice. Academically, it will contribute to understanding the problems of th law from the macro perspective and suggesting the integrated improvement ways of the law.

NOAA's Response Plan for Nuclear Emergencies

  • Hwang, Sun-Tae;Choi, Kil-Oung
    • Journal of Radiation Protection and Research
    • /
    • v.25 no.2
    • /
    • pp.115-118
    • /
    • 2000
  • With reference to nuclear emergency information concerning the national emergency plan for nuclear accidents, the response plan for the atmospheric nuclear emergencies of the U.S. National Oceanic and Atmospheric Administration (NOAA) was reviewed and described for introducing an overview on it to the Korean Association for Radiation Protection (KARP).

  • PDF

Protection Circuits in Flat Fluorescent Lamp(FFL) Backlight Inverter (LCD 백라이트용 면광원 램프 구동용 인버터 보호회로에 관한 연구)

  • Hur, Jeong-Wook;Lim, Sung-Kyoo
    • Proceedings of the IEEK Conference
    • /
    • 2008.06a
    • /
    • pp.1067-1068
    • /
    • 2008
  • An inverter for driving flat fluorescent lamp(FFL) with various protection circuits using micro controller(Micom) is proposed in this paper. The inverter will be shut down if the fault operating conditions such as open lamp, over current and over voltage are detected.

  • PDF

Terrestrial DTV Broadcasting Program Protection System based on Program Protection Information (방송프로그램 보호신호에 기반한 지상파 방송프로그램 보호 시스템)

  • Choo, Hyon-Gon;Lee, Joo-Young;Nam, Je-Ho
    • Journal of Broadcast Engineering
    • /
    • v.15 no.2
    • /
    • pp.192-204
    • /
    • 2010
  • As illegal distribution of the terrestial DTV broadcast program occurs very frequently in on-line, the needs to protect broadcast program have increased. In this paper, a new approach to implement a system for terrestial DTV broadcast program protection based on program protection information(PPI) is proposed. In our approach, the broadcast program is recorded with encryption according to redistribution condition of the PPI and packaged into a file with key information and PPI together. And we also define a set of domain protocol for supporting user fair-use of broadcast program. In the proposed system, copy control can also be provided by process of home domain management. Implementation results show that our system can protect broadcast programs with efficiency and can support conditional distribution within home domain in order to satisfy user fair-use.

A Revocable Fingerprint Template for Security and Privacy Preserving

  • Jin, Zhe;Teoh, Andrew Beng Jin;Ong, Thian Song;Tee, Connie
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.4 no.6
    • /
    • pp.1327-1342
    • /
    • 2010
  • With the wide deployment of biometric authentication systems, several issues pertaining security and privacy of the biometric template have gained great attention from the research community. To resolve these issues, a number of biometric template protection methods have been proposed. However, the design of a template protection method to satisfy four criteria, namely diversity, revocability and non-invertibility is still a challenging task, especially performance degradation when template protection method is employed. In this paper, we propose a novel method to generate a revocable minutiae-based fingerprint template. The proposed method consists of feature extraction from fingerprint minutiae pairs, quantization, histogram binning, binarization and eventually binary bit-string generation. The contributions of our method are two fold: alignment-free and good performance. Various experiments on FVC2004 DB1 demonstrated the effectiveness of the proposed methods.

Improvement Research for Information Protection Management System of Small and Medium Enterprises (중소기업의 정보보호 관리체계 개선방안 연구)

  • Hye-Joung Yun;Yong-Woo Lee;Hee-Doo Heo;Sam-Hyun Chun
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.23 no.2
    • /
    • pp.15-20
    • /
    • 2023
  • Recently, digitalization is accelerating in all industries, and the use of information and personal information produced and used in the process of it is very important for the success or failure of a company. However, malicious attempts to steal or leak major information and personal information of a company as an adverse effect continue to increase, and appropriate defense and response are absolutely necessary. However, in the case of small and medium-sized enterprises, the priority of information protection and the possession of professional manpower are very insufficient compared to large enterprises. This paper studies the certification and audit implemented in Korea, and suggests ways to expand the certification of the information protection system suitable for SMEs and improve the effectiveness of the support system through the expansion of the privacy law notification standard and operation of support system.

A Case Study on the Cost-Effectiveness Analysis for the Feasibility Study of Public Project Related to Personal Information Protection (개인정보보호 관련 공공사업의 타당성 조사를 위한 비용효과분석 사례 연구)

  • Jo, Illhyung;Kim, Jin;Yoo, Jinho
    • Knowledge Management Research
    • /
    • v.20 no.3
    • /
    • pp.91-106
    • /
    • 2019
  • In the era of the 4th Industrial Revolution, the importance of information protection is increasing day by day with the advent of the 'hyper-connection society', and related government financial investment is also increasing. The source of the government's fiscal investment projects is taxpayers' money. Therefore, the government needs to evaluate the effectiveness and feasibility of the project by comparing the public benefits created by the financial investment projects with the costs required for it. At present, preliminary feasibility study system which evaluates the feasibility of government financial investment projects in Korea has been implemented since 1994, but most of them have been actively carried out only in some fields such as large SOC projects. In this study, we discuss the feasibility evaluation of public projects for the purpose of information security. we introduce the case study of the personal information protection program of Korean public institutions and propose a cost-effectiveness analysis method that can be applied to the feasibility study of the information protection field. Finally, we presented the feasibility study and criteria applicable in the field of information security.

A Study on Dental Hygienist' Knowledge, Awareness and Performance of Patient's Personal Information Protection (환자 개인정보보호에 관한 치과위생사의 지식과 인식도 및 실천도에 관한 연구)

  • Choi, Ye-Jin;Kang, Hyun-Kyung
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.17 no.2
    • /
    • pp.416-426
    • /
    • 2016
  • This study intended to identify dental hygienists' knowledge and extent of awareness and performance of patient's personal information protection. In addition, this research was conducted to contribute to medical centers' preparation of measures to strengthen the personal information protection by identifying the factors affecting dental hygienists' extent of performance related to the patient's personal information protection. After explaining the purpose and meaning of the research to the survey participants and gaining their consent, a self-administered survey was conducted from November 7, 2014 to June 30, 2015. The data on 210 dental hygienists in Busan city and Gyeongsangnam-do province was used for analysis. As a result, in dental hygienists with more than 10 years experience, the extent of the performance was significantly high (p<.05). In positions higher than a senior manager, the extent of knowledge was high (p<.01) and the extent of performance was significantly high (p<.05). In hospitals with more than 10 to 20 workers, the extent of awareness was significantly high (p<.05). Regarding the correlation of knowledge and the extent of awareness and performance, a high level of knowledge showed a positive correlation of the extent of awareness and performance (p<.01). As a result of a survey regarding what effects dental hygienists' knowledge and extent of awareness of patient's personal information protection have on dental hygienists' extent of performance, it was found that knowledge (.231) and the extent of awareness (.212) are factors affecting the extent of performance. Therefore, to increase the extent of dental hygienists' performance of patient's personal information protection, there is a need to improve the knowledge of patient's personal information protection and change its awareness. To change the awareness of patient's personal information protection, there is a serious need to carry out education targeting dental hygienists.