• Title/Summary/Keyword: Security Service History

Search Result 54, Processing Time 0.027 seconds

Index method of using Rend 3DR-tree for Location-Based Service (위치 기반 서비스를 위한 Rend 3DR-tree를 이용한 색인 기법)

  • Nam, Ji-Yeun;Rim, Kee-Wook;Lee, Jeong-Bae;Lee, Jong-Woock;Shin, Hyun-Cheol
    • Convergence Security Journal
    • /
    • v.8 no.4
    • /
    • pp.97-104
    • /
    • 2008
  • Recently, the wireless positioning techniques and mobile computing techniques have rapidly developed to use location data of moving objects. The more the number of moving objects is numerous and the more periodical sampling of locations is frequent, the more location data of moving objects become very large. Hence the system should be able to efficiently manage mass location data, support various spatio-temporal queries for LBS, and solve the uncertainty problem of moving objects. Therefore, in this paper, innovating the location data of moving object effectively, we propose Rend 3DR-tree method to decrease the dead space and complement the overlapping of nodes by utilizing 3DR-tree with the indexing structure to support indexing of current data and history data.

  • PDF

Analysis on ISMS Certification and Organizational Characteristics based on Information Security Disclosure Data (정보보호 공시 데이터를 이용한 정보보호 관리체계 인증과 조직의 특성 분석)

  • SunJoo Kim;Tae-Sung Kim
    • Information Systems Review
    • /
    • v.25 no.4
    • /
    • pp.205-231
    • /
    • 2023
  • The Information Security Management System (ISMS) is a protection procedure and process that keeps information assets confidential, flawless, and available at any time. ISMS-P in Korea and ISO/IEC 27001 overseas are the most representative ISMS certification systems. In this paper, in order to understand the relationship between ISMS certification and organizational characteristics, data were collected from Korea Internet & Security Agency (KISA), Ministry of Science and ICT, Information Security Disclosure System (ISDS), Financial Supervisory Service, Data Analysis, Retrieval and Transfer System (DART), and probit regression analysis was performed. In the probit analysis, the relationship with four independent variables was confirmed for three cases: ISMS-P acquisition, ISO/IEC 27001 acquisition, and both ISMS-P and ISO/IEC 27001 acquisition. As a result of the analysis, it was found that companies that acquired both ISMS-P and ISO/IEC 27001 had a positive correlation with the total number of employees and a negative correlation with business history. In addition, the improvement direction of the ISMS-P certification system and information security disclosure system could also be confirmed.

A Study on the Oriental Medical Insurance and the Industrial Accident Compensation in the Social Security System (사회보장제도(社會保障制度)로서의 한방의료보험(韓方醫療保險)과 산재보상(産災補償))

  • Yoon Young-Soo
    • Journal of Society of Preventive Korean Medicine
    • /
    • v.1 no.1
    • /
    • pp.137-148
    • /
    • 1997
  • The Serial Securities and the Social Welfare, as the national policy aimed at securing generals' lives, are the policies or systems for the stabilization in lift; especially of law-incomers and workers, for which the povernment has to establish the Social Security System. No wonder the Social Insurance System is a part of the Social Security System and the most important. The Social Insurance System, along with Public Assistance, is underlying the Social Security System. Social Security System includes medical insurance, industrial accident Compensation insurance, national pention insurance and employment insurance. The study is on 'The Oriental Medical Insurance and the Industrial Accident Compensation in the Social Security System' . The rate of industrial accident in Korea marks the highest rank in the world. for laborer, industrial accident do not merely mean the loss of health but the question of the right to live in terms of their loss of opportunity of life. The industrial accident compensation system should be established as the es post facto remedy system to guarantee the injured worker and his/her family's life. The oriental medical insurance system which began to operate in 1987 in Korea is based on unionism and divided into 3 parts; one part for the worker, a second part for the community inhabitants, and a third part for the public service personnel and private school personnel. Today the medical problem must be the most important social assignment to be considered. The medical system of contemporary industrial society has began greatly stood out in relief as a part of social welfare not emphasized on gainings of physicians. Accordingly systematization of the oriental medical insurance was strongly Pursued and it was developed to to the extent of entire nation insurance. Though the history of it is very short, most of the people are getting benefit from the insurance system by the social security system method. This study develops the Oriental Medical Insurance, the Workmen's Accident Compensation Insurance, the Pension System in relation to the industrial accident compensation of Employees, along with the ideas and principles of social insurance.

  • PDF

How to improve carrier (telecommunications) billing services to prevent damage (통신과금서비스의 피해예방을 위한 개선방안)

  • Yoo, Soonduck;Kim, Jungil
    • Journal of Digital Convergence
    • /
    • v.11 no.10
    • /
    • pp.217-224
    • /
    • 2013
  • Due to the development of mobile technologies, the carrier (telecommunications) billing service market is rapidly growing. carrier (telecommunications) billing service allows users to make on-line purchases through mobile-billing. Users find this particularly convenient because the payment acts as a credit transaction. Furthermore, the system is commonly believed to be secure through its use of SMS (Short Message Service) authentication and a real-time transaction history to confirm the transaction. Unfortunately, there is a growing number of fraudulent transactions threaten the future of this system. The more well documented types of security breaches involves hackers intercepting the authentication process. By contaminating the device with security breaching applications, hackers can secretly make transactions without notifying users until the end of month phone bill. This study sheds light on the importance of this societal threat and suggests solutions. In particular, "secure" systems need to be more proactive in addressing the methods hackers use to make fraudulent transactions. Our research partially covers specific methods to prevent fraudulent transactions on carrier billing service providers' systems. We discuss about the proposed improvements such as complement of electronic payment systems, active promotion for fraudulent transactions enhanced monitoring, fraud detection and introduce a new authentication service. This research supports a future of secure communications billing services, which is essential to expanding new markets.

Design and Development of Network for Housing Estate Security System

  • Nachin, Awacharin;Mitatha, Somsak;Dejhan, Kobchai;Kirdpipat, Patchanon;Miyanaga, Yoshikazu
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2003.10a
    • /
    • pp.1480-1484
    • /
    • 2003
  • This paper presents the design and development of network for housing estate security system. The system can cover up to 961 houses which can be up to 1,200 meters long transfer rate of 9,600 bps. This system uses checking and warning the abnormal situation. More over this system has ability to control switch on/off the electrical equipment in the house via AC line control system. The system consists of 4 parts. The first part is a security system of each house using MCS-51 microcontroller as a central processing unit scan 32 sensors and control 8 appliances and send alarm. The MCS-51 microcontroller received control signal via telephone used DTMF circuit. The second part is distributed two levels master/slave network implementing after RS-485 serial communication standard. The protocol its base on the OSI (Open Systems Interconnection) 7 layers protocol model design focus on speed, reliability and security of data that is transferred. The network security using encrypt by DES algorithm, message sequence, time stamp checking and authentication system when user to access and when connect new device to this system. Flow control in system is Poll/Select and Stop-and-Wait method. The third part is central server that using microcomputer which its main function are storing event data into database and can check history event. The final part is internet system which users can access their own homes via the Internet. This web service is based on a combination of SOAP, HTTP and TCP/IP protocols. Messages are exchanged using XML format [6]. In order to save the number of IP address, the system uses 1 IP address for the whole village in which all homes and appliance in this village are addressed using internal identification numbers. This proposed system gives the data transfer accuracy over 99.8% and maximum polling time is 1,120 ms.

  • PDF

Security issues and requirements for cloud-based u-Healthcare System (클라우드기반 u-헬스케어 시스템을 위한 보안 이슈 및 요구사항 분석)

  • Lee, Young Sil;Kim, TaeYong;Lee, HoonJae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2014.05a
    • /
    • pp.299-302
    • /
    • 2014
  • Due to the convergence between digital devices and the development of wireless communication technology, bit-signal sensor miniaturization, building an Electronic Medical Record (EMR) which is a digital version of a paper chart that contains all of a patient's medical history and the information of Electronic Health Record (EHR), Ubiquitous healthcare (u-Healthcare) that can monitor their health status and provide personal healthcare service anytime and anywhere. Also, the appearance of cloud computing technology is one of the factors that accelerate the development of u-healthcare service. However, if the individual information to be used maliciously during the u-healthcare service utilization, leads to serious problems directly related to the individual's life because if it goes beyond the level of simple health screening and treatment, it may not provide accurate and reliable healthcare services. For this reason, we analyzed a variety of security issues related to u-healthcare service in cloud computing environment and described about directions of secure health information sharing system construction. In addition, we suggest the future developmental direction for th activation of u-healthcare industry.

  • PDF

A Study on the construction of physical security system by using security design (보안디자인을 활용한 시설보안시스템 구축 방안)

  • Choi, Sun-Tae
    • Korean Security Journal
    • /
    • no.27
    • /
    • pp.129-159
    • /
    • 2011
  • Physical security has always been an extremely important facet within the security arena. A comprehensive security plan consists of three components of physical security, personal security and information security. These elements are interrelated and may exist in varying degrees defending on the type of enterprise or facility being protected. The physical security component of a comprehensive security program is usually composed of policies and procedures, personal, barriers, equipment and records. Human beings kept restless struggle to preserve their and tribal lives. However, humans in prehistoric ages did not learn how to build strong house and how to fortify their residence, so they relied on their protection to the nature and use caves as protection and refuge in cold days. Through the history of man, human has been establishing various protection methods to protect himself and his tribe's life and assets. Physical security methods are set in the base of these security methods. Those caves that primitive men resided was rounded with rock wall except entrance, so safety was guaranteed especially by protection for tribes in all directions. The Great Wall of China that is considered as the longest building in the history was built over one hundred years from about B.C. 400 to prevent the invasion of northern tribes, but this wall enhanced its protection function to small invasions only, and Mongolian army captured the most part of China across this wall by about 1200 A.D. European lords in the Middle Ages built a moat by digging around of castle or reinforced around of the castle by making bascule bridge, and provided these protections to the resident and received agricultural products cultivated. Edwin Holmes of USA in 20 centuries started to provide innovative electric alarm service to the development of the security industry in USA. This is the first of today's electrical security system, and with developments, the security system that combined various electrical security system to the relevant facilities takes charging most parts of today's security market. Like above, humankind established various protection methods to keep life in the beginning and its development continues. Today, modern people installed CCTV to the most facilities all over the country to cope with various social pathological phenomenon and to protect life and assets, so daily life of people are protected and observed. Most of these physical security systems are installed to guarantee our safety but we pay all expenses for these also. Therefore, establishing effective physical security system is very important and urgent problem. On this study, it is suggested methods of establishing effective physical security system by using system integration on the principle of security design about effective security system's effective establishing method of physical security system that is increasing rapidly by needs of modern society.

  • PDF

Analyzing vocational outcomes of people with hearing impairments : A data mining approach (청각장애인의 취업결정요인 분석 연구 -데이터마이닝 기법(Exhaustive CHAID)의 적용)

  • Shin, Hyun-Uk
    • Journal of Digital Convergence
    • /
    • v.13 no.11
    • /
    • pp.449-459
    • /
    • 2015
  • The purpose of this study was to examine demographic, human capital and service factors affecting employment outcomes of people with hearing impairments. The total of 422 individuals (age from 20 years to 65 years) with hearing impairments were collected from the Panel Survey of Employment for the Disabled from Korea Employment Agency for the Disabled. The dependent variable is employment outcomes. The predictor variables include a set of personal history, human capital and rehabilitation service variables. The chi-squared automatic interaction detector (CHAID) analysis revealed that the status of the national basic livelihood security played a determining role in predicting the employment of people with hearing impairments. Also, it was found that the three factors of the status on the national basic livelihood security, needed help about activities of dailey living, licenses & employment service factors created bigger synergy effect when they inter-complemented one another.

Design and Implementation of Container Security Device(CSD) based on IEEE standards 802.15.4b (IEEE 표준 802.15.4b 기반컨테이너 보안장치(CSD) 시스템 구현 및 검증)

  • Lee, Eun-Kyu;Shon, Jung-Rock;Choi, Sung-Pill;Moon, Young-Sik;Kim, Jae-Joong;Choi, Hyung-Rim
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.15 no.7
    • /
    • pp.1613-1620
    • /
    • 2011
  • CSD is IEEE Stan없rd 802.15.4b based Container Security Device which is proposed by the U.S Department of Home Security. It is mounted inside the container to sense opening of the container door. ConTracer is the CSD which is developed in this research whose major features are sensing door opening status as well as history inquiring on internal environment and shock to the container by mounting the temperature/humidity/shock sensors. Moreover, its RFID frequency bandwidth uses 2.4GHz 10 correspond actively to the radio regulations used by different countries. This. paper introduces the development trend of CSD, compares the ConTracer which is developed thru this research and other company's CSD, and introduces CSD System which is designed and established using ConTracer. Finally, the implemented CSD System is verified by applying the demonstration service to container distribution between Korea and Japan.

A Study on The Development of Container Security Device(CSD) based on Active RFID (능동형 RFID 기반 컨테이너 보안 장치(CSD)의 개발에 관한 연구)

  • Choi, Hyung-Rim;Kim, Jae-Joong;Kang, Moo-Hong;Shin, Joong-Jo;Shon, Jung-Rock;Moon, Young-Sik;Lee, Eun-Kyu
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.35 no.2B
    • /
    • pp.244-251
    • /
    • 2010
  • CSD is Active RFID based Container Security Device which is proposed by the U.S Department of Home Security. It is mounted inside the container to sense opening of the container door. ConTracer is the CSD which is developed in this research whose major features are sensing door opening status as well as history inquiring on internal environment and shock to the container by mounting the temperature/humidity/shock sensors. Moreover, its RFID frequency bandwidth uses 433MHz and 2.4GHz to correspond actively to the radio regulations used by different countries. This paper introduces the development trend of CSD, compares the ConTracer which is developed thru this research and other company's CSD, and introduces CSD System which is designed and established using ConTracer. Finally, the implemented CSD System is verified by applying the demonstration service to container distribution between Korea and China.