• Title/Summary/Keyword: Security Strategies

Search Result 620, Processing Time 0.023 seconds

The Effect of Active Aging on the Life Satisfaction in Elderly People (고령자의 활동적 노화가 삶의 만족도에 미치는 영향요인)

  • Yu, Chae-nam
    • 한국노년학
    • /
    • v.36 no.4
    • /
    • pp.1075-1088
    • /
    • 2016
  • This study aimed to identify the effect of the active aging on life satisfaction and present an improvement strategies to increase life satisfaction in elderly people. Active aging is divide into three aspects; health, participation and security. The subjects were people older than 55 years who were enrolled in Korean Retirement and Income Study. The influencing effect was analyzed by a hierarchial regression. Key factors associated with active aging influencing life satisfaction were subjective health, mental health, participation in the labor market, income, and housing while subjective health was a determinant factor that best describes the effect of the active aging on life satisfaction. On the basis of above result, this study suggests that there needs to be an effort in improvement of physical and mental health, participation in the labor market, and housing at national and regional levels.

Real-Time Detection of Cache Side-Channel Attacks Using Non-Cache Hardware Events (비 캐시 하드웨어 이벤트를 이용한 캐시 부채널 공격 실시간 탐지)

  • Kim, Hodong;Hur, Junbeom
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.6
    • /
    • pp.1255-1261
    • /
    • 2020
  • Cache side-channel attack is a class of attacks to retrieve sensitive information from a system by exploiting shared cache resources in CPUs. As the attacks are delivered to wide range of environments from mobile systems to cloud systems recently, many detection strategies have been proposed. Since the conventional cache side-channel attacks are likely to incur tremendous number of cache events, most of the previous detection mechanisms were designed to carefully monitor mostly cache events. However, recently proposed attacks tend to incur less cache events during the attack. PRIME+ABORT attack, for example, leverages the Intel TSX instead of accessing cache to measure access time. Because of the characteristic, attack detection mechanisms based on cache events may hardly detect the attack. In this paper, we conduct an in-depth analysis of the PRIME+ABORT attack to identify the other useful hardware events for detection rather than cache events. Based on our finding, we present a novel mechanism called PRIME+ABORT Detector to detect the PRIME+ABORT attack and demonstrate that the detection mechanism can achieve 99.5% success rates with 0.3% performance overhead.

A Study on the Safe Use of Data in the Digital Healthcare Industry Based on the Data 3 Act (데이터 3법 기반 디지털 헬스케어 산업에서 안전한 데이터 활용에 관한 연구)

  • Choi, Sun-Mi;Kim, Kyoung-Jin
    • Journal of the Korea Convergence Society
    • /
    • v.13 no.4
    • /
    • pp.25-37
    • /
    • 2022
  • The government and private companies are endeavoring to help the digital healthcare industry grow. This includes easing regulations on the big data industry such as the amendment of the Data 3 Act. Despite these efforts, however, there have been constant demands for the amendment of laws related to the medical field and for securing medical data transmissions. In this paper, the Data 3 Act of Korea and the legal system related to healthcare are examined. Then the legal, institutional, and technical aspects of the strategies are compared to understand the issues and implications. Based on this, a legal and institutional strategy suitable for the digital healthcare industry in Korea is suggested. Additionally, a direction to improve social perception along with technical measures such as safe de-identification processing and data transmission are also proposed. This study hopes to contribute to the spread of various convergent industries along with the digital healthcare industry.

Latest Information Technologies in the UK Adults Education System

  • Tverezovska, Nina;Bilyk, Ruslana;Rozman, Iryna;Semerenko, Zhanna;Orlova, Nataliya;Vytrykhovska, Oksana;Oros, Ildiko
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.8
    • /
    • pp.25-34
    • /
    • 2022
  • Today, further education of adults in the UK is one of the developing areas of continuing education. The Open University with distance learning, in the process of which innovative forms and methods based on computer and telecommunication technologies are used, is particularly successful in the organization of additional education of the adult population. The advantages of distance learning, multimedia - the latest information technologies, which provide the combination of graphic images, video, sound with the help of modern computer tools, are noted. The basic principles and forms underlying the technologies and forms of work with the elderly are defined. The international experience of implementing "Universities of the Third Age" is summarized. The most widespread approach in adult education in Great Britain is informational. The use of computer technologies motivates a new paradigm in educational methods and strategies, which requires new approaches, forms of learning, and innovative ways of delivering educational materials to adult learners. Information technologies have gained great popularity in such activities as distance learning, online learning, assistance in the education management system, development of programs and virtual textbooks in various subjects, online search for information for the educational process, computer testing of students' knowledge, creation of electronic libraries, formation of a single scientific electronic environment, publication of virtual magazines and newspapers on pedagogical topics, teleconferences, expansion of international cooperation in the field of Internet education. The information technology of synchronous distance learning "online" has gained considerable popularity in the educational process today. A promising direction is the use of multimedia technologies in educational activities to create a design of a virtual computer environment by decoding audiovisual information.

Potential Risks Associated with eSportsmen Activities: an Empirical Study

  • Bonkalo, Tatyana I.;Stepanova, Olga N.;Latushkina, Elena N.;Kozlyatnikov, Oleg A.;Kumancova, Elizaveta S.
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.8
    • /
    • pp.280-284
    • /
    • 2022
  • The purpose of the study was to identify the level of development of gaming disorder among e-sportsmen as a potential risk of their activity. Three groups were formed for the study. The first group consisted of 102 e-sportsmen aged between 18 and 32; the second group consisted of boys of the same age who, according to preliminary questionnaires, played computer games fairly frequently - at least once a week (n = 102); the third group consisted of individuals of the same gender and age, but who did not share a passion for computer games (n = 102). The study was performed using semi-structured interview during which the respondents filled out the Computer gaming disorder questionnaire developed and tested by O.M. Vidova under our supervision. Our study showed that among 102 e-sportsmen, 82,3% did not have any computer gaming disorder, only some tendency thereto. While 17,6% of e-sportsmen were characterized by a pronounced gaming disorder. E-sportsmen who prefer strategies, less than all other e-sportsmen, tend to escape from reality and accept the game role, to express their emotions through the game, and in general have the lowest level of dependence on games. Additionally, strategic e-sportsmen are most likely to study the game thoroughly and to develop themselves with it. Many Starcraft e-sportsmen tend to explore the possibilities of the game in detail and, at the same time, protect themselves from escaping into virtual reality. The risk of computer gaming disorder among e-sportsmen is largely determined by their sports achievements, the type of sports activity (individual or team), and genre of the preferred computer game.

Improving Public Medical and Social Services Market Management: Application of Information Technologies

  • Barzylovych, Anastasiia;Malinina, Olena;Gnyloskurenko, Ganna;Borysiuk, Iryna;Yuriy, Rayisa
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.7
    • /
    • pp.257-266
    • /
    • 2021
  • This article examines the features of improving the public management of the market of medical and social services using information technology to improve the efficiency of public activity in modern conditions. The interpretation of the essence of the categories "information technologies" and "information support" is analyzed. The importance of the organization of information support of public authorities in the insurance of the state apparatus of information management for the adoption and solution of state issues of the market of medical and social services has been studied. Issues and system of information support of public management of the market of medical and social services are considered. The stages of the ICT implementation process in the market of medical and social services are described. The tools of state regulation in the market of medical and social services and the introduction of targeted programs for the development of the social sphere and health care are highlighted. Recommendations for improvement are formulated public management of the market of medical services and social way introduction of ICT tools, which provide for the implementation of a set of measures aimed at intellectualizing the entire system public data management spheres. The necessity of development of innovative tools of public management of the market of medical and social services of Ukraine for the purpose of working out of strategies of increase of quality of medical and social services in the XXI century is substantiated. A number of benefits from the implementation of an effective process of application of information support of public management of the market of medical and social services to ensure the efficiency of public authorities of Ukraine. It is proposed to create a "Department of information support of self-government" and electronic health care system (e-Health) to improve the management decision-making process, which will provide an opportunity to accumulate, process, analyze, and as a result, get the expected effect in the form of balanced management decisions by public authorities of Ukraine.

Outsourcing as a Modern Form of International Labor Division

  • Kiptenko, Viktoriia;Razumova, Oleksandra;Boriushkina, Oksana;Romanova, Vera;Negoda, Anna
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.8
    • /
    • pp.43-50
    • /
    • 2021
  • For the implementation of innovative products or services companies use different innovation strategies, in particular, outsourcing is quite widespread, given the high level of specialization and professionalism of companies that provide such services. The aim of this article was to evaluate the link between outsourcing of innovative activities and indicators of companies' efficiency. The methodology of the research includes the methods of correlation analysis and regression analysis to reveal the correlation between the use of outsourcing of innovative products and services and the turnover of the EU enterprises. The results show a high level of innovative activity of EU enterprises (50.3% innovatively active). Innovative business processes are the most widespread form of innovation activity (41% of enterprises implement business processes, and the indicator is higher than 41% in the most developed EU countries). The turnover of enterprises with new or substantially improved products was found to grow by 10.92% for the period 2016-2018. The correlation analysis shows weak direct links between the indicator of turnover growth and the number of enterprises that have independently implemented innovations, or have implemented innovations jointly with third-party companies, or using outsourcing services. The highest level of direct connection was found between the growth of turnover of enterprises that launched a new product for the market and the growth of the number of enterprises that implemented innovations with the involvement of organizations (correlation 0.273). Based on the regression analysis it was found that with a 1% change in the growth rate of the number of innovation-active enterprises, the growth rate of turnover from new or improved products increased by 5.67%. At the same time, with a 1% change in the growth rate of the number of enterprises that implement innovation through outsourcing, the growth rate of turnover from new or improved products will increase by 7.15%.

Anglicisms in the Field of Information Technology: Analysis of Linguistic Features

  • Antonina, Plechko;Tetiana, Chukhno;Tetiana, Nikolaieva;Liliia, Apolonova;Tetiana, Leleka
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.4
    • /
    • pp.183-192
    • /
    • 2022
  • The role that English currently plays is undeniable. It has become the most common means of communication among native speakers of several languages around the world. English penetrates into all areas of people's daily lives. In the field of Information Technology (IT), English has taken a dominant position, as many of the terms used on a daily basis are written in English. The purpose of the article is to analyze the linguistic features of anglicisms in the field of Information Technology. Methods. The research is based on systematic and comparative analysis, dialectical method, as well as methods of classification and generalization. Results. This study presents the results of compiling a multilingual glossary with anglicisms used in the GitHub and 3D Slicer fields. Despite the limited number of terms included in the glossary, the article provides a lot of evidence for the influence of the English language in the areas of Information Technology, GitHub and 3D Slicer under consideration. The types of anglicisms used in the 3D Slicer area seem to be more diverse than in the GitHub area. This study found that five European languages use language strategies to solve any communication problem. The multilingual glossary showed that in some cases there is a coexistence between Anglicism and the native term. In other cases, the English term is the only one used in different languages. There are cases when only the native language is used. Conclusions. This study is a useful tool that helps to improve the efficiency of communication between engineers and technicians who speak different native languages. The ultimate goal of this research will be to create a multilingual glossary that is still under development and is likely to cover other IT areas such as Python and VTK.

Ensuring the Quality of Higher Education in the United Kingdom Using Informatization

  • Andreikova, Iryna;Moiseienko, Natalia;Boichuk, Petro;Iliichuk, Liubomyra;Fedchenko, Karina;Bezliudnyi, Oleksandr;Sopivnyk, Ruslan
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.11
    • /
    • pp.324-330
    • /
    • 2022
  • The United Kingdom is known for the quality of its qualifications. There is a strict quality system with reputable bodies responsible for ensuring that high quality standards are met. In order for new qualifications to be accredited, they must meet all the requirements set out in the regulations for the quality and informatization of Education. The crucial role of the Agency for Quality Assurance of Higher Education (QAA) in the UK for creating high-quality management of higher education institutions is revealed, the influence of informatization tools on its effective mechanism as an independent entity is shown, and positive experience for the educational sector is highlighted. While the universities themselves are responsible for reviewing educational programs at the subject level, the QAA review focuses on verifying internal quality assurance, as well as systems and improvement strategies. The QAA uses a peer review process in which teams mostly consist of academic staff from other institutions to assess the quality of the institution's education. In Scotland, the team also includes an international reviewer. The student is also a member of the Scottish teams. In the UK, attention is paid to providing a cohort of experienced reviewers who can conduct high-quality monitoring and help with advice on improving education. All reviewers must complete training and have permission to participate in the review of educational programs. There are selected committees that are members of the QAA council, each of which is headed by a member of the Council or an independent person approved by the Council. Attention is drawn to the main areas of the QAA's work in the framework of environmental, social and corporate governance.

Analysis of Cybercrime Investigation Problems in the Cloud Environment

  • Khachatryan, Grigor
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.7
    • /
    • pp.315-319
    • /
    • 2022
  • Cloud computing has emerged to be the most effective headway for investigating crime especially cybercrime in this modern world. Even as we move towards an information technology-controlled world, it is important to note that when innovations are made, some negative implications also come with it, and an example of this is these criminal activities that involve technology, network devices, and networking that have emerged as a result of web improvements. These criminal activities are the ones that have been termed cybercrime. It is because of these increased criminal activities that organizations have come up with different strategies that they use to counter these crimes, and one of them is carrying out investigations using the cloud environment. A cloud environment has been defined as the use of web-based applications that are used for software installation and data stored in computers. This paper examines problems that are a result of cybercrime investigation in the cloud environment. Through analysis of the two components in play; cybercrime and cloud environment, we will be able to understand what are the problems that are encountered when carrying out investigations in cloud forensics. Through the use of secondary research, this paper found out that most problems are associated with technical and legal channels that are involved in carrying out these investigations. Investigator's mistakes when extracting pieces of evidence form the most crucial problems that take a lead when it comes to cybercrime investigation in the cloud environment. This paper not only flags out the challenges that are associated with cybercrime investigation in cloud environments but also offer recommendations and suggested solutions that can be used to counter the problems in question here. Through a proposed model to perform forensics investigations, this paper discusses new methodologies solutions, and developments for performing cybercrime investigations in the cloud environment.