• Title/Summary/Keyword: data policy

Search Result 11,187, Processing Time 0.03 seconds

A Study on Public Data Quality Factors Affecting the Confidence of the Public Data Open Policy (공공데이터 품질 요인이 공공데이터 개방정책의 신뢰에 미치는 영향에 관한 연구)

  • Kim, Hyun Cheol;Gim, Gwang Yong
    • Journal of Information Technology Services
    • /
    • v.14 no.1
    • /
    • pp.53-68
    • /
    • 2015
  • This article aims to identify the quality factors of public data which have increased as a public issue; analyze the impact of users satisfaction in the perspective of Technology Acceptance Model (TAM), and investigate the effect of service satisfaction on the government's open policy of public data. This study is consistent with Total Data Quality Management (TDQM) of MIT, it focuses on three main qualities except Contextual Data Quality (CDQ) and includes seven independent variables : accuracy, reliability, fairness for Intrinsic Data Quality (IDQ), accessibility, security for Accessibility Data Quality (ADQ), Consistent representation and understandability for Representational Data Quality (RDQ). Basing on TAM, the research model was conducted to examine which factors affect to perceived usefulness, perceived ease of use, service satisfaction and how service satisfaction affects to the government's open policy of public data. The results showed that accuracy, fairness, understandability affect both perceived ease of use and perceived usefulness; while reliability, consistent representation, security, and accessibility affect only perceived ease of use. This article found that the influence of perceived ease of use on perceived usefulness and the influence of these two causes on service satisfaction in the perspective of TAM were significant and it was consistent with prior studies. The service satisfaction when using public data leads to the reliability of public data open policy. As an initial study on unstructured public data open policy, this article offered quality factors that pubic data providers should consider and also present the operation plan of public data open policy in the future.

Sharing and Privacy in PHRs: Efficient Policy Hiding and Update Attribute-based Encryption

  • Liu, Zhenhua;Ji, Jiaqi;Yin, Fangfang;Wang, Baocang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.1
    • /
    • pp.323-342
    • /
    • 2021
  • Personal health records (PHRs) is an electronic medical system that enables patients to acquire, manage and share their health data. Nevertheless, data confidentiality and user privacy in PHRs have not been handled completely. As a fine-grained access control over health data, ciphertext-policy attribute-based encryption (CP-ABE) has an ability to guarantee data confidentiality. However, existing CP-ABE solutions for PHRs are facing some new challenges in access control, such as policy privacy disclosure and dynamic policy update. In terms of addressing these problems, we propose a privacy protection and dynamic share system (PPADS) based on CP-ABE for PHRs, which supports full policy hiding and flexible access control. In the system, attribute information of access policy is fully hidden by attribute bloom filter. Moreover, data user produces a transforming key for the PHRs Cloud to change access policy dynamically. Furthermore, relied on security analysis, PPADS is selectively secure under standard model. Finally, the performance comparisons and simulation results demonstrate that PPADS is suitable for PHRs.

Deduction of the Policy Issues for Activating the Geo-Spatial Big Data Services (공간 빅데이터 서비스 활성화를 위한 정책과제 도출)

  • Park, Joon Min;Lee, Myeong Ho;Shin, Dong Bin;Ahn, Jong Wook
    • Spatial Information Research
    • /
    • v.23 no.6
    • /
    • pp.19-29
    • /
    • 2015
  • This study was conducted with the purpose of suggesting the improvement plan of political for activating the Geo-Spatial Big Data Services. To this end, we were review the previous research for Geo-Spatial Big Data and analysis domestic and foreign Geo-Spatial Big Data propulsion system and policy enforcement situation. As a result, we have deduced the problem of insufficient policy of reaction for future Geo-Spatial Big Data, personal information protection and political basis service activation, relevant technology and policy, system for Geo-Spatial Big Data application and establishment, low leveled open government data and sharing system. In succession, we set up a policy direction for solving derived problems and deducted 5 policy issues : setting up a Geo-Spatial Big Data system, improving relevant legal system, developing technic related to Geo-Spatial Big Data, promoting business supporting Geo-Spatial Big Data, creating a convergence sharing system about public DB.

The big data analysis framework of information security policy based on security incidents

  • Jeong, Seong Hoon;Kim, Huy Kang;Woo, Jiyoung
    • Journal of the Korea Society of Computer and Information
    • /
    • v.22 no.10
    • /
    • pp.73-81
    • /
    • 2017
  • In this paper, we propose an analysis framework to capture the trends of information security incidents and evaluate the security policy based on the incident analysis. We build a big data from news media collecting security incidents news and policy news, identify key trends in information security from this, and present an analytical method for evaluating policies from the point of view of incidents. In more specific, we propose a network-based analysis model that allows us to easily identify the trends of information security incidents and policy at a glance, and a cosine similarity measure to find important events from incidents and policy announcements.

Effect of Liquidity, Profitability, Leverage, and Firm Size on Dividend Policy

  • PATTIRUHU, Jozef R.;PAAIS, Maartje
    • The Journal of Asian Finance, Economics and Business
    • /
    • v.7 no.10
    • /
    • pp.35-42
    • /
    • 2020
  • This study aims to investigate the relationship between the variables of Current Ratio (CR), Return-on-Equity (ROE), Return-on-Assets (ROA), Debt-to-Equity Ratio (DER), and Firm Size (FS) on Dividend Policy (DP) in real estate and property companies listed on the Indonesia Stock Exchange in the period 2016-2019, looking at nine real estate companies in Indonesia. The research methodology uses an explanatory analysis approach and linear regression. Based on the eligibility and homogeneity of the data, the number of sample companies selected was nine companies. The company's financial statement data derived from primary data obtained on the Indonesia Stock Exchange, such as current ratio (CR), return-on-equity (ROE), return-on-assets (ROA), debt-to-equity ratio (DER) and firm size and dividend policy variables. The data analysis procedure is first to transform financial data from the original ratio data into interval data and, then, transform it to ordinal data. Furthermore, the validity and reliability process are ignored because the data is primary. Finally, regression testing is part of the hypothesis testing stage. The results of this study showed that the CR, ROE, and firm size had no positive and significant effect on dividend policy. In contrast, DER and ROA have a positive and significant impact on dividend policy.

On-Demand Broadcasting for Healthcare Services using Time-Parameterized Replacing Policy

  • Im, Seokjin
    • International journal of advanced smart convergence
    • /
    • v.9 no.2
    • /
    • pp.164-172
    • /
    • 2020
  • The interest and importance of the convergence services for healthcare expand more and more as the average life expectancy increases. Convergence of ICT and healthcare technology unfold efficient and quick health services. Recently, healthcare services provide to clients with apps over web. On-demand wireless data broadcast supports any number of clients to access their desired data items dynamically by responding the needs for data items from the clients. In this paper, we propose an on-demand system to broadcast FHIR bundles for efficient healthcare services. We use time-parameterized replacing policy for renewing the bundle items on the wireless broadcast channel. The policy lets the on-demand broadcasting dynamic by controlling the time duration for the bundles to reside over the wireless channel. With simulation studies using an implemented testbed, we evaluate the performances of the proposed system in access time and tuning time. For evaluation, we compare the time-parameterized replacing policy of the proposed system with regular-number replacing policy. The proposed time-parameterized replacing policy shows shorter access time than the regular-number replacing policy because the policy responds more actively and dynamically to the change of the needs of the clients for FHIR bundles.

Comparative Analysis of National Policies for Open Data Government Ecosystem (공공데이터 생태계 조성을 위한 주요 국가별 정책에 관한 비교 분석)

  • Song, Seokhyun;Lee, Jai Yong
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.41 no.1
    • /
    • pp.128-139
    • /
    • 2018
  • As The Fourth Industrial Revolution and Intelligent Information Age came into full-scale, the policy of open government data has become a hot topic for each country. The United States, the United Kingdom, and other countries are shifting policy direction to "creating value" of open government data. Also, in the age of the digital economy where the data market is soaring, open government data is gradually being recognized as a new raw material for new business and start-ups. In addition, Korea ranked first in the OECD open government data evaluation twice in a row, and was highly evaluated in the international evaluation. However, domestic firms are still lacking in qualitative openness of government data, data is dispersed among institutions, lack of public-private data linkage, and development of app-oriented development. This study attempts to analyze major national policies for the creation of a data ecosystem that considers data lifecycle, from production to storage, distribution and utilization of data. First, the target countries were the leading public data countries among the OGP member countries, the USA, the UK, Australia and Canada. The results of this study are as follows. As a result of analyzing the results and comparing Korea's policies, it was concluded that most of Korea is superior in open government data policy. However, improvement of data quality, development of open data portal as an open platform, support for finding various users including apps and web development companies, and cultivation of open government data utilizing personnel are analyzed as policy issues. In addition, the direction of policy for the balanced ecosystem of Korea is presented together.

Kerberos Authentication Deployment Policy of US in Big data Environment (빅데이터 환경에서 미국 커버로스 인증 적용 정책)

  • Hong, Jinkeun
    • Journal of Digital Convergence
    • /
    • v.11 no.11
    • /
    • pp.435-441
    • /
    • 2013
  • This paper review about kerberos security authentication scheme and policy for big data service. It analyzed problem for security technology based on Hadoop framework in big data service environment. Also when it consider applying problem of kerberos security authentication system, it analyzed deployment policy in center of main contents, which is occurred in commercial business. About the related applied Kerberos policy in US, it is researched about application such as cross platform interoperability support, automated Kerberos set up, integration issue, OPT authentication, SSO, ID, and so on.

Analyzing data-related policy programs in Korea using text mining and network cluster analysis (텍스트 마이닝과 네트워크 군집 분석을 활용한 한국의 데이터 관련 정책사업 분석)

  • Sungjun Choi;Kiyoon Shin;Yoonhwan Oh
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.28 no.6
    • /
    • pp.63-81
    • /
    • 2023
  • This study endeavors to classify and categorize similar policy programs through network clustering analysis, using textual information from data-related policy programs in Korea. To achieve this, descriptions of data-related budgetary programs in South Korea in 2022 were collected, and keywords from the program contents were extracted. Subsequently, the similarity between each program was derived using TF-IDF, and policy program network was constructed accordingly. Following this, the structural characteristics of the network were analyzed, and similar policy programs were clustered and categorized through network clustering. Upon analyzing a total of 97 programs, 7 major clusters were identified, signifying that programs with analogous themes or objectives were categorized based on application area or services utilizing data. The findings of this research illuminate the current status of data-related policy programs in Korea, providing policy implications for a strategic approach to planning future national data strategies and programs, and contributing to the establishment of evidence-based policies.

Implementation of Data Mining Engine for Analyzing Alert Data of Security Policy Server (보안정책 서버의 경보데이터 분석을 위한 데이터마이닝 엔진의 구현)

  • 정경자;신문선
    • Journal of the Korea Society of Computer and Information
    • /
    • v.7 no.4
    • /
    • pp.141-149
    • /
    • 2002
  • Recently, a number of network systems are developed rapidly and network architectures are more complex than before, and a policy-based network management should be used in network system. Especially, a new paradigm that policy-based network management can be applied for the network security is raised. A security policy server in the management layer can generate new policy, delete. update the existing policy and decide the policy when security policy is requested. The security server needs to analyze and manage the alert message received from server Policy enforcement system in the enforcement layer for the available information. In this paper, we implement an alert analyzer that analyze the stored alert data for making of security policy efficiently in framework of the policy-based network security management. We also propose a data mining system for the analysis of alert data The implemented mining system supports alert analyzer and the high level analyzer efficiently for the security.

  • PDF