• Title/Summary/Keyword: digital environments

Search Result 1,159, Processing Time 0.027 seconds

Personal Information Management System (PIMS) improvement research using cloud computing security (개인정보관리체계계(PIMS)를 이용한 클라우드컴퓨팅 개인정보 보안 개선 방안 연구)

  • Jeong, Hyein;Kim, Seongjun
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.12 no.3
    • /
    • pp.133-155
    • /
    • 2016
  • Recently, in the adoption of cloud computing are emerging as locations are key requirements of security and privacy, at home and abroad, several organizations recognize the importance of privacy in cloud computing environments and research-based transcription and systematic approach in progress have. The purpose of this study was to recognize the importance of privacy in the cloud computing environment based on personal information security methodology to the security of cloud computing, cloud computing, users must be verified, empirical research on the improvement plan. Therefore, for existing users of enhanced security in cloud computing security consisted framework of existing cloud computing environments. Personal information protection management system: This is important to strengthen security for existing users of cloud computing security through a variety of personal information security methodology and lead to positive word-of-mouth to create and foster the cloud industry ubiquitous expression, working environments.

Global Recovery Management Protocol for Heterogeneous System in Security Environments (보안환경에서 이질형 시스템의 전역 복구 관리 프로토콜)

  • Jeong, Hyun Cheol
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.5 no.4
    • /
    • pp.51-59
    • /
    • 2009
  • Many failures are due to incorrectly programmed transactions and data entry errors. System failure causes the loss or corruption of the contents of volatile storage. Although global processing protects data values to detect direct or indirect information effluence, security environments are very important in the recovery management of heterogeneous systems. Although transaction can't control system fault, the restart for the system can cause information effluence by low bandwith. From various faults, it is not easy to maintain the consistency and security of data. This paper proposes recovery management protocols to assure global multilevel secure one-copy quasi-serializability in security environments of heterogeneous systems with replicated data and proves its correctness. The proposed secure protocols guarantee the reliability and security of system when the system fault is happened.

A Study on Security Framework in Digital Home Environments (디지털홈 환경에서의 보안 프레임워크 연구)

  • 김도우;한종욱;주홍일;이윤경
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2004.05b
    • /
    • pp.724-727
    • /
    • 2004
  • With the development of modem communication and networking technology, more and more computing and communication facilities, automation equipments, hone information appliances and different type of networking terminals come into home all over the world. The user can control information appliances in home environments. The home environment can communicate with the external network via phone line, wired LAN, wireless LAN, or mixed. However, home information appliances that are connected to the external network are under attack and need to be secured. So specifying suitable security requirements and policies for digital home environment is critical in hone networking environments. This paper analyzes the possible vulnerability to home network, and specifies the security requirements derived from the vulnerability analysis for digital home environment

  • PDF

The Comparative Error Performance of Digital Communication System in Gaussian/Non Gaussian Nolse and Fading Environments (가우스성/비가우스성 잡음과 페이딩 환경하에서의 제반 디지틀 통신방식의 오율특성)

  • 김현철;조성준
    • Proceedings of the Korean Institute of Communication Sciences Conference
    • /
    • 1987.04a
    • /
    • pp.223-229
    • /
    • 1987
  • The error rate eqations of digital modulated signals transmitted through the fading cdannel have been derived in the Gaussian/Impulsive noise environments Whing the derived equations for the error drobadillties of ASK, QAM, FSK, MSK, PSK, and DPSK signais, the error tate performance of digital modulation systems have been evaluated and represented in the graghes as parameters of carrier to \ulcornernoise power ratio (CNR) and fading figures The results show that in the fading environenet the error is occurred more frequently by gaussian noise in the deep fading Howerer in the shallow fading lmpulsive noise is more domiant than gaussian nosie in occurring the error

  • PDF

Using Grounded Theory Techniques for Reviewing Literature: Shadow Work in Digital Environment (문헌 고찰을 위한 근거이론방법의 활용: 디지털 환경에서의 그림자 노동 개념 도출)

  • Park, Sangcheol;Lee, Woong-Kyu
    • Knowledge Management Research
    • /
    • v.20 no.2
    • /
    • pp.183-195
    • /
    • 2019
  • The objective of this paper is to present how to use Grounded Theory Methodology for conducting a literature review that produces new insights and conceptualizations. In this paper, we have employed Wolfswinkel et al.(2013)'s method, which is called by Grounded Theory Literature-Review Method, for a rigorous literature review. We have utilized this method to capture the concept and insights of individuals' shadow wok in digital environments. By analyzing the relevant literature based on Wolfswinkel et al.'s guide, we have extracted 73 codes in the coding steps and finally showed 12 categories by incorporating similar concepts from those codes. Based on the categories, we end this paper by developing the academic definitions of shadow work in digital environments.

A Study on Self Repairing for Fast Fault Recovery in Digital System by Mimicking Cell

  • Kim, Soke-Hwan;Hur, Chang-Wu
    • Journal of information and communication convergence engineering
    • /
    • v.9 no.5
    • /
    • pp.615-618
    • /
    • 2011
  • Living cells generate the cell cycle or apoptosis, depending on the course will be repeated. If an error occurs during this period of life in order to maintain the cells in the peripheral cells find the error portion. These cellular functions were applied to the system to simulate the circuit. Circuit implementation of the present study was constructed the redundant structure in order to found the error quickly. Self-repairing of digital systems as an advanced form of fault-tolerance has been increasingly receiving attention according as digital systems have been more and more complex and speed-up especially for urgent systems or those working on extreme environments such as deep sea and outer space. Simulating the process of cell differentiation algorithm was confirmed by the FPGA on the counter circuit. If an error occurs on the circuit where the error was quickly locate and repair. In this paper, we propose a novel self-repair architecture for fast and robust fault-recovery that can easily apply to real, complex digital systems. These Self-Repairing Algorithms make it possible for the application digital systems to be alive even though in very noisy and extreme environments.

The Design of Web-Linked Digital Map for LBS/GIS Service (LBS/GIS 서비스를 위한 웹 연동 수치지도 설계)

  • Park Sung-Seok;Kim Chang-Soo
    • Journal of Korea Multimedia Society
    • /
    • v.8 no.8
    • /
    • pp.1023-1031
    • /
    • 2005
  • LBS(Location Based Service) and GIS (Geographic Information System) are supporting necessary services for system which provides geographic information using location information based on various platforms. However the mobile computing environments such as PDA system have serious limitations in functional viewpoints compare of general computing environments, it has problems for developing GIS system which is providing various information. In this paper, we suggest the reduced methods of digital map and format of web-linked digital mao in order to fit in mobile environment. As a result of map generation, the total capacity of the supported digital map was diminished about $99.34\%$ than the original map.

  • PDF

An exploratory study on the interaction between luxury brands and customers in service encounters (서비스 접점에서 럭셔리 브랜드와 고객과의 상호작용에 관한 탐색적 연구)

  • Minjung, Cho;Eunju, Ko
    • Journal of Fashion Business
    • /
    • v.26 no.5
    • /
    • pp.49-61
    • /
    • 2022
  • Advancements in technology and the proliferation of digital services have highlighted the importance of luxury brands in service environments. Based on the social exchange theory, this study investigated the interaction between customers and luxury brands in a traditional offline service encounter and a digital online service encounter. The interaction area was classified into three parts: human-human, human-digital, and human-physical environments. We qualitatively investigated the practitioners' working experiences with luxury brands. The study determined that both online and offline service encounter interactions between luxury brands and customers have become diverse. First, forming a special relationship with customers and frontline employees in traditional service encounters is important. Second, luxury brands should focus on the interaction among customers. Third, various digital tools should be considered to provide information about the brand to customers. Fourth, the exclusive benefits of offline service encounters should be maximized to stimulate positive experiences. The findings provide valuable insight to scholars and marketers on the new interaction phase between customers and luxury brands in the digital age.

A Study to Suggest a Method to Evaluate Light Environment Energy Performance based on Actual Residence Environments (실거주환경 기반 빛환경 에너지 성능평가 방법 제안 연구)

  • Gim, Sang-Hoon;Lee, Heang-Woo;Kim, Yong-Seong
    • Journal of The Korean Digital Architecture Interior Association
    • /
    • v.13 no.4
    • /
    • pp.33-39
    • /
    • 2013
  • As lighting energy consumption in buildings occupies high ratio, technical researches to solve it have been constantly carried out. However, basic studies on light environment performance evaluation is actually deficient and only at a level of a simple illumination monitoring. Thus, this study has suggest a light environment energy performance evaluation based on actual residence environments to allow setting lighting interoperation and user required illumination. Conclusions from the study are as follows: 1) As the performance evaluation suggested by this study has not only derived lighting energy usage as well as monitored simple indoor illumination distribution, it is quantitative and allows derivation of visual results. 2) The performance evaluation suggested by this study allows inputs of user required illumination through the performance evaluation server, which is able to support for performance evaluations for various works and users. 3) This study has verified validity of the performance evaluation method by analyzing results of lighting energy reduction by executing performance evaluation on changes of light shelf that is a natural lighting system through the suggested performance evaluation method. This study is significant from a viewpoint that it has suggested a quantitative performance evaluation method on the basis of actual residence environments. Those researches concerned on the energy performance evaluation should be constantly progressed from an aspect that they are another solution of the energy problems.

Design and Estimation of a Session Key based Access Control Scheme for Secure Communications in IoT Environments (IoT 환경에서 안전한 통신을 위한 세션 키 기반 접근 제어 기법의 설계 및 평가)

  • Jin, Byungwook;Jung, Dongwoog;Cha, Siho;Jun, Moonseog
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.12 no.1
    • /
    • pp.35-41
    • /
    • 2016
  • Internet of Things (IoT) services are widely used in appliances of daily life and industries. IoT services also provide various conveniences to users and are expected to affect value added of all industries and national competitiveness. However, a variety of security threats are increased in IoT environments and lowers reliability of IoT devices and services that make some obstacles for commercialization. The attacks arising in IoT environments are making industrial and normal life accidents unlike existing information leak and monetary damages, and can expand damage scale of leakage of personal information and privacy more than existing them. To solve these problems, we design a session key based access control scheme for secure communications in IoT environments. The proposed scheme reinforces message security by generating session key between device and access control network system. We analyzed the stability of the proposed access scheme in terms of data forgery and corruption, unauthorized access, information disclosure, privacy violations, and denial of service attacks. And we also evaluated the proposed scheme in terms of permission settings, privacy indemnity, data confidentiality and integrity, authentication, and access control.