• Title/Summary/Keyword: information security system

Search Result 6,591, Processing Time 0.035 seconds

A Study on the Current Status and Responses System of Child Abuse

  • Lee, Young-Woo;Jang, Su-Yeon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.27 no.7
    • /
    • pp.109-114
    • /
    • 2022
  • Recently, child abuse cases such as the "16-month death of adopted children" have occurred one after another in our society and have emerged as a serious social problem. Child abuse not only significantly violates children's human rights, but also leaves scars on the child's body and sometimes threatens their lives. As a result, laws related to child abuse have been revised several times and related systems have been reorganized to protect the affected children safely and grow healthy, but child abuse cases continue to occur. Therefore, it is urgent to come up with effective measures to prevent child abuse crimes and protect affected children. Therefore, this study examines the concept and related laws of child abuse, the current status of child abuse, and suggests countermeasures to effectively respond to child abuse compared to the US child abuse legislation and child protection system.

User Response to Mobile Payment System: Emotional, Cognitive, and Behavioral Approaches (모바일 간편결제시스템 사용의 감성적, 인지적, 행동적 반응 과정 연구)

  • Choi, Yoo-Jung;Hwangbo, Hyunwoo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.26 no.8
    • /
    • pp.1158-1164
    • /
    • 2022
  • In this study, the emotional reaction process and the cognitive reaction process were divided into the process of building trust in order to form a continuous use intention in the process of using the mobile simple payment system. We examined the process by which various external factors generate continuous use intentions, that is, behavioral responses through the process of each reaction. External factors were divided into social factors, systemic factors, and social factors. Among them, system factors were social norms and images, and systemic factors were simplicity and accessibility. And the social factors consisted of security and compatibility. And the emotional response was set as pleasure and emotional trust, the cognitive response was cognitive trust, and the final dependent variable was set as continuous use intention. A survey was conducted for model analysis, and the analysis results were derived using PLS.

Measures for Improving Response of Autonomous Police Against Mass Disasters (자치경찰의 대형재난 대응 개선방안)

  • Jae-Min Lee;Jae-Hun Shin
    • Journal of the Society of Disaster Information
    • /
    • v.19 no.3
    • /
    • pp.481-489
    • /
    • 2023
  • Purpose: The purpose of this study is to examine the actual disaster response and suggest improvement measures for introduction of an autonomous police system Method: This study suggests the improvement measures by reviewing police disaster response manual, related statistical data, and statutes comprehensively Result: The introduction of autonomous police system enabled effective management of police based on circumstances of each region. However, there are still doubts on police response against situations that require large number of personnel. According to analysis on roles of autonomous police during the mass disasters, the autonomous police controlled disaster site to prevent secondary damage, prevented additional disaster damages, and rescued people. However, it is hard for the autonomous police to respond against the mass disasters due to its structure. Conclusion: To improve the response of autonomous police against mass disasters, this study suggested on disaster scene control and secondary damage prevention by the police, cooperative disaster response with regional autonomous police, and utilization of control tower.

Video-based Inventory Management and Theft Prevention for Unmanned Stores (재고 관리 및 도난 방지를 위한 영상분석 기반 무인 매장 관리 시스템)

  • Soojin Lee;Jiyoung Moon;Haein Park;Jiheon Kang
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.29 no.1
    • /
    • pp.77-89
    • /
    • 2024
  • This paper presents an unmanned store management system that can provide inventory management and theft prevention for displayed products using a small camera that can monitor the shelves of sold products in small and medium-sized stores. This system is a service solution that integrates object recognition, real-time communication, security management, access management, and mobile authentication. The proposed system uses a custom YOLOv5-x model to recognize objects on the display, measure quantities in real time, and support real-time data communication with servers through Raspberry Pie. In addition, the number of objects in the database and the object recognition results are compared to detect suspected theft situations and provide burial images at the time of theft. The proposed unmanned store solution is expected to improve the efficiency of small and medium-sized unmanned store operations and contribute to responding to theft.

A Study of Fusion Image System and Simulation based on Mutual Information (상호정보량에 의한 이미지 융합시스템 및 시뮬레이션에 관한 연구)

  • Kim, Yonggil;Kim, Chul;Moon, Kyungil
    • Journal of The Korean Association of Information Education
    • /
    • v.19 no.1
    • /
    • pp.139-148
    • /
    • 2015
  • The purpose of image fusion is to combine the relevant information from a set of images into a single image, where the resultant fused image will be more informative and complete than any of the input images. Image fusion techniques can improve the quality and increase the application of these data important applications of the fusion of images include medical imaging, remote sensing, and robotics. In this paper, we suggest a new method to generate a fusion image using the close relation of image features obtained through maximum entropy threshold and mutual information. This method represents a good image registration in case of using a blurring image than other image fusion methods.

Identifying Factors for Corn Yield Prediction Models and Evaluating Model Selection Methods

  • Chang Jiyul;Clay David E.
    • KOREAN JOURNAL OF CROP SCIENCE
    • /
    • v.50 no.4
    • /
    • pp.268-275
    • /
    • 2005
  • Early predictions of crop yields call provide information to producers to take advantages of opportunities into market places, to assess national food security, and to provide early food shortage warning. The objectives of this study were to identify the most useful parameters for estimating yields and to compare two model selection methods for finding the 'best' model developed by multiple linear regression. This research was conducted in two 65ha corn/soybean rotation fields located in east central South Dakota. Data used to develop models were small temporal variability information (STVI: elevation, apparent electrical conductivity $(EC_a)$, slope), large temporal variability information (LTVI : inorganic N, Olsen P, soil moisture), and remote sensing information (green, red, and NIR bands and normalized difference vegetation index (NDVI), green normalized difference vegetation index (GDVI)). Second order Akaike's Information Criterion (AICc) and Stepwise multiple regression were used to develop the best-fitting equations in each system (information groups). The models with $\Delta_i\leq2$ were selected and 22 and 37 models were selected at Moody and Brookings, respectively. Based on the results, the most useful variables to estimate corn yield were different in each field. Elevation and $EC_a$ were consistently the most useful variables in both fields and most of the systems. Model selection was different in each field. Different number of variables were selected in different fields. These results might be contributed to different landscapes and management histories of the study fields. The most common variables selected by AICc and Stepwise were different. In validation, Stepwise was slightly better than AICc at Moody and at Brookings AICc was slightly better than Stepwise. Results suggest that the Alec approach can be used to identify the most useful information and select the 'best' yield models for production fields.

Medical prescription design using QR Codes (QR코드를 적용한 진료 처방전 설계)

  • Lim, Myung-Jae;Jung, Dong-Keun;Kim, Myung-Gwon
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.13 no.6
    • /
    • pp.161-166
    • /
    • 2013
  • With recent development in information technology, IT convergence has been achieved ubiquitously in all areas of industry. In particular, there have been a lot of changes in medical IT conversion sector in terms of user service. In this regard, this paper attempts to propose an environment in which the existing paper prescription can be transferred in the form of QR codes using mobile handsets as one of practices from the perspective of user service. QR codes can minimize the burden resulting from the process of the output, delivery and storage of paper prescriptions. In addition, they can utilize the representation of the information in a wide variety of ways, and they are considered to be media that can minimize the risk of personal information exposure and falsification due to the restoration and encryption of the information. Accordingly, the application of QR codes to the medical field is expected to improve confidentiality ad storage capability of the information, along with users' convenience.

Delivery Tracing Protect Model Based Smart Contract for Guaranteed Anonymity (익명성 보호를 위한 스마트 컨트랙트의 배송추적 방지 모델)

  • Kim, Young Chan;Kim, Young Soo;Im, Kwang Hyuk
    • Journal of Industrial Convergence
    • /
    • v.16 no.1
    • /
    • pp.15-20
    • /
    • 2018
  • Along with the increase of internet shopping, crimes that exploited personal information on the invoice of goods are becoming more and more advanced and becoming more and more classified from the interception of goods through voice phishing attack, injury, sexual offense. Therefore, in order to guarantee the anonymity of the customer's delivery information, there is a need for a delivery tracking prevention system which keeps the route information of the product's destination secret among delivery companies. For this purpose, We suggest that delivery tracing protect model based smart contract for guaranteed anonymity to protect the anonymity by encrypting delivery information and by separation of payment and personal information using the anonymity technique of block chain-based cryptography. Our proposed model contributes to expansion of internet shopping based on block chaining by providing information about product sales to company and guaranteeing anonymity of customer's delivery information to customer.

A Study on the Consumer Disputes and Protection Measures of the Digital Healthcare Market and O2O Service (디지털헬스케어 시장과 O2O서비스 소비자분쟁 및 보호방안)

  • Byeon, Seung Hyeok
    • Journal of Arbitration Studies
    • /
    • v.30 no.4
    • /
    • pp.121-138
    • /
    • 2020
  • The O2O services in the healthcare sector have only been in full swing for about three years, and unlike existing O2O consumer goods, the scale and scope of the dispute are more complicated due to restrictions on medical treatment. In this study, O2O service platform operators and medical institutions' roles and responsibilities were redefined as a countermeasure for resolving disputes in healthcare O2O services and the laws for changing the transaction environment. A change in institutional mechanisms was proposed. This study looked at the types of consumer disputes related to healthcare O2O services as insufficient information problems, problems in the course of medical service implementation, problems with immunity provisions for platform operators, cancellations, and non-compliance with refunds. All the information generated during transactions in the healthcare sector was extensive in scale and included the most sensitive information among personal information, stressing the importance of ensuring security. The area that started in the O2O range before the medical institution visit also proposed a plan to establish a system for the delivery of proven information as a pre-medical person. The scale and growth will grow faster, given that consumers can experience the information they want anytime, anywhere they want. However, the platform broker's role, a link player, will become more important because consumers who use the service will have their first meeting with non-face-to-face product providers. On the other hand, service providers may have side effects of misleading consumers by providing false information or misleading consumers through exaggerated advertisements. The O2O service market is expected to expand beyond distribution and dining out to the entire industry. However, since it is challenging to check accurate statistics on the detailed market, various disputes and consumer protection measures will be required for each detailed market, and comprehensive leading solutions will be essential in the future.

A Comparative Analysis of Research Trends in the Information and Communication Technology Field of South and North Korea Using Data Mining

  • Jiwan Kim;Hyunkyoo Choi;Jeonghoon Mo
    • Journal of Information Science Theory and Practice
    • /
    • v.11 no.1
    • /
    • pp.14-30
    • /
    • 2023
  • The purpose of this study is to compare research trends in the information and communication technology (ICT) field between North and South Korea and analyze the differences by using data mining. Frequency analysis, clustering, and network analysis were performed using keywords from seven South Korean and two North Korean ICT academic journals published for five years (2015-2019). In the case of South Korea (S. Korea), the frequency of research on image processing and wireless communication was high at 16.7% and 16.3%, respectively. North Korea (N. Korea) had a high frequency of research, in the order of 18.2% for image processing, 16.9% for computer/Internet applications/security, and 16.4% for industrial technology. N. Korea's natural language processing (NLP) sector was 11.9%, far higher than S. Korea's 0.7 percent. Student education is a unique subject that is not clustered in S. Korea. In order to promote exchanges between the two Koreas in the ICT field, the following specific policies are proposed. Joint research will be easily possible in the image processing sector, with the highest research rate in both Koreas. Technical cooperation of medical images is required. If S. Korea's high-quality image source is provided free of charge to N. Korea, research materials can be enriched. In the field of NLP, it calls for proposing exchanges such as holding a Korean language information conference, developing a Korean computer operating system. The field of student education encourages support for remote education contents and management know-how, as well as joint research on student remote evaluation.