• Title/Summary/Keyword: private information

Search Result 2,830, Processing Time 0.03 seconds

The Audit Method for Private Location Information based on Location Services (위치서비스에 기반한 개인위치정보에 대한 감리방법)

  • Seo, Jung-Ho;Seo, Hee-Myung;Kim, Dong-Soo;Kim, Hee-Wan
    • Journal of Digital Convergence
    • /
    • v.10 no.5
    • /
    • pp.251-266
    • /
    • 2012
  • Location Information is an information about a place where an individual exists or had existed. As smart phones are popularized, location information becomes more than simple information about the place. As a result, services using an individual's location information became the trend. However, problems arising from discharging Private Information can damage an individual, because it causes financial and economic loss but also detects individual's location and route directly. In realities, the guide that regulates Location Based Service for administering Private Location Information is insufficient. Therefore, this paper proposes check items, which contain standards of judicial action, financial loss ratings, importance of Private Location Information, and criticality of check lists, during the Private Location Information audit at the level of analysis, design, and management of the Information System, in order to prevent the infringement and disclosure of the Private Location Information. Moreover, the proposed check items were verified for its suitability by the professionals' survey.

A Study on the Qualitative Improvement of Private Security Industrial (민간경호업의 질적 발전 방안에 관한 연구)

  • Song, Sang-Wook
    • Journal of the Society of Disaster Information
    • /
    • v.2 no.1
    • /
    • pp.113-127
    • /
    • 2006
  • The suggestions that follow are about the Qualitative Improvement of private security Industrial. First, in legal and institutional policy, new establishment by law for private security and more support from government is asked. Moreover, the restructuring or M&A between petty companies and the pricing for security service should be performed. Second, in the structural aspect of private security industry, the professional education center for private security guards should be established and the terms of payment and welfare should be improved to the level above standard. In addition, it should be achieved to change the public to have a new and correct understanding of private security and develope the specialized parts suited to the characteristic and ability of each companies. Third, the construction of operating system for private security service should be achieved; recruit system for competent security guards, marketing strategy and enforcement system, widely known confidence to client, normal training system for security guards and post management system for client. This is also to be suited to the characteristic of each companies.

  • PDF

The Application of Private Investment for the Promoting of Geographical Information Services (지리정보서비스 활성화를 위한 민간투자사업 활용방안)

  • Yang Kwang-Sik
    • Spatial Information Research
    • /
    • v.12 no.3
    • /
    • pp.251-261
    • /
    • 2004
  • Geographical Information Service of local authorities is already considerable interest to private and public organizations. This paper presents the application of private investment aimed to promoting the extent of geographical information services in local authority. For it, the theoretical backgrounds of geographical information services are represented. On the basis of the empirical evidence, the paper represent a policy how a various issues should be dealt with promotion of geographical information services in the private investment.

  • PDF

Fuzzer for Private MIB in SNMP (SNMP 대상 퍼징기술 개발)

  • Soohun Kim;Brent ByungHoon Kang
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2023.01a
    • /
    • pp.405-406
    • /
    • 2023
  • 일반적으로 네트워크 장비는 원활한 장비 관리를 위해 SNMP라는 프로토콜을 활용한다. SNMP를 활용함에 있어, 각 장비 제조사에서는 고유 기능을 정의하여 사용하기도 하는데 이를 Private MIB이라고 한다. 본 연구에서는 이러한 Private MIB을 대상으로 하는 퍼징(Fuzzing) 기술을 고안하였다. 본 논문에서는 특정 제조사의 Private MIB에 대해 페이로드를 만드는 전략과 실제 페이로드의 생성을 보인다. 이는 수많은 소프트웨어 혹은 장비들의 초기 안전성 평가를 수행하는 데 응용될 수 있을 것으로 기대한다.

  • PDF

The Threat Analysis and Security Guide for Private Information in Web Log (웹 로그 데이터에 대한 개인정보 위협분석 및 보안 가이드)

  • Ryeo, Sung-Koo;Shim, Mi-Na;Lee, Sang-Jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.19 no.6
    • /
    • pp.135-144
    • /
    • 2009
  • This paper discusses an issue of serious security risks at web log which contains private information, and suggests solutions to protect them. These days privacy is core information to produce value-added in information society. Its scope and type is expanded and is more important along with the growth of information society. Web log is a privacy information file enacted as law in South Korea. Web log is not protected properly in spite of that has private information It just is treated as residual product of web services. Many malicious people could gain private information in web log. This problem is occurred by no classified data and improper development of web application. This paper suggests the technical solutions which control data in development phase and minimizes that the private information stored in web log, and applies in operation environment. It is very efficient method to protect private information and to observe the law.

The viewpoint-based product information modeling in collaborative product development (협업적 제품개발에서의 관점기반 제품정보 모델링)

  • 채희권;최영환;김광수
    • Proceedings of the CALSEC Conference
    • /
    • 2003.09a
    • /
    • pp.54-59
    • /
    • 2003
  • The information sharing is essential to make collaboration by participants in the collaboration environment. The sharing of the information is necessary to reduce time-to-market of new Product. In this paper, V2-model is proposed far supporting the sharing of the information on product development. V2-model supports collaborative product development in design and supply chain. Through viewpoints, V2-model supports 1) two-level structure that consist of private level and public level ,2) level-up process and 3) product development process. The public level information supports to share the product information on collaborative supply chain and design. The viewpoints in V2-model are divided into public viewpoints that point to the public level information and private viewpoints that point to the private level information. Private viewpoints are transformed into public viewpoints. The extended Topic Map has B-Topic, S-Topic and View for representing V2-model in this paper. The level-up process of V2-model is implemented through the merging of S-Topics. V2-model is implemented with washing machine model using extended Topic Maps. In this model, the public viewpoints and private viewpoints are represented and the level-up process, which transforms private viewpoints into public viewpoints, is implemented.

  • PDF

Source of Drug Information among Private Practitioners and Hopital Physicians (의약품 정보원 이용에 관한 개업의와 봉직의의 비교)

  • 김영애;이태용;이석구
    • Health Policy and Management
    • /
    • v.7 no.2
    • /
    • pp.89-108
    • /
    • 1997
  • The purpose of this study is to investigate drug information sources which influence physician's prescriptions, and to compare the differences of drugh information sources between private practitioners and hospital physicians. In addition, the ultimate goal of this study is to provide better quality of drug information for both groups of physicians through the professional drug information system. 264 physicians, including general practitioners and all types of specialists who were working in hospitals and private clinics in Taejon and Chungnam area, participated in this study which was conducted by mail. The results are summarized as follows ; 1. Both physician groups received drug informations mainly from medical journals, but there were differences in secondary sources of drug information. Namely, hospital physicians got drug information from annual meetings and textbooks, and private practitioners got it from detail men and colleagues. 2. Drug effect was the first consideration for drug selection in both physician groups. But, in the 2nd consideration, private practitioners concerned about the price, insurance and rebates, but hospital physicians were not. 3. Only 9.2% of the private practitioners satisfied with the sufficiency of drug information, whereas 22.0% of hospital physicians satisfied with it. The most insufficient area of information was drug interaction in both groups and 91.9% of the physicians suggested that a professional drug information system should be introduced. 4. Both physician groups had contacted with detail men frequently. However, it was rare for them to contact with a pharmacist. This phenomenon was more severe in the case of private practitioners. 5. Neither physician groups knew very much about drug informatio centers. However, they would be willig to participate if a professional drug information system were established. Also, they indicated that the information most required was drug interaction.

  • PDF

WHICH INFORMATION MOVES PRICES: EVIDENCE FROM DAYS WITH DIVIDEND AND EARNINGS ANNOUNCEMENTS AND INSIDER TRADING

  • Kim, Chan-Wung;Lee, Jae-Ha
    • The Korean Journal of Financial Studies
    • /
    • v.3 no.1
    • /
    • pp.233-265
    • /
    • 1996
  • We examine the impact of public and private information on price movements using the thirty DJIA stocks and twenty-one NASDAQ stocks. We find that the standard deviation of daily returns on information days (dividend announcement, earnings announcement, insider purchase, or insider sale) is much higher than on no-information days. Both public information matters at the NYSE, probably due to masked identification of insiders. Earnings announcement has the greatest impact for both DJIA and NASDAQ stocks, and there is some evidence of positive impact of insider asle on return volatility of NASDAQ stocks. There has been considerable debate, e.g., French and Roll (1986), over whether market volatility is due to public information or private information-the latter gathered through costly search and only revealed through trading. Public information is composed of (1) marketwide public information such as regularly scheduled federal economic announcements (e.g., employment, GNP, leading indicators) and (2) company-specific public information such as dividend and earnings announcements. Policy makers and corporate insiders have a better access to marketwide private information (e.g., a new monetary policy decision made in the Federal Reserve Board meeting) and company-specific private information, respectively, compated to the general public. Ederington and Lee (1993) show that marketwide public information accounts for most of the observed volatility patterns in interest rate and foreign exchange futures markets. Company-specific public information is explored by Patell and Wolfson (1984) and Jennings and Starks (1985). They show that dividend and earnings announcements induce higher than normal volatility in equity prices. Kyle (1985), Admati and Pfleiderer (1988), Barclay, Litzenberger and Warner (1990), Foster and Viswanathan (1990), Back (1992), and Barclay and Warner (1993) show that the private information help by informed traders and revealed through trading influences market volatility. Cornell and Sirri (1992)' and Meulbroek (1992) investigate the actual insider trading activities in a tender offer case and the prosecuted illegal trading cased, respectively. This paper examines the aggregate and individual impact of marketwide information, company-specific public information, and company-specific private information on equity prices. Specifically, we use the thirty common stocks in the Dow Jones Industrial Average (DJIA) and twenty one National Association of Securities Dealers Automated Quotations (NASDAQ) common stocks to examine how their prices react to information. Marketwide information (public and private) is estimated by the movement in the Standard and Poors (S & P) 500 Index price for the DJIA stocks and the movement in the NASDAQ Composite Index price for the NASDAQ stocks. Divedend and earnings announcements are used as a subset of company-specific public information. The trading activity of corporate insiders (major corporate officers, members of the board of directors, and owners of at least 10 percent of any equity class) with an access to private information can be cannot legally trade on private information. Therefore, most insider transactions are not necessarily based on private information. Nevertheless, we hypothesize that market participants observe how insiders trade in order to infer any information that they cannot possess because insiders tend to buy (sell) when they have good (bad) information about their company. For example, Damodaran and Liu (1993) show that insiders of real estate investment trusts buy (sell) after they receive favorable (unfavorable) appraisal news before the information in these appraisals is released to the public. Price discovery in a competitive multiple-dealership market (NASDAQ) would be different from that in a monopolistic specialist system (NYSE). Consequently, we hypothesize that NASDAQ stocks are affected more by private information (or more precisely, insider trading) than the DJIA stocks. In the next section, we describe our choices of the fifty-one stocks and the public and private information set. We also discuss institutional differences between the NYSE and the NASDAQ market. In Section II, we examine the implications of public and private information for the volatility of daily returns of each stock. In Section III, we turn to the question of the relative importance of individual elements of our information set. Further analysis of the five DJIA stocks and the four NASDAQ stocks that are most sensitive to earnings announcements is given in Section IV, and our results are summarized in Section V.

  • PDF

Private and Public Securities' Mutual Cooperation Plans to Deal with Crimes Threatening the Livelihood of the People (민생침해범죄 예방을 위한 민간경비와 경찰의 상호협력방안)

  • Hong, Eun-sun;Kim, Tae-hwan
    • Journal of the Society of Disaster Information
    • /
    • v.4 no.1
    • /
    • pp.154-174
    • /
    • 2008
  • Korean public power isn't currently performing its duties of crime prevention or public security services as effectively as the people expect from it due to excessive work load, insufficient budget, and equipment or work force problems, although it should protect the people from increasing crimes. The mutual cooperation between the police and the private security firms can' t be enhanced unless both parties are involved. Above all, the private security companies should secure superior security personnel and provide them with systematic education and training to improve their qualities. The police should also make an effort. In order to foster the private security firms soundly, the police should improve the system if necessary, and establish, guide and monitor the department wholly responsible for the private security affair. Both parties also should deal with crimes systematically by exchanging information for crime prevention, having informal meetings and introducing a joint patrol system. In order to cope with crimes threatening the livelihood of the people in our society, the public and private securities' mutual cooperation plans should be formulated. For this purpose to be achieved, the private security firms and the police should understand each other and bilateral efforts should be made. If both parties understand each other and make an effort, the relationship between them will be improved greatly and developmental plans for preventing crimes can be made.

  • PDF

The Improved Estimation of the Least Upper Bound to Search for RSA's Private key

  • Somsuk, Kritsanapong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.16 no.6
    • /
    • pp.2074-2093
    • /
    • 2022
  • RSA is known as one of the best techniques for securing secret information across an unsecured network. The private key which is one of private parameters is the aim for attackers. However, it is exceedingly impossible to derive this value without disclosing all unknown parameters. In fact, many methods to recover the private key were proposed, the performance of each algorithm is acceptable for the different cases. For example, Wiener's attack is extremely efficient when the private key is very small. On the other hand, Fermat's factoring can quickly break RSA when the difference between two large prime factors of the modulus is relatively small. In general, if all private parameters are not disclosed, attackers will be able to confirm that the private key is unquestionably inside the scope [3, n - 2], where n is the modulus. However, this scope has already been reduced by increasing the greatest lower bound to [dil, n - 2], where dil ≥ 3. The aim of this paper is to decrease the least upper bound to narrow the scope that the private key will remain within this boundary. After finishing the proposed method, the new scope of the private key can be allocated as [dil, dir], where dir ≤ n - 2. In fact, if the private key is extremely close to the new greatest lower bound, it can be retrieved quickly by performing a brute force attack, in which dir is decreased until it is equal to the private key. The experimental results indicate that the proposed method is extremely effective when the difference between prime factors is close to each other and one of two following requirement holds: the first condition is that the multiplier of Euler totient function is very close to the public key's small value whereas the second condition is that the public key should be large whenever the multiplier is far enough.