• Title/Summary/Keyword: 개인정보관리모델

Search Result 349, Processing Time 0.023 seconds

Ontology-based u-Healthcare System for Patient-centric Service (환자중심서비스를 위한 온톨로지 기반의 u-Healthcare 시스템)

  • Jung, Yong Gyu;Lee, Jeong Chan;Jang, Eun Ji
    • Journal of Service Research and Studies
    • /
    • v.2 no.2
    • /
    • pp.45-51
    • /
    • 2012
  • U-healthcare is real-time monitoring of personal biometric information using by portable devices, home network and information and communication technology based healthcare systems, and fused together automatically to overcome the constraints of time and space are connected with hospitals and doctors. As u-healthcare gives health service in anytime and anywhere, it becomes to be a new type of medical services in patients management and disease prevention. In this paper, recent changes in prevention-oriented care is analyzed in becoming early response for Healthcare Information System by requirements analysis for technology development trend. According to the healthcare system, PACS, OCS, EMR and emergency medical system, U-healthcare is presenting the design of a patient-centered integrated client system. As the relationship between the meaning of the terms is used in the ontology, information models in the system is providing a common vocabulary with various levels of formality. In this paper, we propose an ontology-based system for patient-centered services, including the concept of clustering to clustering the data to define the relationship between these ontologies for more systematic data.

  • PDF

Changes in the Concept of Disability and its Implications for Social Work Practice (장애개념의 변화와 사회복지실천 현장 함의)

  • Kim, Yong-Deug
    • Korean Journal of Social Welfare
    • /
    • v.51
    • /
    • pp.157-182
    • /
    • 2002
  • This study attempts to identify the changes in social reactions to disabilities in general, and to research the contextual implication of these changes in social work practice in Korea. In the early years after the Industrial Revolution, disability was conceived as social unfitness and it was assumed that the cause and responsibility could be attributed to people with disabilities. But, in the midst and late 20th century, social responsibility for people with disabilities was argued and generally accepted. As the results of these changes, conceptual models explaining disabilities have changed gradually; there has been a transition, so called, from individual model to social model. In a similar vein, WHO has refined the definition and classification of disability. Related to these changes, social welfare service paradigm for people with disabilities has shifted. This paradigm shift can be explained with the perspective of strength approach, empowerment approach, case management and independent living model. In Korea, 1998 Act on welfare for people with disabilities meant that social service for the disabled were categorized with, namely, residential service, community rehabilitation service and vocational rehabilitation service. Recently, the extent of these services has been rapidly broadened. In these situation, this study researched to identify the implications on social work practice in the context of changes in social response, conceptual model, definition and also service paradigm. Such as the followings are enumerated for the implications: disabled person's participation in assessment process, development of assessment tools focusing on social and environmental perspectives, reinforcement of information service helping self-determination, supporting on formal and informal helping network, expanding self-help programs and, finally, a shift from displacement model to support model.

  • PDF

5G Network Resource Allocation and Traffic Prediction based on DDPG and Federated Learning (DDPG 및 연합학습 기반 5G 네트워크 자원 할당과 트래픽 예측)

  • Seok-Woo Park;Oh-Sung Lee;In-Ho Ra
    • Smart Media Journal
    • /
    • v.13 no.4
    • /
    • pp.33-48
    • /
    • 2024
  • With the advent of 5G, characterized by Enhanced Mobile Broadband (eMBB), Ultra-Reliable Low Latency Communications (URLLC), and Massive Machine Type Communications (mMTC), efficient network management and service provision are becoming increasingly critical. This paper proposes a novel approach to address key challenges of 5G networks, namely ultra-high speed, ultra-low latency, and ultra-reliability, while dynamically optimizing network slicing and resource allocation using machine learning (ML) and deep learning (DL) techniques. The proposed methodology utilizes prediction models for network traffic and resource allocation, and employs Federated Learning (FL) techniques to simultaneously optimize network bandwidth, latency, and enhance privacy and security. Specifically, this paper extensively covers the implementation methods of various algorithms and models such as Random Forest and LSTM, thereby presenting methodologies for the automation and intelligence of 5G network operations. Finally, the performance enhancement effects achievable by applying ML and DL to 5G networks are validated through performance evaluation and analysis, and solutions for network slicing and resource management optimization are proposed for various industrial applications.

The influences of individual personality types on ERP system's acceptance: a preliminary test (개인의 성격유형이 ERP수용에 미치는 영향에 관한 탐색적 연구)

  • Kim, Hyun-Sang;Lee, Jang-Hyung
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.11 no.4
    • /
    • pp.47-65
    • /
    • 2006
  • The application of the ERP system is becoming more common to the businesses since a firm needs to reinforce positive competitiveness and to maintain competitive advantage. The ERP system is an enterprise integration solution that converts the whole business processes through information technology. Extant research provides plenty of results about the success factors of the ERP system; however, most of the researches focus on the exterior factors such as techniques rather than on the influences that a firm's employees' individual personality has in accepting the information technology of the ERP system. The objective of this study is to investigate the role of the employees' individual personality as a factor that makes the ERP system a success. The surveys--composed of the extent of information technology acceptance about the personality type of MBTI (Myers-Briggs type indicator) and the ERP system--were given to the companies applying the ERP system The personality type of MBTI is measured by 4 types of Myers, and Davis's TAM (technology acceptance model) is used for the information technology acceptance. The results of this study are summarized as follows. First the extraversion and the judging in the personality types of MBTI have a significant influence on the information technology acceptance of the ERP system. However, the thinking and the feeling in the personality types of MBTI were analyzed to not have a critical affect on the ERP system acceptance. Second as verified in the extant research the information technology acceptance verification related to the ERP system has a significant influence on perceived ease of use, perceived usefulness, behavioral intention and actual usage of the ERP system. The results of this study can be used for a successful application of the ERP system as follows. First it offers foundation of perception that the type of the individual personality is a significant key figure for the successful use of the ERP system. Second it provides a basis for the knowledge of combining the model of information technology acceptance and the psychological factors.

  • PDF

A Study on Big Data Based Non-Face-to-Face Identity Proofing Technology (빅데이터 기반 비대면 본인확인 기술에 대한 연구)

  • Jung, Kwansoo;Yeom, Hee Gyun;Choi, Daeseon
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.6 no.10
    • /
    • pp.421-428
    • /
    • 2017
  • The need for various approaches to non-face-to-face identification technology for registering and authenticating users online is being required because of the growth of online financial services and the rapid development of financial technology. In general, non-face-to-face approaches can be exposed to a greater number of threats than face-to-face approaches. Therefore, identification policies and technologies to verify users by using various factors and channels are being studied in order to complement the risks and to be more reliable non-face-to-face identification methods. One of these new approaches is to collect and verify a large number of personal information of user. Therefore, we propose a big-data based non-face-to-face Identity Proofing method that verifies identity on online based on various and large amount of information of user. The proposed method also provides an identification information management scheme that collects and verifies only the user information required for the identity verification level required by the service. In addition, we propose an identity information sharing model that can provide the information to other service providers so that user can reuse verified identity information. Finally, we prove by implementing a system that verifies and manages only the identity assurance level required by the service through the enhanced user verification in the non-face-to-face identity proofing process.

Analysis on the Type of S&T Knowledge Expert Network : A Case Study of the Global Network of Korean Scientists & Engineers (과학기술 지식전문가 정책 네트워크 유형분석 : 한민족과학기술자 네트워크(KOSEN)를 중심으로)

  • Jeong, Yion-Il;Lee, Joo-Young;Yoon, Jung-Sun
    • Journal of Information Management
    • /
    • v.36 no.4
    • /
    • pp.199-215
    • /
    • 2005
  • Experts participating in the knowledge expert network externalize their implicit knowledge by providing information or writing reports. Almost all the members of the network share externalized knowledge and the network facilitate the dissemination and diffusion of knowledge. Individuals reproduce another implicit knowledge by internalizing shared knowledge through the network and re-created knowledge is externalized, establishing knowledge circulation. In this paper, we analyze the expert groups of the Global Network of Korean Scientists & Engineers(KOSEN, www.kosen21.org), the Korea's No. 1 science and engineering knowledge expert community, with the application of the theory of policy network proposed by Marsh & Rhodes. According to the principal standards of policy network classification such as the number of participants, interaction among participants, consistency, distribution of resources and dependency, we categorize the KOSEN expert groups as closed policy network and opened issue network, and divide closed policy network into core community and periphery community.

Design of VMS Fuzzy Feedback Controller for VMS Routing Information (대안경로 안내용 VMS 퍼지 피드백 제어기법)

  • Park, Eun-Mi;O, Hyeon-Seon;Yang, Tae-Gyu
    • Journal of Korean Society of Transportation
    • /
    • v.29 no.6
    • /
    • pp.129-136
    • /
    • 2011
  • Variable Message Signs have been used for providing information on the current traffic conditions. However, it is considered more important to achieve optimal traffic allocation among the alternative routes by strategic VMS information provision. Fuzzy control is very effective and efficient to deal with such systems that are too complex and uncertain to build mathematical models. In this paper, a fuzzy feedback controller for VMS is proposed, whose goal is to achieve the travel time equilibrium between the two alternative routes. The performance of the suggested controller is implemented and examined using MATLAB/Simulink. More robust controller applicable to a real highway network is suggested for the further research.

Factors that Affect the Intention of Password Security Behavior (패스워드 보안행위의도에 영향을 미치는 요인)

  • Lee, Dong-Hee;Kim, Tae-Sung;Jun, Hyo-Jung
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.1
    • /
    • pp.187-198
    • /
    • 2018
  • Recently, financial transactions and electronic commerce in cyberspace are being performed more quickly and conveniently, with the development in diverse types of fintech and biometric authentication. But user authentication using passwords still occupies a big proportion even in these new services. therefore, safe creation and management of passwords is fundamental and indispensable to protect personal information and asset. This study examined the patterns of password usage by conducting a survey and analyzed factors influencing password security behavior intentions using the heath belief model. As a result, perceived susceptibility, perceived severity, perceived benefits, and perceived barriers significantly affected security behavior intentions, and especially, perceived severity had a moderating effect in other factors.

Two-round ID-based Group Key Agreement Fitted for Pay-TV System (유료 방송 시스템에 적합한 ID기반의 2 라운드 그룹키 동의 프로토콜)

  • Kim Hyunjue;Nam Junghyun;Kim Seungjoo;Won Dongho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.15 no.1
    • /
    • pp.41-55
    • /
    • 2005
  • A group key agreement protocol allows a group of user to share a key which may later be used to achieve certain cryptographic goals. In this paper, we propose a new scalable two-round ID-based group key agreement protocol which would be well fit to a Pay-TV system, additionally. to the fields of internet stock quotes, audio and music deliveries, software updates and the like. Our protocol improves the three round poop key agreement protocol of Nam et al., resulting in upgrading the computational efficiency by using the batch verification technique in pairing-based cryptography. Also our protocol simplifies the key agreement procedures by utilizing ID-based system. We prove the security of our protocol under the Computational Diffie-Hellman assumption and the Bilinear Decisional Diffie-Hellman assumption. Also we analyze its efficiency.

A Study on the Improvemental Method for Effective Operating System of Safety Monitoring Activity in case of Gangdong-gu (강동구사례를 중심으로 한 안전모니터링활동의 효율적인 운영시스템 개선방안에 관한 연구)

  • Kim, Sung Soo;Hong, Hyun Sook;Lee, Tae Shik
    • Journal of Korean Society of Disaster and Security
    • /
    • v.6 no.1
    • /
    • pp.9-17
    • /
    • 2013
  • Government ministries operate various system dealing with filed civil appeals. There are representative systems such as Safety Monitoring System of the Ministry of Public Administration and Security (MOPAS), Disaster Premonitory Information System of the National Emergency Management Agency (NEMA), Facilities Hazard Information System of the Ministry of Land, Transportation and Maritime Affairs (MLTM), Environmantal Monitoring System of the Ministry of Environment (ME). The purpose managing these systems is to reduce casualties and to improve safety by preventing disasters and accidents in local communities. This study suggests the method to effectively operate a safety monitoring system which fits to local situations based on the statistical analysis performed on filed complaint cases in Gangdong-gu as a sample region. The cases has been collected since 2012 through the voluntary safety monitoring activity of a specialist who had finished the Emergency and Safety maneger's master course.