• Title/Summary/Keyword: 개인추적

Search Result 387, Processing Time 0.032 seconds

Methods for Investigating of Edit History about MS PowerPoint Files That Using the OOXML Formats (OOXML형식을 사용하는 MS 파워포인트 파일에 대한 편집 이력 조사 방법)

  • Youn, Ji-Hye;Park, Jung-Heum;Lee, Sang-Jin
    • The KIPS Transactions:PartC
    • /
    • v.19C no.4
    • /
    • pp.215-224
    • /
    • 2012
  • Today, individuals and businesses are a lot of paperwork through a computer. So many documents files are creating to digital type. And the digital type files are copied, moved by various media such as USB, E-mail and so on. A careful analysis of these digital materials can be tracked that occurred during the document editing work history. About these research are on the compound document file format, but has not been studied about the new OOXML format that how to analyze linkages between different document files, tracking an internal order, finding unsaved file for identify the process of creating the file. Future, the use of OOXML format digital documents will further increase, these document work history traceability in digital forensic investigation would be a big help. Therefore, this paper on the new OOXML format(has a forensic viewpoint) will show you how to track the internal order and analyze linkages between the files.

Delivery Tracing Protect Model Based Smart Contract for Guaranteed Anonymity (익명성 보호를 위한 스마트 컨트랙트의 배송추적 방지 모델)

  • Kim, Young Chan;Kim, Young Soo;Im, Kwang Hyuk
    • Journal of Industrial Convergence
    • /
    • v.16 no.1
    • /
    • pp.15-20
    • /
    • 2018
  • Along with the increase of internet shopping, crimes that exploited personal information on the invoice of goods are becoming more and more advanced and becoming more and more classified from the interception of goods through voice phishing attack, injury, sexual offense. Therefore, in order to guarantee the anonymity of the customer's delivery information, there is a need for a delivery tracking prevention system which keeps the route information of the product's destination secret among delivery companies. For this purpose, We suggest that delivery tracing protect model based smart contract for guaranteed anonymity to protect the anonymity by encrypting delivery information and by separation of payment and personal information using the anonymity technique of block chain-based cryptography. Our proposed model contributes to expansion of internet shopping based on block chaining by providing information about product sales to company and guaranteeing anonymity of customer's delivery information to customer.

Follow-Up Method in Patients with Kawasaki Disease who had No Coronary Artery Abnormalities in the Convalescent Period (회복기 심초음파 검사상 관상동맥 내경 크기가 정상 범위인 가와사끼병 환자에서 추적관찰 방법에 대한 고찰)

  • Joo, Hee Jung;Song, Min Seob;Kim, Chul Ho
    • Clinical and Experimental Pediatrics
    • /
    • v.48 no.2
    • /
    • pp.165-173
    • /
    • 2005
  • Purpose : We performed the study to evaluate the value of the follow-up echocardiogram performed 6 months to 1 year after the onset of Kawasaki disease(KD), as recommended by American Heart Association(AHA) guidelines, when echocardiograms in the convalescent period were normal. Methods : Patients were selected from 147 cases diagnosed with KD at Pusan Paik hospital from January 2000 to October 2003. A total of 45 KD patients belonged to AHA risk level I and II were performed follow-up echocardiography. The patient's medical records and echocardiogram were reviewed. Additionally, we sought the opinion of pediatric cardiologists on the subject by means of a multiple-choice survey. Results : 37 children were belonged to AHA risk level I and the remaining 8 patients were belonged to risk level II. Of these 45 children, none were noted to have abnormalities on later follow-up echocardiogram. In the results of questionnaire, 37 percent of the participants advocate no follow-up after convalescent period for risk level I, and 33.3 percent favor periodic follow-up with echocardiography for risk level II up to one year. But there were no consensus about the diagnostic criteria of coronary abnormalities and how to follow-up these patients. Conclusion : All children with KD should have an echocardiogram at present and a follow-up study 6 to 8 weeks after the onset of fever. However, additional echocardiographies are not justified if the 6- to 8-week follow-up echocardiogram is normal. We would recommend that the more reasonable diagnostic criteria for coronary abnormalities and the Korean guidelines for long-term cardiovascular management and follow-up of KD need to be established.

THE POSTOPERATIVE CONDYLAR POSITION RELATED TO TEMPOROMANDIBULAR DISCOMFORT IN SAGITTAL SPLIT RAMUS OSTEOTOMY (하악지 시상 분할술에 있어 술후 하악과두의 위치와 측두 하악관절장애)

  • You, Jun-Young
    • Maxillofacial Plastic and Reconstructive Surgery
    • /
    • v.19 no.2
    • /
    • pp.130-134
    • /
    • 1997
  • The sagittal split ramus osteotomy(SSRO) of the mandible has used one of the most popula methods for the correction of various dentofacial deformities, especially mandibular prognathism. In SSRO, there are produced bony gap following mandible setback because of mandibular flaring. For this reason, the condylar axis may be changed due to bony approximation both segment in three dimension more mesio-laterally. According to change of condylar position, the condition of TMJ structure are changed and change of TMJ symptoms are suggested theoretically, and the correction of malocclusion by SSRO may improve the TMJ symptoms by improvement of feeding difficulties. The pupose of this study was to determine relationship between expected alterations in condylar position and suggested TMJ symptoms produced by change of condylar position. TMJ symptoms of 15patients who had operated SSRO are checked at about postoperative 6 month ranging $5{\sim}11$ month. Anterior-posterior position of condyle which was comparison preoperative with postoperative position, was classified 5 groups. The author tried to identify relationship between positional change of condyle and TMJ discomfort.

  • PDF

Analysis and Proposal of "Do Not Track" Regulations for Online Behavioral Advertising (온라인 행동기반 맞춤형 광고를 위한 온라인 추적 금지 제도 분석 및 제안)

  • Choi, Jinju;Lee, Chunghun;Kim, Beomsoo
    • The Journal of Society for e-Business Studies
    • /
    • v.17 no.4
    • /
    • pp.155-174
    • /
    • 2012
  • As Online Behavioral Advertising is dramatically growing with usefulness of information and user convenience in recent years, there are privacy issues caused by collecting user's behavioral information without their consent. To tackle the problem, the need of Do Not Track regulations is getting much higher. In Korea, however, it has never existed. So, this study is examining the case of the major countries have been enforcing the law and regulations of DNT. After that, it is classified with four domain (law/regulation, corporation, individual, society) to include all stakeholders of OBA. Furthermore, this study may have academic significance by suggesting DNT framework through analysis of them. Providing DNT mechanism consisted of three type (behavioral information, control, DNT system), it can be useful guidelines for companies to support decision making as introduced DNT. As analyzed between DNT and stakeholders based on the study of OBA market, it will be useful basic material of OBA study later.

Technical Survey on the Real Time Eye-tracking Pointing Device as a Smart Medical Equipment (실시간 시선 추적기반 스마트 의료기기 고찰)

  • Park, Junghoon;Yim, Kangbin
    • Smart Media Journal
    • /
    • v.10 no.1
    • /
    • pp.9-15
    • /
    • 2021
  • The eye tracking system designed in this paper is an eye-based computer input device designed to give an easy access for those who are uncomfortable with Lou Gehrig's or various muscle-related diseases. It is an eye-based-computer-using device for users whose potential demand alone amounts to 30,000. Combining the number of Lou Gehrig's patients in Korea estimated at around 1,700, and those who are unable to move their bodies due to various accidents or diseases. Because these eye input devices are intended for a small group of users, many types of commercial devices are available on the market. It is making them more expensive and difficult to use for these potential users, less accessible. For this reason, each individual's economic situation and individual experience with smart devices are slightly different. Therefore, making it difficult to access them in terms of cost or usability to use a commercial eye tracking system. Accordingly, attempts to improve accessibility to IT devices through low-cost but easy-to-use technologies are essential. Thus, this paper proposes a complementary superior performance eye tracking system that can be conveniently used by far more people and patients by improving the deficiencies of the existing system. Through voluntary VoCs(Voice of Customers) of users who have used different kinds of eye tracking systems that satisfies it through various usability tests, and we propose a reduced system that the amount of calculation to 1/15th, and eye-gaze tracking error rate to 0.5~1 degree under.

Individualism and collectivism in ethical decision making (문화성향은 윤리적 의사결정의 과정에 영향을 주는가?)

  • Hong Im Shin
    • Korean Journal of Culture and Social Issue
    • /
    • v.21 no.1
    • /
    • pp.67-96
    • /
    • 2015
  • Do cultural differences affect moral decisions? Two studies were conducted to investigate whether attitudes of individualism vs. collectivism have an impact on ethical decision making. Study 1 (N=92) showed that utilitarianism was preferred in a situation, in which an intervention resulted in the best outcome (i.e., saving more people's lives), while deontology was preferred in a situation, in which the focus was on negative consequences of the intervention (i.e. personal sacrifices). Additionally, there were differences between the idiocentrics and the allocentrics groups regarding morality aspects. In the idiocentrics group, harm and fairness were regarded as more important than other moral aspects, while in the allocentrics group, not only harm and fairness, but also ingroup and authority were perceived as critical moral aspects. In Study 2 (N=30), after lexical decision tasks were conducted for culture priming, the mouse tracking method was used to explore response dynamics of moral decision processes, while judging appropriateness of interventions in moral dilemmas. In Study 2, in a condition, in which the small number of victims were focused upon, there were more maximal deviations and higher Xflips in the individualism priming group than in the collectivism priming group, which showed that the participants in the individualism condition had more deliberative processes before choosing their answers between utilitarianism and deontology. In addition, the participants in the individualism priming condition showed more maximal deviations in the mouse trajectories regarding ingroup related interventions in moral dilemmas than those in the collectivism priming condition. These results implicated the possibilities that the automatic emotional process and the controlled deliberative process in moral decision making might interact with cultural dispositions of the individuals and the focus of situations.

  • PDF

Spatial Analysis to Capture Person Environment Interactions through Spatio-Temporally Extended Topology (시공간적으로 확장된 토폴로지를 이용한 개인 환경간 상호작용 파악 공간 분석)

  • Lee, Byoung-Jae
    • Journal of the Korean Geographical Society
    • /
    • v.47 no.3
    • /
    • pp.426-439
    • /
    • 2012
  • The goal of this study is to propose a new method to capture the qualitative person spatial behavior. Beyond tracking or indexing the change of the location of a person, the changes in the relationships between a person and its environment are considered as the main source for the formal model of this study. Specifically, this paper focuses on the movement behavior of a person near the boundary of a region. To capture the behavior of person near the boundary of regions, a new formal approach for integrating an object's scope of influence is described. Such an object, a spatio-temporally extended point (STEP), is considered here by addressing its scope of influence as potential events or interactions area in conjunction with its location. The formalism presented is based on a topological data model and introduces a 12-intersection model to represent the topological relations between a region and the STEP in 2-dimensional space. From the perspective of STEP concept, a prototype analysis results are provided by using GPS tracking data in real world.

  • PDF

Anonymity Certification Technique of a Smart Card base for Personal Information Protection (개인정보보호를 위한 스마트카드 기반의 익명 인증 기법)

  • Lee, Kwang-Hyoung;Park, Jeong-Hyo
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.13 no.12
    • /
    • pp.6071-6080
    • /
    • 2012
  • Regarding the official authentication method which is a strong encrypt method for financial transactions, there has recently been a concern for the problem of storage. As a solution for such problems, this study provides the anonymous authentication method based on the smart card used for such a purpose by utilizing the pseudo ID replacing the user's personal data. Such an anonymous authentication method makes it possible to prevent any inside leakage, intermediary attack, limited re-transmission attack, service-denying attack, directional safety attack and secret inspector attack in regard to the user's personal data. As a result, there would be no concern for the leakage of any personal data. In comparative analysis, after executing the comparison and analysis process through the experiment for the authentication process by using the previously-used smart card, the new one has shown about 10% a high level of efficiency for the encrypt and decrypt process together with excellent features in terms of flexibility in regard to the user's anonymity and tracking ability.

Protection of Location Privacy for Spatio-Temporal Query Processing Using R-Trees (R-트리를 활용한 시공간 질의 처리의 위치 개인정보 보호 기법)

  • Kwon, Dong-Seop
    • The Journal of Society for e-Business Studies
    • /
    • v.15 no.3
    • /
    • pp.85-98
    • /
    • 2010
  • The prevailing infrastructure of ubiquitous computing paradigm on the one hand making significant development for integrating technology in the daily life but on the other hand raising concerns for privacy and confidentiality. This research presents a new privacy-preserving spatio-temporal query processing technique, in which location based services (LBS) can be serviced without revealing specific locations of private users. Existing location cloaking techniques are based on a grid-based structures such as a Quad-tree and a multi-layered grid. Grid-based approaches can suffer a deterioration of the quality in query results since they are based on pre-defined size of grids which cannot be adapted for variations of data distributions. Instead of using a grid, we propose a location-cloaking algorithm which uses the R-tree, a widely adopted spatio-temporal index structure. The proposed algorithm uses the MBRs of leaf nodes as the cloaked locations of users, since each leaf node guarantees having not less than a certain number of objects. Experimental results show the superiority of the proposed method.