• Title/Summary/Keyword: 익명처리

Search Result 87, Processing Time 0.019 seconds

Legal Issues on the Collection and Utilization of Infectious Disease Data in the Infectious Disease Crisis (감염병 위기 상황에서 감염병 데이터의 수집 및 활용에 관한 법적 쟁점 -미국 감염병 데이터 수집 및 활용 절차를 참조 사례로 하여-)

  • Kim, Jae Sun
    • The Korean Society of Law and Medicine
    • /
    • v.23 no.4
    • /
    • pp.29-74
    • /
    • 2022
  • As social disasters occur under the Disaster Management Act, which can damage the people's "life, body, and property" due to the rapid spread and spread of unexpected COVID-19 infectious diseases in 2020, information collected through inspection and reporting of infectious disease pathogens (Article 11), epidemiological investigation (Article 18), epidemiological investigation for vaccination (Article 29), artificial technology, and prevention policy Decision), (3) It was used as an important basis for decision-making in the context of an infectious disease crisis, such as promoting vaccination and understanding the current status of damage. In addition, medical policy decisions using infectious disease data contribute to quarantine policy decisions, information provision, drug development, and research technology development, and interest in the legal scope and limitations of using infectious disease data has increased worldwide. The use of infectious disease data can be classified for the purpose of spreading and blocking infectious diseases, prevention, management, and treatment of infectious diseases, and the use of information will be more widely made in the context of an infectious disease crisis. In particular, as the serious stage of the Disaster Management Act continues, the processing of personal identification information and sensitive information becomes an important issue. Information on "medical records, vaccination drugs, vaccination, underlying diseases, health rankings, long-term care recognition grades, pregnancy, etc." needs to be interpreted. In the case of "prevention, management, and treatment of infectious diseases", it is difficult to clearly define the concept of medical practicesThe types of actions are judged based on "legislative purposes, academic principles, expertise, and social norms," but the balance of legal interests should be based on the need for data use in quarantine policies and urgent judgment in public health crises. Specifically, the speed and degree of transmission of infectious diseases in a crisis, whether the purpose can be achieved without processing sensitive information, whether it unfairly violates the interests of third parties or information subjects, and the effectiveness of introducing quarantine policies through processing sensitive information can be used as major evaluation factors. On the other hand, the collection, provision, and use of infectious disease data for research purposes will be used through pseudonym processing under the Personal Information Protection Act, consent under the Bioethics Act and deliberation by the Institutional Bioethics Committee, and data provision deliberation committee. Therefore, the use of research purposes is recognized as long as procedural validity is secured as it is reviewed by the pseudonym processing and data review committee, the consent of the information subject, and the institutional bioethics review committee. However, the burden on research managers should be reduced by clarifying the pseudonymization or anonymization procedures, the introduction or consent procedures of the comprehensive consent system and the opt-out system should be clearly prepared, and the procedure for re-identifying or securing security that may arise from technological development should be clearly defined.

A Phenomenological Study on the Burnout of Specialized Counselors in the 117 Report Center - Application of the Integrated Working System of Government Departments- (117 신고센터 전문상담 요원의 소진에 관한 현상학적 연구 -정부 부처 통합근무 체제 적용-)

  • Youn, Yang-suk;Kim, Eun-hye
    • Industry Promotion Research
    • /
    • v.7 no.3
    • /
    • pp.85-91
    • /
    • 2022
  • In modern society, the field of life is expanding to complex and diverse fields according to changes in lifestyle. As people's consciousness also changes, various social problems are involved, and countermeasures are being taken in various ways. In particular, as the issue of school violence has become a subject of interest, government-related ministries have jointly set up a reporting center and professional counselors are receiving and consulting on damage reports. Counselors experience mental and physical exhaustion in the course of their work. Therefore, the need to contribute to effective counseling work is raised by studying the factors that cause burnout. This study collected the experiences of 10 counselors working at 117 reporting centers from February 2019 to May 2020 through interviews and analyzed them with Colaizzi's phenomenological research method. The exhaustion factors derived from the results of the study were first experiences such as conflict between counselors during the period of institutional integration in the "117 reporting center experience", and secondly, professional counselors experienced emotional exhaustion, inhumanization, and lack of achievement. In order to prevent and overcome the exhaustion factors of counseling agents, it was necessary to prepare measures to promote fraud. This is expected to be useful data for improving the working environment of special job counselors in the era of industrialization and informatization in which various anonymous counseling methods are used.

Legal Issues in Protecting and Utilitizing Medical Data in United States - Focused on HIPAA/HITECH, 21st Century Cures Act, Common Law, Guidance - (미국의 보건의료데이터 보호 및 활용을 위한 주요 법적 쟁점 -미국 HIPAA/HITECH, 21세기 치료법, 공통규칙, 민간 가이드라인을 중심으로-)

  • Kim, Jae Sun
    • The Korean Society of Law and Medicine
    • /
    • v.22 no.4
    • /
    • pp.117-157
    • /
    • 2021
  • This research reviewed the HIPAA/HITECH, 21st Century Cures Act, Common Law, and private Guidances from the perspectives in protecting and utilitizing the medical data, while implications were followed. First, the standards for protection and utilization are relatively clearly regulated through single law on personal medical information in the United States. The HIPAA has been introduced in 1996 as fundamental act on protection of medical data. Medical data was divided into personally identifiable information, non-identifying information, and limited dataset under HIPAA. Regulations on de-identification measures for medical information, objects for deletion of limited data sets, and agreement on prohibition of data re-identification were stipulated. Moreover, in the 21st Century Cures Act regulated mutual compatibility for data sharing, prohibition of data blocking, and strengthening of accessibility of data subjects. Common Law introduced comprehensive consent system and clearly stipulates procedures. Second, the regulatory system is relatively simplified and clearly stipulated in the United States. To be specific, the expert consensus and the safe harbor system were introduced as an anonymity measure for identifiable medical information, which clearly defines the process while increasing trust. Third, the protection of the rights of the data subject is specified, the duty of explanation is specified in detail, while the information right of the consumer (opt-out procedure) for identification information is specified. For instance, the HHS rule and FDA regulations recognize the comprehensive consent system for human research, but the consent procedure, method, and requirements are stipulated through the common rule. Fourth, in the case of the United States, a trust-based system is being used throughout the health and medical data legislation. To be specific, Limited Data Sets are allowed to use in condition to the researcher's agreement to prohibit re-identification, and de-identification or consent process is simplified under the system.

An Automatic Relational Schema Generating System for an XML Schema (XML Schema에 대한 관계형 스키마 자동 생성 시스템)

  • 김정섭;박창원;정진완
    • Journal of KIISE:Databases
    • /
    • v.31 no.5
    • /
    • pp.527-539
    • /
    • 2004
  • As more and more documents are published in XML, generating relational schemas to store XML documents in a relational database is also getting important. This paper describes a technique as well as its implementation to produce a relational schema from the XML Schema, a standard recently recommended by W3C. The DTD-based inlining technique cannot be applied to the XML Schema, because the XML Schema has many new features, which don't exist in the DTD. Various built-in data types, inheritance, and polymorphism, for example, strengthen the XML Schema, but make the generation of a relational schema from an XML Schema more difficult. We propose an XML Schema Inlining Technique, based on the previous work. The technique first maps various data types in the XML Schema to those of the relational database. After that, it construct the schema graph and the type graph from types and elements defined in the XML Schema. The relational schema is generated while traversing the type graphs. Besides, we describe techniques for handling xsi:type, used for the polymorphism, and the anon#moos type. We also propose a couple of heuristic methods for enhancing the performance of the system. Finally, we conducted experiments to show that our technique is better than the binary table approach.

Comparison of Attitudes of Nursing Students toward Death, Self-esteem and Life Satisfaction according to Clinical Experience (임상실습경험에 따른 간호대학생의 죽음에 대한 태도와 자아존중감 및 삶의 만족도 비교)

  • Kim, Soon-Hee;Kim, Dong-Hee;Son, Hyun-Mi
    • Journal of Hospice and Palliative Care
    • /
    • v.14 no.3
    • /
    • pp.144-151
    • /
    • 2011
  • Purpose: This study was conducted to compare nursing students' attitudes toward death, self-esteem and life satisfaction according to clinical experience. Methods: We surveyed 1,030 nursing students from two different universities with a questionnaire consisting of items regarding attitudes toward death, self-esteem and life satisfaction. The data were analyzed using a PASW program. Results: Students with clinical experience scored 2.85 on the attitude toward death, while those without clinical experience scored 2.79 (t=2.775, P=0.006). Students with clinical experience had significantly higher self-esteem (t=4.541, P<0.001) and life satisfaction (t=4.050, P<0.001) than those without it. Students with clinical experience showed correlations between attitude toward death and self-esteem (r=0.159, P<0.001) and life satisfaction (r=0.090, P=0.025), while those without it did not (r=0.106, P=0.014). Conclusion: These results provide guidance for developing educational strategies such as educational program to help students build positive attitude toward death through their experience in clinical practice.

Grid-based Trajectory Cloaking Method for protecting Trajectory privacy in Location-based Services (위치기반서비스에서 개인의 궤적 정보를 보호하기 위한 그리드 기반 궤적 클로킹 기법)

  • Youn, Ji-hye;Song, Doo-hee;Cai, Tian-yuan;Park, Kwang-jin
    • Journal of Internet Computing and Services
    • /
    • v.18 no.5
    • /
    • pp.31-38
    • /
    • 2017
  • Recently with the rapid development of LBS (Location-based Services) technology, approaches of protecting user's location have gained tremendous attentions. For using LBS, users need to forward their real locations to LBS server. However, if the user sends his/her real location to LBS server, the server will have the all the information about user in LBS. Moreover, if the user opens it to LBS server for a long time, the trajectory of user may be released. In this paper, we propose GTC (Grid-based Trajectory Cloaking) method to address the privacy issue. Different from existing approaches, firstly the GTC method sets the predicting trajectory and divides the map into $2^n*2^n$ grid. After that we will generate cloaking regions according to user's desired privacy level. Finally the user sends them to LBS server randomly. The GTC method can make the cost of process less than sequential trajectory k-anonymity. Because of confusing the departure and destination, LBS server could not know the user's trajectory any more. Thus, we significantly improve the privacy level. evaluation results further verify the effectiveness and efficiency of our GTC method.

Development of IoT-based App Service for Non-face-to-face Management of Library Reading Rooms (도서관 열람실의 비대면 관리를 위한 사물인터넷(IoT) 기반 앱 서비스 개발)

  • Hong-hyeon Choi;Seung-hoon Lee;Jeong-du Lee;Jin Yu;Seong-hoon Jeong;Joon-hwan Shim
    • Journal of Advanced Navigation Technology
    • /
    • v.25 no.6
    • /
    • pp.562-568
    • /
    • 2021
  • Seat reservations and civil complaints in the library reading room have been done face-to-face by managers, and efficient management has been difficult. In addition, there is a problem that it is difficult to take action in the event of a civil complaint due to user inconvenience, such as a noise problem between users in the reading room. In this study, an online reservation system was developed for efficient management of seats in the library reading room so that it could be serviced non-face-to-face. In addition, when using the library reading room, it is possible to apply for non-face-to-face civil complaints when complaints occur due to noise problems between users, loss of belongings, and snoring during the user's sleep. Managers can smoothly manage library reading rooms through non-face-to-face inconvenience reports. It is possible to increase the satisfaction of using the library by resolving the inconvenience of users. The developed service app allows seat reservations and anonymous inconvenience reports. The administrator can check the received inconvenience report and warn the user of the seat with an IoT sensor-based LED. When corrective action is completed, the result of the action may be fed back to the reporter.