• Title/Summary/Keyword: Data Portability

Search Result 162, Processing Time 0.021 seconds

Study on HIPAA PHI application method to protect personal medical information in OMOP CDM construction (OMOP CDM 구축 시 개인의료정보 보호를 위한 HIPAA PHI 적용 방법 연구)

  • Kim, Hak-Ki;Jung, Eun-Young;Park, Dong-Kyun
    • The Journal of Korean Institute of Next Generation Computing
    • /
    • v.13 no.6
    • /
    • pp.66-76
    • /
    • 2017
  • In this study, we investigated how to protect personal healthcare information when constructing OMOP (Observational Medical Outcomes Partnership) CDM (Common Data Model). There are two proposed methods; to restrict data corresponding to HIPAA (Health Insurance Portability and Accountability Act) PHI (Protected Health Information) to be extracted to CDM or to disable identification of it. While processing sensitive information is restricted by Korean Personal Information Protection Act and medical law, there is no clear regulation about what is regarded as sensitive information. Therefore, it was difficult to select the sensitive information for protecting personal healthcare information. In order to solve this problem, we defined HIPAA PHI as restriction criterion of Article 23 of the Personal Information Protection Act and maps data corresponding to CDM data. Through this study, we expected that it will contribute to the spread of CDM construction in Korea as providing solutions to the problem of protection of personal healthcare information generated during CDM construction.

A design of FACE-compliant IOS and TS segments architecture based on ARINC653 in avionics system (항공전자 시스템에서 ARINC653 기반의 FACE를 준수하는 IOS 및 TS 세그먼트 구조 설계 )

  • Doo-Hwan Lee;Young-Uk Nam;Kyeong-Yeon Cho;Ji-Yong Yoon
    • Journal of Advanced Navigation Technology
    • /
    • v.27 no.4
    • /
    • pp.429-435
    • /
    • 2023
  • The increasing complexity of avionics systems has emphasized the portability and reusability of software components. In this paper, a structural design method for IOSS (Input Output Service Segment) and TSS (Transport Service Segment) complying with the FACE (The Future Airborne Capability Environment) standard in the VxWorks 653 operating environment that satisfies ARINC 653 requirements is described. IOSS and TSS operate independently in different partitions to minimize time/space separation and the influence of other software, and to increase portability and reusability, strategy patterns among design patterns are applied. In addition, IOSS provides external interface service by applying distributed IO service structure, and among external interfaces, the ARINC 664 P7 interface of FACE-compliant equipment is placed in TSS to optimize the data movement path.

Effective Searchable Symmetric Encryption System using Conjunctive Keyword on Remote Storage Environment (원격 저장소 환경에서 다중 키워드를 이용한 효율적인 검색 가능한 대칭키 암호 시스템)

  • Lee, Sun-Ho;Lee, Im-Yeong
    • The KIPS Transactions:PartC
    • /
    • v.18C no.4
    • /
    • pp.199-206
    • /
    • 2011
  • Removable Storage provides the excellent portability with light weight and small size which fits in one's hand, many users have recently turned attention to the high-capacity products. However, due to the easy of portability for Removable Storage, Removable Storage are frequently lost and stolen and then many problems have been occurred such as the leaking of private information to the public. The advent of remote storage services where data is stored throughout the network, has allowed an increasing number of users to access data. The main data of many users is stored together on remote storage, but this has the problem of disclosure by an unethical administrator or attacker. To solve this problem, the encryption of data stored on the server has become necessary, and a searchable encryption system is needed for efficient retrieval of encrypted data. However, the existing searchable encryption system has the problem of low efficiency of document insert/delete operations and multi-keyword search. In this paper, an efficient searchable encryption system is proposed.

A Study on the Effective Guarantee of the Right to Portability of Personal Health Information (개인건강정보 이동권의 실효적 보장에 관한 연구)

  • Kim, Kang Han;Lee, Jung Hyun
    • The Korean Society of Law and Medicine
    • /
    • v.24 no.2
    • /
    • pp.35-77
    • /
    • 2023
  • As the amendment to the Personal Information Protection Act, which newly established the basis for the right to request transmission of personal information, was promulgated through the plenary session of the National Assembly, MyData, which was previously applied only to the financial sector, could spread to all fields. The right to request transmission of personal information is the right of the information subject to be guaranteed for the realization of MyData. However, since the right to request transmission of personal information stipulated in the Personal Information Protection Act is designed to be applied to all fields, not a special field such as the medical field, it has many shortcomings to act as a core basis for implementing MyData in Medicine. Based on this awareness of the problem, this paper compares and analyzes major legal trends related to the right to portability of personal health information at home and abroad, and examines the limitations of Korea's Personal Information Protection Act and Medical Act in realizing Medical MyData. Under the Personal Information Protection Act, the right to request transmission of personal information is insufficient to apply to the medical field, such as the scope of information to be transmitted, the transmission method, and the scope of the person obligated to perform the transmission, etc.. Regulations on the right to access medical information and transmission of medical records under the Medical Act also have limitations in implementing the full function of Medical My Data in that the target information and the leading institution are very limited. In order to overcome these limitations, this paper prepared a separate and independent special law to regulate matters related to the use and protection of personal health information as a measure to improve the legal system that can effectively guarantee the right to portability of personal health information, taking into account the specificity of the medical field. It was proposed to specifically regulate the contents of the movement and transmission system of personal health information.

The Analysis of Software Fault and Application Method of Weight using the Testing Data (시험데이터를 이용한 소프트웨어 결함분석과 가중치 적용 방안)

  • Jung, Hye-Jung
    • Journal of Korea Multimedia Society
    • /
    • v.14 no.6
    • /
    • pp.766-774
    • /
    • 2011
  • We survey the software faults according to the software characteristics, so we can use it to make a software testcases. We divide the software fault according to six characteristics, functionality, usability, reliability, efficiency, maintainability, and portability. We analyze the software faults to find the common factors according to the software products, also we survey the number of faults according to six characteristics. We propose the method of weight application using the relative comparison of the number of faults.

Factors Affecting Subscribers' Switching between Providers within Mobile Number Portability System (이동전화 이용자의 번호이동에 영향을 미치는 요인에 대한 실증분석)

  • Kim, Ho;Park, Yoon-Seo;Jun, Duk-Bin;Yang, Liu
    • Korean Management Science Review
    • /
    • v.25 no.2
    • /
    • pp.57-71
    • /
    • 2008
  • We study factors that affect consumers' switching behaviors among service providers in Korean mobile telecommunications service market. For empirical analysis, quarterly time series data from the first quarter of 2004 through the second quarter of 2007 were used. We chose the number of switchers to each mobile service provider in each quarter as dependent variables. Independent variables include acquisition costs per subscriber, which play the role of subsidy to mobile handset, switching costs, time trend, structural change effect, and waiting demand effects. Through the empirical analysis, we found that each provider's churn-in customers are affected by different factors. Specifically, the number of churn-in customers into SK Telecom is explained mainly by SK Telecom's customer acquisition costs and waiting demand from KTF, while the number of customers switching into KTF is better explained by switching costs from the previous service provider and waiting demand from SK Telecom. Those who chose LG Telecom as their new provider, on the other hand, were mainly attracted by LG Telecom's high subscriber acquisition cost.

The Effects of Cellular Phone Service Quality to Switching Barrier in Korean Mobile Telecommunication Market (한국 이동통신시장에서 휴대폰 서비스품질이 전환장벽에 미치는 영향 분석)

  • Zu, Hyung-Lyul;Lee, Jin-Choon
    • Journal of Information Technology Services
    • /
    • v.8 no.2
    • /
    • pp.229-245
    • /
    • 2009
  • The Korean mobile telecommunication service market is faced with a tremendous competitive period, in which the market is entering into the maturity stage with launching of the 3rd generation service and with introduction of mobile number portability. In general, it is more important to sustain the old customers than to attracting new customers, as the life cycle of an industry is entering the maturity stage in which the growth rate of new customers is decreasing gradually or becoming stagnant. Thus, mobile telecommunication business has to seek a way to maintain the existing customers instead of promoting new customers. So this study investigates whether the service quality of mobile telecommunication could have effects on the switching barrier of the industry. In order to test the hypothesis on the effects of service quality of mobile telecommunication in Korea on switching barrier, this study collected the questionnaire response data of students including middle and high school students and undergraduates, who are regarded as the major customers in that mobile telecommunication industry.

Artificial Intelligence software evaluation plan (인공지능 소프트웨어 평가방안)

  • Jung, Hye Jung
    • Advanced Industrial SCIence
    • /
    • v.1 no.1
    • /
    • pp.28-34
    • /
    • 2022
  • Many studies have been conducted on software quality evaluation. Recently, as artificial intelligence-related software has been developed a lot, research on methods for evaluating artificial intelligence functions in existing software is being conducted. Software evaluation has been based on eight quality characteristics: functional suitability, reliability, usability, maintainability, performance efficiency, portability, compatibility, and security. Research on the part that needs to be confirmed through evaluation of the function of the intelligence part is in progress. This study intends to introduce the contents of the evaluation method in this part. We are going to propose a quality evaluation method for artificial intelligence software by presenting the existing software quality evaluation method and the part to be considered in the AI part.

Consumers' preference about the attributes of Post PC: reaults of a contingent ranking study (Post PC의 속성별 소비자 선호 분석 : 조건부 순위결정법을 이용하여)

  • Lee, Ju-Seok;Yu, Seung-Hun;Gwak, Seung-Jun
    • Journal of Korea Technology Innovation Society
    • /
    • v.8 no.1
    • /
    • pp.135-153
    • /
    • 2005
  • With an explosive growth of internet and a change of consumer's demand, Post PC is emerging as a substitute for the existing desktop computer and laptop computer. Post PC is a new computer which is portable with wireless networking, cheaper than the existing PCs and specialized in the specific function that consumers want. Furthermore, the shape and the ability of Post PC are dependent on its specific function. The rudimentary Post PCs such as PDA, web-pad and smart-phone are already usable. And in the future, owing to the progress of technologies, the heterogeneity of relate companies and the low entry barrier, various Post PCs will be developed. In this paper, we analyze consumers' willingness-to-pay for Post PC with the attributes such as the portability, the speed of CPU, the data input method (using key board, or notepad etc), the size of monitor and price. To estimating consumers' willingness-to-pay for the attributes of Post PC, we apply a contingent ranking method, which makes the respondents rank hypothetical Post the portability, the speed of CPU, the data input method (using key board, or notepad etc),the size of monitor and price. To estimating consumers' willingness-to-pay for the attributes of Post PC, we apply a contingent ranking method, which makes the respondents rank hypothetical Post PC alternatives featuring various combinations of attributes, to a survey data collected in Korea. Using the estimated willingness-to-pay, we predict the shape and the ability of future's Post PC and draw policy implications for the national and company level R&D strategies.

  • PDF

A Design of Agent Model for Real-time Intrusion Detection (실시간 침입 탐지를 위한 에이전트 모델의 설계)

  • Lee, Mun-Gu;Jeon, Mun-Seok
    • The Transactions of the Korea Information Processing Society
    • /
    • v.6 no.11
    • /
    • pp.3001-3010
    • /
    • 1999
  • The most of intrusion detection methods do not detect intrusion on real-time because it takes a long time to analyze an auditing data for intrusions. To solve the problem, we are studying a real-time intrusion detection. Therefore, this paper proposes an agent model using multi warning level for real-time intrusion detection. It applies to distributed environment using an extensibility and communication mechanism among agents, supports a portability, an extensibility and a confidentiality of IDS.

  • PDF