• Title/Summary/Keyword: Data Privacy

Search Result 1,256, Processing Time 0.025 seconds

Security Framework for Intelligent Predictive Surveillance Systems (지능형 예측감시 시스템을 위한 보안 프레임워크)

  • Park, Jeonghun;Park, Namje
    • Journal of the Korea Convergence Society
    • /
    • v.11 no.3
    • /
    • pp.77-83
    • /
    • 2020
  • Recently, intelligent predictive surveillance system has emerged. It is a system that can probabilistically predict the future situation and event based on the existing data beyond the scope of the current object or object motion and situation recognition. Since such intelligent predictive monitoring system has a high possibility of handling personal information, security consideration is essential for protecting personal information. The existing video surveillance framework has limitations in terms of privacy. In this paper, we proposed a security framework for intelligent predictive surveillance system. In the proposed method, detailed components for each unit are specified by dividing them into terminals, transmission, monitoring, and monitoring layers. In particular, it supports active personal information protection in the video surveillance process by supporting detailed access control and de-identification.

Context Based User Profile for Personalization in Ubiquitous Computing Environments (유비쿼터스 컴퓨팅 환경에서 개인화를 위한 상황정보 기반 사용자 프로파일)

  • Moon, Ae-Kyung;Kim, Hyung-Hwan;Park, Ju-Young;Choi, Young-Il
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.34 no.5B
    • /
    • pp.542-551
    • /
    • 2009
  • We proposed the context based user profile which is aware of its user's situation and based on user's situation it recommends personalized services. The user profile which consists of (context, service) pair can be acquired by the context and the service usage of a user; it then can be used to recommend personalized services for the user. In this paper, we show how they can be evolved without previously known user information so that not to violate privacy during the learning phase; in the result our user profile can be applied to any new environment without any modification to model only except context profiles. Using context-awareness based user profile, the service usage pattern of a user can be learned by the union of contexts and the preferred services can be recommended by the current environments. Finally, we evaluate the precision of proposed approach using simulation with data sets of UCI depository and Weka tool-kit.

An Analysis of Factors Affecting Satisfaction of Physical Therapy Patients (물리치료 내원환자의 만족도에 영향을 미치는 요인 분석)

  • Sohn, Ae-Ree;Kim, Mi-Won
    • Journal of Korean Physical Therapy Science
    • /
    • v.9 no.4
    • /
    • pp.63-72
    • /
    • 2002
  • Patient satisfaction is an important factor in evaluating the quality of care. Patient satisfaction may be used to evaluate provider services and facilities, and used to predict the patient returns to a facility. The patients d whether the patient returns to a facility or whether the patient recommends the facility to other people may be affected by a variety of factors of patient satisfaction. Low satisfaction may result in poor compliance with the potential of waste of resources and suboptimal clinical outcome. This study is to identify factors of patient satisfaction that will affect patients decision whether the patient returns or not. A self-administered questionnaire survey was conducted in Seoul, Chung-Joo and Bu-Cheon cities, Survey data was obtained from 743 patients who visited the physical therapy practice at university hospitals, general hospitals and clinics. Response rate was 94.4%. The instrument developed by Goldstein et al. (2000) was used and translated into Korean. Several items were added to the instrument. Patient's opinions of service in each domain measured using 5-point Likert-type scales that ranged from strongly disagree to strongly agree. A multiple-regression analytic approach was used to predict overall satisfaction of physical therapy. Age, kindness, scheduling, convenience of parking, privacy, and waiting time predicted the overall satisfaction of physical therapy. The older patients had higher level of satisfaction with physical therapy compared with the younger patients. Patient satisfaction were more affected by access (scheduling and waiting time), administrative technical management (convenience of parking), and interpersonal management (kindness of physical therapists and other staffs) than clinical technical management (physical therapists' skills).

  • PDF

A Study on Group Key Generation and Exchange using Hash Collision in M2M Communication Environment (M2M 통신 환경에서 해시 충돌을 이용한 그룹키 생성 및 교환 기법 연구)

  • Song, Jun-Ho;Kim, Sung-Soo;Jun, Moon-Seog
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.19 no.5
    • /
    • pp.9-17
    • /
    • 2019
  • As the IoT environment becomes more popular, the safety of the M2M environment, which establishes the communication environment between objects and objects without human intervention, becomes important. Due to the nature of the wireless communication environment, there is a possibility of exposure to security threats in various aspects such as data exposure, falsification, tampering, deletion and privacy, and secure communication security technology is considered as an important requirement. In this paper, we propose a new method for group key generation and exchange using trap hash collision hash in existing 'M2M communication environment' using hash collision, And a mechanism for confirming the authentication of the device and the gateway after the group key is generated. The proposed method has attack resistance such as spoofing attack, meson attack, and retransmission attack in the group communication section by using the specificity of the collision message and collision hash, and is a technique for proving safety against vulnerability of hash collision.

A Study on Legal Issues between the Application of Blockchain Technology and Deletion and the Third Party Supply of Personal Information (블록체인 기술 적용과 개인정보 삭제 및 제3자 제공의 법적 문제에 관한 연구)

  • Choi, Yong-hyuk;Kwon, Hun-yeong
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.6
    • /
    • pp.1607-1621
    • /
    • 2018
  • The financial industry, which guarantees a credible transaction and can not permit forgery of its transaction information, has hitherto adhered to a traditional centralized ledger management method. However, the blockchain technology has a decentralization which has been regarded as unsafe for the time being, and the more reliable transaction agreement and data integrity are guaranteed The world's financial industry and the IT world is causing the wave. Nevertheless, the inherent characteristics of the blockchain, such as the irreversibility of block information within a blockchain and the sharing of blocks between blockchain participants, can not avoid conflicts with the privacy laws. The purpose of this study is to investigate the problems related to deletion and the third party supply of personal information by focusing on these characteristics of the blockchain and to suggest the technical alternatives of the applicable blockchain and the improvement direction of the personal information protection law for using of blockchain technology.

A Study on the Analysis and Solutions of the Blockchain Security Issues (블록체인 보안 이슈에 대한 분석과 해결 방안에 대한 연구)

  • Noh, Siwan;Rhee, Kyung-Hyune
    • Journal of Internet Computing and Services
    • /
    • v.20 no.4
    • /
    • pp.1-11
    • /
    • 2019
  • A Blockchain-based access control technology is one of the various use cases of blockchain and is used in many areas to transparently transfer and manage ownership of data between users without the trusted third party. The characteristics of transparency, Irreversibility, and decentralization provided by the public blockchain help to offer new benefits that existing access control technologies did not offer. However, various security issues facing the current blockchain are raising the issue of the safety of the technology. Therefore, in this paper, we analyze an overview of the blockchain-based access control technology and solutions of the security challenges faced. Moreover, we further present solutions that are not affected by the blockchain trilemma and models of access control technology based on them.

Interrelationship between Records and Information (기록과 정보의 상관관계)

  • Song, Byoung-Ho
    • The Korean Journal of Archival Studies
    • /
    • no.20
    • /
    • pp.3-32
    • /
    • 2009
  • When the record management faces to the information environment, the practices based on self-judgment needs more open and considerate policies. New viewpoint that treat records as information and treat information as records will produce new mutual-conscious behavior that create records based on the value of information usage and maintain information data based on the reliability as an record. As the internal aspect how to create records well, how to transfer them well, and how to archives them well used to be the focus of record management, existing legislation, guidelines, and training seem to be mainly related to this front steps. We should also address issues according to the succeeding information services, including opening to the relevant, sharing, duplicating, information security, privacy protection, and constructing collections with continual supplement. This paper observe the confusion of the viewpoints in the recent reports, explain the need of fusion viewpoint, and suggest interconnecting feedback cycle between record management system and general information system.

A Study on Issues and Tasks of Humanity and Social Science in a Fourth Industrial Revolution Era (제4차 산업혁명시대 인문사회학적 쟁점과 과제에 관한 연구)

  • Kim, Jin-Young;Heo, Wan-Gyu
    • Journal of Digital Convergence
    • /
    • v.16 no.11
    • /
    • pp.137-147
    • /
    • 2018
  • To prepare for and implement policies for the Fourth Industrial Revolution, which is characterized by convergence, super-connectivity, and AI, this study summarized the effects and characteristics of individual technologies on our society and discussed the issues with humanity and social science perspectives. As a result, in terms of AI technology, the issues of job losses, project-type works, basic income and robot taxes, accountability of AI, and algorithm inequality were dealt with. Security, cyber hacking and privacy infringement issues were highlighted in big-data technology. In the part of block-chain and bioengineering, the society of decentralization, the concentration, digital divide, and ethical issues were discussed. On-demand economic aspects highlighted the problems of civil ethics and human commercialization. Lastly, the development of VR is discussed including side effects such as cyber-syndrom, avoidance of reality, and so on.

Intelligent Information Technology and Democracy : Algorithm-driven Information Environment and Politics (지능정보기술과 민주주의: 알고리즘 정보환경과 정치의 문제)

  • Min, Hee;Kim, Jeong-Yeon
    • Informatization Policy
    • /
    • v.26 no.2
    • /
    • pp.81-95
    • /
    • 2019
  • This study explores how the advanced data analysis capabilities of intelligent information technology are being utilized in politics. In particular, we focus on the fact that voter behavioral targeting in election campaigns comes into conflict with the democratic process in various ways. For this purpose, this study examines political micro-targeting and political bots. It is aimed at showing that these technology-based campaign techniques work as a factor preventing free expression of opinions and discussions, which are the core of democracy itself. Then we identify the attributes of the algorithm that affects them. As a result, this study suggests that the following issues might arise regarding intelligent information technology-based politics and democracy. First, inequality in political participation becomes more severe. Second, the public debate between voters gets more difficult. Third, superficial politics is prevalent. Fourth, single-issue politics and the exclusion of political representation is likely to increase. Fifth, political privacy might also be invaded. Based on our discussions, this study concludes that it is our role to find ways by which intelligent information technology and democracy can coexist.

An Analysis of Façade Panel Characteristics of UN Studio's Office Projects (유엔스튜디오 업무시설 외피 패널의 형태적 특성 분석)

  • Ko, Sung Hak
    • Journal of the Architectural Institute of Korea Planning & Design
    • /
    • v.35 no.8
    • /
    • pp.23-34
    • /
    • 2019
  • The façade, a fundamental function as a skin that protects human life from external environment such as cold and hot weather, snow, rain, and wind, etc, has served as a media for communication between indoor space of the building and outside space. From the media for communication point of view, the approach to envelope design, in which environmental elements are transmitted internally through the filtering of external environments, has been evolving in various ways from the past to the present. Today, modern architecture technologies including curtain wall systems and user-friendly computer programming and environmental analysis programs demonstrate a differentiated approach to envelope design related to the indoor environment. For this reason, it is worth noting that the envelope design factors and trends that appear variously in the UNStudio's projects before and after the 2000s. The factors reflected in the envelop design in conjunction with the indoor environment obtained through the case study of the UNStudio's office projects were daylight environment, thermal environment, ventilation, noise, privacy and view, and consideration for daylight environment and thermal environment was reflected in many cases through the case study. Looking at the changes in the diagrams in order of year, it can be seen that the envelope design using the environmental analysis tool has been performed since 2006. This is a clue to show the envelop design changes from the conceptual method to the data-based one. The diagrams and analysis results related to the envelop design showed that the thermal environment related to solar radiation was the most, and no diagrams and analysis related to the indoor illumination were found. Since 2010, PV panel installation has been shown in the envelope design, which can be found in the increased efficiency of PV panels due to the technological advances and the decrease in production cost.