• Title/Summary/Keyword: Data Privacy

Search Result 1,269, Processing Time 0.157 seconds

Integrity proof Method research in Mobile Forensic (모바일 포렌식 에서의 무결성 입증방안 연구)

  • Kim, Ki-Hwan;Shin, Young-Tae;Park, Dea-Woo
    • KSCI Review
    • /
    • v.15 no.1
    • /
    • pp.37-46
    • /
    • 2007
  • Lately, is trend that diffusion of Mobile information appliance that do various function by development of IT technology is increasing much. There is function that do more convenient and efficient life and business using portable phone that is Daepyo?? of Mobile information appliance, but dysfunction that is utilized by Beopjoe of pointed end engineering data leakage, individual's privacy infringement, threat and threat etc. relationship means to use Mobile Phone is appeared and problems were appeared much. However, legal research of statute unpreparedness and so on need research and effort to prove delete, copy, integrity of digital evidence that transfer secures special quality of easy digital evidence to objective evidence in investigation vantage Point is lacking about crime who use this portable phone. It is known that this digital Forensic field is Mobile Forensic. Is purposeful to verify actually about acquisition way of digital evidence that can happen in this treatise through portable phone that is Mobile Forensic's representative standing and present way to prove integrity of digital evidence using Hash Function.

  • PDF

A Study on Emergency Medical Information Management Methods for Elderly Patients using QR code and Finger-print Recognition (QR 코드와 지문인식을 이용한 고령 환자의 응급 의료정보 관리 방법에 대한 연구)

  • Lee, Jung-hyun;Cho, Myeon-gyun
    • Journal of Convergence for Information Technology
    • /
    • v.7 no.6
    • /
    • pp.135-141
    • /
    • 2017
  • Recently, as elderly people suffering from chronic diseases have increased and disasters such as traffic accidents have increased, urgent rescue workers and doctors need to respond effectively to such emergencies. For elderly people, the difficulty in communicating their condition especially the health condition during disaster is one of the problems in which delay on immediate handling by rescue team can cause death. Providing a solution for this problem is one of the main issues in our research. In this paper, we use the QR code to communicate the minimum personal information and medical history needed for emergency medical treatment to emergency medical personnel, and to transmit the medical history and treatment data to the doctors of the hospital through QR code and fingerprint recognition, respectively. Especially, by using both QR code of smart phone and fingerprint of individual, we can protects personal information and strengthens privacy and security of medical information by allowing only authorized physicians to check medical records of the old patient.

Revaluation of the Modernization in the Korean Housing Culture Since 1980s′ (1980년대 이후 한국 주거문화에 나타난 근대화의 재평가)

  • 은난순
    • Journal of Families and Better Life
    • /
    • v.22 no.5
    • /
    • pp.59-73
    • /
    • 2004
  • Since 1980s' Korea had a great change on the housing culture by the supply of multi-family housing stock both on the macro-social and micro-social aspects. The purpose of this study was to examine the changes and the characteristics of housing environments which were estimated its modernization, and to examine the personal life under the change of housing environments. So I would like to revaluation the characteristics of modernization between the 1980s' and 1990s'. Therefore references were made to various papers, reports, the statistical data, newspaper reports, advertisements and magazines during that period. As a result, this paper came to the remarks as follows: 1. The success of modernization on the housing environments since 1980s' was the Quantitative growth of housing supply by multi-family housing. In spite of this, the Quantitative growth of housing supply and the improvement in Quality like housing space per person had the characters which was 'out of valence on the division'. 2. The Qualitative improvement of modem housing life by the development of housing industries could be said the improvement owing to develop of facilities and equipments. The introduction of up-to-date facilities and equipments realized the convenience and the rationality of living in the house. Although the improvement on the physical things deteriorated the modernized spaces to uniform things by commercial strategies. 3. The life in the multi-family housing which gives protection to personal privacy was settle down on the extremely individualized life without common things within the neighbors. Multi-family housing which was a production of process of modernization came true the growth in an appearance and the variety in the inside, but for the aspect of residents' everyday life in the multi-family housing, the Korean traditional relationship was collapsed and a sense of incompatibility within the residents was created.

Security Framework for Intelligent Predictive Surveillance Systems (지능형 예측감시 시스템을 위한 보안 프레임워크)

  • Park, Jeonghun;Park, Namje
    • Journal of the Korea Convergence Society
    • /
    • v.11 no.3
    • /
    • pp.77-83
    • /
    • 2020
  • Recently, intelligent predictive surveillance system has emerged. It is a system that can probabilistically predict the future situation and event based on the existing data beyond the scope of the current object or object motion and situation recognition. Since such intelligent predictive monitoring system has a high possibility of handling personal information, security consideration is essential for protecting personal information. The existing video surveillance framework has limitations in terms of privacy. In this paper, we proposed a security framework for intelligent predictive surveillance system. In the proposed method, detailed components for each unit are specified by dividing them into terminals, transmission, monitoring, and monitoring layers. In particular, it supports active personal information protection in the video surveillance process by supporting detailed access control and de-identification.

Context Based User Profile for Personalization in Ubiquitous Computing Environments (유비쿼터스 컴퓨팅 환경에서 개인화를 위한 상황정보 기반 사용자 프로파일)

  • Moon, Ae-Kyung;Kim, Hyung-Hwan;Park, Ju-Young;Choi, Young-Il
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.34 no.5B
    • /
    • pp.542-551
    • /
    • 2009
  • We proposed the context based user profile which is aware of its user's situation and based on user's situation it recommends personalized services. The user profile which consists of (context, service) pair can be acquired by the context and the service usage of a user; it then can be used to recommend personalized services for the user. In this paper, we show how they can be evolved without previously known user information so that not to violate privacy during the learning phase; in the result our user profile can be applied to any new environment without any modification to model only except context profiles. Using context-awareness based user profile, the service usage pattern of a user can be learned by the union of contexts and the preferred services can be recommended by the current environments. Finally, we evaluate the precision of proposed approach using simulation with data sets of UCI depository and Weka tool-kit.

An Analysis of Factors Affecting Satisfaction of Physical Therapy Patients (물리치료 내원환자의 만족도에 영향을 미치는 요인 분석)

  • Sohn, Ae-Ree;Kim, Mi-Won
    • Journal of Korean Physical Therapy Science
    • /
    • v.9 no.4
    • /
    • pp.63-72
    • /
    • 2002
  • Patient satisfaction is an important factor in evaluating the quality of care. Patient satisfaction may be used to evaluate provider services and facilities, and used to predict the patient returns to a facility. The patients d whether the patient returns to a facility or whether the patient recommends the facility to other people may be affected by a variety of factors of patient satisfaction. Low satisfaction may result in poor compliance with the potential of waste of resources and suboptimal clinical outcome. This study is to identify factors of patient satisfaction that will affect patients decision whether the patient returns or not. A self-administered questionnaire survey was conducted in Seoul, Chung-Joo and Bu-Cheon cities, Survey data was obtained from 743 patients who visited the physical therapy practice at university hospitals, general hospitals and clinics. Response rate was 94.4%. The instrument developed by Goldstein et al. (2000) was used and translated into Korean. Several items were added to the instrument. Patient's opinions of service in each domain measured using 5-point Likert-type scales that ranged from strongly disagree to strongly agree. A multiple-regression analytic approach was used to predict overall satisfaction of physical therapy. Age, kindness, scheduling, convenience of parking, privacy, and waiting time predicted the overall satisfaction of physical therapy. The older patients had higher level of satisfaction with physical therapy compared with the younger patients. Patient satisfaction were more affected by access (scheduling and waiting time), administrative technical management (convenience of parking), and interpersonal management (kindness of physical therapists and other staffs) than clinical technical management (physical therapists' skills).

  • PDF

A Study on Group Key Generation and Exchange using Hash Collision in M2M Communication Environment (M2M 통신 환경에서 해시 충돌을 이용한 그룹키 생성 및 교환 기법 연구)

  • Song, Jun-Ho;Kim, Sung-Soo;Jun, Moon-Seog
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.19 no.5
    • /
    • pp.9-17
    • /
    • 2019
  • As the IoT environment becomes more popular, the safety of the M2M environment, which establishes the communication environment between objects and objects without human intervention, becomes important. Due to the nature of the wireless communication environment, there is a possibility of exposure to security threats in various aspects such as data exposure, falsification, tampering, deletion and privacy, and secure communication security technology is considered as an important requirement. In this paper, we propose a new method for group key generation and exchange using trap hash collision hash in existing 'M2M communication environment' using hash collision, And a mechanism for confirming the authentication of the device and the gateway after the group key is generated. The proposed method has attack resistance such as spoofing attack, meson attack, and retransmission attack in the group communication section by using the specificity of the collision message and collision hash, and is a technique for proving safety against vulnerability of hash collision.

A Study on Legal Issues between the Application of Blockchain Technology and Deletion and the Third Party Supply of Personal Information (블록체인 기술 적용과 개인정보 삭제 및 제3자 제공의 법적 문제에 관한 연구)

  • Choi, Yong-hyuk;Kwon, Hun-yeong
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.6
    • /
    • pp.1607-1621
    • /
    • 2018
  • The financial industry, which guarantees a credible transaction and can not permit forgery of its transaction information, has hitherto adhered to a traditional centralized ledger management method. However, the blockchain technology has a decentralization which has been regarded as unsafe for the time being, and the more reliable transaction agreement and data integrity are guaranteed The world's financial industry and the IT world is causing the wave. Nevertheless, the inherent characteristics of the blockchain, such as the irreversibility of block information within a blockchain and the sharing of blocks between blockchain participants, can not avoid conflicts with the privacy laws. The purpose of this study is to investigate the problems related to deletion and the third party supply of personal information by focusing on these characteristics of the blockchain and to suggest the technical alternatives of the applicable blockchain and the improvement direction of the personal information protection law for using of blockchain technology.

A Study on the Analysis and Solutions of the Blockchain Security Issues (블록체인 보안 이슈에 대한 분석과 해결 방안에 대한 연구)

  • Noh, Siwan;Rhee, Kyung-Hyune
    • Journal of Internet Computing and Services
    • /
    • v.20 no.4
    • /
    • pp.1-11
    • /
    • 2019
  • A Blockchain-based access control technology is one of the various use cases of blockchain and is used in many areas to transparently transfer and manage ownership of data between users without the trusted third party. The characteristics of transparency, Irreversibility, and decentralization provided by the public blockchain help to offer new benefits that existing access control technologies did not offer. However, various security issues facing the current blockchain are raising the issue of the safety of the technology. Therefore, in this paper, we analyze an overview of the blockchain-based access control technology and solutions of the security challenges faced. Moreover, we further present solutions that are not affected by the blockchain trilemma and models of access control technology based on them.

Interrelationship between Records and Information (기록과 정보의 상관관계)

  • Song, Byoung-Ho
    • The Korean Journal of Archival Studies
    • /
    • no.20
    • /
    • pp.3-32
    • /
    • 2009
  • When the record management faces to the information environment, the practices based on self-judgment needs more open and considerate policies. New viewpoint that treat records as information and treat information as records will produce new mutual-conscious behavior that create records based on the value of information usage and maintain information data based on the reliability as an record. As the internal aspect how to create records well, how to transfer them well, and how to archives them well used to be the focus of record management, existing legislation, guidelines, and training seem to be mainly related to this front steps. We should also address issues according to the succeeding information services, including opening to the relevant, sharing, duplicating, information security, privacy protection, and constructing collections with continual supplement. This paper observe the confusion of the viewpoints in the recent reports, explain the need of fusion viewpoint, and suggest interconnecting feedback cycle between record management system and general information system.