• Title/Summary/Keyword: Data Privacy

Search Result 1,246, Processing Time 0.031 seconds

Factors Affecting the Intention to Adopt Self-Determination Rights of Personal Medical Information (개인의료정보 자기결정권 행사 의도에 영향을 미치는 요인)

  • Yunmo Koo;Sungwoo Hong;Beomsoo Kim
    • Information Systems Review
    • /
    • v.20 no.1
    • /
    • pp.159-177
    • /
    • 2018
  • With an extensive proliferation of information and communication technology, the volume and amount of digital information collected and utilized on the Internet have been increasing rapidly. Also on the rapid rise are side effects such as unintended breach of accumulated personal information and consequent invasion of personal privacy. Informational self-determination is rarely practiced, despite various states' legal efforts to redress data subjects' damage. Personal health information, in particular, is a subcategory of personal information where informational self-determination is hardly practiced enough. The observation is contrasted with the socio-economic inconvenience that may follow due to its sensitive nature containing individuals' physical and health conditions. This research, therefore, reviews factors of self-determination on personal health information while referring to the protection motivation theory (PMT), the long-time framework to understand personal information protection. Empirical analysis of 200 data surveyed reveals threat-appraisal (perceived vulnerability and perceived severity of threats) and coping-appraisal (perceived response effectiveness), in addition to individual levels of concern regarding provided personal health information, influence self-determination to protect personal health information. The research proposes theoretical findings and practical suggestions along with reference for future research topics.

A Study on the Sensitivity of Human Rights and the Advocacy Activities of Korean Occupational Therapists (국내 작업치료사의 인권감수성이 옹호활동에 미치는 영향)

  • Kim, Ji-Man;Hong, Ki-Hoon;Lee, Chun-Yeop;Kim, Hee-Jung
    • The Journal of Korean society of community based occupational therapy
    • /
    • v.10 no.2
    • /
    • pp.11-24
    • /
    • 2020
  • Objective : The Human Rights constitute one of the basic pillars of every work where persons are involved, such is the case of the occupational therapy field. Methods : In this study we investigate the human rights sensitivity and the advocacy activities of occupational therapists. The differences according to their characteristics, the relationship and the impact of the human rights sensitivity are examined and presented. Making use of online surveys 116 subjects participated in the study. Results : The measured average of human right sensitivity is 69.00 ± 17.67 point, being them distributed according to the following subcategories: to the perception of the situation corresponds 23.25±5.62 points, to the perception of the consequences 22.75±6.54 points and for the perception of the responsibility 23±6.54 points. In all the cases have been taken in account the equal rights, the right to education in disables, the right to pursue the happiness of the elderly, the right of the disables to have personal freedom, the privacy rights and the privacy rights for mental illness people. According to the working area the Human Right sensitiveness is higher in Seoul than in the Gyeongsang province meanwhile the advocacy activities is higher in Seoul and in Gyeonggi province than in Gyeongsang province. Depending of the type of service, general hospitals and rehabilitation/nursing hospitals showed higher human rights sensitivity than other service organizations According to the working field, occupational therapy group focused in elderly showed higher Human Right sensitivity than other fields. Professionals belonging groups of clinical experience from 3 to 5 years and from 6 to 10 years showed higher advocacy activities than professionals with more than 11 years of experience. A positive correlation was showed between the human rights sensitivity and the advocacy activities. For this situation, the human rights sensitiveness was divided in sub-categories in perception of the situation, perception of the consequences and perception of the responsibility. As showed by the result of multiple regression analyses the advocacy activities of human would grow up in accordance with the increase of the human rights sensitiveness of responsibility perception. Conclusion : Due to the actual lack of information, the collection and study of basic data is fundamental for the development of practical human rights educational programs and to emphasize the role of the defense of the human rights.

A Study on Vulnerability Prevention Mechanism Due to Logout Problem Using OAuth (OAuth를 이용한 로그아웃 문제로 인한 취약점 방지 기법에 대한 연구)

  • Kim, Jinouk;Park, Jungsoo;Nguyen-Vu, Long;Jung, Souhwan
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.27 no.1
    • /
    • pp.5-14
    • /
    • 2017
  • Many web services which use OAuth Protocol offer users to log in using their personal profile information given by resource servers. This method reduces the inconvenience of the users to register for new membership. However, at the time a user finishes using OAuth client web service, even if he logs out of the client web service, the resource server remained in the login state may cause the problem of leaking personal information. In this paper, we propose a solution to mitigate the threat by providing an additional security behavior check: when a user requests to log out of the Web Client service, he or she can make decision whether or not to log out of the resource server via confirmation notification regarding the state of the resource server. By utilizing the proposed method, users who log in through the OAuth Protocol in the public PC environment like department stores, libraries, printing companies, etc. can prevent the leakage of personal information issues that may arise from forgetting to check the other OAuth related services. To verify our study, we implement a Client Web Service that uses OAuth 2.0 protocol and integrate it with our security behavior check. The result shows that with this additional function, users will have a better security when dealing with resource authorization in OAuth 2.0 implementation.

A Remote User Authentication Scheme Preserving Anonymity and Traceability with Non-Tamper Resistant Smart Cards (정보추출 가능한 스마트카드 환경에서 익명성과 추적성을 제공하는 원격 사용자 인증 기법)

  • Kwon, Hyuck-Jin;Ryu, Eun-Kyung;Lee, Sung-Woon
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.50 no.6
    • /
    • pp.159-166
    • /
    • 2013
  • Recently, because the interest and needs in privacy protection are growing, smartcard-based remote user authentication schemes have been actively studied to provide the user anonymity. In 2008, Kim et al. first proposed an authentication scheme in order to ensure the user anonymity against both external attackers and the remote server and track malicious users with the help of a trusted trace sever. However, in 2010, Lee et al. showed that Kim et al.'s scheme cannot provide the user anonymity against remote server, which is because the server can trace users without any help of the trace server, and then proposed a improved scheme. On the other hand, in 2010, Horng et al. proposed an authentication scheme with non-tamper resistant smart cards, in which the non-tamper resistant smart card means that an attacker may find out secret information stored in the smart card through special data analysis techniques such as monitoring power consumption, to be secure against a variety of attacks and to provide the user anonymity against external attackers. In this paper, we will propose a remote user authentication scheme with non-tamper resistant smart cards not only to ensure the user anonymity against both external attackers and the remote server but also to track malicious users with only the help of a trusted trace sever.

The Study of Comparison Satisfaction and Re-use Intention between Central and Ward Reception Desk Users (입.퇴원 수속창구 중앙화와 분산화에 따른 이용자의 만족도와 재이용 의사)

  • Ham, Tae-Hoon;Lee, Kyung-Woo;Sohn, Tae-Yong;Yu, Seung-Hum
    • Korea Journal of Hospital Management
    • /
    • v.14 no.4
    • /
    • pp.149-162
    • /
    • 2009
  • The purpose of this study is to design strategic hospital service based on each hospital's features. For this study, an assessment was conducted by 398 in-patents of one university hospital located in Seoul. The self-questionnaires, which were investigated from Oct. 15th to 29th in 2008, compared central reception desk with ward reception desk in satisfaction and re-use rate of patients. The major results of this study are as follow. First, according to each reception desk user, they have different satisfaction of it. As for the staff kindness, admission procedure, discharge procedure and manner of staff, those made patients be gratified as well. Second, when it comes to the intention of re-use, there were no significant features between them. Only convenience in admission and discharge procedure, however, was an attractive factor for the recommendation. Third, this study found out the reasons for higher re-use rate of central reception desk users. Regarding service, they were contented with the time for test and treatment. As for the hospital service, they would like to re-use this hospital because of convenient steps of paying interim fee and getting certificates. Forth, this study found out the reasons for higher re-use rate of ward reception desk users. As a point of hospital service view, they responded that respected privacy, hospital facility and general service were good for staying. As for the manner of staff, they mentioned nurses and staff in charge and whole staff members were kind. When it comes to the procedures of patient management, steps of discharge and paying interim fee were convenience. In conclusion, the results of this study suggest that providing a ward reception desk service can boost the satisfaction and re-use rate of in-patients. Furthermore, this strategic management method would be good for not only cutting the moving line but also efficient in-patient care system. These results can be used for the strategic hospital marketing field, as well. Even though this study has a limitation of the targeted populations which were only in a ward reception desk running hospital, it can say that having competitiveness in satisfaction of hospital service is good for promoting and differencing each hospital. Consequently, whole general management system would be adjusted first for differencing each hospital; however, this sort of additional factor should be concerned as well. I expect that this study would give meaningful data for designing strategic and differencing marketing method to lots of hospitals.

  • PDF

A Study on the Problems in the Use of CCTV by the Police and Some Proposals (경찰CCTV 운용상의 문제점과 개선방안)

  • Lee, Sang-Won;Lee, Seung-Chal
    • Korean Security Journal
    • /
    • no.10
    • /
    • pp.215-242
    • /
    • 2005
  • As CCTV can be an effective tool to prevent or suppress crime at low cost, they have been widesoread in developed countries. In spite of their effectiveness, they infringe some constitutional rights such as the right to privacy, the right of likeness and the right to control over personal information. The police and ward offices install CCTV in public areas to prevent crimes without a legal basis or standard. When information obtained in such a way is used as investigation data for the police or as an evidence in a court, it can cause serious trouble. To solve this problem, legal restriction on the installation of CCTV as should be clearer. Since current laws on public agencies' protection of personal information are too general, they are not effective enough to protect personal information. Therefore, Personal Information Protection Organic Act should be enacted to make a legal basis for protecting comprehensive personal information. It should be obvious who installs CCTVs, who pay for the cost and how they are managed. Before installation, the police and ward offices should obtain residents' consent through a public hearing or voting (on the range and purpose of installation), or conduct an impact assessment. During installation, CCTVs should be limited to prevent or suppress crimes, keep public order and void dangers. In case of making a sign of installation, it must specify its rights. After installation(operation/management phase), they should abide by principles of information protection and try not to infringe constitutional right. In the cognitive aspect, the police should constitutional rights must be secured although it is important to carry out their missions. The police should serve citizens and change to the police of communities. Citizens should understand that constitutional right can be infringed if public order is not maintained. When citizens cooperate with the police, they fear of crimes will decrease.

  • PDF

Reversible Watermarking based on Predicted Error Histogram for Medical Imagery (의료 영상을 위한 추정오차 히스토그램 기반 가역 워터마킹 알고리즘)

  • Oh, Gi-Tae;Jang, Han-Byul;Do, Um-Ji;Lee, Hae-Yeoun
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.4 no.5
    • /
    • pp.231-240
    • /
    • 2015
  • Medical imagery require to protect the privacy with preserving the quality of the original contents. Therefore, reversible watermarking is a solution for this purpose. Previous researches have focused on general imagery and achieved high capacity and high quality. However, they raise a distortion over entire image and hence are not applicable to medical imagery which require to preserve the quality of the objects. In this paper, we propose a novel reversible watermarking for medical imagery, which preserve the quality of the objects and achieves high capacity. First, object and background region is segmented and then predicted error histogram-based reversible watermarking is applied for each region. For the efficient watermark embedding with small distortion in the object region, the embedding level at object region is set as low while the embedding level at background region is set as high. In experiments, the proposed algorithm is compared with the previous predicted error histogram-based algorithm in aspects of embedding capacity and perceptual quality. Results support that the proposed algorithm performs well over the previous algorithm.

Customer Information Management of Online Fashion Companies: From CRM Perspectives (CRM 관점에서 본 온라인 의류업체의 고개정보관리)

  • Chung Ihn-Hee;Kim Soon-Chul;Hwang In-Do;Jung Ji-Wook;Choo Ho-Jung
    • Journal of the Korean Society of Costume
    • /
    • v.56 no.2 s.101
    • /
    • pp.83-100
    • /
    • 2006
  • As online fashion businesses achieve rapid growth in the last few years, they gather various kinds of customer information through customer registration procedures and expect to utilize this information for CRM programs. The purpose of this study were to understand the current practices of customer information management of online fashion companies and to discuss how to improve it for the benefit of both customers and fashion businesses. This study included three steps of empirical data collection process: First, online fashion companies were visited and content analyzed at three time periods-2002, 2003, and 2004. Second, a questionnaire was developed and surveyed with 488 customers. And third, interviews with two groups were conducted, one with customers who experienced customer registration with online fashion companies and the other with experts of web developing. Through customer registration procedures, personal and contact information such as name, citizen registration number(social security number), home address, home telephone number, and cellular phone number were most frequently required. Customers were asked to provide more specific information regarding their privacy, online behavior, and taste recently. The variety of information category in 2004 observation was larger than 2002, but the amount of required information from each company got smaller. Customers tended to provide some false infor- mation, and the most frequently cited reason for that was 'too much hassle' and 'no practical benefit from information provision'. Customers were concerned with the exposure of personal information such as citizen registration number. The ideal number of pieces of information required was identified as 3 to 5 including name, phone number, and address. The paper was concluded with the discussion of customer information management from CRM perspective, CRM program, information analysis methods, and security.

Study on Utilization Drones in Domestic Logistics Service in Korea (한국내 물류서비스에 드론 활용을 위한 연구)

  • Kang, Ki-Seog;Jeon, In-Oh
    • Journal of Distribution Science
    • /
    • v.14 no.5
    • /
    • pp.51-57
    • /
    • 2016
  • Purpose - In the year of 2015 and 2016, one of the items that got attention in CES was a drone. It has been 100 years since a drone emerged, but most were used for military purposes. As its use became diverse as of 2010, it got attention of the general public. In Korea, it was in 2011 that a drone was known to the public through an aerial video shooting for television program. This study tried to come up with suggestions by comparing domestic with overseas cases, and tried to consider the related technologies and systems with applying the role of drones in logistics service. Research design, data, and methodology - The overseas cases were regarded as drone's logistical purpose. The Prime Air service by US Amazon is still not commercialized and under pre-testing due to Federal Aviation Regulations, although it started in 2013. In Germany, DHL succeeded in delivering service testing which is called Parcelcopter, but it is not commercialized yet. Other than these, there are more attempts to prepare logistics service in China with Taobao, in France with Geopost's test, and in Africa. In Korea, CJ Korea Express tested delivery with a self-developed drone Results - In order to study for utilizing drones for logistics as the prerequisites, some overseas and domestic cases, which are currently considered, were reviewed. Also, the technologies and institutional requirements to commercialize drones for logistical purpose were reviewed. The reasons for using drones in logistics is to ensure the price competitiveness by reducing cost. The empirical test also will be needed because drone pilot areas are designated by ministry of land, infrastructure and transport. Conclusions - In order to utilize drones in logistics and foster the industry, this study would like to suggest the followings. First of all, size of drones for logistics needs to be fixed and their operating system should be standardized. Centralized investment resources are needed through standardization to ensure the market occupancy. Secondly, it is necessary to get the converged businesses that do research, develop and commercialize drones with the investment of private sector. Example can be found in Korea aerospace Industries. We can respond to the rapid growth of the market with intensive investing by integrating the private sector investment. Thirdly, institutional arrangements are needed to be established quickly. In the case of high-technologies like drones, institutional support often does not follow the rapid development of the technology. The problems can be found in securing drones-only airspace, creating drone-specialized pilot's license, matters related to remote controller and complementary regulations for drones in Aviation Act. If these regulations are not prepared or complemented at the right timing, technologies cannot be commercialized even though the development is completed. Fourthly, there is a need to secure the transparency regarding possible privacy and personal information protection problem while operating drones. Finally, in order to foster this new industry, government should focus on supporting R&D more in the long term than short term outcomes.

GIS-based Study on Residential and Neighboring Environment and Residents' Social Exclusion in Slum Area (쪽방밀집지역의 주거환경과 주민들의 사회적 배제에 대한 GIS 활용 연구)

  • Kim, Dong-Seon
    • The Journal of the Korea Contents Association
    • /
    • v.17 no.8
    • /
    • pp.209-225
    • /
    • 2017
  • This study examines the effect of residential and neighboring environment on the residents' social exclusion in Daejeon Chokbangchon, the city's slum area. Based on GIS methodology with residents' addresses and other characteristics, this study finds out the feminization and the ageing trends in the central part of this area. Besides, longitudinal data between 2007 to 2016 shows this area's depopulation resulting in people's spread into other parts of the city. This study took pictures of 252 images of in the streets and indoors, analysed them and defined the problems of residential and neighboring environment. According to this picture analysis, the predicaments of this area was categorized into 4 types such as appearance-hygiene, narrowness-lack of residential functions, safety-privacy violation and stigma. This area ranging 1 km from north to south adjacent with Daejeon railway station was divided into 4 sections with different main problems. The follow-up survey for residents living in each section showed each section was different in work state, neighbor satisfaction, stigma and social exclusion. Finally, residential satisfaction was found to be the most important affecting factor on social exclusion. Based on these results, this study suggests government's housing policy on this area to be more enthusiastic and specific to cope with each problems of sections.