• Title/Summary/Keyword: Data Privacy

Search Result 1,246, Processing Time 0.029 seconds

A Study on Library Service using Artificial Intelligence: Focused on North American University Libraries (인공지능(AI)을 이용한 도서관서비스 연구 - 북미 대학도서관을 중심으로 -)

  • Kim, Ji-Hyun
    • Journal of Korean Library and Information Science Society
    • /
    • v.51 no.4
    • /
    • pp.231-247
    • /
    • 2020
  • As artificial intelligence (AI) has emerged as a promising future technology among the fourth industrial revolution, we are trying to apply artificial intelligence technology across all area of society, including libraries. This study investigated the effects, issues, and implications of artificial intelligence on university library services. As a research method, in-depth interviews were conducted with IT experts of university libraries in North America, and conclusions and discussion were drawn from interview results and related documents. Research results revealed that university libraries in North America were trying to build an infrastructure that facilitates information access and retrieval based on artificial intelligence systems and to provide new services in collaboration with AI research institutes in universities. This study raised issues regarding the expansion of the role of libraries and librarians, privacy, and data quality. It was also discussed that the need for re-education of university librarians to become software engineers who play a role in disseminating knowledge. In addition, this study suggested the investment for the establishment of the information system and an artificial intelligence research center in the library. The study discussed limitations of research due to changes in the research environment and suggestions for future research.

Characteristics of Spatial Environment in Psychiatric Wards through the Analysis by Patient's Preferred Healing Environment in Observational Ward Structure Dividing Staff Area and Patient Area (정신요양 병동에서의 관리영역과 환자의 요양 공간영역의 관찰적 시선에 따른 병동구조와 요양 공간환경의 특성에 관한 연구)

  • Joo, Yongsun
    • Journal of The Korea Institute of Healthcare Architecture
    • /
    • v.27 no.2
    • /
    • pp.57-64
    • /
    • 2021
  • Purpose: The relationship between the staff area and the patient's private area is the key factor in designing the structure and the environmental characteristics of ward spaces in a psychiatric hospital. Recent research has found that for the purpose of treatment and securing privacy, psychiatric patients need to be in an open space of relief rather than closed confined environment and under the watch of nursing staffs. Methods: A survey at three kinds of wards in a private psychiatric hospital in Japan was conducted in October 2002. These wards include an acute ward, a psychiatric convalescence ward, and a stress care ward. All three kinds of wards have the same structure. At each ward, spatial preferences of the 145 psychiatric inpatients were surveyed and data concerning the patient's diagnostic category, symptoms, and activities of daily living were recorded. Results: The patients in the stress care ward prefer to stay in private spaces than public spaces. On the other hand, in the acute ward the patients seem to have a preference between managed public spaces where are monitored by nursing staffs and their private rooms where the nurse station is close. In addition, the patients in the psychiatric convalescence ward spend most of their time in the public space, such as the hallways or the day room. Implications: Base on this research, the spaces at the acute ward that could be monitored by the nursing station serves effectively as a safety space for patients was concluded. However, in the stress care ward, the patients may perceive the monitoring by the nursing staff as interruption or nuisance to their relaxation. In order to design an ideal healing environment for psychiatric patients in psychiatric ward, it is important to consider how environmental characteristics of space affect the environmental sense of patients in each ward.

Public Key Encryption with Keyword Search in Multi-Receiver Setting (다중 수신자 환경에서 키워드 검색 가능한 공개키 암호시스템)

  • Rhee, Hyun-Sook;Park, Jong-Hwan;Rhee, Dong-Hoon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.19 no.2
    • /
    • pp.31-38
    • /
    • 2009
  • To provide the privacy of a keyword, a public key encryption with keyword search(PEKS) firstly was propsed by Boneh et al. The PEKS scheme enables that an email sender sends an encrypted email with receiver's public key to an email server and a server can obtain the relation between the given encrypted email and an encrypted query generated by a receiver. In this email system, we easily consider the situation that a user sends the one identical encrypted email to multi-receiver like as group e-mail. Hwang and Lee proposed a searchable public key encryption considering multi-receivers. To reduce the size of transmission data and the server's computation is important issue in multi-receiver setting. In this paper, we propose an efficient searchable public key encryption for multi-receiver (mPEKS) which is more efficient and reduces the server's pairing computation.

A Study on Efficient ID-based Partially Blind Signature (효율적인 ID 기반 부분은닉서명에 관한 연구)

  • 김현주;오수현;원동호
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.13 no.6
    • /
    • pp.149-161
    • /
    • 2003
  • Partially blind signature scheme allows the signer to insert non-removable common information into his blind signature. Blind signatures providing with both users privacy and data authenticity are one of key parts of information systems, such anonymous electronic cash and electronic voting as typical examples. Partially blind signature, with which all expired e-cash but for still-alive can be removed from the banks database, copes well with the problem of unlimited growth of the banks' database in an electronic cash system. In this paper we propose an efficient ID-based partially blind signature scheme using the Weil-pairing on Gap Diffie-Hellman group. The security of our scheme relies on the hardness of Computational Diffie-Hellman Problem. The proposed scheme provides higher efficiency than existing partially blind signature schemes by using three-pass protocol between two participants, the signer and requesters also by reducing the computation load. Thus it can be efficiently used in wireless environment.

Public Key Encryption with Equality Test with Designated Tester (고정된 검사자를 고려한 메시지 동일성 검사 공개키 암호시스템)

  • Lee, Young-Min;Koo, Woo-Kwon;Rhee, Hyun-Sook;Lee, Dong-Hoon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.21 no.5
    • /
    • pp.3-13
    • /
    • 2011
  • In 2004, Boneh et.al. proposed a public key encryption with keyword search (PEKS) scheme which enables a server to test whether a keyword used in generating a ciphertext by a sender is identical to a keyword used in generating a query by a receiver or not. Yang et. al. proposed a probabilistic public key encryption with equality test (PEET) scheme which enables to test whether one message of ciphertext generated by one public key is identical to the other message generated by the other public key or not. If the message is replaced to a keyword, PEET is not secure against keyword guessing attacks and does not satisfy IND-CP A security which is generally considered in searchable encryption schemes. In this paper, we propose a public key encryption with equality test with designated tester (dPEET) which is secure against keyword guessing attacks and achieves IND-CPA security.

A Low-Cost RFID Tag Search Protocol Preventing the Reuse of Mobile Reader's Tag-List (모바일 리더의 태그 리스트 재사용을 방지하는 저비용 RFID 태그 검색 프로토콜)

  • Yeo, Don-Gu;Lee, Sang-Rae;Choi, Hyun-Woo;Jang, Jae-Hoon;Youm, Heung-Youl
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.21 no.1
    • /
    • pp.143-151
    • /
    • 2011
  • When a real-time data transfer is not possible between a reader and a back-end server in the mobile environment, the reader should support a capability to search a certain tag without communicating with a back-end server. Some recent papers related to the mobile reader-based tag search protocol have addressed privacy concerns for the reader and the tags. However, to our best knowledge, there are no papers addressing the problem arising from reusing tag lists existed in the mobile reader. In other words, there arise a problem that a mobile reader which has lost an right to access to a specific tag is able to search that tag by reusing a tag list for searching a particular tag. If mobile reader having an unauthorized tag list, the mobile reader can reuse a particular tag list. Our protocol provides the enhanced secure tag lists preventing the reuse of the tag lists and an efficient tag search protocol based on dynamic identity in the mobile reader-based RFID environments.

Mutual Identification and Key Exchange Scheme in Secure Vehicular Communications based on Group Signature (그룹 서명 기반의 차량 네트워크에서 상호 신분 확인 및 세션키 교환 기법)

  • Kim, Dai-Hoon;Choi, Jae-Duck;Jung, Sou-Hwan
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.20 no.1
    • /
    • pp.41-50
    • /
    • 2010
  • This paper proposes a mutual identification and session key exchange scheme in secure vehicular communication based on the group signature. In VANETs, security requirements such as authentication, conditional privacy, non-repudiation, and confidentiality are required to satisfy various vehicular applications. However, existing VANET security methods based on the group signature do not support a mutual identification and session key exchange for data confidentiality. The proposed scheme allows only one credential to authenticate ephemeral Diffie-Hellman parameters generated every key exchange session. Our scheme provides a robust key exchange and reduces storage and communication overhead. The proposed scheme also satisfies security requirements for various application services in VANETs.

Design and Implementation of an Android Application for Protecting the Personal Information on Smart Phones (스마트폰의 개인 정보 보호를 위한 안드로이드용 어플리케이션 설계 및 구현)

  • Lim, Hun-Jin;Choi, Do-Jin;Yoo, Jae-Soo
    • The Journal of the Korea Contents Association
    • /
    • v.20 no.12
    • /
    • pp.266-277
    • /
    • 2020
  • As users' convenience increases, the issue of personal information leakage about smartphones is also becoming serious. Since all of the user's personal information needed to provide functions such as electronic banking services and personal file storage is stored in the smartphone, the user's important personal information may be exposed if the smartphone is lost or stolen. In order to protect this privacy, governments and telecommunications companies offer smartphone locking or initialization services, but there are many loopholes and problems. In this paper, we design and implement applications that prevent malicious use of a user's personal information stored on a smartphone when a smartphone is lost or stolen, and that automatically initializes the smartphone used after removing or altering the USIM chip and destroys the user's personal information stored within the phone. The proposed application prevents users from maliciously using their personal information when a smartphone is lost or stolen.

Awareness of Dental Hygiene Department Students regarding the Protection of Patients' Personal Information (환자 개인정보보호에 대한 치위생 전공 학생의 인식도)

  • Cho, Myung-Sook;Lee, Seong-Sook
    • Journal of Korean Dental Hygiene Science
    • /
    • v.4 no.1
    • /
    • pp.89-98
    • /
    • 2021
  • Background: The purpose of the present study was to gather basic data necessary for developing an educational program regarding the protection of patients' personal information. Such a program would stress the importance of the protection of patients' personal information for dental hygiene students obtaining clinical practice. Methods: A self-reported questionnaire-based survey was conducted targeting dental hygiene undergraduates who were obtaining clinical practice in the capital region. A total of 543 questionnaires were included in the analysis. Results: The results of this study were as follows: 1) the average score for awareness of the Patient Privacy Act was 2.93 on a 4-point scale; 2) the average score for the recognition of the protection of patients' personal information was 3.22 on a 4-point scale; 3) the area-based perception of the protection of patient's personal information was 3.37 points for communication, which scored highest, followed-by the linked-work area at 3.27 points, the patient's information management at 3.22 points, and the direct dental hygiene work at 3.18 points; 4) with regard to awareness of the protection of patients' personal information according to general characteristics, the perception was higher in the advanced academic year (p < 0.01), in those who had education regarding the protection of patients' personal information at both the university and the clinical practice institution (p < .05), and in those with higher grades (p < 0.01). Conclusions: Based on the above findings, the development and application of an educational program to improve awareness of the protection of patients' personal information are considered to be necessary by both universities and clinical practice institutions.

A Study on the Customer Experience Design through analyzing Smart Hotels in China (중국 스마트 호텔의 사례 연구를 통한 사용자 경험 연구)

  • Luo, Xuan;Pan, Yonghwan
    • Journal of the Korea Convergence Society
    • /
    • v.12 no.3
    • /
    • pp.115-124
    • /
    • 2021
  • The outbreak of covid-19 has brought the characteristics and advantages of non-contact services to increased prominence, and the development of smart hotels"has accelerated. This study aims to identify, categorize and define the smart service experience at different touch points of the customer experience. The concept and characteristics of the smart hotel were examined based on existing research and literature. An analytical framework was designed using smart experience factors and customer touch points of smart hotels. Selected Chinese smart hotels were then examined under this framework. The case analysis results show that the customer experience design of smart hotels has developed to different degrees, in terms of interactivity, personalization, accessibility, information and privacy security. Based on the above findings, this article suggests that the design of smart hotels should use integrated data to further enhance personalized service experience.