• Title/Summary/Keyword: Data Privacy

Search Result 1,246, Processing Time 0.026 seconds

A self-portrait of the information society: An Arguments on the SNS users' Responsibilities

  • Seo, Ran-Sug
    • Journal of the Korea Society of Computer and Information
    • /
    • v.25 no.8
    • /
    • pp.159-172
    • /
    • 2020
  • Social networking services (SNS) are developing significantly with the Internet and smartphones. It's a friendly social media, but if you think deeply about it, you'll find that it has a variety of faces. It is a communication tool between users, a medium for delivering information, an infrastructure for providing applications, and a community where people with common interests gather. In recent years, business tools, shopping and payment methods are also being swallowed. The influence of the spread of SNS on the real world is also expanding, and the work being dealt with from a sociological perspective is also increasing. Also, if you pay attention to the technical aspects of SNS, it is composed of various technical elements, such as infrastructure that handles large-scale access, user interface that supports comfortable use, and big data analysis to understand people's behavior more deeply. However, I usually use it as usual. However, if you look through SNS, you can see that the situation is surprisingly profound and multifaceted. This study began by looking at the history and current status of SNS and attempted to find its status through comparison with other media. From the point of view of relationship with society, it can be a risk and legal issue when using SNS, such as crimes using bad social media or social media. It is also necessary to comment on the activities on SNS or the guidelines established by the operators. Therefore, various legal issues on SNS will be discussed. Also, as an example of using SNS, I will introduce an example of using SNS in disaster response. From a more technical point of view, you will receive commentary on SNS's network-based technology and SNS's information use, and these articles will help you understand and use SNS safely and help you further utilize or develop SNS.

An Explorative Study of Consumer Response on O2O Service Types: Focusing on Delivery and Car sharing service (O2O(Online to Offline)서비스 사업 형태에 따른 소비자 반응에 관한 탐색적 연구 : 배달 서비스와 카셰어링 서비스 중심으로)

  • Sung, Jungyeon
    • Journal of Digital Convergence
    • /
    • v.18 no.1
    • /
    • pp.129-135
    • /
    • 2020
  • This study examined the consumer response of the current O2O service between service types. Previous studies mainly focused on the quality factor of O2O service or Technology Acceptance Model or extended TAM, This study is different from the fact that there are differences in factors that consumers consider important and consumer reactions by service type. It is also significant that we compared between representative food delivery services and car sharing services that are actively used among O2O services. As O2O service is closely related to consumer's life, this study chose three factors that the issue of personal information security and trust of intermediary platform companies, and finally subjective norm based on individuals and groups who are aware of new O2O service. To test hypotheses, data were collected and analyzed for 301 samples, focusing on delivery and car sharing service, As a result, the delivery service among the O2O services was more positive to attitude toward service in the consumer group with lower personal information security, trust in platform, and subjective norm than car sharing service. Based on these results, implications and future research directions were presented.

The Design and Implementation of Secure Instant Messaging System (안전한 단문 전송 시스템 설계 및 구현)

  • Song, Gi-Pyeung;Sohn, Hong;Jo, In-June;Ju, Young-Ki;Lee, Dal-Won
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.5 no.2
    • /
    • pp.357-364
    • /
    • 2001
  • The Instant Messenger(IM) is the most popular personal communication tool today. IM is a tool that can substitute E-mail for a person, and can secure the user for a company. Further, it is claimed as it has a limitless potential. However, there has been several reports on security issues. It has known that the transmitting message is not secured for the attacks, and hacking tools has been developed. In addition, several reports has been made regards to the vulnerability. In other words, anyone can peep through and manipulate the messages that are sent or received via IM. This is a barrier for the IM to be developed as a corporate's strategic tool, and furthermore, it will create serious personal privacy issue. IETF IMPP Working (:roup is preparing a standard mutual relationship between IM. However, it is complicated due to the American On-Lines's absence, whom has ensured the most number of IM users. There was a discussion only about the form of the transmitting data, but it is insufficient state to discuss the security service for general. In this paper, 1 design and implement the Secure Instant Messaging System, to solve the IM's vulnerability and the security issue presented above.

  • PDF

Verifying a Safe P2P Security Protocol in M2M Communication Environment (M2M 통신환경에서 안전한 P2P 보안 프로토콜 검증)

  • Han, Kun-Hee;Bae, Woo-Sik
    • Journal of Digital Convergence
    • /
    • v.13 no.5
    • /
    • pp.213-218
    • /
    • 2015
  • In parallel with evolving information communication technology, M2M(Machine-to-Machine) industry has implemented multi-functional and high-performance systems, and made great strides with IoT(Internet of Things) and IoE(Internet of Everything). Authentication, confidentiality, anonymity, non-repudiation, data reliability, connectionless and traceability are prerequisites for communication security. Yet, the wireless transmission section in M2M communication is exposed to intruders' attacks. Any security issues attributable to M2M wireless communication protocols may lead to serious concerns including system faults, information leakage and privacy challenges. Therefore, mutual authentication and security are key components of protocol design. Recently, secure communication protocols have been regarded as highly important and explored as such. The present paper draws on hash function, random numbers, secret keys and session keys to design a secure communication protocol. Also, this paper tests the proposed protocol with a formal verification tool, Casper/FDR, to demonstrate its security against a range of intruders' attacks. In brief, the proposed protocol meets the security requirements, addressing the challenges without any problems.

Implementation of A Patient Card Integrating System Using by IC Card To Share A Medical Information (진료정보 공유를 위한 IC카드 기반 병원 진찰 카드 통합 시스템 구축)

  • Pack D.H.;Lee N.Y.;Kim Y.J.;Lee K.B.
    • Journal of Biomedical Engineering Research
    • /
    • v.24 no.6 s.81
    • /
    • pp.533-541
    • /
    • 2003
  • In the paper. the health card system to integrate several cards into one card for protecting patient's privacy and security problems is proposed. Firstly, it is defined the minimal data set for integrating several patient cards into one card using IC card, and developed the issuing system to issue the integrated patient IC card. In order to secure and certificate a patient's personal information. the integrated patient IC card has applied 3-DES and the PKI certificate authority based Windows 2000 is established. The receipt and reservation system for taking care of a healthcare has developed to cooperate with the existing hospital computer system. The integrating patient IC card system proposed in this paper is implemented to 11 hospitals and used for 1.000 patients. On the result of the simulation. the proposed system can receive or reserve for a patient to take care of healthcare in the simulated hospitals and also establish the basis of the mechanism to share a medical information.

Development and Evaluation of a Protocol for Bedside Nursing Handoff with Patient Engagement in a Tertiary Hospital in South Korea (한국형 환자참여 간호사 침상인계 프로토콜 개발 및 평가)

  • Lee, Tae Wha;Ji, Yoon Jung;Jang, Yeon Soo;Do, Hyun Ok;Oh, Kyoung Hwan;Kim, Chang Kyung;Chun, Ja Hye;Shin, Hae Kyung;Cho, Mee Young;Bae, Jung Im
    • Journal of Korean Clinical Nursing Research
    • /
    • v.26 no.1
    • /
    • pp.117-130
    • /
    • 2020
  • Purpose: This study aimed to develop a bedside nursing shift report protocol and evaluate the effect of the protocol in a tertiary hospital in South Korea. Methods: The bedside nursing handoff protocol with patient engagement was developed based on the literature review and the validation of an expert group. The effect of the protocol on clinical implication was tested in three medical-surgical units in a tertiary hospital. Outcomes were assessed by patient perception, nurse perception, and reporting time. Data collected from June to August in 2018 and analyzed with descriptive statistics and One-way ANOVA using SPSS version 25.0. Results: The bedside nursing shift report protocol with patient engagement consisted of two steps: nurse to nurse report and bedside report with patients. Nurse's perception with patient engagement was significantly increased after applying protocol (F=17.85, p<.001). Patient's perception was significantly improved in the areas of discharge plan (F=7.86, p<.001), health information privacy (F=4.46, p=.012) and identify attending nurse (F=3.19, p=.042). There were no differences in reporting time between the bedside nursing shift report and a traditional shift report (F=0.61, p=.054). Conclusion: Patient perception was significantly increased, while nurse perception was not different after applying this protocol. For the change in the perception of nurses, education may be preceded to improve nurses' competence for the bedside shift report. Furthermore, the support in enough nurse staffing should be needed for encouraging the bedside shift report. The bedside shift report may enhance patient engagement. Therefore it may improve patient safety and health outcome in clinics.

The Effects of Judo Training of Male University Students Security Martial Art Majoring on Body Composition, Behavioral Fitness, Growth hormone and IGF-1 (경호무도전공 남자대학생들의 유도수련이 신체구성, 행동체력, 성장호르몬 및 IGF-1에 미치는 영향)

  • Yang, Sang-Hoon
    • Korean Security Journal
    • /
    • no.57
    • /
    • pp.85-110
    • /
    • 2018
  • The bodyguard is continuously training basic physical training and security art martial to protect the privacy of security target, prepare and deal with external contingencies and threats. Currently, university students majoring in security are required to take a judo class, one of their security art martial, which can use a technology to catch, crush and repress opponent. Therefore, this study identified the effects of systematic training on body composition, Performance fitness, growth hormones, and IGF-1 among male university students through a 10-week judo training program so that it was committed to providing objective data to enhance the value of judo as a security art martial and as a result, we have a conclusion as follows: After 10 weeks of judo training, muscle mass increased significantly, and body fat rate and BMI decreased significantly. The muscular strength and power of Performance fitness were shown to increase significantly, and growth hormones were shown to increase significantly. In total, the above results showed that for judo training university students, overall body composition improved positively, the muscular strength and power of active physical fitness improved, and growth hormones increased. Thus, the increase in muscle strength and growth hormones through judo training will encourage fat breakdown due to the development of the body's muscles and increase bone density in the spine, thereby reducing the risk of fractures and preventing injury to the trainees who are performing a security art martial. It will also greatly help your health by preventing obesity, cardiovascular and metabolic diseases, which eventually will enhance your bodyguard function and prolong your life as a bodyguard.

Transponder and Ground Station Systems for Drones

  • Kim, Ki-Su;Ha, Heon-Seong;Lee, Jong-Chan
    • Journal of the Korea Society of Computer and Information
    • /
    • v.25 no.6
    • /
    • pp.9-15
    • /
    • 2020
  • In this paper, we propose a case that drone (unmanned aerial vehicle), one of the representative technologies of the 4th Industrial Revolution, threatens airport safety and privacy infringement, and describes a drone control system proposal to solve the problem. Unmanned aerial vehicle (Drone) is creating a serious problem recently, In Korea, on May 21, 19, according to the Jeju Regional Aviation Administration, drones flew over Jeju Jeongseok Airfield twice in the same month, causing problems in aircraft operation. In overseas cases, two drones near the runway of Gatwick International Airport in the UK There has been a disturbance in which the takeoff and landing of the aircraft flies for a while, and various problems have occurred, such as voyeuring the private life of an individual using a drone. This paper is equipped with an Acess Point transponder mounted on a drone (unmanned aerial vehicle), and unspecified many who want to receive flight information (coordinates, altitude, and obstacles) of the drone access the drone AP, receive and receive the flight information of the drone, and receive unspecified multiple Drone AP flight information is collected and collected to provide the information of the drone currently floating on one user interface screen. In addition, an AP transponder is proposed to operate a safe drone (unmanned aerial vehicle) and the drone's flight information is transmitted., To receive and collect and collect data.

A Study on the Research Trends for Smart City using Topic Modeling (토픽 모델링을 활용한 스마트시티 연구동향 분석)

  • Park, Keon Chul;Lee, Chi Hyung
    • Journal of Internet Computing and Services
    • /
    • v.20 no.3
    • /
    • pp.119-128
    • /
    • 2019
  • This study aims to analyze the research trends on Smart City and to present implications to policy maker, industry professional, and researcher. Cities around globe have undergone the rapid progress in urbanization and the consequent dramatic increase in urban dwellings over the past few decades, and faced many urban problems in such areas as transportation, environment and housing. Cities around the globe are in a hurry to introduce Smart City to pursue a common goal of solving these urban problems and improving the quality of their lives. However, various conceptual approaches to smart city are causing uncertainty in setting policy goals and establishing direction for implementation. The study collected 11,527 papers titled "Smart City(cities)" from the Scopus DB and Springer DB, and then analyze research status, topic, trends based on abstracts and publication date(year) information using the LDA based Topic Modeling approaches. Research topics are classified into three categories(Services, Technologies, and User Perspective) and eight regarding topics. Out of eight topics, citizen-driven innovation is the most frequently referred. Additional topic network analysis reveals that data and privacy/security are the most prevailing topics affecting others. This study is expected to helps understand the trends of Smart City researches and predict the future researches.

Efficient Patient Information Transmission and Receiving Scheme Using Cloud Hospital IoT System (클라우드 병원 IoT 시스템을 활용한 효율적인 환자 정보 송·수신 기법)

  • Jeong, Yoon-Su
    • Journal of Convergence for Information Technology
    • /
    • v.9 no.4
    • /
    • pp.1-7
    • /
    • 2019
  • The medical environment, combined with IT technology, is changing the paradigm for medical services from treatment to prevention. In particular, as ICT convergence digital healthcare technology is applied to hospital medical systems, infrastructure technologies such as big data, Internet of Things, and artificial intelligence are being used in conjunction with the cloud. In particular, as medical services are used with IT devices, the quality of medical services is increasingly improving to make them easier for users to access. Medical institutions seeking to incorporate IoT services into cloud health care environment services are trying to reduce hospital operating costs and improve service quality, but have not yet been fully supported. In this paper, a patient information collection model from hospital IoT system, which has established a cloud environment, is proposed. The proposed model prevents third parties from illegally eavesdropping and interfering with patients' biometric information through IoT devices attached to the patient's body at hospitals in cloud environments that have established hospital IoT systems. The proposed model allows clinicians to analyze patients' disease information so that they can collect and treat diseases associated with their eating habits through IoT devices. The analyzed disease information minimizes hospital work to facilitate the handling of prescriptions and care according to the patient's degree of illness.