• Title/Summary/Keyword: Data protection

Search Result 3,415, Processing Time 0.03 seconds

The awareness and performance towards the dental radiation protection behaviors in Busan and Gyeongnam (부산·경남 일부지역의 치과방사선 인식도와 수행도에 따른 치과방사선 방어행위)

  • Na, Hyeon-Hui;Jin, Hye-Jung;Lee, Min-Kyung
    • Journal of Korean society of Dental Hygiene
    • /
    • v.14 no.5
    • /
    • pp.673-680
    • /
    • 2014
  • Objectives : The purpose of this study is to investigate the awareness and performance towards the dental radiation protection behaviors in dental institutions in Busan and Gyeongnam. Methods : Two hundred and one dental medical institutions in Busan and Gyeongnam participated in the survey from March 10 to April 4, 2014. The data were analyzed using SPSS 19.0 for ${\chi}^2$ test, t-test, ANOVA, and multiple regression analysis. Results : There were significant differences in the awareness and performance towards the radiation protection behaviors according to age, monthly income, and type of hospital(p<0.05). Protective equipment influenced on the awareness and performance of dental staff and patients(p<0.001). The important variables on dental radiation protection included protection facility and education of protective equipment. It is found the variable to affect the performance of dental radiation protection was protection facility, wearing of protective device staff and patients, education on RSM. Conclusions : These results can provide the basic data for the effective dental radiation safety management and improvement for the dental institutions.

A Study on the Role and Security Enhancement of the Expert Data Processing Agency: Focusing on a Comparison of Data Brokers in Vermont (데이터처리전문기관의 역할 및 보안 강화방안 연구: 버몬트주 데이터브로커 비교를 중심으로)

  • Soo Han Kim;Hun Yeong Kwon
    • Journal of Information Technology Services
    • /
    • v.22 no.3
    • /
    • pp.29-47
    • /
    • 2023
  • With the recent advancement of information and communication technologies such as artificial intelligence, big data, cloud computing, and 5G, data is being produced and digitized in unprecedented amounts. As a result, data has emerged as a critical resource for the future economy, and overseas countries have been revising laws for data protection and utilization. In Korea, the 'Data 3 Act' was revised in 2020 to introduce institutional measures that classify personal information, pseudonymized information, and anonymous information for research, statistics, and preservation of public records. Among them, it is expected to increase the added value of data by combining pseudonymized personal information, and to this end, "the Expert Data Combination Agency" and "the Expert Data Agency" (hereinafter referred to as the Expert Data Processing Agency) system were introduced. In comparison to these domestic systems, we would like to analyze similar overseas systems, and it was recently confirmed that the Vermont government in the United States enacted the first "Data Broker Act" in the United States as a measure to protect personal information held by data brokers. In this study, we aim to compare and analyze the roles and functions of the "Expert Data Processing Agency" and "Data Broker," and to identify differences in designated standards, security measures, etc., in order to present ways to contribute to the activation of the data economy and enhance information protection.

Pseudonymization's effect on data quality: A study under personal information protection act (개인정보보호법에 따른 가명처리로 인한 데이터 손실이 데이터 분석의 정확도에 미치는 영향)

  • Minjeong Kim;Jae Keun Yoo
    • The Korean Journal of Applied Statistics
    • /
    • v.37 no.3
    • /
    • pp.381-393
    • /
    • 2024
  • This study investigates the impact of pseudonymization of personal information and its effect on the accuracy of data analysis. We quantitatively evaluated the relationship between the degree of pseudonymization and the accuracy of data analysis using logistic regression models, decision trees, and random forests. Through this, we confirmed that pseudonymizing sensitive information can realize personal information protection without significantly damaging data quality. However, we recognized limitations such as single sample data and consistent application of pseudonymization ratios. To overcome these limitations, additional research on diverse datasets is necessary to strengthen the generalizability of results. Moreover, we propose developing and applying methodologies to find optimal pseudonymization ratios for individual variables. The results from this study provide new insights into maintaining usability of data while achieving regulatory compliance and personal information protection.

The Effect of Corporate Social Responsibility on the Corporate Image and Purchase Intention (패션기업의 사회적 책임활동이 기업이미지와 구매인도에 미치는 영향)

  • Jeon, Ji-Hyun
    • Journal of the Korean Society of Clothing and Textiles
    • /
    • v.35 no.5
    • /
    • pp.547-560
    • /
    • 2011
  • This study examines the effect of corporate social responsibility on the corporate image and purchase intention. The data were obtained from 320 male and female 'C' university students in Daejeon in October of 2010. The data were analyzed by descriptive statistics, factor analysis, reliability analysis, regression analysis using the SPSS-WIN 15.0 and AMOS 7.0 program. The results were as follows. First, corporate social responsibility consists of five dimensions: community/cultural service, social contribution, environmental protection, consumer protection/legal responsibility, and economic responsibility. Purchase intention consists of comparative purchase and priority purchase. Second, social contribution, consumer protection/legal responsibility, and economic responsibility affect the corporate image. Third, social contribution and consumer protection/legal responsibility also affect purchase intention. Forth, the corporate image affects purchase intention. The findings of this study are expected to be used as basic data for establishing differentiated marketing strategies in fashion company.

Criminal And Legal Protection Of Information Relations

  • Manzhai, Oleksandr;Kuryliuk, Yurii;Miroshnykov, Ivan;Syiploki, Mykola;Vazhynskyi, Volodymyr
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.5
    • /
    • pp.284-288
    • /
    • 2022
  • The article analyzes the regulations of current criminal law, which ensures the protection and protection of information relations, offers the optimal model of the system of norms of the Criminal Code of Ukraine, which establishes liability for violation of information. The subject of the article is protected information, which should include information or data, the procedure for access to and distribution of which, regardless of the method of submission, storage or organization, are subject to legal regulation in accordance with laws and regulations. For the purposes of criminal law, information as an object of criminal law protection should be classified on the following grounds: depending on the content: personal or family secrets; information constituting a state secret; data included in the official secret; information that constitutes a professional secret; information that constitutes a commercial, tax, banking secret, and, depending on the medium - documented and undocumented.

A Study on the User Authentication and the Protection of Data in the Collaborative Cloud Storage (협업을 위한 클라우드 스토리지에서의 사용자 인증과 데이터 보호에 관한 연구)

  • Jae-Young, Lee
    • Journal of Digital Convergence
    • /
    • v.12 no.9
    • /
    • pp.153-158
    • /
    • 2014
  • The Collaborative Cloud Storage is that several members of collaborating group together use data stored in a storage. Therefore, it is obvious that it is more complicated and important to protect data stored in the sharing storage than general cloud storage, not Collaborative Cloud Storage. this paper proposes a method for user authentication and data protection.

Analysis of MSAS Correction Information and Performance in Korea (MSAS 보정정보 분석 및 국내 적용 시 성능 평가)

  • Jeong, Myeong-Sook;Kim, Jeong-Rae
    • Journal of the Korean Society for Aeronautical & Space Sciences
    • /
    • v.37 no.4
    • /
    • pp.372-382
    • /
    • 2009
  • A GNSS software for processing the SBAS correction data is developed, and Japan MSAS correction data is analyzed. MSAS orbit correction data is analyzed and compared with WAAS data. MSAS ionosphere correction data is analyzed and the effect of the equatorial anomaly on the correction accuracy is discussed. Degradation due to receive delay of correction information and effect of the degradation on protection level analyzed using partial remove of MSAS correction information. Integrity and availability for precision approch using the MSAS system analyzed.

Trend of DomeTrend of Domestic Patent and Utility Model Application of Head Protector Technologystic Patent and Utility Model Application of Head Protector Technology (머리 안전·보호구 기술의 국내 특허 및 실용신안 출원 동향)

  • Hyunjung Han;Eunkung Jeon
    • Journal of the Korean Society of Clothing and Textiles
    • /
    • v.46 no.6
    • /
    • pp.1128-1141
    • /
    • 2022
  • Due to increased interest in safety in sports, leisure, industries, and daily life; the demand for products that protect the head is increasing. As a preparatory study for the development of head protection for head injury prevention, this study analyzed patents and utility models related to head protection products such as industrial safety helmets, vehicle helmets, and sports protection gear. For this study, 368 patents and utility models for head protection products searched through WipsOn were selected and analyzed by application year, function, application, protection area, main material, and subject. From the analytic results of this study, the quantitative and qualitative flow and characteristics of developing technology related to head protection products were identified. Through the trend of current technology, it provided data to seek the development direction in the future. The significance of this study is to secure objective data to establish a road map for creating new Intellectual Property for head protection products.

A Data Protection Scheme based on Hilbert Curve for Data Aggregation in Wireless Sensor Network (센서 네트워크에서 데이터 집계를 위한 힐버트 커브 기반 데이터 보호 기법)

  • Yoon, Min;Kim, Yong-Ki;Chang, Jae-Woo
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.16 no.11
    • /
    • pp.1071-1075
    • /
    • 2010
  • Because a sensor node in wireless sensor networks(WSNs) has limited resources, such as battery capacity and memory, data aggregation techniques have been studied to manage the limited resources efficiently. Because sensor network uses wireless communication, a data can be disclosed by attacker. Thus, the study on data protection schemes for data aggregation is essential in WSNs. But the existing data aggregation methods require both a large number of computation and communication, in case of network construction and data aggregation processing. To solve the problem, we propose a data protection scheme based on Hilbert-curve for data aggregation. Our scheme can minimizes communications among neighboring sensor nodes by using tree-based routing. Moreover, it can protect the data from attacker by doing encryption through a Hilbert-curve technique based on a private seed, Finally, we show that our scheme outperforms the existing methods in terms of message transmission and average sensor node lifetime.

Hybrid Recommendation Algorithm for User Satisfaction-oriented Privacy Model

  • Sun, Yinggang;Zhang, Hongguo;Zhang, Luogang;Ma, Chao;Huang, Hai;Zhan, Dongyang;Qu, Jiaxing
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.16 no.10
    • /
    • pp.3419-3437
    • /
    • 2022
  • Anonymization technology is an important technology for privacy protection in the process of data release. Usually, before publishing data, the data publisher needs to use anonymization technology to anonymize the original data, and then publish the anonymized data. However, for data publishers who do not have or have less anonymized technical knowledge background, how to configure appropriate parameters for data with different characteristics has become a more difficult problem. In response to this problem, this paper adds a historical configuration scheme resource pool on the basis of the traditional anonymization process, and configuration parameters can be automatically recommended through the historical configuration scheme resource pool. On this basis, a privacy model hybrid recommendation algorithm for user satisfaction is formed. The algorithm includes a forward recommendation process and a reverse recommendation process, which can respectively perform data anonymization processing for users with different anonymization technical knowledge backgrounds. The privacy model hybrid recommendation algorithm for user satisfaction described in this paper is suitable for a wider population, providing a simpler, more efficient and automated solution for data anonymization, reducing data processing time and improving the quality of anonymized data, which enhances data protection capabilities.