• Title/Summary/Keyword: Location privacy

Search Result 262, Processing Time 0.032 seconds

A Study on the Functional Efficiency according to Composition of Single Bedroom in Ward - Focused on Distance from NS to Bed - (종합병원 병동부 1인 병실 적용에 따른 기능효율성에 관한 연구 - 간호거점에서 병상간의 거리를 중심으로 -)

  • Kim, Khilchae;Lee, Hyunjin;Kwun, Joonbum
    • Journal of The Korea Institute of Healthcare Architecture
    • /
    • v.21 no.2
    • /
    • pp.17-24
    • /
    • 2015
  • Purpose: This study examines distance from nurse station to bed according to composition of single bedroom. Methods: This study has two groups of target sample ward planes. The first group has diverse patients bedroom. The other group is 36 single bedrooms and 2 3-bedrooms. The guideline of distance measurement was instituted for consistency. This study has 3 main concepts of the guideline. 1) The distance is shortcut from NS to bed. 2) The traffic line is center line between walls and center of door. 3) The start point is center of NS and the end point is bed. Results: The result of this study can be summarized into two points. The first one is that single bedroom has good privacy and longer distance from NS to bed. The second one is that weak point of single bedroom was asked ward operating system and architectural planning like as patients room, bed per unit, location of NS and plan type. Implications: Consideration Should be taken into account for the effective bedroom composition and allocation in ward. This Stuy hopefully serve as a stepping stone for the standard design of space program in ward planning.

A Robust Biometric-based User Authentication Protocol in Wireless Sensor Network Environment (무선센서네트워크 환경에서 생체기반의 개선된 사용자 인증 프로토콜)

  • Shin, Kwang-Cheul
    • The Journal of Society for e-Business Studies
    • /
    • v.18 no.3
    • /
    • pp.107-123
    • /
    • 2013
  • In a wireless sensor network environment, it is required to ensure anonymity by keeping sensor nodes' identifiers not being revealed and to support real-time authentication, lightweight authentication and synchronization. In particular, there exist possibilities of location information leakage by others, privacy interference and security vulnerability when it comes to wireless telecommunications. Anonymity has been an importance issue in wired and wireless network environment, so that it has been studied in wide range. The sensor nodes are interconnected among them based on wireless network. In terms of the sensor node, the researchers have been emphasizing on its calculating performance limit, storage device limit, and smaller power source. To improve of biometric-based D. He scheme, this study proposes a real-time authentication protocol using Unique Random Sequence Code(URSC) and variable identifier for enhancing network performance and retaining anonymity provision.

A Selection of Artificial Surveillance Zone through the Spatial Features Analysis of Crime Occurrence Place (범죄발생지점의 공간적 특성분석을 통한 인위적 감시지역의 선정)

  • Kim, Dong-Moon;Park, Jae-Kook
    • Journal of Korean Society for Geospatial Information Science
    • /
    • v.18 no.3
    • /
    • pp.83-90
    • /
    • 2010
  • In modern society, there has been an increase in needs to protect the life and property of the people, because the number of various crimes is on the increase due to the sudden and complicated changes of the urban environment. For the needs, security persons in the urban area are expanding the role and skill of police for more effective crime prevention and surveillance, although the number of policeman/woman is insufficient and their tasks are hard. Recently, a system to observe and prevent crime in effective has been introduced by using such an artificial surveillance device as CCTV to monitor focusing on one area for 24 hours. However, the system brings such problems as the insufficiency of systematic criteria to install surveillance device and the invasion of privacy. Therefore, in this study, artificial surveillance zones to monitor crimes are selected by applying spatial features between artificial surveillance devices including CCTV and crime occurrence place, and using GIS spatial analysis techniques. As a result of selecting, it's found that the number of CCTV is absolutely insufficient and spatial distribution is not fully considered in the existing location of installed CCTV.

A Study on the Plan Type of National Rental Housing during the 1978-'80s - Focused on the R.C Structure depending on an access method to stairs - (1978-80년대 국민임대주택의 평면유형에 관한 연구 - 계단진입방식에 따른 R.C구조 평면을 중심으로 -)

  • Kim, Hong-Bae
    • Journal of the Korean Institute of Rural Architecture
    • /
    • v.17 no.4
    • /
    • pp.49-56
    • /
    • 2015
  • This study aims to identify variables (dependent and independent variables) by plane type and area, focusing on the R.C structure planes which were applied to the National Rental Housing Complexes during the 1970-80s; and to investigate differences in residential space compositions depending on the interrelationship between the variables. The results of this study can be summarized as follows: First, an independent variable which had the most influence on the residential space composition was found to be stairs. As dependent variables, bedroom, livingroom, and kitchen showed difference in spatial arrangements. Second, in the case of the front entry type, one-sided arrangements were the most common for the 3L+D.K composition, because livingroom was arranged near the stairs, Disadvantages were: (1) the spatial division of each room was not efficient; and (2) the use of room space was low due to long access to each room. Third, in the case of the rear entry type, no problem was found in arranging bedrooms on the front side. By arranging livingroom as a common space area, the distance of approachability to each room was found to be short and the use of space was excellent. However, disadvantages were: (1) stability was lacking; and (2) privacy was low. Fourth, depending on the location of the stairs, an interaction between bedrooms and the connectivity between livingroom and kitchen were found. Accordingly, there were differences in the size and arrangement of space by plane type.

The Characteristics of the Floor Plan on Small-sized Apartments in DaLian-city, China (중국 대련시 소형아파트 평면특성)

  • Chen, Yi-Yang;Park, Sun-Hee
    • Journal of the Korean housing association
    • /
    • v.25 no.1
    • /
    • pp.63-71
    • /
    • 2014
  • This research is aimed to analyze the basic characteristics of the 16 floor plans of 4 small-sized apartments in DaLian-City. Recently, there are increasing that a small-sized apartments for new younger generation in China. The younger ages intend to got a new floor plan types apartments according to own's life style. Also, a lot of construction company showed the many types of new residential space design during the last about 10 years, in DaLian City. The research results are summarized as follows: First, all of the floor plan types were '-' shape, 'L' shape. Second, there were several co-relational types of space plan between living room, kitchen and dining space. Those are LDK, L K, L DK, LD K. Third, the bedroom of the $30m^2$-floor plan size has an open-space design but over the size of $40m^2$-floor plan the space is closed design. Fourth, The number of bathrooms in all the floor plans is just 1 and it's placed beside the entrance except for B3, C4. The basic equipments of the lavatory was a toilet, a washbowl, a shower. A bathtub is installed in the floor plans greater than $60m^2$. Fifth, almost all of the characteristics of the spatial interrelation - each room position order - based on the location of the entrance. In particular, almost all of the bedrooms are furthest from the entrance for the most privacy.

Perceived Usefulness and Risks and Behavioral Intentions of Mobile Fashion Apps -Focus Group Interviews with Chinese Students Studying in Korea- (모바일 패션 앱의 지각된 유용성과 위험 및 행동의도 -중국인 유학생 초점집단 면접 조사-)

  • Hong, Heesook;Sun, Yu;Lee, Seung-Eun
    • Journal of the Korean Society of Clothing and Textiles
    • /
    • v.44 no.2
    • /
    • pp.255-272
    • /
    • 2020
  • This exploratory study investigated Chinese consumers' perceived usefulness and risks of fashion apps and identified reasons for continuance and discontinuance intentions. This study conducted focus group interviews with a convenience sample of 13 Chinese students majoring in fashion in Korea. Based on interviewee responses, this study identified five attributes leading the perceived usefulness of mobile fashion apps (ubiquity and convenience, multi-media information, personalization, interactivity between consumers, and immediateness) and sub elements related to the five attributes. Five types of perceived risk (privacy risk, security risk, product risk, loss of future opportunity, and time risk) were identified in relation to Chinese consumers' use of fashion apps. The important role of live streaming services was uniquely identified by Chinese fashion app users. Usefulness of location-based information provided by mobile fashion apps were differently perceived according to respondents' use purpose, and augmented reality services provided by the apps were related to entertainment rather than usefulness. This study provides meaningful insights into Chinese consumers' perceptions of fashion apps and important app attributes that influence their continuance and discontinuance intentions. The findings from this study lend preliminary implications for future researchers and fashion businesses interested in the Chinese app market.

Affordable 3D VR Technology for Sensible Design - An Approach to Designing an End-User Oriented Service Space (3D VR 기술을 이용한 서비스 공간의 감성적 디자인)

  • Yoon, So-Yeon;Hwang, Jo-Hye;Park, Jung-A
    • Science of Emotion and Sensibility
    • /
    • v.13 no.1
    • /
    • pp.269-278
    • /
    • 2010
  • Today's Virtual Reality(VR) technology has become considerably more affordable and sophisticated with rapidly advancing computer technology. Photo-realistic visual representations along with real-time interactivity are now achievable without special programing knowledge and expensive equipment. The purpose of this paper is to establish how simple, credible user testing methods based on VR simulations can be utilized to improve design decision making towards more sensible design solutions for end-users. Results of a case study demonstrate the value of potential user-testing feedback in a simulated 3D virtual service space, i.e., restaurant interior. User feedback from the VR simulation includes preferences in table location, privacy, and values of seating preferred tables. A new design framework incorporating an empirical testing method for service spaces is presented. The overall design process, the development of the VE, and the user testing method and findings are discussed. This study provides useful guidances for future efforts in the areas where such technology may benefit to understand end-user feedbacks in design process.

  • PDF

A Secure Telemedicaine System in Smart Health Environment using BYOD (BYOD를 활용한 스마트헬스 환경에서 안전한 원격의료 시스템)

  • Cho, Young-bok;Woo, Sung-hee;Lee, Sang-ho;Park, Jong-bae
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.19 no.10
    • /
    • pp.2473-2480
    • /
    • 2015
  • In telemedicaine, people can make their health checked at anywhere from temporal and spatial constraints and It's environment can provide continuous health information regardless of the location of customers through PCs and smart phones. In addition, personal health information collected utilizing the BYOD(bring your own device) is the most important factor data security and guaranteed personal privacy because it's directly connected to the individual's health and life. In this paper, we provide a signature of the private key encryption system and method for providing the security of personal health information data collected utilizing the BYOD. Against replay attacks and man-in-the-middle attacks on security issues that are emerging as a smart environmental health was used as the timestamp and signature methods. Proposed method provides encryption overhead, while a communication was lower compared to the pre-encrypted with a mean 1.499mJ 1.212mJ shown by simulation to respond quickly in an emergency situation to be about 59%.

Role-based User Access Control with Working Status for u-Healthcare System (u-Healthcare 시스템을 위한 RBAC-WS)

  • Lee, Bong-Hwan;Cho, Hyun-Sug
    • The KIPS Transactions:PartC
    • /
    • v.17C no.2
    • /
    • pp.173-180
    • /
    • 2010
  • Information technology is being applied to the development of ubiquitous healthcare system, which provides both efficient patient care and convenient treatment regardless of patient's location. However, the increasing number of users and medical information give rise to the problem of user management and the infringement of privacy. In order to address this problem we propose a user access scheme based on the RBAC (Role Based Access Control) model. The preceding trust management model for Grid security, FAS(Federation Agent Server), was analyzed and extended to provide supplementary functions for role-based access control in u-Healthcare system. The RBAC model provides efficient user management and access control, but very vulnerable in case when one with valid role tries to leak confidential inner medical information. In order to resolve this problem, a RBAC-WS (Work Status with RBAC) model has been additionally developed which allows only qualified staffs to access the system while on duty. Th proposed RBAC and RBAC-WS model have been merged together and applied to the PACS (Picture Archiving and Communication System).

A Dynamic Investigation of iBeacon Adoption at Tourism Destination (관광지에서의 iBeacon 도입에 대한 동태적 분석)

  • Choedon, Tenzin;Lee, Young-Chan
    • Journal of Industrial Convergence
    • /
    • v.16 no.2
    • /
    • pp.1-14
    • /
    • 2018
  • The interconnectedness of all things is continuously expanding. For example, bluetooth low energy (BLE) beacons are wireless radio transmitters that can send an identifier to nearby receivers and trigger a number of applications, from proximity marketing to indoor location-based service. iBeacon technology which is one of the newest technologies in the smart tourism field, is reckoned as being very useful for travelers in enhancing the experience with visiting places. However, there is consequently not much existing research yet about the connection between iBeacon technology and tourism destination. Considering that, this study analyzes the adoption of iBeacon in tourism destination, this study examine the interrelationships and feedback structures of key factors in iBeacon adoption. To serve the purpose, this study used system dynamics approach to develop a model of iBeacon adoption in tourism destination. The analysis results showed that the concept of 'Social Influences' is one of the significant predictors for individual's intention behavior to accept iBeacon, and word of mouth (WOM), subjective norm, privacy concern, and perceived usefulness are key factors influencing the iBeacon adoption.