• Title/Summary/Keyword: Personal Data Control

Search Result 678, Processing Time 0.033 seconds

Design and Evaluation of Secure Framework for User Management in Personal Cloud Environments (퍼스널 클라우드 환경에서 사용자 관리를 위한 보안 프레임워크의 설계 및 평가)

  • Jin, Byungwook;Kim, Jonghwa;Cha, Siho;Jun, Moonseog
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.12 no.1
    • /
    • pp.81-87
    • /
    • 2016
  • Cloud computing technologies are utilized and merged in various domains. Cloud computing technology-based personal cloud service technologies provide mobility and free access by using user centered storages and smart devices such like smart phones and table PCs. Therefore, we should overcome limits on the storage by solving the capacity problems of devices to provide security services in the personal cloud environments It can be addressable to provide the convenience of various security technologies. However, there are some security threats inherited from existing cloud environments and the possibilities of information leakage when devices are lost or stolen. Therefore, we designed a framework for providing secure cloud services by adding objects, such as user authorization, access tokens, set permissions by key generation, and key management assignments, for user management in personal cloud environments. We analyzed the stability of the proposed framework in terms of irreverent use and abuse, access to insiders, and data loss or leakage. And we evaluated the proposed framework in terms of the security with access control requirements in personal cloud environments.

Knowledge, attitude, and wearing of personal protective equipment among dental hygienists in regions during the COVID-19 era (위드 코로나 시대 일부지역 치과위생사의 개인보호장구에 대한 지식, 태도 및 착용)

  • Mi-Jung Park;Jung-Hwa Lee;Kyung-Ae Jang;Hyun-Seo Yoon
    • Journal of Korean society of Dental Hygiene
    • /
    • v.24 no.2
    • /
    • pp.163-174
    • /
    • 2024
  • Objectives: This study aimed to understand the knowledge, attitude, and wearing of four types of personal protective equipment among dental hygienists based on to the COVID-19 infection control guidelines and to provide basic data on the need to wear these equipment by dental hygienists in dental medical institutions. Methods: Between March 31 and April 26, 2022, 285 dental hygienists working at dental institutions in Busan and Gyeongsang Provinces participated in the study. Results: The higher the knowledge on personal protective equipment, the higher the glove-wearing rate; and the higher the attitude toward personal protective equipment, the higher the KF94 mask-wearing rate. Furthermore, the higher the rate of wearing face shields, the higher the rate of wearing gloves and full-body protective suits; and the higher the rate of wearing gloves, the higher the rate of wearing a full-body protective suit. Conclusions: To prevent cross-infection by dental hygienists in dental medical institutions, it is necessary to have the four types of personal protective equipment at all times and to strengthen comprehensive education on these equipment

The Effects of Preschool Children's Age and Mothers' Modes of Verbal Control on Children's Lying (연령과 어머니의 언어통제유형이 유아의 거짓말에 미치는 영향)

  • Oh, You-Lee;Doh, Hyun-Sim;Choi, Mi-Kyoung
    • Journal of Families and Better Life
    • /
    • v.26 no.3
    • /
    • pp.191-201
    • /
    • 2008
  • This study examined how preschool children's age and mothers' modes of verbal control affect children's lying. A sample of 108 preschool children aged from 3 to 6 participated in a lying experiment. Their mothers answered questionnaires regarding the mothers' modes of verbal control. Preschool children's lying was measured by the Guessing Game Experiment developed by Talwar and Lee(2002). Mothers' modes of verbal control were measured by Jung's(2005) scale for preschool children. To analyze the data, crosstabs and logistic regression analyses were conducted. The results of the experiment showed that three-year-old children are able to lie intentionally. The older preschool children lied more than the younger ones. Mothers' imperative and personal modes of verbal control were positively related to preschool children's lying. The most significant variable on preschool children's lying was mother's imperative modes of verbal control, followed by personal modes of verbal control, which emphasizes the crucial influence of parenting on preschool children's lying.

Study on Communication Interface of Multiple Smartphones for Unit Control in a PC (PC에서 유닛 제어를 위한 다중 스마트폰의 통신 인터페이스 연구)

  • Jung, Hahmin;Kim, Dong Hun
    • Journal of Institute of Control, Robotics and Systems
    • /
    • v.19 no.6
    • /
    • pp.520-526
    • /
    • 2013
  • This study presents the unit control of a PC (Personal Computer) program using multiple smartphones based on ad hoc communication. A design of the data packet that multiple smartphones send to a computer, and a framework that manages and controls the unit in a computer after analyzing the data packet, are proposed. As a result, multiple users are able to control their own units using their smartphones while seeing the monitor connected to a computer. In other words, multiple users can share the same game in a computer or control their units embedded in a system using their smartphones. An experimental result shows that a racing game in a PC can be realized by the proposed communication interface, where four iPhones are used to control their units in a computer. Thus, the proposed framework can be effectively used for unit control in a PC using multiple smartphones.

A Privacy-aware Graph-based Access Control System for the Healthcare Domain

  • Tian, Yuan;Song, Biao;Hassan, M.Mehedi.;Huh, Eui-Nam
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.6 no.10
    • /
    • pp.2708-2730
    • /
    • 2012
  • The growing concern for the protection of personal information has made it critical to implement effective technologies for privacy and data management. By observing the limitations of existing approaches, we found that there is an urgent need for a flexible, privacy-aware system that is able to meet the privacy preservation needs at both the role levels and the personal levels. We proposed a conceptual system that considered these two requirements: a graph-based, access control model to safeguard patient privacy. We present a case study of the healthcare field in this paper. While our model was tested in the field of healthcare, it is generic and can be adapted to use in other fields. The proof-of-concept demos were also provided with the aim of valuating the efficacy of our system. In the end, based on the hospital scenarios, we present the experimental results to demonstrate the performance of our system, and we also compared those results to existing privacy-aware systems. As a result, we ensured a high quality of medical care service by preserving patient privacy.

Software Framework of Reconfigurable Data-oriented and Bi-directional Universal Remote Controller (동적 재구성이 가능한 데이터 지향적인 양방향 통합 리모컨의 소프트웨어 프레임워크)

  • Shin, Young-Sul;Lee, Woo-Jin
    • The KIPS Transactions:PartA
    • /
    • v.14A no.5
    • /
    • pp.287-294
    • /
    • 2007
  • Most of existing integrated remote controllers can control only a group of home appliances made by the same manufacturer. And they cannot monitor the status of home appliances since they are based on analog RF(Radio Frequency) signal and operate in a uni-directional manner In this paper, we propose a software framework for a hi-directional universal remote controller(URC) which monitors the status of home appliances in Wireless Personal Area Network(WPAN). The URC can handle the control and status messages which consist of a command with related arguments. When a user wants to control any home appliance, the URC can be dynamically configured to its dedicated remote controller by generating a GUI according to its profile. Any other devices which have a capacity for understanding the profile from the controlled devices can play the same role of the URC.

Analysis of Nursing Students' Educational Needs about Corona19 Infection Control (간호대학생의 코로나19 감염관리 교육에 대한 요구 분석)

  • Yoo, Eun-Young
    • Journal of Digital Convergence
    • /
    • v.18 no.12
    • /
    • pp.335-341
    • /
    • 2020
  • This study aims to identify the importance and degree of performance of COVID19 infection control educational program for 4th grade nursing college students, and to prepare the basic data for developing COVID19 infection control nursing education program based on this study. Data were collected from January 6 to January 30, 2020 by using structured questionnaire from 72 senior nursing students at "A" City Nursing College. The overall average of importance of COVID19 infection control nursing was 4.4 out of 5, and the overall average of performance was 2.4 out of 5. The greatest difference in importance and performance were the sectors of personal protection(equipment dressing & undessing) and collecting safe sample. By analyzing the needs for COVID19 infection control nursing of nursing college students It is used as the basic data for the development of simulation education programs by improving performance of both personal protection and collecting safety samples.

Analysis of Global Trends in the Cross-border Transfer of Personal Data and Its Implications for Korea (개인정보 국외이전 관련 규범 국제 동향 분석 및 한국에의 시사점)

  • Bomin-Ko
    • Korea Trade Review
    • /
    • v.46 no.6
    • /
    • pp.239-255
    • /
    • 2021
  • To review the theoretical background of regulatory approaches to cross-border transfer of personal data, this paper divides major digital trade participating countries into four types according to the OECD - non-regulatory, post-intervention, pre-supervision, and national control. It then analyzes the US, Japan, the EU, and China respectively that belong to each type. South Korea, which is currently about to pass the amendment by the National Assembly, has identified that it is in the middle of post-intervention and pre-supervision, and needs to evolve into pre-supervision norms like the EU while it has to participate more actively in the process of establishing international digital trade rules. Korea first needs to sign digital trade agreements and promote mutual certification projects more actively from the standpoint of a medium-sized open country with growing digital companies and digitally-open consumers. Second, the government should fully consider the interests of not only companies but also various trade stakeholders including domestic consumers, when drafting and implementing trade policies. To this end, 'a single window approach' is needed not only at the Ministry of Trade, Industry, and Energy, but also at the level of the entire government which require an integrated form of digital trade policy governance.

Materialize the Checklist through Type of Classification analysis for the Regulatory Compliance and Database Encryption, Access Control (데이터베이스 규제 준수, 암호화, 접근제어 유형 분류에 따른 체크리스트 구현)

  • Lee, Byoung-Yup;Park, Jun-Ho;Kim, Mi-Kyoung;Yoo, Jae-Soo
    • The Journal of the Korea Contents Association
    • /
    • v.11 no.2
    • /
    • pp.61-68
    • /
    • 2011
  • Due to the rapid development of the Internet, many companies in a variety of applications to users open an unspecified number of the current business environment, security of personal information about recent issues are often mentioned in terms of its importance may be the company's top priority. The government recently on personal information strengthening measures on information communications network law enacted into law which is applicable to various industries. Companies to protect the personal information of various measures to comply with these regulations, and arrange your personal information for internal management to enhance security fast security solution has been introduced. The number of used data is stored in the DBMS in terms of compliance with these regulations at the same time effectively to ensure data security and encryption measures, access control, audit, each separated by an implementation of the solution and how it compares with the best Database security plan allows you to explore as a this paper's security checklist.

A Study on ways to secure personal information stability according to the implementation of the mobile phone use system for milityary personnel (군장병 휴대전화 사용제도 시행에 따른 개인정보 안정성 확보 방안 연구)

  • Hwangbo, Wongyu;Shin, Dong-Kyoo
    • Journal of Internet Computing and Services
    • /
    • v.23 no.6
    • /
    • pp.49-58
    • /
    • 2022
  • As military service members are fully permitted to use mobile phones for sickness after work, it is time to minimize the direct collection of personal information from telecommunication companies when opening mobile phones to secure the safety of military service personnel's personal information. Prior to introducing the use of mobile phones by soldiers after work, the Ministry of National Defense established a security control system such as blocking the mobile phone shooting function to prevent security accidents and concerns about some adverse functions such as illegal cyber gambling, game addiction, and viewing pornography. come. Mobile telecommunications companies entrust personal information processing tasks, such as opening mobile phones, to telecommunications agencies and carry out management and supervision, such as checking the status of personal information protection measures. When a military service member opens a mobile phone, a personal information management agency is newly established using the right to portability of personal information, and a system for requesting the transmission of personal information from the military service member is proposed.