• Title/Summary/Keyword: Personal Data Management

Search Result 1,507, Processing Time 0.028 seconds

Verifiable Could-Based Personal Health Record with Recovery Functionality Using Zero-Knowledge Proof (영지식 증명을 활용한 복원 기능을 가진 검증 가능한 클라우드 기반의 개인 건강기록)

  • Kim, Hunki;Kim, Jonghyun;Lee, Dong Hoon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.6
    • /
    • pp.999-1012
    • /
    • 2020
  • As the utilize of personal health records increases in recent years, research on cryptographic protocol for protecting personal information of personal health records has been actively conducted. Currently, personal health records are commonly encrypted and outsourced to the cloud. However, this method is limited in verifying the integrity of personal health records, and there is a problem with poor data availability because it is essential to use it in decryption. To solve this problem, this paper proposes a verifiable cloud-based personal health record management scheme using Redactable signature scheme and zero-knowledge proof. Verifiable cloud-based personal health record management scheme can be used to verify the integrity of the original document while preserving privacy by deleting sensitive information by using Redactable signature scheme, and to verify that the redacted document has not been deleted or modified except for the deleted part of the original document by using the zero-knowledge proof. In addition, it is designed to increase the availability of data than the existing management schemes by designing to recover deleted parts only when necessary through the Redact Recovery Authority. And we propose a verifiable cloud-based personal health record management model using the proposed scheme, and analysed its efficiency by implementing the proposed scheme.

Security Policy Proposals through PC Security Solution Log Analysis (Prevention Leakage of Personal Information) (PC보안솔루션 로그분석을 통한 보안정책 제안 (개인정보유출 방지))

  • Chae, Hyun Tak;Lee, Sang-Jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.24 no.5
    • /
    • pp.961-968
    • /
    • 2014
  • In order to prevent leakage of personal information by insiders a large number of companies install pc security solutions like DRM(Digital Right Management), DLP(Data Loss Prevention), Personal information filtering software steadily. However, despite these investments anomalies personal information occurred. To establish proper security policy before implementing pc security solutions, companies can prevent personal information leakage. Furthermore by analyzing the log from the solutions, companies verify the policies implemented effectively and modify security policies. In this paper, we define the required security solutions installed on PC to prevent disclosure of personal information in a variety of PC security solution, plan to integrate operations of the solutions in the blocking personal information leakage point of view and propose security policies through PC security solution log analysis.

Design and Implementation of Web-based Dashboard UI Components and Integrated Repository for Personal Health Records Management (개인 건강 정보 관리를 위한 통합 리파지토리 및 웹 기반 대시보드 UI 컴포넌트 설계 및 구현)

  • Jeon, Dong-cheol;Hwang, Heejoung
    • Journal of Korea Multimedia Society
    • /
    • v.22 no.11
    • /
    • pp.1288-1299
    • /
    • 2019
  • As life expectancy increases, chronic diseases become a problem, and health management in daily life becomes important. With the development of IT convergence technology, personal health records have been collected through various data sources, but they are saved separately by each medical services. Distributed storage of personal health records caused inconvenience about managing the user's health records. In this paper, we designed and implemented an integrated repository and web-based dashboard UI components to solve that inconvenience. The proposed method shows that users can manage their personal health records in the integrated repository effectively and show them through dashboard UI components.

A Study on the correlations between Parent's Raising Attitude and Children's Personal Character (부모의 양육태도와 아동의 개인적 특성간의 상관관계에 관한 연구)

  • Song, Gyo-Seok
    • Journal of Industrial Convergence
    • /
    • v.12 no.2
    • /
    • pp.1-14
    • /
    • 2014
  • This thesis is to analyse the correlations between parent's raising attitude and children' personal character. The way their parents raised them is divided 4 ways-devotion, hostility, autonomy and regulations. Children' personal characters are composed of Self-esteem and Self-regulation. In order to do this study first, I Set up a hypothesis. Second, I surveyed the result from the questionnaire to verify it on the basis of the data on the 442 elementary student in the fifth and sixth grade who live in the Ansan-City. Third, I used the SPSS program. Based on the result of the research, the hypothesis is proved as follows: The result from strong devotion and autonomy show high Self-esteem and Self-regulation, but those from strong hostility and regulation show low Self-esteem and Self-regulation.

  • PDF

The Improvement Plan for Indicator System of Personal Information Management Level Diagnosis in the Era of the 4th Industrial Revolution: Focusing on Application of Personal Information Protection Standards linked to specific IT technologies (제4차 산업시대의 개인정보 관리수준 진단지표체계 개선방안: 특정 IT기술연계 개인정보보호기준 적용을 중심으로)

  • Shin, Young-Jin
    • Journal of Convergence for Information Technology
    • /
    • v.11 no.12
    • /
    • pp.1-13
    • /
    • 2021
  • This study tried to suggest ways to improve the indicator system to strengthen the personal information protection. For this purpose, the components of indicator system are derived through domestic and foreign literature, and it was selected as main the diagnostic indicators through FGI/Delphi analysis for personal information protection experts and a survey for personal information protection officers of public institutions. As like this, this study was intended to derive an inspection standard that can be reflected as a separate index system for personal information protection, by classifying the specific IT technologies of the 4th industrial revolution, such as big data, cloud, Internet of Things, and artificial intelligence. As a result, from the planning and design stage of specific technologies, the check items for applying the PbD principle, pseudonymous information processing and de-identification measures were selected as 2 common indicators. And the checklists were consisted 2 items related Big data, 5 items related Cloud service, 5 items related IoT, and 4 items related AI. Accordingly, this study expects to be an institutional device to respond to new technological changes for the continuous development of the personal information management level diagnosis system in the future.

The Analysis of Factors affecting Workers' Knowledge Sharing Intention in a University Hospital (일 대학병원 근로자의 지식공유 의도에 미친 영향분석)

  • Lee, Hyun-Sook;Kim, Young-Hoon;Lee, Hae-Jong;Kim, Young-Bae
    • Korea Journal of Hospital Management
    • /
    • v.18 no.4
    • /
    • pp.131-144
    • /
    • 2013
  • The purpose of this study is to analysis factors affecting workers' knowledge sharing intention in a hospital. This study is based on personal factors such as perceived incentives, perceived reciprocal benefits, perceived behavioral control, and subjective norm. Also, there are organizational factors such as organizational climate, CEO's support, rewards system, trust, and IT system. Data were assessed using 107 employees who work at C university hospital in Chunkcheong-do and collected with self-administered questionnaires from April 1 to 13 in 2013. This study was analyzed SPSS 18 by using frequency and multi regression analysis. The results of the study were as follows. First, knowledge sharing intention among personal factors was statistically significant in perceived behavioral control. Second, the awareness of knowledge sharing intention among organizational factors was turned out to be positive effect for CEO's support and trust. This study was identified a couple of factors affecting knowledge sharing intention between personal and organizational factors. The the implications of these factors are discussed and areas for developing hospital management strategies are fostered knowledge sharing.

  • PDF

Development of an Intelligent Control System to Integrate Computer Vision Technology and Big Data of Safety Accidents in Korea

  • KANG, Sung Won;PARK, Sung Yong;SHIN, Jae Kwon;YOO, Wi Sung;SHIN, Yoonseok
    • International conference on construction engineering and project management
    • /
    • 2022.06a
    • /
    • pp.721-727
    • /
    • 2022
  • Construction safety remains an ongoing concern, and project managers have been increasingly forced to cope with myriad uncertainties related to human operations on construction sites and the lack of a skilled workforce in hazardous circumstances. Various construction fatality monitoring systems have been widely proposed as alternatives to overcome these difficulties and to improve safety management performance. In this study, we propose an intelligent, automatic control system that can proactively protect workers using both the analysis of big data of past safety accidents, as well as the real-time detection of worker non-compliance in using personal protective equipment (PPE) on a construction site. These data are obtained using computer vision technology and data analytics, which are integrated and reinforced by lessons learned from the analysis of big data of safety accidents that occurred in the last 10 years. The system offers data-informed recommendations for high-risk workers, and proactively eliminates the possibility of safety accidents. As an illustrative case, we selected a pilot project and applied the proposed system to workers in uncontrolled environments. Decreases in workers PPE non-compliance rates, improvements in variable compliance rates, reductions in severe fatalities through guidelines that are customized according to the worker, and accelerations in safety performance achievements are expected.

  • PDF

A Study on Data Governance Maturity Model and Total Process for the Personal Data Use and Protection (개인정보의 활용과 보호를 위한 데이터 거버넌스 성숙도 모형과 종합이행절차에 관한 연구)

  • Lee, Youngsang;Park, Wonhwan;Shin, Dongsun;Won, Yoojae
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.5
    • /
    • pp.1117-1132
    • /
    • 2019
  • Recently, IT technology such as internet, mobile, and IOT has rapidly developed, making it easy to collect data necessary for business, and the collected data is analyzed as a new method of big data analysis and used appropriately for business. In this way, data collection and analysis becomes easy. In such data, personal information including an identifier such as a sensor id, a device number, IP address, or the like may be collected. However, if systematic management is not accompanied by collecting and disposing of large-scale data, violation of relevant laws such as "Personal Data Protection Act". Furthermore, data quality problems can also occur and make incorrect decisions. In this paper, we propose a new data governance maturity model(DGMM) that can identify the personal data contained in the data collected by companies, use it appropriately for the business, protect it, and secure quality. And we also propose a over all implementation process for DG Program.

Improvement Plan and Analysis of Construction Safety Management for Risk Management (리스크관리에 의한 건설안전관리의 분석 및 발전방안)

  • Chung, Byoung-Hwa;Kim, Sung-Deuk
    • Journal of the Korea Institute of Building Construction
    • /
    • v.6 no.4 s.22
    • /
    • pp.53-60
    • /
    • 2006
  • Quality control and safety represent increasingly important concerns for project managers. In the worst case, failures may cause personal injuries or fatalities. Accidents during the construction process can similarly result in personal injuries and large costs. We present the results of a study designed to identify the tools that are most widely used and those that are associated with successful project management in general, and with effective project risk management in particular. The study is based on a questionnaire administered to a sample of project managers from construction enterprises. The response data was analyzed in order to find which tools are more likely to be used in the those organizations that report better project management performance and in those that value the contribution of risk management processes.

The Impacts of Social Norms and Personal Ethics on Recycling Behavior (재활용행동에 관한 연구 : 규범적 접근을 중심으로)

  • 유두련;김정희;박영미
    • Journal of Families and Better Life
    • /
    • v.21 no.6
    • /
    • pp.69-79
    • /
    • 2003
  • The purpose of this study was to examine the effects of social norms and personal ethics on recycling behavior. For this purpose, survey data from four hundred and fifty seven individuals were collected and analyzed using an SPSS program. The major findings were as follows: First, social norms had a positive impact on personal ethics and recycling behavior. Second, personal ethics significantly affected recycling behavior. Third, awareness of the consequences of recycling behavior (AC) and ascription of responsibility for environmental problems(AR) did not significantly translate personal ethics into actual recycling behavior. Fourth, ascription of responsibility for environmental problems(AR) and awareness of consequences of recycling behavior(AC) affected recycling behavior. These results suggest that in order to encourage recycling behavior, it is necessary to inform and educate the public so as to enhance social norms and personal ethics.