• Title/Summary/Keyword: Personal Data Processing

Search Result 415, Processing Time 0.024 seconds

Study on HIPAA PHI application method to protect personal medical information in OMOP CDM construction (OMOP CDM 구축 시 개인의료정보 보호를 위한 HIPAA PHI 적용 방법 연구)

  • Kim, Hak-Ki;Jung, Eun-Young;Park, Dong-Kyun
    • The Journal of Korean Institute of Next Generation Computing
    • /
    • v.13 no.6
    • /
    • pp.66-76
    • /
    • 2017
  • In this study, we investigated how to protect personal healthcare information when constructing OMOP (Observational Medical Outcomes Partnership) CDM (Common Data Model). There are two proposed methods; to restrict data corresponding to HIPAA (Health Insurance Portability and Accountability Act) PHI (Protected Health Information) to be extracted to CDM or to disable identification of it. While processing sensitive information is restricted by Korean Personal Information Protection Act and medical law, there is no clear regulation about what is regarded as sensitive information. Therefore, it was difficult to select the sensitive information for protecting personal healthcare information. In order to solve this problem, we defined HIPAA PHI as restriction criterion of Article 23 of the Personal Information Protection Act and maps data corresponding to CDM data. Through this study, we expected that it will contribute to the spread of CDM construction in Korea as providing solutions to the problem of protection of personal healthcare information generated during CDM construction.

User Modeling Using User Preference and User Life Pattern Based on Personal Bio Data and SNS Data

  • Song, Hyejin;Lee, Kihoon;Moon, Nammee
    • Journal of Information Processing Systems
    • /
    • v.15 no.3
    • /
    • pp.645-654
    • /
    • 2019
  • The purpose of this study was to collect and analyze personal bio data and social network services (SNS) data, derive user preference and user life pattern, and propose intuitive and precise user modeling. This study not only tried to conduct eye tracking experiments using various smart devices to be the ground of the recommendation system considering the attribute of smart devices, but also derived classification preference by analyzing eye tracking data of collected bio data and SNS data. In addition, this study intended to combine and analyze preference of the common classification of the two types of data, derive final preference by each smart device, and based on user life pattern extracted from final preference and collected bio data (amount of activity, sleep), draw the similarity between users using Pearson correlation coefficient. Through derivation of preference considering the attribute of smart devices, it could be found that users would be influenced by smart devices. With user modeling using user behavior pattern, eye tracking, and user preference, this study tried to contribute to the research on the recommendation system that should precisely reflect user tendency.

Analysis of Variable Guard Channel Allocation For Image/Voice/Data Calls in Multimedia Personal Communication Services (멀티미디어 PCS에서 Image/Voice/Data 호에 대한 가변적 보호채널 할당의 분석)

  • Na, Won-Shik;Lee, Yong-Ju
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2000.04a
    • /
    • pp.692-697
    • /
    • 2000
  • 멀티미디어 개인 휴대 통신(MPCS)에서 다중 클래스호에 대한 효율적인 채널할당은 매우 중요하다고 할 수 있다. 본 논문에서는 Image/Voice/Data 호에 대하여 가변적 보호 채널을 할당하는 새로운 방식을 제안하였다. 이러한 방식은 3차원 상태 천이도로 모델링 되며 보호 채널의 크기를 가변적으로 조절함으로써 보다 융통성있는 서비스를 제공하게 되며, 또한 수학적 분석과 시뮬레이션을 통해 비교분석을 수행하였다.

  • PDF

A Study of Trace for Data Wiping Tools (완전삭제 도구 사용 흔적에 관한 연구)

  • Kim, Yeon-Soo;Bang, Je-Wan;Kim, Jin-Kook;Lee, Sang-Jin
    • The KIPS Transactions:PartC
    • /
    • v.17C no.2
    • /
    • pp.159-164
    • /
    • 2010
  • The data wiping is a technique which perfectly deletes data in a storage to prevent data recovery. Currently, management of stored data is important because of increasing an accident of personal information leakage. Especially, if you need to discard data contained personal information, using a wiping tool which permanently deletes data to prevent unnecessary personal information leakage. The data wiping is also used for data security and privacy protection. However the data wiping can be used intentionally destruction of evidence. This intentionally destruction of evidence is important clues of forensic investigation. This paper demonstrates the methods for detecting the usage of wiping tools in digital forensic investigation.

Hilbert-curve based Multi-dimensional Indexing Key Generation Scheme and Query Processing Algorithm for Encrypted Databases (암호화 데이터를 위한 힐버트 커브 기반 다차원 색인 키 생성 및 질의처리 알고리즘)

  • Kim, Taehoon;Jang, Miyoung;Chang, Jae-Woo
    • Journal of Korea Multimedia Society
    • /
    • v.17 no.10
    • /
    • pp.1182-1188
    • /
    • 2014
  • Recently, the research on database outsourcing has been actively done with the popularity of cloud computing. However, because users' data may contain sensitive personal information, such as health, financial and location information, the data encryption methods have attracted much interest. Existing data encryption schemes process a query without decrypting the encrypted databases in order to support user privacy protection. On the other hand, to efficiently handle the large amount of data in cloud computing, it is necessary to study the distributed index structure. However, existing index structure and query processing algorithms have a limitation that they only consider single-column query processing. In this paper, we propose a grid-based multi column indexing scheme and an encrypted query processing algorithm. In order to support multi-column query processing, the multi-dimensional index keys are generated by using a space decomposition method, i.e. grid index. To support encrypted query processing over encrypted data, we adopt the Hilbert curve when generating a index key. Finally, we prove that the proposed scheme is more efficient than existing scheme for processing the exact and range query.

3D Seismic Data Processing Methodology using Public Domain Software System (공유 소프트웨어 시스템을 이용한 3차원 탄성파 자료처리 방법론)

  • Ji, Jun;Choi, Yun-Gyeong
    • Geophysics and Geophysical Exploration
    • /
    • v.13 no.2
    • /
    • pp.159-168
    • /
    • 2010
  • Recent trend in petroleum/gas exploration is an application of 3D seismic exploration technique. Unlike the conventional 2D seismic data processing, 3D seismic data processing is considered as the one which requires expensive commercial software systems and high performance computer. This paper propose a practical 3D seismic processing methodology on a personal computer using public domain software such as SU, SEPlib, and SEPlib3D. The applicability of the proposed method has been demonstrated by successful application to a well known realistic 3D synthetic data, SEG/EAGE 3D salt model data.

Chracteristics of Somatotype for Boys of Elementary School Age I - In point of the Characteristics of Changing Somatotype in each period of Elementary School Age- (학령기 남아의 체형특성 I - 학령기별 체형변이특성을 중심으로-)

  • Yeo, Hye-Rin;Kwon, Young-Suk
    • Journal of the Korean Society of Costume
    • /
    • v.46
    • /
    • pp.31-48
    • /
    • 1999
  • The purpose of this study is to offer fundamental data for classification of somatotype for boys of elementary school age. The subject were 458 elementary school boys aged from 7 to 12 living in Pusan. Data were collected by 56 anthropometric 11 photoraphic measurements and 41 body indices. 56 anthropometric measurements were analyzed by ANOVA and method of Duncan-test as Multiple Range Test among 6 grade groups and then total 108 measurments were analyzed by statistical data processing. The results are as followings: 1, In Duncan-test boys were significantly different in most of height and length items but were not significantly different in main items for clothing construction among 1.2/3.4/5.6 grades so that the period of elementary school age were divided with 3 periods. 2. According to increase school age most of item's means increased gradually and personal difference for each items increased too. In case of height and length items the items of lower half were greater than the items of upper half in personal difference and depth items were greater than the breadth items in personal difference. And weight and angle items were very great personal difference is specially.

  • PDF

Development of a Smart Oriental Medical System Using Security Functions

  • Hong, YouSik;Yoon, Eun-Jun;Heo, Nojeong;Kim, Eun-Ju;Bae, Youngchul
    • International Journal of Fuzzy Logic and Intelligent Systems
    • /
    • v.14 no.4
    • /
    • pp.268-275
    • /
    • 2014
  • In future, hospitals are expected to automatically issue remote transcriptions. Many general hospitals are planning to encrypt their medical database to secure personal information as mandated by law. The electronic medical record system, picture archiving communication system, and the clinical data warehouse, amongst others, are the preferred targets for which stronger security is planned. In the near future, medical systems can be assumed to be automated and connected to remote locations, such as rural areas, and islands. Connecting patients who are in remote locations to medical complexes that are usually based in larger cities requires not only automatic processing, but also a certain amount of security in terms of medical data that is of a sensitive and critical nature. Unauthorized access to patients' transcription data could result in the data being modified, with possible lethal results. Hence, personal and sensitive data on telemedicine and medical information systems should be encrypted to protect patients from these risks. Login passwords, personal identification information, and biological information should similarly be protected in a systematic way. This paper proposes the use of electronic acupuncture with a built-in multi-pad, which has the advantage of being able to establish a patient's physical condition, while simultaneously treating the patient with acupuncture. This system implements a sensing pad, amplifier, a small signal drive circuit, and a digital signal processing system, while the use of a built-in fuzzy technique and a control algorithm have been proposed for performing analyses.

A study on Data Context-Based Risk Measurement Method for Pseudonymized Information Processing

  • Kim, Dong-Hyun
    • Journal of the Korea Society of Computer and Information
    • /
    • v.27 no.6
    • /
    • pp.53-63
    • /
    • 2022
  • Recently, as digital transformation due to the COVID-19 pandemic accelerates, data to improve individual quality of life is being used in large quantities, and more reinforced non-identification processing procedures are required to utilize the most valuable personal information among data. In Korea, procedures for de-identification measures are presented through amendments to laws and guidelines, but there is no methodology to measure the level of de-identification in the field due to ambiguous processing standards and subjective risk measurement methods. This paper compares and analyzes the current status of policy and guidelines related to de-identification measures proposed at home and abroad to derive complementary points, suggests a data context-based risk measurement method centered on pseudonymized information processing, and verifies its validity. As a result of verification through Delphi survey and focus group interview (FGI), it was confirmed that the need for the proposed methodology and the validity of the indicators were high.