• Title/Summary/Keyword: Personal Data Protection

Search Result 466, Processing Time 0.025 seconds

Analysis of the criticality of the shipping cask(KSC-7) (KSC-7 사용후핵연료 수송용기 핵임계해석)

  • Yoon, Jung-Hyun;Choi, Jong-Rak;Kwak, Eun-Ho;Lee, Heung-Young;Chung, Sung-Whan
    • Journal of Radiation Protection and Research
    • /
    • v.18 no.2
    • /
    • pp.47-59
    • /
    • 1993
  • The criticality of the shipping cask(KSC-7) for transportion of 7PWR spent fuel assemblies has been calculated and analysised on the basis of neutron transport theory. For criticality analysis, effects of the rod pitches, the fixed neutron absorbers(borated sus+boral) were considered. The effective multiplication factor has been calculated by KENO-Va, Mote Carlo method computer code, with the HANSEN-ROACH 16 group cross section set, which was made for personal computer system. The criticality for the KSC-7 cask was calculated in terms of the fresh fuel which was conservative for the aspects of nuclear critility. From the results of criticality analysis, the calculated Keff is proved to be lower than subcritical limit during normal transportation and under hypothetical accident condition. The maximum calculated criticalities of the KSC-7 were lower the safety criticality limit 1.0 recommended by US 10CFR71 both under normal and hypothetical accident condition. Also, to verify the KSC-7 criticality calculation results by using KENO-Va, it was carried out benchmark calculation with experimental data of B & W(Bobcock and Wilcox) company. From the 3s series of calculation of the KSC-7 cask and benchmark calculation, the cask was safely designed in nuclear criticality, respectively.

  • PDF

Hash based Secure RFID Authentication Protocol for User Privacy Protection (사용자 프라이버시 보호를 위한 해쉬 기반의 안전한 RFID 인증 프로토콜)

  • Lee, Han-Kwon;Cho, Tae-Kyung;Yoo, Hyun-Joong;Park, Byoung-Soo
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.8 no.1
    • /
    • pp.33-40
    • /
    • 2007
  • RFID, a non-contact wireless identification technology is being noticed as a technology to alternate barcode system in distribution industry and general industry. Despite of merit of RFID, there are issues to be solved for practical use. One of them, which are most important, is resolution of user's information protection. RFID system without security function bears risk exposing personal data and user's privacy. In this paper, we propose mutual authentication protocol for RFID system in order to solve this security issue. This study aimed to protect user's privacy by providing dynamic ID for tag through authentication protocol safe from security threats. Information being transmitted between backend, reader and tag has no direct connection with ID of tag, and it conducts authentication process using one-way hash function, which prevents attacker's obtaining of tag information using information being transmitted.

  • PDF

A Study on the Influencing Factors on Social Media Use Intensity and Fatigue, and the Moderating Effect of Process Incentive Expectations (소셜 미디어 사용 강도 및 피로감에 미치는 영향 요인과 성과기대의 조절 효과 연구)

  • Park, Kiho
    • Journal of Digital Convergence
    • /
    • v.19 no.5
    • /
    • pp.215-227
    • /
    • 2021
  • This study empirically studied the factors affecting the intensity of use of mobile social media and fatigue. Theories for the research framework were based on the theory of planned behavior, the theory of private information protection, the theory of flow, and the theory of process incentives. As a result of data analysis, it was found that self-efficacy, user habits, and flow experience positively influence the intensity of mobile social media use. This study assumed that personal information protection issues negatively affect the intensity of mobile social media use, but have little influence on the use intensity. The intensity of media use had a positive effect on media fatigue. In other words, when the intensity of using mobile social media increased, the feeling of fatigue increased. The expected process incentives variable did not show a moderating effect between media use intensity and social media fatigue. The findings will have implications for social media-related companies and organizations that want to use social media tools for business and public services.

Signal and Telegram Security Messenger Digital Forensic Analysis study in Android Environment (안드로이드 환경에서 Signal과 Telegram 보안 메신저 디지털 포렌식분석 연구)

  • Jae-Min Kwon;Won-Hyung Park;Youn-sung Choi
    • Convergence Security Journal
    • /
    • v.23 no.3
    • /
    • pp.13-20
    • /
    • 2023
  • This study conducted a digital forensic analysis of Signal and Telegram, two secure messengers widely used in the Android environment. As mobile messengers currently play an important role in daily life, data management and security within these apps have become very important issues. Signal and Telegram, among others, are secure messengers that are highly reliable among users, and they safely protect users' personal information based on encryption technology. However, much research is still needed on how to analyze these encrypted data. In order to solve these problems, in this study, an in-depth analysis was conducted on the message encryption of Signal and Telegram and the database structure and encryption method in Android devices. In the case of Signal, we were able to successfully decrypt encrypted messages that are difficult to access from the outside due to complex algorithms and confirm the contents. In addition, the database structure of the two messenger apps was analyzed in detail and the information was organized into a folder structure and file format that could be used at any time. It is expected that more accurate and detailed digital forensic analysis will be possible in the future by applying more advanced technology and methodology based on the analyzed information. It is expected that this research will help increase understanding of secure messengers such as Signal and Telegram, which will open up possibilities for use in various aspects such as personal information protection and crime prevention.

A Study on Improvement for Service Proliferation Based on Blockchain (블록체인 기반 서비스 확산을 위한 개선 방안 연구)

  • Yoo, Soonduck;Kim, Kiheung
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.18 no.1
    • /
    • pp.185-194
    • /
    • 2018
  • This study investigates the limitations of blockchain technology and the ways to improve it by using Delphi technique. Limit factors and improvement measures are classified into technology, service, and legal system. First, from a technical point of view, lack of standardization of the technology, insufficiency of integration, lack of scalability, unclear cancellation or correction policy, excessive cost of transaction verification, insufficient personal information protection and not enough to respond to hacking defense were the limiting factors. In order to improve these, the followings; ensuring standardization, securing integration and scalability, establishing cancellation of each applicable data, establishment of correction policy, efficiency of verification cost, the protection of personal information and countermeasure against hacking are provided. The related technology development and countermeasures must be established to effectively introduce the blockchain technology to the market. Second, in the early stage of blockchain service, it showed lack of utilization of the blockchain, security threat, shortage of skilled workers, and lack of legal liability. As a solution to these problems, it is necessary to suggest various applications, against security threat, training professional manpower, and securing legal responsibility. It should also provide a foundation for providing institutionally stable services. Third, from as legal system point of view, inadequate legal compliance, lack of relevant regulation, and uncertainty in the regulation were the limiting factors. Therefore establishing a legal system, which is the most important area for activating the service, should be accompanied by the provision of legal countermeasures, clearness of regulations and measures to be taken by relevant governmental authorities. This study will contribute as a reference for a research, related to the blockchain.

A Study on Policy Improvement for Ensuring the Effectiveness of Suicide Prevention Law (「자살예방 및 생명존중 문화 조성을 위한 법률」의 실효성 확보를 위한 정책적 개선 방안 - 「개인정보보호법」과의 충돌문제 해결을 중심으로 -)

  • Kwon, Do-Hyun;Park, Jong-Ik;Ah, Yong-Min
    • The Korean Society of Law and Medicine
    • /
    • v.20 no.2
    • /
    • pp.261-285
    • /
    • 2019
  • The essential policy of suicide prevention is to continuously manage and treat suicide attempted people through data base related to suicide retry rate and follow-up study report. In Korea, only few people are allowed to follow-up by the Personal Information Protection Act. As a result, the research participation rate and the service participation rate are rather low, so that the research participants is limited to a part of the suicide attempted people. Therefore, the policy proposals to be improved in the Ministry of Health and Welfare Act were examined comparatively in order to increase the practical utilization of the suicide prevention about Article 14 and Article 20 of the Suicide Prevention Act. As a criterion for policy improvement, measures for non-discrimination of information to be considered in terms of technical and ethical dimensions and non-profit research and medical information for medical purposes were suggested. In addition to the severity of the suicide, the suicide risk was assessed and the criteria for the objective assessment of the follow-up observation were considered in consideration of the severity of the suicide.

Development of TLD Algorithms by Monochromatic Fluorescence Radiations and Continuous Spectrum X-rays (단일에너지 형광 X선 및 연속 스펙트럼 X선장에 의한 TLD 알고리즘 개발)

  • Kim, Jang-Lyul;Kim, Bong-Hwan;Chang, Si-Young;Lee, Jai-Ki
    • Journal of Radiation Protection and Research
    • /
    • v.23 no.3
    • /
    • pp.159-174
    • /
    • 1998
  • Personal dosimetry system is required to measure the personal dose equivalent accurately in a wide range of radiation fields, but the dose evaluation algorithms have been developed with the X-ray fields described in MOST Ordinance (equivalent to the ANSI N13.11) from which the actual fields to be monitored may be significantly different. To evaluate the dose more accurately when workers are exposed to the non-ANSI N13.11 radiation fields, two algorithms for monochromatic radiations (one algorithm was used for various ratios of TL dosimeter and the other for matrix approximation) were developed with the experimental data of the energy responses of the $CaSO_4:Dy$ TL materials irradiated by monochromatic X-ray fields recently established in KAERI, and compared with the another algorithm developed on the basis of the ANSI N13.11 continuous spectrum X-ray fields. Then it follows the discussions for some results of the algorithm testing including mixed fields irradiations and angular response conducted in IAEA/RCA intercomparison as well as ANSI and ISO continuous spectrum X-ray and monochromatic radiation fields. The developed algorithms were successfully performed the test not only in the continuous spectrum X-ray fields given by MOST Ordinance but also in the several non-MOST Ordinance radiation fields which could be encountered in the practical working environments.

  • PDF

Comparison of the Knowledge, Attitude and the Preventive Behavior of Noise According to Noise-induced Hearing Loss Prevention Education (소음성난청 예방교육 실시에 따른 소음에 대한 인식 및 태도, 예방행위 비교)

  • Kwon, Su Ja;Kim, Tae Kyung;Jung, Hee Young
    • Korean Journal of Occupational Health Nursing
    • /
    • v.15 no.1
    • /
    • pp.5-13
    • /
    • 2006
  • Purpose: The research were conducted to identify the knowledge, attitude and the preventive behaviour of noise according to noise-induced hearing loss prevention education and to provide primary data for effective noise-induced hearing loss prevention education for noise-exposed workers. Method: 104 noise-exposed workers were included in this study. The instrument used in this study was knowledge, attitude and preventive behavior of noise tool by Lee & Lee(1996). The first data were collected before the noise education from August to September, 2002. During 6 months, the education was provided, and then the second data were collected from April to May, 2003. Data were analyzed by SPSS 10.0 win program for finding frequency, percentage, mean, standard deviation, t-test, and ANOVA. Results: The results of this study were as follows: There were statistically significant differences of knowledge and attitude of noise related education level, and adhesion quality of wearing ear protection equipment after noise education. Also, otitis media's history, received education of the personal protective devices for the hearing conservation was significant in the preventive behaviour of noise. Conclusion: In conclusion, the noise-induced hearing loss prevention education was effective in changing the knowledge, attitude and the prevention behaviour of noise. Therefore, the noise-induced hearing loss prevention education is strongly recommended for noise-exposed workers and it will be necessary repeated education for changing prevention behaviour of noise.

  • PDF

Secure De-identification and Data Sovereignty Management of Decentralized SSI using Restructured ZKP (재구성된 영지식 증명을 활용한 탈중앙형 자기 주권 신원의 안전한 비식별화 및 데이터 주권 관리)

  • Cho, Kang-Woo;Jeon, Mi-Hyeon;Shin, Sang Uk
    • Journal of Digital Convergence
    • /
    • v.19 no.8
    • /
    • pp.205-217
    • /
    • 2021
  • Decentralized SSI(Self Sovereign Identity) has become an alternative to a new digital identity solution, but an efficient de-identification technique has not been proposed due to the unique algorithmic characteristics of data transactions. In this study, to ensure the decentralized operation of SSI, we propose a de-identification technique that does not remove identifiers by restructuring the verification results of ZKP (Zero Knowledge Proof) into a form that can be provided to the outside by the verifier. In addition, it is possible to provide restructured de-identification data without the consent of data subject by proposing the concept of differential sovereignty management for each entity participating in verification. As a result, the proposed model satisfies the domestic personal information protection law in a decnetralized SSI, in addition provides secure and efficient de-identification processing and sovereignty management.

A Study on the Energy Platform to Reduce Carbon Emissions (탄소배출 저감을 위한 에너지 플랫폼 연구)

  • Beom-seok Cha;Hyung-Jin Moon;Woojin Wi;Gab-Sang Ryu
    • Journal of Internet of Things and Convergence
    • /
    • v.10 no.2
    • /
    • pp.43-50
    • /
    • 2024
  • This manuscript proposes an artificial intelligence-based(AI) energy platform system that efficiently use existing energy than creating new energy than creating new energy sources. To this end, it collects public information data portal and statistics data portal and data emissions, including energy usage and greenhouse gas emissions, including energy consumption and greenhouse gas emissions.In addition, it provides strong security and personal information protection functions to overcome the limit of existing energy platform. Through the built energy platform, improving power supply and user convenience of users and users to contribute to global warming issues.In this paper, the contents to implement the contents of the system, and improvement direction from the future completion and improvement direction.