• Title/Summary/Keyword: Personal Information Exposure

Search Result 193, Processing Time 0.029 seconds

User perception of medical service robots in hospital wards: a cross-sectional study

  • Lee, Jung Hwan;Lee, Jae Meen;Hwang, Jaehyun;Park, Joo Young;Kim, Mijeong;Kim, Dong Hwan;Lee, Jae Il;Nam, Kyoung Hyup;Han, In Ho
    • Journal of Yeungnam Medical Science
    • /
    • v.39 no.2
    • /
    • pp.116-123
    • /
    • 2022
  • Background: Recently, there have been various developments in medical service robots (MSRs). However, few studies have examined the perceptions of those who use it. The purpose of this study is to identify user perceptions of MSRs. Methods: We conducted a survey of 320 patients, doctors, and nurses. The contents of the survey were organized as follows: external appearances, perceptions, expected utilization, possible safety accidents, and awareness of their responsibilities. Statistical analyses were performed using t-test, chi-square test, and analysis of variance. Results: The most preferred appearance was the animal type, with a screen. The overall average score of positive questions was 3.64±0.98 of 5 points and that of negative questions was 3.24±0.99. Thus, the results revealed that the participants had positive perceptions of MSR. The overall average of all expected utilization was 4.05±0.84. The most expected utilization was to guide hospital facilities. The most worrisome accident was exposure to personal information. Moreover, participants thought that the overall responsibility of the robot user (hospital) was greater than that of the robot manufacturer in the case of safety accidents. Conclusion: The perceptions of MSRs used in hospital wards were positive, and the overall expected utilization was high. It is necessary to recognize safety accidents for such robots, and sufficient attention is required when developing and manufacturing robots.

Detection Models and Response Techniques of Fake Advertising Phishing Websites (가짜 광고성 피싱 사이트 탐지 모델 및 대응 기술)

  • Eunbeen Lee;Jeongeun Cho;Wonhyung Park
    • Convergence Security Journal
    • /
    • v.23 no.3
    • /
    • pp.29-36
    • /
    • 2023
  • With the recent surge in exposure to fake advertising phishing sites in search engines, the damage caused by poor search quality and personal information leakage is increasing. In particular, the seriousness of the problem is worsening faster as the possibility of automating the creation of advertising phishing sites through tools such as ChatGPT increases. In this paper, the source code of fake advertising phishing sites was statically analyzed to derive structural commonalities, and among them, a detection crawler that filters sites step by step based on foreign domains and redirection was developed to confirm that fake advertising posts were finally detected. In addition, we demonstrate the need for new guide lines by verifying that the redirection page of fake advertising sites is divided into three types and returns different sites according to each situation. Furthermore, we propose new detection guidelines for fake advertising phishing sites that cannot be detected by existing detection methods.

The Associated Factors of Protective Behaviors for Radiation Exposure based on Health Belief Model Honam Province Radiologic Technologists (건강신념모델을 적용한 호남지역 방사선사의 방사선 방어행위 수행도 관련 요인)

  • Yoon, Yo-Sang;Ryu, So-Yeon;Park, Jong;Choi, Seong-Woo;Oh, Hye-Jong
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.21 no.3
    • /
    • pp.96-107
    • /
    • 2020
  • This study aimed to identify the associated factors of protective behaviors for radiation exposure among some radiology technologists using the Health Belief Model. The subjects of the study were 541 radiology technologists working at hospitals or clinics in Honam Province. Using the SPSS version 18.0 program, data were analyzed using a t-test, ANOVA, Pearson's correlation analysis, and hierarchical multiple logistic regression analysis. To modify the factors, the performance of subjects who had a higher level of education and nuclear medicine rooms were higher than those who worked in simple radiography rooms. The radiation protective behaviors performance of the subjects who had more exercise, medium-level stress, and worked in higher-quality protection facilities was higher. Regarding the personal perceptions, the cues to action (β=.292, p=.0001), and perceived seriousness (β =.075, p=.010) were factors that had effects on the performance of radiation protection behaviors. Regarding the likelihood of action, the benefits (β=.168, p<.0001), self-efficacy (β=.148, p=.007), and the performance of protective behaviors were higher. In conclusion, protection education as a cue to action should be provided to stimulate protective behaviors, and the benefits of protective behaviors should be emphasized. To increase the performance of protection behaviors, self-efficacy should be enhanced, and the subjects are offered appropriate information that helps perceive seriousness.

Factors Influencing the Adoption of Location-Based Smartphone Applications: An Application of the Privacy Calculus Model (스마트폰 위치기반 어플리케이션의 이용의도에 영향을 미치는 요인: 프라이버시 계산 모형의 적용)

  • Cha, Hoon S.
    • Asia pacific journal of information systems
    • /
    • v.22 no.4
    • /
    • pp.7-29
    • /
    • 2012
  • Smartphone and its applications (i.e. apps) are increasingly penetrating consumer markets. According to a recent report from Korea Communications Commission, nearly 50% of mobile subscribers in South Korea are smartphone users that accounts for over 25 million people. In particular, the importance of smartphone has risen as a geospatially-aware device that provides various location-based services (LBS) equipped with GPS capability. The popular LBS include map and navigation, traffic and transportation updates, shopping and coupon services, and location-sensitive social network services. Overall, the emerging location-based smartphone apps (LBA) offer significant value by providing greater connectivity, personalization, and information and entertainment in a location-specific context. Conversely, the rapid growth of LBA and their benefits have been accompanied by concerns over the collection and dissemination of individual users' personal information through ongoing tracking of their location, identity, preferences, and social behaviors. The majority of LBA users tend to agree and consent to the LBA provider's terms and privacy policy on use of location data to get the immediate services. This tendency further increases the potential risks of unprotected exposure of personal information and serious invasion and breaches of individual privacy. To address the complex issues surrounding LBA particularly from the user's behavioral perspective, this study applied the privacy calculus model (PCM) to explore the factors that influence the adoption of LBA. According to PCM, consumers are engaged in a dynamic adjustment process in which privacy risks are weighted against benefits of information disclosure. Consistent with the principal notion of PCM, we investigated how individual users make a risk-benefit assessment under which personalized service and locatability act as benefit-side factors and information privacy risks act as a risk-side factor accompanying LBA adoption. In addition, we consider the moderating role of trust on the service providers in the prohibiting effects of privacy risks on user intention to adopt LBA. Further we include perceived ease of use and usefulness as additional constructs to examine whether the technology acceptance model (TAM) can be applied in the context of LBA adoption. The research model with ten (10) hypotheses was tested using data gathered from 98 respondents through a quasi-experimental survey method. During the survey, each participant was asked to navigate the website where the experimental simulation of a LBA allows the participant to purchase time-and-location sensitive discounted tickets for nearby stores. Structural equations modeling using partial least square validated the instrument and the proposed model. The results showed that six (6) out of ten (10) hypotheses were supported. On the subject of the core PCM, H2 (locatability ${\rightarrow}$ intention to use LBA) and H3 (privacy risks ${\rightarrow}$ intention to use LBA) were supported, while H1 (personalization ${\rightarrow}$ intention to use LBA) was not supported. Further, we could not any interaction effects (personalization X privacy risks, H4 & locatability X privacy risks, H5) on the intention to use LBA. In terms of privacy risks and trust, as mentioned above we found the significant negative influence from privacy risks on intention to use (H3), but positive influence from trust, which supported H6 (trust ${\rightarrow}$ intention to use LBA). The moderating effect of trust on the negative relationship between privacy risks and intention to use LBA was tested and confirmed by supporting H7 (privacy risks X trust ${\rightarrow}$ intention to use LBA). The two hypotheses regarding to the TAM, including H8 (perceived ease of use ${\rightarrow}$ perceived usefulness) and H9 (perceived ease of use ${\rightarrow}$ intention to use LBA) were supported; however, H10 (perceived effectiveness ${\rightarrow}$ intention to use LBA) was not supported. Results of this study offer the following key findings and implications. First the application of PCM was found to be a good analysis framework in the context of LBA adoption. Many of the hypotheses in the model were confirmed and the high value of $R^2$ (i.,e., 51%) indicated a good fit of the model. In particular, locatability and privacy risks are found to be the appropriate PCM-based antecedent variables. Second, the existence of moderating effect of trust on service provider suggests that the same marginal change in the level of privacy risks may differentially influence the intention to use LBA. That is, while the privacy risks increasingly become important social issues and will negatively influence the intention to use LBA, it is critical for LBA providers to build consumer trust and confidence to successfully mitigate this negative impact. Lastly, we could not find sufficient evidence that the intention to use LBA is influenced by perceived usefulness, which has been very well supported in most previous TAM research. This may suggest that more future research should examine the validity of applying TAM and further extend or modify it in the context of LBA or other similar smartphone apps.

  • PDF

A study on the FIDO authentication system using OpenSource (OpenSource를 이용한 FIDO 인증 시스템에 관한 연구)

  • Lee, Hyun-Jo;Cho, Han-Jin;Kim, Yong-Ki;Chae, Cheol-Joo
    • Journal of the Korea Convergence Society
    • /
    • v.11 no.5
    • /
    • pp.19-25
    • /
    • 2020
  • As the number of mobile device users increases, research on various user authentication methods has been actively conducted to protect sensitive personal information. Knowledge-based techniques have the disadvantage that security is deteriorated due to easy exposure of authentication means, and proprietary-based techniques have a problem of increasing construction cost and low user convenience to use the service. In order to solve this problem, a FIDO authentication system, which is a user authentication method using a smart device, has been proposed. Since the FIDO authentication system performs authentication based on the biometric information of the user, the risk of the authentication means being leaked is low, and since the authentication information is stored in the user's smart device, the user information due to server hacking is solved. Through this, it is possible to select and utilize user authentication technology suitable for the security level of the service. In this paper, we introduce the FIDO authentication system, explain the main parts required for FIDO UAF client-server development, and show examples of implementation using UAF open source provided by ebay.

A survey on the EMF Levels of Study and Electric Appliances in Korea (국내 전철 및 가전제품을 대상으로 한 전자장 수준 실태조사)

  • Jang, Seong Ki;Cho, Yong Sung;Lee, Seok Jo;Yoo, Seong Wha;Jung, Kyung Mi;Lim, Jun Ho
    • Journal of Korean Society of Occupational and Environmental Hygiene
    • /
    • v.15 no.1
    • /
    • pp.71-81
    • /
    • 2005
  • The purposes of this study was to collect, analyze, and describe the MF exposure levels from subways in Korea and to measure and evaluate the MF levels generated from electric appliances used at general homes. The target subway lines were Seoul Metropolitan Line 1 to Line 8, Bundang Line, Incheon Line, Daegu Line, Gwangju Line, and Busan Line 1 and Line 2. We measured at each station in those subway lines and, all the train types (pantograph-equipped, motor-equipped, and common), and platform types(facing and isolating) were investigated by the distance(80, 200, 400 cm) from the train on 19 targeted subway lines using 3 magnetic field measuring devices (EMDEXII, Enertech Co.) during the survey from January till October, 2004. On the other hand, the levels of the 60Hz magnetic fields generated from 14 items of home electric appliances such as electric blankets, hair dryers, electric razors, etc. were measured at 10 general homes using 5 EMDEXII meters with a sampling interval of 1.5 second by the distance(surface, 30, 50, 100, 300cm ) from the target electric appliances. The survey results in the whole subway lines examined in this study were as follows; Seoul Metropolitan Line 4 using AC(alternating current) power source showed the highest mean value of $2.85{\mu}T$, followed by Seoul Metropolitan Line 1 running between Seoul and Incheon using AC($2.78{\mu}T$), Seoul Metropolitan Line 1 between Seoul and Uijongbu using AC($2.73{\mu}T$), Bundang Line using AC($1.79{\mu}T$), Seoul Metropolitan Line 1 connected from Yongsan using AC($1.67{\mu}T$), Seoul Metropolitan Line 1 between Seoul and Suwon using AC($0.79{\mu}T$), and so on. In general, the intensity of the magnetic field in the subway systems in Korea was significantly higher when using AC($2.14{\pm}0.91{\mu}T$) than when using DC($0.29{\pm}0.44{\mu}T$) power source. Among the home electric appliances examined, microwave ovens showed the highest mean value of $7.69{\mu}T$, followed by hair dryers($6.47{\mu}T$), vacuum cleaners($5.27{\mu}T$), televisions ($2.26{\mu}T$), electric blankets($1.38{\mu}T$), personal computers ($0.81{\mu}T$), and so on. Two items of electric appliances showed the excess value of $0.2{\mu}T$ at the distance of 30cm in the MF exposure level; electric razors $1.58{\pm}2.13{\mu}T$ and vacuum cleaners $0.48{\pm}0.44{\mu}T$. As a whole, this study showed a tendency that the shift of the MF levels according to the increase of distance from the electric appliances was lower than those of the results surveyed in UK and USA. As a result, this study is expected to suggest meaningful data for the future study in exposure assessment of magnetic fields and for the establishment of guidelines for subways and electric appliances in Korea. More detailed and large scaled exposure assessment studies should be performed continuously to get the various and useful information on health risk assessment of MFs in Korea.

Detection and Blocking Techniques of Security Vulnerability in Android Intents (안드로이드 인텐트의 보안 취약성 탐지 및 차단 기법)

  • Yoon, Chang-Pyo;Moon, Seok-jae;Hwang, Chi-Gon
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2013.05a
    • /
    • pp.666-668
    • /
    • 2013
  • Recently, the kind and number of malicious code, which operates in Operation System of smart devices, are rapidly increasing along with the fast supplement of smart devices. Especially, smart devices based on Android OS have high potential of danger to expose to malicious code as it has an easy access to system authority. When using intent, the global message system provided from Android, inter approach between applications is available, and possible to access to created data by the device. Intent provides convenience to application development in the aspect of reusability of component however, it could be appointed as a risk element in security-wise. Therefore, if intent is used in malicious purpose, it is easy to lead the condition where is weak on security. That is, it is possible to control as accessing to resources which application is carrying to operate by receiving intents as making smart device uncontrollable or consuming system resources. Especially, in case of system authority is achieved, the risks such as smart device control or personal information exposure become bigger when misusing broadcast intent through malicious code. This paper proposes a corresponding method of security vulnerability of Android intent that monitors the appearance of intent with intent pattern inspection, detects and blocks unidentified pattern intent.

  • PDF

Gender Differences of Susceptibility to Lung Cancer According to Smoking Habits (흡연습관에 따른 폐암발생 감수성에 대한 성별의 차이)

  • Choi, Chung-Kyoung;Shin, Kyeong-Cheol;Lee, Kwan-Ho
    • Tuberculosis and Respiratory Diseases
    • /
    • v.49 no.5
    • /
    • pp.576-584
    • /
    • 2000
  • Background : With the increase of cigarette consumption by women and the young, the incidence of lung cancer is expected to increase during the next three or four decades in Korea. The purpose of this study was to analyze the smoking habits in patients with lung cancer and to identify the gender differences in terms of their susceptibility to cigarette related carcinogens. Method : This investigation was a hospital-based case control study, which included the data of 178 case subjects (72 females, 106 males) with lung cancer and 218 control subjects (97 females, 121 males) with diseases unrelated to smoking. The information was obtained through a direct personal interview and a questionnaire related to personal smoking history. Results : The relative frequency of the squamous cell carcinoma was substantially higher in males than in females (61.3% in males, and 29.2% in females), while adenocarcinoma including bronchoalveolar cell carcinoma was higher in females(31.9% in females, 18.9% in males). Kreyberg I lung cancer was of relatively higher frequencies in males and smokers, while Kreyberg II lung cancer was higher in females and never smokers. The odds ratios (ORs) at each exposure level were consistently higher in females than males. For all cell types, the risk of lung cancer was increased with the quantity of smoked cigarettes, duration of smoking, and depth of inhalation. Odds ratio was distinctly higher in Kreyberg I lung cancer than in total lung cancer and a steeper gradient of risk with increased smoking was observed in females. Conclusion : The relative risk for lung cancer was consistently higher in females than in males at every level of exposure to cigarette smoke. This is believed to be due to the higher susceptibility of females to tobacco carcinogens, such as gender associated differences of carcinogen activation and/or the elimination of smoking related metabolites.

  • PDF

A study on lead exposure indices of male workers exposed to lead less than 1 year in storage battery industries (축전지 제조업에서 입사 1년 미만 남자 사원들의 연 노출 지표치에 관한 연구)

  • HwangBo, Young;Kim, Yong-Bae;Lee, Gap-Soo;Lee, Sung-Soo;Ahn, Kyu-Dong;Lee, Byung-Kook;Kim, Joung-Soon
    • Journal of Preventive Medicine and Public Health
    • /
    • v.29 no.4 s.55
    • /
    • pp.747-764
    • /
    • 1996
  • This study intended to obtain an useful information for health management of lead exposed workers and determine biological monitoring interval in early period of exposure by measuring the lead exposure indices and work duration in all male workers (n=433 persons) exposed less than 1 year in 6 storage battery industries and in 49 males who are not exposed to lead as control. The examined variables were blood lead concentration (PBB), Zinc-protoporphyrin concentration (ZPP), Hemoglobin (HB) and personal history; also measured lead concentration in air (PBA) in the workplace. According to the geometric mean of lead concentration in the air, the factories were grouped into three categories: A; When it is below $0.05mg/m^3$, B; When it is between 0.05 and $0.10mg/m^3$, and C; When it is above $0.10mg/m^3$. The results obtained were as follows: 1. The means of blood lead concentration (PBB), ZPP concentration and hemoglobin(HB) in all male workers exposed to lead less than 1 year in storage battery industries were $29.5{\pm}12.4{\mu}g/100ml,\;52.9{\pm}30.0{\mu}g/100ml\;and\;15.2{\pm}1.1\;gm/100ml$. 2. The means of blood lead concentration (PBB), ZPP concentration and hemoglobin(HB) in control group were $5.8{\pm}1.6{\mu}g/100ml,\;30.8{\pm}12.7{\mu}g/100ml\;and\;15.7{\pm}1.6{\mu}g/100ml$, being much lower than that of study group exposed to lead. 3. The means of blood lead concentration and ZPP concentration among group A were $21.9{\pm}7.6{\mu}g/100,\;41.4{\pm}12.6{\mu}g/100ml$ ; those of group B were $29.8{\pm}11.6{\mu}g/100,\;52.6{\pm}27.9{\mu}g/100ml$ ; those of group C were $37.2{\pm}13.5{\mu}g/100,\;66.3{\pm}40.7{\mu}g/100ml$. Significant differences were found among three factory group(P<0.01) that was classified by the geometric mean of lead concentration in the air, group A being the lowest. 4. The mean of blood lead concentration of workers who have different work duration (month) was as follows ; When the work duration was $1\sim2$ month, it was $24.1{\pm}12.4{\mu}g/100ml$, ; When the work duration was $3\sim4$ month, it was $29.2{\pm}13.4{\mu}g/100ml$ ; and it was $28.9\sim34.5{\mu}g/100ml$ for the workers who had longer work duration than other. Significant differences were found among work duration group(P<0.05). 5. The mean of ZPP concentration of workers who have different work duration (month) was as follows ; When the work duration was $1\sim2$ month, it was $40.6{\pm}18.0{\mu}g/100ml$, ; When the work duration was $3\sim4$ month, it was $53.4{\pm}38.4{\mu}g/100ml$ ; and it was $51.5\sim60.4{\mu}g/100ml$ for the workers who had longer work duration than other. Significant differences were found among work duration group(P<0.05). 6. Among total workers(433 person), 18.2% had PBB concentration higher than $40{\mu}g/100ml$ and 7.1% had ZPP concentration higher than $100{\mu}g/100ml$ ; In workers of factory group A, those were 0.9% and 0.0% ; In workers of factory group B, those were 17.1% and 6.9% ; In workers of factory group C, those were 39.4% and 15.4%. 7. The proportions of total workers(433 person) with blood lead concentration lower than $25{\mu}g/100ml$ and ZPP concentration lower than $50{\mu}g/100ml$ were 39.7% and 61.9%, respectively ; In workers of factory group A, those were 65.5% and 82.3% : In workers of factory group B, those were 36.1% and 60.2% ; In workers of factory group C, those were 19.2% and 43.3%. 8. Blood lead concentration (r=0.177, P<0.01), ZPP concentration (r=0.135, P<0.01), log ZPP (r=0.170, P<0.01) and hemoglobin (r=0.096, P<0.05) showed statistically significant correlation with work duration (month). ZPP concentration (r=0.612, P<0.01) and log ZPP (r=0.614, P<0.01) showed statistically significant correlation with blood lead concentration 9. The slopes of simple linear regression between work duration(month, independent variable) and blood lead concentration (dependent variable) in workplace with low air concentration of lead was less steeper than that of poor working condition with high geometric mean air concentration of lead. The study result indicates that new employees should be provided with biological monitoring including blood lead concentration test and education about personal hygiene and work place management within $3\sim4$ month.

  • PDF

Analysis of the Vulnerability of the IoT by the Scenario (시나리오 분석을 통한 사물인터넷(IoT)의 취약성 분석)

  • Hong, Sunghyuck;Sin, Hyeon-Jun
    • Journal of the Korea Convergence Society
    • /
    • v.8 no.9
    • /
    • pp.1-7
    • /
    • 2017
  • As the network environment develops and speeds up, a lot of smart devices is developed, and a high-speed smart society can be realized while allowing people to interact with objects. As the number of things Internet has surged, a wide range of new security risks and problems have emerged for devices, platforms and operating systems, communications, and connected systems. Due to the physical characteristics of IoT devices, they are smaller in size than conventional systems, and operate with low power, low cost, and relatively low specifications. Therefore, it is difficult to apply the existing security solution used in the existing system. In addition, IoT devices are connected to the network at all times, it is important to ensure that personal privacy exposure, such as eavesdropping, data tampering, privacy breach, information leakage, unauthorized access, Significant security issues can arise, including confidentiality and threats to facilities. In this paper, we investigate cases of security threats and cases of network of IoT, analyze vulnerabilities, and suggest ways to minimize property damage by Internet of things.