• Title/Summary/Keyword: Personal Information Exposure

Search Result 195, Processing Time 0.025 seconds

Methodology for Quantitative Monitoring of Agricultural Worker Exposure to Pesticides (농작업자에 대한 농약 노출의 정량적 측정 방법)

  • Kim, Eun-Hye;Lee, Hye-Ri;Choi, Hoon;Moon, Joon-Kwan;Hong, Soon-Sung;Jeong, Mi-Hye;Park, Kyung-Hun;Lee, Hyo-Min;Kim, Jeong-Han
    • The Korean Journal of Pesticide Science
    • /
    • v.15 no.4
    • /
    • pp.507-528
    • /
    • 2011
  • Agricultural workers who mix/loads and spray pesticide in fields expose to pesticide through dermal and inhalation routes. In such situation, exposed amount should be measured quantitatively for reasonable risk assessment. Patch, gloves, socks and mask will be good materials for monitoring for dermal exposure while personal air monitor equipped with solid adsorbent and air pump will be a tool for inhalation exposure. For extrapolation of absorbed amount in dermal exposure matrices and of trapped amount in solid sorbent to total deraml or inhalation exposure, Korean standard body surface area and respiration rate were proposed in substitution of EPA data. Important exposure factors such as clothing and skin penetration ratio of dermal and inhalation exposure were suggested based on Spraying time for exposure monitoring must be long enough that the amount of pesticide to get absorbed/trapped in exposure matrices results in reasonable analytical value. In domestic case for the both of speed sprayer and power spray machine, spraying time of 20~40 minutes (0.1~0.2 ha) will be reasonable per single replicate before extrapolating to 4 hours a day with triplicates experiment.

Key Determinants of Dissatisfaction on COVID-19 Contact Tracing and Exposure Notification Apps (COVID-19 접촉추적과 노출알림 앱사용자의 항의 및 불만요인 탐색)

  • Leem, Byung-hak;Hong, Han-Kook
    • The Journal of the Korea Contents Association
    • /
    • v.21 no.9
    • /
    • pp.176-183
    • /
    • 2021
  • Digital medical technology is very effective and at the same time faces the challenge of protecting privacy. However, for contact tracking and exposure notification apps in COVID-19 environment, there is always a trade-off between privacy measures and the effectiveness of the app's use. Today, many countries have developed and used contact tracking and exposure notification apps in various forms to prevent the spread of COVID-19, but the suspicion of digital surveillance (digital panopticon) is unavoidable. Therefore, this study aims to identify the factors of personal information infringement and dissatisfaction through text mining analysis by extracting user reviews of "Self-Quarantine Safety Protection" in Korea. As a result of the text mining analysis, we derived four groups, 'Address recognition error', 'Exit warning error', 'Access error', and 'App. program error'. Since 'Address recognition error' and 'Exit warning error' can give the app users a strong perception that they are keeping under surveillanc by the app, transparent management of personal information protection and consent procedures related to personal information collection are required. In addition, if the other two groups are not corrected immediately due to an error in an app function or a program bug, the complaints of users can be maximized and a protest against the monitor can be raised.

Design of EEG Signal Security Scheme based on Privacy-Preserving BCI for a Cloud Environment (클라우드 환경을 위한 Privacy-Preserving BCI 기반의 뇌파신호 보안기법 설계)

  • Cho, Kwon;Lee, Donghyeok;Park, Namje
    • Journal of KIISE
    • /
    • v.45 no.1
    • /
    • pp.45-52
    • /
    • 2018
  • With the advent of BCI technology in recent years, various BCI products have been released. BCI technology enables brain information to be transmitted directly to a computer, and it will bring a lot of convenience to life. However, there is a problem with information protection. In particular, EEG data can raise issues about personal privacy. Collecting and analyzing big data on EEG reports raises serious concerns about personal information exposure. In this paper, we propose a secure privacy-preserving BCI model in a big data environment. The proposed model could prevent personal identification and protect EEG data in the cloud environment.

A Design of Interdependent Multi Session Authentication Scheme for Secure Cloud Service (안전한 클라우드 서비스를 위한 상호의존적 다중세션 인증 기법 설계)

  • Song, Jun Ho;Choi, Do Hyun;Park, Jung Oh
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.10 no.3
    • /
    • pp.181-196
    • /
    • 2014
  • Cloud computer technology currently provides diverse services based on a comprehensive environment ranging from hardware to solution, network and service. While the target of services has been extended from institutions and corporations to personal infrastructure and issues were made about security problems involved with protection of private information, measures on additional security demands for such service characteristics are insufficient. This paper proposes a multi-session authentication technique based on the characteristics of SaaS (Software as a Service) among cloud services. With no reliable authentication authority, the proposed technique reinforced communication sessions by performing key agreement protocol safe against key exposure and multi-channel session authentication, providing high efficiency of performance through key renewal using optimzied key table. Each formed sessions have resistance against deprivation of individual confirmation and service authority. Suggested confirmation technique that uses these features is expected to provide safe computing service in clouding environment.

A Study on the Cryptography Technology for Computing Stored and Encrypted Information without Key Leakage (키 유출 없이 저장되고 암호화된 정보를 계산할 수 있는 암호기술에 관한 연구)

  • Mun, Hyung-Jin;Hwang, Yoon-Cheol
    • Journal of Industrial Convergence
    • /
    • v.17 no.1
    • /
    • pp.1-6
    • /
    • 2019
  • Various cryptographic technologies have been proposed from ancient times and are developing in various ways to ensure the confidentiality of information. Due to exponentially increasing computer power, the encryption key is gradually increasing for security. Technology are being developed; however, security is guaranteed only in a short period of time. With the advent of the 4th Industrial Revolution, encryption technology is required in various fields. Recently, encryption technology using homomorphic encryption has attracted attention. Security threats arise due to the exposure of keys and plain texts used in the decryption processing for the operation of encrypted information. The homomorphic encryption can compute the data of the cipher text and secure process the information without exposing the plain text. When using the homomorphic encryption in processing big data like stored personal information in various services, security threats can be avoided because there is no exposure to key usage and decrypted information.

Who Speaks for Innovations?: An Analysis of the Media Exposure of R&D Outputs

  • Jeong, Seongkyoon;Cho, Sukmin
    • STI Policy Review
    • /
    • v.8 no.1
    • /
    • pp.41-61
    • /
    • 2017
  • The literature in research policy extensively addresses the interaction between public R&D and the society. Scholars have paid particular attention to the way science and technology are diffused into the society and industry with the aim of substantiating their potential value. In practice, having recognized the importance of the said interaction, R&D entities and governmental organizations promote scientific and technological innovations that result from their R&D activities. Yet, the nature of news media exposure as their primary channel to promote R&D outcomes has been remarkably understudied. Using the results of R&D projects supported by the National Research Foundation of Korea (NRF), this study examines R&D entities' strategic use of the news media to publicize their outcomes. The empirical results suggest that the scale of an R&D project positively affects the counts of media exposure of its R&D outcomes, whereas the level of technology readiness and the technology life-cycle do not have significant influence. In addition, the results suggest that, compared to senior researchers, young researchers are more likely to publicize their R&D outcomes and that R&D outcomes from highly ranked universities are more likely to be publicized than those from lower-ranking universities despite our control for R&D outcomes. The aforementioned results suggest that in promoting the diffusion of science and technology, especially to the public, policymakers should be concerned about incentives for those who provide techno-scientific information, such as researchers. The social need for the diffusion of techno-scientific information into the public (e.g., technology transfer and diffusion) is an insignificant factor in determining the media exposure of such information, whereas personal benefits and sensitive issues related to a researcher's own R&D activities (e.g., justification for R&D activities) drive researchers to publicize their R&D outcomes. This paper suggests that policymakers, especially those concerned with better diffusion of scientific and technological innovations need to design a proper incentive system to maximize the societal benefits of media exposure.

Study on the Effect of Self-Disclosure Factor on Exposure Behavior of Social Network Service (자기노출 요인이 소셜 네트워크 서비스의 노출행동에 미치는 영향에 관한 연구)

  • Do Soon Kwon;Seong Jun Kim;Jung Eun Kim;Hye In Jeong;Ki Seok Lee
    • Information Systems Review
    • /
    • v.18 no.3
    • /
    • pp.209-233
    • /
    • 2016
  • Internet companies that utilize social network have increased in number. The introduction of diverse social media services facilitated innovative changes in e-business. Social network service (SNS), which is a domain of social media, is a web-based service designed to strengthen human relations in the Internet and build new social relations. The remarkable growth of social network services and the profit generation and perception of this service are the new growth engines of this digital age. Given this development, many global IT companies views SNS as the most powerful form of social media. Thus, they invest efforts to develop business models using SNS.2) This study verifies the impact of privacy exposure in SNS as a result of privacy invasion. This study examines the purpose of using the SNS and user's awareness of the significance of personal information, which are key factors that affect self-disclosure of personal information. This study utilizes theory of reasoned action (TRA) to provide a theoretical platform that describes the specific behavior and emotional response of individuals. This study presents a research model that considers negative attitude (negatude). In this model, self-disclosure in SNS is considered a TRA. TRA is a subjective norm, a behavioral intention, and a key variable of exposure behavior. A survey was conducted on college students at Y university in Seoul to empirically verify the research model. The students have experiences in using SNS. A total of 198 samples were collected. Path analysis was applied to analyze the relations of factors. The results of path analysis show the statistically insignificant impact of privacy invasion on negatude, subjective norm, behavioral intention, and exposure behavior. The impact of unrecognized privacy invasion was also considered insignificant. The impacts of intention to use SNS on negatude, subjective norm, behavioral intention, and exposure behavior was significant. A significant impact was also found for the significance of personal information on subjective norm, behavioral intention, and exposure behavior, whereas the impact on negatude was insignificant. The impact of subjective norm on behavioral intention was significant. Lastly, the impact of behavioral intention on exposure behavior was insignificant. These findings are significant because the study examined the process of self-disclosure by integrating psychological and social factors based on theoretical discussion.

A Close Contact Tracing Method Based on Bluetooth Signals Applicable to Ship Environments

  • Qianfeng Lin;Jooyoung Son
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.17 no.2
    • /
    • pp.644-662
    • /
    • 2023
  • There are still outbreaks of COVID-19 across the world. Ships increase the risk of worldwide transmission of the virus. Close contact tracing remains as an effective method of reducing the risk of virus transmission. Therefore, close contact tracing in ship environments becomes a research topic. Exposure Notifications API (Application Programming Interface) can be used to determine the encountered location points of close contacts on ships. Location points of close contact are estimated by the encountered location points. Risky areas in ships can be calculated based on the encountered location points. The tracking of close contacts is possible with Bluetooth technology without the Internet. The Bluetooth signal can be used to judge the proximity among detecting devices by using the feature that Bluetooth has a strong signal at close range. This Bluetooth feature makes it possible to trace close contacts in ship environments. In this paper, we propose a method for close contact tracing and showing the risky area in a ship environment by combining beacon and Exposure Notification API using Bluetooth technology. This method does not require an Internet connection for tracing close contacts and can protect the personal information of close contacts.

A Study on the Noise by working Process in Dental Laboratory (치과기공실(齒科技工室)의 작업공정별(作業工程別) 소음(騷音)에 관한 연구(硏究))

  • Nam, Sang-Yong
    • Journal of Technologic Dentistry
    • /
    • v.15 no.1
    • /
    • pp.27-41
    • /
    • 1993
  • Degree of noise by personal dental laboratory working process and degree of noise by complex dental laboratory working process were measured separtely. The time of exposure to noise greater than 70dB was analyzed. Then, the whole degree of noise in dental laboratory was estimated on the basis of afore-mentioned information. Questionaire were employed to investigate the mental, emotional and physiological effects of noise in dental technicians, The purpose of this study was to provide basic information on keeping dental techneicans who are exposed to noise pollution in good working condition and good health. Results obtained are as follows ; 1. Polishing process in each working part showed high degree of noise greater than 70dB in terms of degree of noise by personal working. 2. Degree of noise by complex working process in each working part was greater than that of personal working process. 3. Time of exposure to noise complex working process the part of porcelain 150min, partial denture 120 min, crown and bridge 100 min, full denture 80 min. 4. Degree of noise by time in dental laboratory was 80dB in general for polishing process and below 75dB for waxing process. 5. Effects of noise on mental and emotional state of dental technicians showed that they felt irritated every day(14%), irritated once in a while(29%) and easily ger mad(19%). 6. Effects of noise on heart and stomach were hyper-gastric acid(38%), gastric ulcer(11%), gastritis(5%), deuodenal ulcer(3%) and weak heart function(32%). 7. Effects of noise in the hearing ability were weak(39%), moderate(33%) and normal(14%) Data presented in this study demonstrated that noise in the dental laboratory exerts profound effect on dental technicians mentally, physiologically and emotionally, in light of the above results, therefore, it appears advisable to devots substantial on the management of working condition and put further(continuing) efforts in the investigation for reducing noise problem.

  • PDF

De-identifying Unstructured Medical Text and Attribute-based Utility Measurement (의료 비정형 텍스트 비식별화 및 속성기반 유용도 측정 기법)

  • Ro, Gun;Chun, Jonghoon
    • The Journal of Society for e-Business Studies
    • /
    • v.24 no.1
    • /
    • pp.121-137
    • /
    • 2019
  • De-identification is a method by which the remaining information can not be referred to a specific individual by removing the personal information from the data set. As a result, de-identification can lower the exposure risk of personal information that may occur in the process of collecting, processing, storing and distributing information. Although there have been many studies in de-identification algorithms, protection models, and etc., most of them are limited to structured data, and there are relatively few considerations on de-identification of unstructured data. Especially, in the medical field where the unstructured text is frequently used, many people simply remove all personally identifiable information in order to lower the exposure risk of personal information, while admitting the fact that the data utility is lowered accordingly. This study proposes a new method to perform de-identification by applying the k-anonymity protection model targeting unstructured text in the medical field in which de-identification is mandatory because privacy protection issues are more critical in comparison to other fields. Also, the goal of this study is to propose a new utility metric so that people can comprehend de-identified data set utility intuitively. Therefore, if the result of this research is applied to various industrial fields where unstructured text is used, we expect that we can increase the utility of the unstructured text which contains personal information.