• Title/Summary/Keyword: Personal Information Sharing

Search Result 250, Processing Time 0.025 seconds

Secure Sharing and Recovering Scheme of e-Business Data Based on Weight Table (가중치 테이블 기반 안전한 e-비즈니스 데이터 분할 복원 방식)

  • Song, You-Jin;Kim, Jin-Seog
    • The KIPS Transactions:PartC
    • /
    • v.16C no.1
    • /
    • pp.27-36
    • /
    • 2009
  • The leaking of personal information is mostly occurred by internal users. The confidential information such as credit card number can be disclosed or modified by system manager easily. The secure storaging and managing scheme for sensitive data of individual and enterprise is required for distributed data management. The manager owning private data is needed to have a weight which is a right to disclose a private data. For deciding a weight, it is required that system is able to designate the level of user's right. In this paper, we propose the new algorithm named digit-independent algorithm. And we propose a new data management scheme of gathering and processing the data based on digit-independent algorithm. Our sharing and recovering scheme have the efficient computation operation for managing a large quantity of data using weight table. The proposed scheme is able to use for secure e-business data management and storage in ubiquitous computing environment.

ERP-Based Accounting Information System Implementation in Organization: A Study in Riau, Indonesia

  • NUR D.P., Emrinaldi;IRFAN, Muhammad
    • The Journal of Asian Finance, Economics and Business
    • /
    • v.7 no.12
    • /
    • pp.147-157
    • /
    • 2020
  • In the accounting information system implementation, the users should consider the benefits and advantages of the system. This paper examines the effect of the Enterprise Resources Planning based (ERP-based) accounting information system implementation on user impact and organizational impact. The population in this study is companies listed on the Indonesian Stock Exchange, especially companies based in Riau, Indonesia. These companies currently use the ERP-based accounting information system. Research samples are employees who use the ERP-based accounting information system. For data analysis, we use structural equation modeling (SEM). Based on data analysis, high-quality information system implementation generate high-quality information that can give satisfaction to the user. Moreover, the information system is related to user skill, satisfaction, and knowledge sharing which improve personal skills; enhanced personal skill contributes to organizational performance. On the other hand, there is no effect of training on personal skills and there is no effect of information quality on perceived usefulness. This research gives implication to the organization for implementing a high-quality ERP-based accounting information system that positively impacts organizational performance. Future research is expected to examine information system implementation in different research objects and conditions.

Security of Medical Information on IoT (사물인터넷 환경의 의료정보 보안)

  • Woo, Sung-hee
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2015.10a
    • /
    • pp.973-976
    • /
    • 2015
  • Inernet of Things(IoT) is interaction with each other, collecting, sharing, and analysing the data. IoT has been noted in combining the fields of medical service in particular. However, the security issue is caused, while IoT is receiving attention. U-Health and medical devices, which deal mainly the personal health information, is required to a high level of privacy and security of health information. This study analyzes cases of leakage of personal medical information, security of IoT, privacy flow, and the response strategies.

  • PDF

A Study on Smart Tourism Based on Face Recognition Using Smartphone

  • Ryu, Ki-Hwan;Lee, Myoung-Su
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.8 no.4
    • /
    • pp.39-47
    • /
    • 2016
  • This study is a smart tourism research based on face recognition applied system that manages individual information of foreign tourists to smartphone. It is a way to authenticate by using face recognition, which is biometric information, as a technology applied to identification inquiry, immigration control, etc. and it is designed so that tourism companies can provide customized service to customers by applying algorism to smartphone. The smart tourism system based on face recognition is a system that prepares the reception service by sending the information to smartphone of tourist service company guide in real time after taking faces of foreign tourists who enter Korea for the first time with glasses attached to the camera. The smart tourism based on face recognition is personal information recognition technology, speech recognition technology, sensing technology, artificial intelligence personal information recognition technology, etc. Especially, artificial intelligence personal information recognition technology is a system that enables the tourism service company to implement the self-promotion function to commemorate the visit of foreign tourists and that enables tourists to participate in events and experience them directly. Since the application of smart tourism based on face recognition can utilize unique facial data and image features, it can be beneficially utilized for service companies that require accurate user authentication and service companies that prioritize security. However, in terms of sharing information by government organizations and private companies, preemptive measures such as the introduction of security systems should be taken.

A Proposal for a Personal Branding Support Service in Social Media Times

  • Kawano, Yoshihiro;Obu, Yuka
    • Journal of Contemporary Eastern Asia
    • /
    • v.12 no.2
    • /
    • pp.49-59
    • /
    • 2013
  • Social media such as Twitter and Facebook have become popular. In the age of social media, many people have become more active online. For example, about half of all global active Internet users are on Facebook (Perry 2012). Personal branding is a very important strategy to build on an individual's strengths, and this kind of branding is expected to contribute to self-actualization. Therefore, the presence of mentors who advise users to discover their own strong points for self-actualization is necessary. In this paper, we propose a personal branding support service, Mentors, which connects mentors and mentees. The core concept is: "Everyone has the face of both a mentor and mentee." The key function is sharing stages of self-analysis in human life design: Determining value, creating a mission, and forming a strategy. From this function, a good match between a mentor and mentee can be found. The program aims to improve human life by understanding the client's strengths and using social media effectively. Future work includes launching Mentors and evaluating its service.

Knowledge Sharing Model in Virtual Communities Considering Personal and Social Factors (개인적·사회적 요인을 고려한 가상 공동체에서의 지식 공유 모형)

  • Choi, Kyungsun;Ahn, Hyunchul
    • The Journal of Information Systems
    • /
    • v.28 no.1
    • /
    • pp.41-72
    • /
    • 2019
  • Purpose Virtual communities (VCs) are becoming ever more important in these days, sometimes more than offline communities. Notably, they have become significant sources of knowledge sharing. Therefore, in order to foster a VC, it is very important to understand why people share their knowledge in the VC. Under this background, this paper aims at proposing the behavioral model best explains knowledge sharing activities in VCs. Design/methodology/approach We basically design our behavioral model for knowledge sharing in VCs based on theory of reasoned action (TRA). However, to understand knowledge sharing in VCs better, we specify knowledge sharing by dividing it into knowledge contribution and knowledge use. Also, instead of 'subjective norm', we adopt 'sense of virtual community (SOVC)' as a main social factor, which has been found to be important in the literature. We also include the antecedents such as 'quality of the shared knowledge', 'trust in community members', 'passion of the community leader', 'reciprocity', and 'self efficacy', which affect VC users' attitude towards knowledge sharing and SOVC. To test the hypotheses in our proposed model, we collected 253 valid surveys from the VC users. Structural equation modeling (SEM) using AMOS 23 is employed to assess the relationships proposed as the hypotheses. Findings Major findings are as follows. SOVC positively affects both intention to contribute knowledge and intention to use knowledge. And, trust in community members positively affects the attitude towards knowledge use and SOVC. The attitude towards knowledge use is also affected by the quality of the shared knowledge. Reciprocity is found to strongly positively affect the attitude towards knowledge contribution. However, passion of the community leader and self efficacy are found to have insignificant effect on SOVC and the attitude towards knowledge contribution respectively. Our study sheds a light on how to foster VCs from the perspective of knowledge management.

Sharing Treatment Information Between Family Members on the Web-based Telemedicine System (웹기반 원격진료시스템에서의 가족간 진료자료공유 알고리즘)

  • Kim Seok-Soo
    • The Journal of the Korea Contents Association
    • /
    • v.5 no.4
    • /
    • pp.141-149
    • /
    • 2005
  • The paper's suggestion is Web based Tele-Medicine System will be open to public, low-budget featuring high quality of extensive medical services. It will keep a log of personal medical history to allow doctors to share information on patients and their families. This will result in the reduction of erroneous diagnosis and ensure successful e-business. On top of this, the new system will provide a solution for membership (client) management. It will combine online and offline medical services and be available 24 hours a day to anywhere users have Internet access, setting itself apart from the existing distance medical services system. Specially, The paper's suggestion is sharing medical treatment information between family members is suggested. This approach makes possible understanding physical constitution and environment between family members, and can result in bringing a faster treatment effect if some family member suffers from a similar disease.

  • PDF

Study of Social Network Site Interactivity to Identify and Avert Usability Flaws for Effective User's Experience

  • Abduljalil, Sami;Hwang, Gi-Hyun;Kang, Dae-Ki
    • Journal of information and communication convergence engineering
    • /
    • v.9 no.3
    • /
    • pp.325-330
    • /
    • 2011
  • Due to the wide growth and popularity of social network website, large numbers of users discover these social network sites are a place where they can be able to spend their leisure time sharing interests, sharing ideas freely, sharing personal experience, and also to search for new friends or partners. These websites give an opportunity for its users to socialize with new people and to keep in touch or reconnect with current or old friends and families across disperse continents, which traditionally replace the common traditional methods. These social network websites need accurate and careful investigations and findings on the usability issues for effective interactivity and more usability. However, little research might have previously invested on the usability of these social network websites. Therefore, we propose a new framework to study and test the usability of these social network sites. We namely call our framework "Interactivity". This framework will enable developers to assess the usability of the social network sites. It will provide an overview of the user's behavior while interacting in these social network websites. Performance of the framework will be performed using Camtasia software. This software will entirely capture the interactivity of users including the screen and the movements, which the screen and the motion of the user action will undergo to analysis at the end of our research.

Development of Location Sharing App with Encryption (암호화를 적용한 위치 공유 앱 개발)

  • Do Eun Kim;Jae-Moon Lee;Kitae Hwang;Inhwan Jung
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.23 no.6
    • /
    • pp.27-32
    • /
    • 2023
  • Location sharing through apps is increasing, such as finding a friend's location or sharing delivery status on the Internet. However, location information is important personal information, and in some cases can be misused for crimes, and so encryption of location information is essential when developing such apps. This paper develops an app that encrypts and shares location information between friends for purposes such as finding friends and deciding meeting locations. To improve encryption performance, the symmetric key was encrypted and transmitted using an asymmetric key, and for location sharing, only the symmetric key was used to encrypt it. The proposed app was developed on iOS, and performance measurements showed that encryption of location information was at least 5,000 times faster when using a symmetric key than when using an asymmetric key.

A Study on Legal Issues between the Application of Blockchain Technology and Deletion and the Third Party Supply of Personal Information (블록체인 기술 적용과 개인정보 삭제 및 제3자 제공의 법적 문제에 관한 연구)

  • Choi, Yong-hyuk;Kwon, Hun-yeong
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.6
    • /
    • pp.1607-1621
    • /
    • 2018
  • The financial industry, which guarantees a credible transaction and can not permit forgery of its transaction information, has hitherto adhered to a traditional centralized ledger management method. However, the blockchain technology has a decentralization which has been regarded as unsafe for the time being, and the more reliable transaction agreement and data integrity are guaranteed The world's financial industry and the IT world is causing the wave. Nevertheless, the inherent characteristics of the blockchain, such as the irreversibility of block information within a blockchain and the sharing of blocks between blockchain participants, can not avoid conflicts with the privacy laws. The purpose of this study is to investigate the problems related to deletion and the third party supply of personal information by focusing on these characteristics of the blockchain and to suggest the technical alternatives of the applicable blockchain and the improvement direction of the personal information protection law for using of blockchain technology.