• Title/Summary/Keyword: Personal Protection

Search Result 1,073, Processing Time 0.024 seconds

A study on Performance of Infection Control in X-ray Taking for Dental Hygiene Student (일부 치위생 학생들의 엑스선촬영에 있어서의 감염관리 실태 조사)

  • Lee, Yeong-Ae;Jo, Min-Jung
    • Journal of dental hygiene science
    • /
    • v.5 no.4
    • /
    • pp.221-225
    • /
    • 2005
  • In this study, survey is conducted to make aware of importance which personal protection was accomplished at the dentistry. It investigated the performance of infection control and X-ray safety management to the third grade of D-Health College. 1. The infection control is recognized to high level and practiced certainly at actual training of oral prophylaxis. 2. The infection control is recognized to low level relatively at actual training of radiography. 3. The infection control is not practiced at actual training of radiography except for the film holder. 4. The X-ray safety management is recognized to high level and conducted certainly at actual training of radiography. To consider the above result, the infection control is not nearly practiced at radiography. In accordance with, the education must be demanded that the infection control is practiced throughly at radiography for raising a necessary against the recognization and practice of the infection control.

  • PDF

Design and implementation of Android obfuscation technique using layout file transformation (레이아웃 파일 변환을 이용한 안드로이드 난독화 기법의 설계 및 구현)

  • Park, Heewan
    • Journal of the Korea Convergence Society
    • /
    • v.11 no.11
    • /
    • pp.1-7
    • /
    • 2020
  • Android apps are mostly distributed as an apk files, and when the apk file is uncompressed, resource files such as xml files, images, and sounds related to app design can be extracted. If the resources of banking or finance-related apps are stolen and fake apps are distributed, personal information could be stolen or financial fraud may occur. Therefore, it is necessary to make it difficult to steal the design as well as the code when distributing the app. In this paper, we implemented a tool to convert the xml file into Java code and obfuscate using the Proguard, and evaluated the execution performance. If the layout obfuscation technique proposed in this paper is used, it is expected that the app operation performance can be improved and the illegal copying damage caused by the theft of the screen design can be prevented.

Safety Analysis of Various Padding Techniques on Padding Oracle Attack (패딩 오라클 공격에 따른 다양한 패딩방법의 안전성 분석)

  • Kim, Kimoon;Park, Myungseo;Kim, Jongsung;Lee, Changhoon;Moon, Dukjae;Hong, Seokhee
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.2
    • /
    • pp.271-278
    • /
    • 2015
  • We use various types of cryptographic algorithms for the protection of personal and sensitive informations in the application environments, such as an internet banking and an electronic commerce. However, recent researches were introduced that if we implement modes of operation, padding method and other cryptographic implementations in a wrong way, then the critical information can be leaked even though the underlying cryptographic algorithms are secure. Among these attacking techniques, the padding oracle attack is representative. In this paper, we analyze the possibility of padding oracle attacks of 12 kinds of padding techniques that can be applied to the CBC operation mode of a block cipher. As a result, we discovered that 3 kinds were safe padding techniques and 9 kinds were unsafe padding techniques. We propose 5 considerations when designing a safe padding techniques to have a resistance to the padding oracle attack through the analysis of three kinds of safe padding techniques.

A Study in the Improvement and Analysis Problem of Privacy Impact Assessment Qualification Criteria: focus on Similarity Analysis between Similar Certificates and Certification System of Privacy Impact Assessment (개인정보영향평가 자격기준의 문제분석과 개선방안 연구 - 유사자격과 개인정보영향평가 자격체계와의 유사성 분석을 중심으로)

  • Kim, Erang;Shim, Mina;Lim, Jong In
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.23 no.1
    • /
    • pp.127-142
    • /
    • 2013
  • Since Personal Information Protection Act came into effect on September 2011, PIA(Privacy Impact Assessment) of public institutions has become obliged. Therefore, an increasing demand for PIA professionals is being expected. In domestic, however, no specialized certificates exist and therefore similar certificates have become a requirement for PIA professionals. Henceforth, however, the system based on these similar certificates is to be an obstacle to advancing PIA. Therefore, this study analyzes the sufficiency of current similar certificates compared with the PIA qualification requirements. And then, analyzes the validity of allowance as similar certificates by using this outcome of the validity. As this comparison draws a clear gap between PIA qualification and similar certificates, this paper suggest three suggestions to improve current qualification. Three suggestions are expected to contribute a qualitative improvement of the PIA industry.

Comparative Analysis of TOA and TDOA method for position estimation of mobile station (이동국 위치 추정을 위한 TOA와 TDOA방법의 비교 분석)

  • 윤현성;호인석;이장호;변건식
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2000.05a
    • /
    • pp.167-172
    • /
    • 2000
  • This paper is aimed at developing an location tracking for mobile station employing currently available mobile communication network of cellular phone and PCS(Personal Communication System). When the location tracking of mobile stations is in services, the services such as Emergency-119, crime investigation, effective urban traffic management or the safety protection of Alzheimer's patients, ran be available. This paper is to track the mobile station in communication network in NLOS environment. To achieve reduction of the standard noise, Kalman filter is used. In terms of the distance, positions are located by using TOA and TDOA methods in the environment that removes NLOS bias in the measured data. And then smoothing method is used. to achieve reduction of the position error values

  • PDF

Low-weight Secure Encryption Protocol on RFID for Manufactory Automation (공장 자동화를 위한 RFID 경량 암호 프로토콜에 관한 연구)

  • Hwang, Deuk-Young;Kim, Jin-Mook
    • Convergence Security Journal
    • /
    • v.16 no.7
    • /
    • pp.173-180
    • /
    • 2016
  • There has been a growing interest in automation of factories in the country. And, the development in this regard has been actively attempted. In particular, on the basis of the "innovation 3.0 strategy of manufacturing industry", interest in the smart of the manufacturing plant of small and medium-sized enterprises has increased rapidly. As well as policy for building smart plant, technical, seeking a strategic approach. But, in order to introduce such a smart plant or factory automation systems, manufacturing plant security with vulnerability and personal information protection problems, it should always be top priority there. Accordingly, we provide the applicable lightweight secure protocols in RFID communication. It is a wireless communication technology that is most often introduced for factory automation. Our proposed lightweight secure protocol in this study, less the number of calculations in comparison with the existing public key-based and the symmetric key encryption algorithm. And it is fast in compare with the existing protocol. Furthermore, we design that it system can support to low power consumption and small consume the memory size.

Study on the New Re-identification Process of Health Information Applying ISO TS 25237 (ISO TS 25237을 적용한 보건의료정보의 새로운 재식별 처리에 관한 연구)

  • Kim, Soon Seok
    • Convergence Security Journal
    • /
    • v.19 no.5
    • /
    • pp.25-36
    • /
    • 2019
  • With the development of information and communication technology, hospitals that electronically process and manage medical information of patients are increasing. However, if medical information is processed electronically, there is still room for infringing personal information of the patient or medical staff. Accordingly, in 2017, the International Organization for Standardization (ISO) published ISO TS 25237 Health Information - Pseudonymization[1]. In this paper, we examine the re - identification process based on ISO TS 25237, the procedure and the problems of our proposed method. In addition, we propose a new processing scheme that adds a re-identification procedure to our secure differential privacy method [2] by keeping a mapping table between de-identified data sets and original data as ciphertext. The proposed method has proved to satisfy the requirements of ISO TS 25237 trust service providers except for some policy matters.

Design for Spatial Information for Effective Implementation of the Convention on the Rights of Persons with Disabilities (장애인권리협약의 효과적 이행을 위한 공간정보 구축방안 연구)

  • Ahn, Jong Wook;Shin, Dong Bin
    • Spatial Information Research
    • /
    • v.20 no.6
    • /
    • pp.59-68
    • /
    • 2012
  • The Convention on the Rights of Persons with Disabilities is the international conventions to acknowledge that persons with disabilities have dignity as human being and to give us duty to make an effort for protection of persons with disabilities' rights. This study deducts several tasks in spatial information field to fulfill the Convention on the Rights of Persons with Disabilities effectively. First of all, For the deduction, this study starts by considering accessability, personal movement, freedom of expression and accessability to information. Second, this study defines persons with disabilities as the spatial information what ensure for prior considerations. Third, this study deducts some requirements on spatial information of persons with disabilities on the basis of the survey targeting persons with disabilities and the expert opinion, and suggests objectives, strategies, tasks, systems for effective implementation of the Convention on the Rights of Persons with Disabilities. Especially, this study sets up a goal on spatial information establishing strategy of persons with disabilities as 'Disadvantaged groups like persons with disabilities can obtain requirable information without distinction of person, thereby pursuing the convenience of life and improving the quality of life.

The Regulations by Criminal Law against any Libel in Cyberspace (사이버명예훼손행위와 형사법적 대응방안)

  • Yoo, In-Chang
    • Journal of the Korea Society of Computer and Information
    • /
    • v.17 no.5
    • /
    • pp.177-183
    • /
    • 2012
  • There occur various crimes in cyber space hiding behind anonymity to avoid punishment by criminal law. One of the most serious crimes committed in cyber space is defamation against others under the cloak of freedom of expression. The infringements by defamations in cyber space are made all of a certain and widespread that the victims have no time to react, and for that reason, the shocks by the defamation are much serious and severe compared with that committed in off line. However, press and publication shouldn't infringe on other's honors, right, public order or social ethics in liberal democrat society which values much the human dignities and values as stipulated in Article 21 section 4 of the Constitution. Protection of personal honor is also the basic rights guaranteed by the Constitution as much as the freedom of expression, and by extension, such harmful behaviour shouldn't be included in the freedom of expression area. In this way, slander can be considered as the minimum limitation of the freedom of expression.

Analysis of Wearing Propensities, Wearing Comfort, Mobility of Movement, and 3D Shape for Advanced Baseball Leg Guards Design (야구 다리보호대 디자인을 위한 착용실태 및 착용감, 운동기능성, 3D 형태분석)

  • Lee, Hyojeong;Eom, Ran-I;Lee, Yejin
    • Journal of the Korean Society of Clothing and Textiles
    • /
    • v.39 no.1
    • /
    • pp.63-76
    • /
    • 2015
  • This study conducted a survey to gauge the buying and wearing propensities of wearers of leg guards made for baseball catchers, as well as product characteristics of preferred leg guards. Data from the survey were analyzed to obtain basic data for the development of an advanced leg guard design. Degree of compression, horizontal distance, cross section view and outline 3D sketch were also analyzed from the 3D data of leg guards; in addition, mobility and kinematic analysis were conducted through a wearing test. The survey indicated that imported products dominate the current retail market because they are appreciated by customers in terms of fit, price, brand, and protection. Representative complaints of products were discomfort, pressure, and the heavy-weight of the leg guards in general attributed to overall structure and 3D shape. When the pressure was lower on the front area of knee, it feels better to wear and the average knee angular velocity during the up and down motion increased, which suggests a better design from a kinematic point of view. The knee is the primary part of the body responsible for any movement of the lower limbs; consequently, the degree of compression and support stability of the leg guards near the knee area are important factors to evaluate the performance of leg guards. The results of our study indicate significant opportunities for improvement in product design and the development of baseball leg guards along with an ergonomic design that considers the mobility of the knee, skin deformations is necessary to improve performance. The process followed in this study will be applicable to studies on other personal protective equipment for sports.