• Title/Summary/Keyword: Personal Security

Search Result 1,605, Processing Time 0.038 seconds

Blockchain Technology for Healthcare Big Data Sharing (헬스케어 빅데이터 유통을 위한 블록체인기술 활성화 방안)

  • Yu, Hyeong Won;Lee, Eunsol;Kho, Wookyun;Han, Ho-seong;Han, Hyun Wook
    • The Journal of Bigdata
    • /
    • v.3 no.1
    • /
    • pp.73-82
    • /
    • 2018
  • At the core of future medicine is the realization of Precision Medicine centered on individuals. For this, we need to have an open ecosystem that can view, manage and distribute healthcare data anytime, anywhere. However, since healthcare data deals with sensitive personal information, a significant level of reliability and security are required at the same time. In order to solve this problem, the healthcare industry is paying attention to the blockchain technology. Unlike the existing information communication infrastructure, which stores and manages transaction information in a central server, the block chain technology is a distributed operating network in which a data is distributed and managed by all users participating in the network. In this study, we not only discuss the technical and legal aspects necessary for demonstration of healthcare data distribution using blockchain technology but also introduce KOREN SDI Network-based Healthcare Big Data Distribution Demonstration Study. In addition, we discuss policy strategies for activating blockchain technology in healthcare.

The Comparative Study of Purchasing Characteristics of the Apparel Products Consumer using Internet Shopping Mall and the Cable TV Home Shopping (인터넷 쇼핑몰과 케이블 TV 홈쇼핑 이용자들의 의류제품 구매특성 비교연구)

  • 최은정;김문숙
    • The Research Journal of the Costume Culture
    • /
    • v.11 no.6
    • /
    • pp.808-825
    • /
    • 2003
  • The purpose of this study is to research the reasons of this outcome by comparing the consumers purchasing characteristics of the Internet shopping mall and cable TV home shopping. A questionnaire was designed for on-line survey panels residing in Korea and the period of the survey was from July 30 to August 6, 2002. 1362 questionnaires were collected and 665 were chosen. The Frequency, %, t-test, and x2-test was performed using Korean version of SPSS 10.0. The summarized results of this study are as follows: The reasons of purchasing Apparel products through Internet and Cable TV home shopping are low price, time Saving, and convenience. The Item that is purchased most often at the Internet shopping mall is casual T-shirt. In case of the cable TV home shopping, it is inner-wears. Most of the users were satisfied with the home shopping. There are significant difference in ‘inexpensiveness of price’, ‘variety of product’, ‘sufficiency of product information’, ‘easiness of searching product’, ‘security of personal information’, ‘convenience of order’ in the side of consumers satisfaction. The reason of not using the media shopping are as follows: ‘Distrust of the product’ appeared one of the main reason of not using internet shopping mall and cable TV home shopping, accounting for 34.3%(Internet)/25.3%(Cable TV) of all respondents, followed by ‘absence of products(18.7%)’, In case of the cable TV home shopping, ‘lack of necessity of home shopping(24.7%)’ was the main reason.

  • PDF

VERIFICATION OF ELECTROMAGNETIC EFFECTS FROM WIRELESS DEVICES IN OPERATING NUCLEAR POWER PLANTS

  • YE, SONG-HAE;KIM, YOUNG-SIK;LYOU, HO-SUN;KIM, MIN-SUK;LYOU, JOON
    • Nuclear Engineering and Technology
    • /
    • v.47 no.6
    • /
    • pp.729-737
    • /
    • 2015
  • Wireless communication technologies, especially smartphones, have become increasingly common. Wireless technology is widely used in general industry and this trend is also expected to grow with the development of wireless technology. However, wireless technology is not currently applied in any domestic operating nuclear power plants (NPPs) because of the highest priority of the safety policy. Wireless technology is required in operating NPPs, however, in order to improve the emergency responses and work efficiency of the operators and maintenance personnel during its operation. The wired telephone network in domestic NPPs can be simply connected to a wireless local area network to use wireless devices. This design change can improve the ability of the operators and personnel to respond to an emergency situation by using important equipment for a safe shutdown. IEEE 802.11 smartphones (Wi-Fi standard), Internet Protocol (IP) phones, personal digital assistant (PDA) for field work, notebooks used with web cameras, and remote site monitoring tablet PCs for on-site testing may be considered as wireless devices that can be used in domestic operating NPPs. Despite its advantages, wireless technology has only been used during the overhaul period in Korean NPPs due to the electromagnetic influence of sensitive equipment and cyber security problems. This paper presents the electromagnetic verification results from major sensitive equipment after using wireless devices in domestic operating NPPs. It also provides a solution for electromagnetic interference/radio frequency interference (EMI/RFI) from portable and fixed wireless devices with a Wi-Fi communication environment within domestic NPPs.

Case Study of Assisted Living Facility (ALF) as a 'Home' (집'으로서의 노인보호주택 사례연구)

  • 김영주
    • Proceeding of Spring/Autumn Annual Conference of KHA
    • /
    • 2002.11a
    • /
    • pp.137-142
    • /
    • 2002
  • The purpose of this study was to examine the features that make residents feel “at home” in ALFs in Southwest Virginia and to suggest further policy and design guidelines for better Quality of ALFs as a “home.” For this purpose, residents' needs, experiences, and opinions of the physical environment, the social environment, and the organizational environments such as policies and programs of ALFs were identified. As a multi-case study, five ALFs in Southwest Virginia were studied using constant comparative methos of data analysis. In addition to face-to-face interviews with 25 residents and five administrators of five ALFs, observations were conducted with personal journal. Overall, the five sites selected presented homelike features showing the philosophy of assisted living which combines housing and services. Each facility was designed to be a single-family house or multi-family dwelling in outside appearance. As a whole, residents felt isolation and loneliness and they did not have active interaction with other residents because of diverse background among the residents. However, all of them had close relationships with the staff. The staff's attitude and behavior seemed to influence greatly the residents' feeling “at home.” Despite the provision of diverse activities by the facilities, many residents did not participate in the programs. Most of the residents agreed that the rule and regulations were fair. In spite of high satisfaction with the facility, many people did not think of their current dwelling as a real ‘home.’ As the biggest difference between living in their own homes and living in the ALF, people pointed out a lack of independence, freedom, and autonomy. Residents of ALFs may have reordered their priorities in their current life situation so that safety, security, and care were more important to them than feeling “at home.” Among the three factors --physical, social, and organizational-- that affect the residents' perception of ALFs as a “home, ” many emphasized the importance of social factors such as relationships with the staff and residents, and social support from their family or friends.

  • PDF

A Multilevel Model Analysis on the Determinants of Smoking Cessation Success Rates (다층모형을 통한 금연성공에 영향을 미치는 요인 분석)

  • Song, Tae Min;Lee, Ju Yul
    • Korean Journal of Health Education and Promotion
    • /
    • v.30 no.1
    • /
    • pp.53-64
    • /
    • 2013
  • Objectives: In this study, a multilevel analysis model has been designed to investigate the effect of personal characteristics associated with smoking cessation on anti-smoking determinants with a goal of finding out the factors which have influence on smoking cessation among the entrants of smoking cessation clinic in a public health center. Methods: A total of 253,136 male smokers who received smoking cessation services for more than six(6) months in a smoking cessation clinic of public health center from July 16, 2007 to July 15, 2008 were examined. For technical analysis, SPSS Version 2.0 has been used. For multilevel analysis on smoking cessation determinants, in addition, HLM 7.0 has been adopted. Results: According to the unconditional model of multilevel analysis, the success rates of smoking cessation among the entrants of a smoking cessation clinic were 47.3%. In an unconditional slope model test to which regional variables were added, a negative effect was observed in average smoking amount, total smoking period, nicotine dependence and services while a positive effect was found in age, stress and type of social security in terms of the log of the odds of smoking cessation. In a conditional model test, a positive effect was observed in Non-Smoking Campaigns (NSC) and Frequency of Counseling (FC) in terms of the log of the odds of smoking cessation in regional variables. Conclusions: It is important to approach smokers individually and, at the same time, build healthy environment for a local community to increase smoking cessation rates among the entrants of smoking cessation clinic in a public health center.

A Study on Hacking Attack of Wire and Wireless Voice over Internet Protocol Terminals (유무선 인터넷전화 단말에 대한 해킹 공격 연구)

  • Kwon, Se-Hwan;Park, Dea-Woo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2011.10a
    • /
    • pp.299-302
    • /
    • 2011
  • Recently, Voice over Internet protocol(VoIP) in IP-based wired and wireless voice, as well as by providing multimedia information transfer. Wired and wireless VoIP is easy on illegal eavesdropping of phone calls and VoIP call control signals on the network. In addition, service misuse attacks, denial of service attacks can be targeted as compared to traditional landline phones, there are several security vulnerabilities. In this paper, VoIP equipment in order to obtain information on the IP Phone is scanning. And check the password of IP Phone, and log in successful from the administrator's page. Then after reaching the page VoIP IP Phone Administrator Settings screen, phone number, port number, certification number, is changed. In addition, IP Phones that are registered in the administrator page of the call records check and personal information is the study of hacking.

  • PDF

Analyzing the Challenges for Cloud Computing Business Dissemination in the Service Provider's Perspective (클라우드 컴퓨팅 시장 확산을 위한 공급자 관점의 선결요인)

  • Park, Soo Kyung;Cho, Ji Yeon;Lee, Bong Gyou
    • Journal of Information Technology Services
    • /
    • v.14 no.3
    • /
    • pp.99-116
    • /
    • 2015
  • The concept of Cloud computing has been introduced in the IT field over 10 years and industry has been expanding constantly. However, compare to the maturity of global market, Korea cloud computing industry is only in the early stage. Even the Korea has advantages in technology infrastructure; the pace of Korea cloud computing market growth is taking a serious downturn. Under these circumstances, it is needed to be discussing that strategy for expanding the cloud computing market size and for sustaining global competitiveness of local companies. Previous studies on plans for Korea cloud computing market has been conducted since 2009 and most of them are tend to examined in demand perspective. Thus, this study aims at identifying the priority of business challenges for making better performance in the market with service provider aspects. To analyze the important factors in the providing cloud computing service, ANP methodology was applied in this study. The network model including five clusters, security, stability, performance, consumer, and institution, was defined through literature review and expert survey was conducted to collect data. As a result of ANP analysis, 'Securing service reliability' was analyzed as the most important factor and followed by 'Preparing the range of legal liability', 'Preventing personal information leakage' and 'Preventing confidential information data leakage.' The priority of result indicates that service provider needs to focus on to make the secured service environment. This study has significance on analyzing the priority of business challenges in the service provider perspective. This study will provide useful guidelines to for establishing strategies in cloud computing market.

A Study on Utilization of Drone for Public Sector by Analysis of Drone Industry (국내외 드론산업 동향 분석을 통한 공공분야에서의 드론 활용방안에 대한 연구)

  • Sim, Seungbae;Kwon, Hunyeong;Jung, Hosang
    • Journal of Information Technology Services
    • /
    • v.15 no.4
    • /
    • pp.25-39
    • /
    • 2016
  • The drone is an unmanned aerial vehicle which has no human pilot. Drones can be classified into military drones, commercial drones, and personal drones by usage. Also, drones can be classified from large-sized to nano-sized drone by size and autonomous, remote controlled drone by control type. Especially, military drones can be classified into low-altitude drones, medium-altitude, and high-altitude drones by altitude. Recently, the drone industry is one of the fast growing industries in the world. As drone technologies have become more advanced and cost-effective, Korean government has set its goal to become a top-level country in drone business. However, the government's strict regulation for drone operations is one of the biggest hurdles for the development of the related technologies in Korea and other countries. For example, critical problems for drone delivery can be classified into technical issues and institutional issues. Technical issues include durability, conditional awareness, grasp and release mechanisms, collision avoidance systems, drone operating system. Institutional issues include pilot and operator licensing, privacy rules, noise guidelines, security rules, education for drone police. This study analyzes the trends of the drone industry from the viewpoint of technology and regulation. Also, we define the business areas of drone utilization. Especially, the drone business types or models for public sector are proposed. Drone services or functions promoting public interests need to be aligned with the business reference model of Korean government. To define ten types of drone uses for public sector, we combine the business types of government with the future uses of drones that are proposed by futurists and business analysts. Future uses of drones can be divided into three sectors or services. First, drone services for public or military sectors include early warning systems, emergency services, news reporting, police drones, library drones, healthcare drones, travel drones. Second, drone services for commercial or industrial services include parcel delivery drones, gaming drones, sporting drones, farming and agriculture drones, ranching drones, robotic arm drones. Third, drone services for household sector include smart home drones.

An Access Control using SPKI Certificate in Peer-to-Peer Environment (P2P 환경에서 SPKI 인증서를 이용한 접근 제어)

  • Shin, Jung-Hwa;Lee, Young-Kyung;Lee, Kyung-Hyune
    • The KIPS Transactions:PartC
    • /
    • v.10C no.6
    • /
    • pp.793-798
    • /
    • 2003
  • The P2P service is a technology that can share their information with each other who is able to be connected ith a relating program without passing by a server. Since all personal compiters that linked to the internet under the P2P service can opetate as server or a client, they can provide and share both their information and services through the direct connection. Currently, the P2P service is giving an equal privilege to all users for sharing their resources,.Under this situation, a lot of vulnerability against the various sttacks through the Unternet is possoble, more sophisticated security services are necessary. In this paper, We propose and access control schemae using SPKI(Simple Public Key Infrastructure). The scheme designates and access and acces control by providing the certificate to users who request a connection for resource sharing and limits the resource usage of information provider according to the access right that is given to their own rights.

Efficient certificate management system design and implementation on the use of medical solutions (의료솔루션 사용과 관련된 효율적인 인증서 관리 시스템 설계 및 구현)

  • Lee, Hyo Seung;Oh, Jae Chul
    • Smart Media Journal
    • /
    • v.5 no.1
    • /
    • pp.114-121
    • /
    • 2016
  • Currently, different medical institutions have been carrying out the e-healthcare system project. The system includes electronic medical record and prescription delivery system, and, the Medical Treatment law permits electronic signature for medical record management, which reduced the relevant costs and enabled sharing medical record. And medical solution using online certificates is expanding its application. In that light, the role of certificates became more important than ever. However, in contrast to active effort made to manage personal certificates, certificates related to medical solutions and other types of work are not being managed properly. Most work-related certificates are saved in office computers, which makes them vulnerable to various security threats. Although certificate servers can be used as a solution to this problem, hospitals must build the server separately and, therefore, small and medium-size hospitals can be reluctant to bear the burden. This study proposed a way to design and implement an effective and secure certificate management system by save the certificate file as a BLOB, using existing resources without needing to build a separate certificate server, at minimized costs.