• Title/Summary/Keyword: Personal Service

Search Result 2,425, Processing Time 0.027 seconds

User-Centric Conflict Management for Media Services Using Personal Companions

  • Shin, Choon-Sung;Yoon, Hyo-Seok;Woo, Woon-Tack
    • ETRI Journal
    • /
    • v.29 no.3
    • /
    • pp.311-321
    • /
    • 2007
  • In this paper, we propose a user-centric conflict management method for media services which exploits personal companions for the harmonious detection and resolution of service conflicts. To detect conflicts based on the varying characteristics of individual users, the proposed method exploits the unified context describing all users attempting to access media services. It recommends and mediates users' preferred media contents through a shared screen and personal companions to resolve the detected conflicts. During the recommendation, a list of preferred media contents is displayed on the shared screen, and a personally preferred content list is shown on the user's personal companion comprising the selection of media contents. Mediation assists the selection of a consensual service by gathering the users' selections and highlighting the common media contents. In experiments carried out in a ubiHome, we observed that recommendations and mediation are useful in harmoniously resolving conflicts by encouraging user participation in conflict situations.

  • PDF

Development of Personal Information Protection Framework to be Followed by IoT Service Providers (IoT서비스제공자가 준수해야 할 개인정보보호 프레임워크의 개발 방안)

  • Shin, Young-Jin
    • Journal of Convergence for Information Technology
    • /
    • v.10 no.7
    • /
    • pp.20-32
    • /
    • 2020
  • This study is to develop and provide a personal information protection framework that enables IoT service providers to safely and systematically operate personal information of IoT service subjects in the overall process of providing IoT devices and services. To this end, a framework for personal information framework was derived through literature survey, and FGI with experts, it was divided into three stages, each of three stages: IoT service provision process and IoT personal information processing process. The study conducted an e-mail survey of related experts using AHP techniques to determine the importance of the components of the selected personal information protection framework. As a result, in the IoT service provision process, the IoT product and service design and development stage (0.5413) is the most important, and in the IoT personal information processing process, personal information protection in the collection and retention of personal information (0.5098) is the most important. Therefore, based on this research, as the IoT service is spreading, it is expected that a safe personal information protection framework will be realized by preventing security threats and personal information infringement accidents.

A Study on the Quantified Point System for Designation of Personal Identity Proofing Service Provider based on Resident Registration Number

  • Kim, JongBae
    • International journal of advanced smart convergence
    • /
    • v.11 no.4
    • /
    • pp.20-27
    • /
    • 2022
  • In this paper, we propose to improve the designation examination criteria of agencies that provide personal identity proofing based on the resident registration number (RRN), a 13-digit number uniquely assigned by the government to identify Korean citizens. In online commerce, etc., the personal identity proofing agency (PIPA) is a place where online users can prove their personal identity by presenting an alternative means instead of their RRN. The designation examination criteria for PIPAs established in 2012 is a revision of the relevant current laws, and there is a problem in applying the designation examination for alternative means of RRN as the current examination standard. Therefore, in this paper, we propose a method to make the current examination criteria applicable to the newly designated examination of the personal identity proofing service provider based on the current RRN alternative method. According to the current designation examination criteria, only those who satisfy all the examination criteria are designated as the PIPA. However, in reality, it is not in line with the purpose of regulatory reform to require that all examination criteria be satisfied. In the proposed method, it is proposed to apply the standard score system for designation of PIPAs, to make the law current, to secure legal compliance, and to establish a new examination standard to provide a new alternative means of personal identity proofing service. By applying the proposed method to the PIPA designation examination, various alternative means of RRN can be utilized in the online commerce service market.

The Association between Medical Service Quality, Consumer Satisfaction, Service Value and Customer Loyalty of Dental Patients (치과내원환자가 인지하는 의료서비스 품질과 고객만족, 서비스가치 및 고객충성도와의 관계분석)

  • Lee, Byung-Ho;Choi, Yu-Jin
    • The Korean Journal of Health Service Management
    • /
    • v.8 no.2
    • /
    • pp.89-100
    • /
    • 2014
  • The purpose of this study was to reveal association between medical service quality, consumer satisfaction, service value and customer loyalty. Medical service quality was composed of physical quality, personal quality, technical quality, procedural quality. We thought these factors affect to the consumer satisfaction, service value and customer loyalty. For this study, 221 dental patients in Busan and Ulsan are participated in this study. The data were analyzed with descriptive statistics, t-test, ANOVA, pearson's correlation coefficients, and stepwise multiple regression analysis with SPSS 18.0 program. In conclusion, we obtained the next results. First, the influencing factor in consumer satisfaction were physical quality(${\beta}$=.519), personal quality(${\beta}$=.262), procedural quality(${\beta}$=.110), adjusted $R^2$=.537. Second, the influencing factor in service value were physical quality(${\beta}$=.253), personal quality(${\beta}$=.251), technical quality(${\beta}$=.210), procedural quality(${\beta}$=.136), adjusted $R^2$=.401. Third, the influencing factor in customer loyalty were personal quality(${\beta}$=.343), physical quality(${\beta}$=.302), procedural quality(${\beta}$=.148), adjusted $R^2$=.398. As dental patients' desire to medical service quality becomes diversified, the analysis result is considered to help the future dental service management.

MyData Personal Data Store Model(PDS) to Enhance Information Security for Guarantee the Self-determination rights

  • Min, Seong-hyun;Son, Kyung-ho
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.16 no.2
    • /
    • pp.587-608
    • /
    • 2022
  • The European Union recently established the General Data Protection Regulation (GDPR) for secure data use and personal information protection. Inspired by this, South Korea revised their Personal Information Protection Act, the Act on Promotion of Information and Communications Network Utilization and Information Protection, and the Credit Information Use and Protection Act, collectively known as the "Three Data Bills," which prescribe safe personal information use based on pseudonymous data processing. Based on these bills, the personal data store (PDS) has received attention because it utilizes the MyData service, which actively manages and controls personal information based on the approval of individuals, and it practically ensures their rights to informational self-determination. Various types of PDS models have been developed by several countries (e.g., the US, Europe, and Japan) and global platform firms. The South Korean government has now initiated MyData service projects for personal information use in the financial field, focusing on personal credit information management. There is also a need to verify the efficacy of this service in diverse fields (e.g., medical). However, despite the increased attention, existing MyData models and frameworks do not satisfy security requirements of ensured traceability, transparency, and distributed authentication for personal information use. This study analyzes primary PDS models and compares them to an internationally standardized framework for personal information security with guidelines on MyData so that a proper PDS model can be proposed for South Korea.

Tackling Privacy Paradox : Protecting Right to Self-determination of Personal Information by Estimating the Economic Value of Personal Information and Visualizing the Price

  • Lim, Sejoon
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.13 no.2
    • /
    • pp.244-259
    • /
    • 2021
  • The economic value of personal information has its importance as an objective measure of valuation in commercial, legal, and policy areas. Until recently, however, personal information subjects have not properly recognized the economic value of personal information, which has led to the inability to exercise the right to self-determination of personal information by unconsciously agreeing to the terms and conditions of personal information service without recognizing the value of personal information provided to the service provider when subscribing to a specific service. Therefore, we will examine the methodologies for calculating the economic value of personal information and the practical guarantee of the right to self-determination of personal information and analyze the economic value of personal information through a survey. Also, we would like to propose various ways for the subject of personal information with limited cognitive resources to visually accept the economic value of personal information required by the terms and conditions and suggest the optimal visualization of personal information economic value to exercise the right to self-determination of personal information. To do so, in this paper, we have conducted two survey experiments to estimate the economic value of personal information. Based on the price of personal information by category retrieved from surveys, we have visualized the price of personal information in various forms and asked respondents to choose the optimal infographic that best represents the value of personal information visually. As a result, we have proposed an optimal usage of the infographic to 'nudge' information subjects about their right to self-determination of personal information, therefore opening the possibility of diminishing privacy paradox.

Method of network connection management in module based personal robot for fault-tolerant (모듈기반 퍼스널 로봇의 결함 허용 지원을 위한 네트워크 연결 유지 관리 기법)

  • Choi, Dong-Hee;Park, Hong-Seong
    • Proceedings of the KIEE Conference
    • /
    • 2006.04a
    • /
    • pp.300-302
    • /
    • 2006
  • Middleware offers function that user application program can transmit data independently of network device. Connection management about network connection of module is important for normal service of module base personal robot. Unpredictable network disconnection is influenced to whole robot performance in module base personal robot. For this, Middleware must be offer two important function. The first is function of error detection and reporting about abnormal network disconnection. Therefore, middleware need method for network error detection and module management to consider special quality that each network device has. The second is the function recovering that makes the regular service possible. When the module closed from connection reconnects, as this service reports connection state of the corresponding module, the personal robot resumes the existing service. In this paper proposed method of network connection management for to support fault tolerant about network error of network module based personal robot.

  • PDF

Fault tolerant architecture for Module-based personal robot (모듈기반 퍼스널 로봇을 위한 Fault Tolerant 구조)

  • Baek, Bum-Hyun;Jee, Dong-Jun;Park, Chan-Jung;Han, Ki-Sung;Lee, Sun-Young;Kim, Kyeong-Tae;Hong, Sung-Won;Park, Hong-Seong
    • Proceedings of the KIEE Conference
    • /
    • 2006.04a
    • /
    • pp.297-299
    • /
    • 2006
  • Many distributed applications is developed in various environment such as operating system, software platform. So, they exhibit different types of system behavior, status, during the course of their operation. Each such behavior may have different functional and non-functional requirements. Therefore, many distributed application need to fault-tolerance solution. Personal robot provide various service or application. Because personal robot has many application or service, it need to fault-tolerance architecture. A flexible architecture is required to provide dependability. In this paper, it is suggested a fault-tolerant architecture for module-based personal robot with module fault-tolerance, service fault-tolerance.

  • PDF

Protection of Personal Information on Cloud Service Models (클라우드 서비스 유형별 개인정보보호 방안)

  • Lee, Bosung;Kim, Beomsoo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.5
    • /
    • pp.1245-1255
    • /
    • 2015
  • As cloud computing services become popular, the concern on the data security of cloud services increases and the efforts for the data security become essential. In this paper, we describe the pros and cons of cloud computing including the definition of cloud. Then, we discuss the regulations about the protection of user data defined in cloud promotion act. Previous studies related to the privacy protection and the entrustment of personal information in cloud computing are reviewed. We examine how to store the personal information depending on the cloud service model. As a result, we argue that the entrustment of personal information should vary according to the cloud service model and we propose how to protect the personal information on IaaS and SaaS cloud service models.

A Study on Improvement of Personal Identity Proofing Service(PIPS) Based on Alternative Methods of Resident Registration Number (온라인에서 주민등록번호 대체수단 기반의 본인확인서비스의 개선 방안 연구)

  • Kim, Jongbae
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.15 no.2
    • /
    • pp.29-42
    • /
    • 2019
  • As online services become more and more popular due to the development of IT, non-face-to-face transactions are continuously increasing rather than face-to-face transactions. The personal identity proofing service(PIPS) based on the alternative method of the resident registration number is used for the purpose of confirming the identity of the other party on the Internet. However, in the case of the current PIPS, the personal information of the PIPS user is excessively provided to the online service provider. As a result, privacy problems of online users, shortage of choice of information providing options, and lack of differentiation of authentication methods are becoming problems. Therefore, this paper proposes a method to improve the PIPS based on the current resident registration number alternative method and to provide a method to differentiate the provision of excessive personal information. In the proposed method, we analyze trends and current status of overseas online PIPS in order to provide a method of providing differentiation of personal information and proposes an effective improvement method applicable to domestic.