• Title/Summary/Keyword: Personal data

Search Result 5,526, Processing Time 0.045 seconds

Zero-knowledge proof algorithm for Data Privacy

  • Min, Youn-A
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.13 no.2
    • /
    • pp.67-75
    • /
    • 2021
  • As pass the three revised bills, the Personal Information Protection Act was revised to have a larger application for personal information. For an industrial development through an efficient and secure usage of personal information, there is a need to revise the existing anonymity processing method. This paper modifies the Zero Knowledge Proofs algorithm among the anonymity processing methods to modify the anonymity process calculations by taking into account the reliability of the used service company. More detail, the formula of ZKP (Zero Knowledge Proof) used by ZK-SNAKE is used to modify the personal information for pseudonymization processing. The core function of the proposed algorithm is the addition of user variables and adjustment of the difficulty level according to the reliability of the data user organization and the scope of use. Through Setup_p, the additional variable γ can be selectively applied according to the reliability of the user institution, and the degree of agreement of Witness is adjusted according to the reliability of the institution entered through Prove_p. The difficulty of the verification process is adjusted by considering the reliability of the institution entered through Verify_p. SimProve, a simulator, also refers to the scope of use and the reliability of the input authority. With this suggestion, it is possible to increase reliability and security of anonymity processing and distribution of personal information.

Relationship between Work Unstability and Personal Medical Expenditure Ratio (고용불안정과 가구소득 대비 개인 의료비 지출 비중의 연관성)

  • Jung, Woo-young;Han, Yun-su;Kim, Chan-ho;Hwang, Yun-tae;Lee, Yejin;Noh, Young-Min;Noh, Jin-Won
    • Korea Journal of Hospital Management
    • /
    • v.24 no.2
    • /
    • pp.1-11
    • /
    • 2019
  • Purpose: The purpose of this study is to identify relationship between work unstability and personal medical expenditure ratio focusing on wage workers' contract period. Method: This study analyzed 2015 yearly data beta version of Korea Health Panel, co-managed by Korea Institute for Health and Social Affairs and National Insurance Corporation for data analysis. When executing linear regression, Household income was applied with equivalized income, and the proportion of personal medical expenditure was naturally logged to perform linear regression and the demographic and socioeconomic factors were taken into account. The demographic and socio-economic factors were also considered. Findings: As a result of reviewing the used factors, it was found that the more unstable work status, the higher personal medical expenditure ratio. This result corresponds to 'The Theory of Fundamental Causes' by Link & Phelan. Conclusion : It indicates that policy efforts should be made to improve the working environment and health level of socially unstable workers.

The Impact of Green Corporate Identity and Green Personal-Social Identification on Green Business Performance: A Case Study in Thailand

  • ONPUTTHA, Suraporn;SIRIWICHAI, Chalermporn
    • The Journal of Asian Finance, Economics and Business
    • /
    • v.8 no.5
    • /
    • pp.157-166
    • /
    • 2021
  • This study aims to investigate the impact of green corporate identity and employees' green identification on green business performance of international automobile manufacturers in Thailand. It involves 400 employees from the target study area, using questionnaires to collect data from January to February 2021, with purposive and convenient sampling methods. Data analysis employed structural equation modeling (SEM). The results show that green corporate identity has a significant impact on employees' green personal-social identification and green business performance; meanwhile, employees' green social identification has a significant impact on green business performance. However, employees' green personal identification has a significant impact on green business performance only through employees' green social identification. Green corporate identity can increase the corporate' green business performance via economic, environmental and social aspects through employees' green personal-social identification. The findings suggest that green corporate communication through visual identity, employee behaviors, culture, policy products and services in response to environmental forces and drivers to create the green corporate identity is deemed to systematically work. Furthermore, the findings also suggest that employees' green identification on both personal and social levels can be a significant issue that the managers in automobile manufacturers should pay attention as well.

Analysis of Privacy Violation Possibility of Partially Anonymized Big Data (온라인 상에 공개된 부분 익명화된 빅데이터의 프라이버시 침해 가능성 분석)

  • Jung, Kang-soo;Park, Seog;Choi, Dae-seon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.3
    • /
    • pp.665-679
    • /
    • 2018
  • With the development of information and communication technology, especially wireless Internet technology and the spread of smart phones, digital data has increased. As a result, privacy issues which concerns about exposure of personal sensitive information are increasing. In this paper, we analyze the privacy vulnerability of online big data in domestic internet environment, especially focusing on portal service, and propose a measure to evaluate the possibility of privacy violation. For this purpose, we collected about 50 million user posts from the potal service contents and extracted the personal information. we find that potal service user can be identified by the extracted personal information even though the user id is partially anonymized. In addition, we proposed a risk measurement evaluation method that reflects the possibility of personal information linkage between service using partial anonymized ID and personal information exposure level.

Design of an USB Security Framework for Double Use Detection (이중사용 방지를 위한 USB 보안 프레임워크의 설계)

  • Jeong, Yoon-Su;Lee, Sang-Ho
    • Journal of the Korea Society of Computer and Information
    • /
    • v.16 no.4
    • /
    • pp.93-99
    • /
    • 2011
  • Recently, the development of internet technology makes user's personal data used by being saved in USB. But there is a critical issue that personal data can be exposed with malicious purpose because that personal data doesn't need to be certificate to use. This paper proposes USB security framework to prevent a duplicate use of personal data for protecting the data which in USB. The proposed USB security framework performs certification process of user with additional 4bite of user's identification data and usage choice of USB security token before certification data when the framework uses USB security product in different network. It makes communication overhead and service delay increased. As a result of the experiment, packet certification delay time is more increased by average 7.6% in the proposed USB security framework than simple USB driver and USB Token, and procedure rate of certification server on the number of USB is also increased by average 9.8%.

Factors Affecting the Intention to Adopt Self-Determination Rights of Personal Medical Information (개인의료정보 자기결정권 행사 의도에 영향을 미치는 요인)

  • Yunmo Koo;Sungwoo Hong;Beomsoo Kim
    • Information Systems Review
    • /
    • v.20 no.1
    • /
    • pp.159-177
    • /
    • 2018
  • With an extensive proliferation of information and communication technology, the volume and amount of digital information collected and utilized on the Internet have been increasing rapidly. Also on the rapid rise are side effects such as unintended breach of accumulated personal information and consequent invasion of personal privacy. Informational self-determination is rarely practiced, despite various states' legal efforts to redress data subjects' damage. Personal health information, in particular, is a subcategory of personal information where informational self-determination is hardly practiced enough. The observation is contrasted with the socio-economic inconvenience that may follow due to its sensitive nature containing individuals' physical and health conditions. This research, therefore, reviews factors of self-determination on personal health information while referring to the protection motivation theory (PMT), the long-time framework to understand personal information protection. Empirical analysis of 200 data surveyed reveals threat-appraisal (perceived vulnerability and perceived severity of threats) and coping-appraisal (perceived response effectiveness), in addition to individual levels of concern regarding provided personal health information, influence self-determination to protect personal health information. The research proposes theoretical findings and practical suggestions along with reference for future research topics.

Determination of Service Areas and Operating Numbers for Free-floating Personal Mobility Sharing Services (First-mile과 Last-mile을 고려한 자유 주차방식(Free-floating) 개인형 이동장치 공유 서비스 권역 및 운영대수 결정)

  • Sang-Wook Han;Dong-Kyu Kim;Sedong Moon
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.23 no.2
    • /
    • pp.106-118
    • /
    • 2024
  • Interest in personal mobility has increased with the growing significance of first-mile and last-mile connectivity in smart mobility services. This study aims to propose a methodology for setting the service area of free-floating personal mobility sharing services and determining the optimal fleet size for the selected shared service area to address first-mile and last-mile challenges. We utilize population data, smart card data, and building data. Additionally, we estimate latent demand by incorporating age-specific and distance-specific utilization rates based on personal mobility device data. Along with the latent demand, we determine the service area based on locations of transit stops and buildings. We apply the proposed methodology to Yeongjong Island, Incheon. As a result, dense residential areas and popular beachside locations are designated as personal mobility sharing service areas. The fleet size for personal mobility in the dense residential service area is determined to be 1,022 units, while the fleet size for the beachside service area is set at 269 units.

An Analysis on the Importance and Performance of Personal Information Protection for the Elderly Welfare Center Employees

  • You, Gil-Jun
    • Journal of the Korea Society of Computer and Information
    • /
    • v.23 no.11
    • /
    • pp.185-191
    • /
    • 2018
  • The purpose of this study is to present effective basic data for business management through analysis of importance and performance of personal information protection of the elderly welfare center workers. For this purpose, the questionnaire on the protection of personal information was reconstructed based on the diagnostic level of the personal information security management level of the public institution and the questionnaire was conducted on 105 employees of the elderly welfare center in Chungbuk area. Based on the responses to the importance and the degree of performance of the personal information protection of the elderly welfare center employees, technical statistics and corresponding sample T-tests were conducted and the importance-performance analysis (IPA) was used. Followings are the results of this study: First, there is a statistically significant difference between the importance and the implementation of the management system for the protection of personal information of the workers in the elderly welfare center, establishment and implementation of protection measures, establishment and implementation of infringement measures. Second, IPA analysis on the protection of personal information of the workers in the elderly welfare center shows that the establishment and implementation of protection measures are the areas to maintain good performance. Third, in IPA analysis of the sub-factors of the personal information protection of the workers in the welfare center of the elderly, in the construction and management of the management system, in performing the role of the personal information protection officer and establishing and implementing protection measures, The factors of prevention of information disclosure and exposure and the safe use and management of personal information processing system were analyzed as areas requiring intensive improvement. This study is meaningful as a basic research that can raise the awareness of the personal information protection of the workers in the elderly welfare center and induce the improvement of the related work.

Real-time Network Middleware Supporting Fault-Tolerant Operations for Personal Robot System

  • Choo, Seong-Ho;Park, Hong-Seong
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2005.06a
    • /
    • pp.756-760
    • /
    • 2005
  • By development of a robot technology, personal robot is being developed very actively. Various infra-technologies are accumulated in hardware and software how by internal a lot of research and development efforts, and it is circumstance that actual commodity is announced. But, personal robot is applied to be acting near human, and takes charge of safety and connected directly a lot of works of home security, gas-leakage, fire-warning facilities, or/and etc. So personal robot must do safe and stable action even if any unexpected accidents are happened, important functions are always operated. In this paper, we are wished to show design structures for supporting fault-tolerant operation from our real-time robot middleware viewpoint. Personal robot, in being developed, was designed by module structure to do to interconnect and to interoperate among each module that is mutually implemented by each research facilities or company. Also, each modules can use appreciate network system that is fit for handling and communicating its data. To guarantee this, we have being developed a real-time network middleware, for especially personal robot. Recent our working is to add and to adjust some functions like connection management, distributed routing mechanism, remote object management, and making platform independent robot application execution environment with self-moving of robot application, for fault-tolerant personal robot.

  • PDF

An Experience of Personal Hygiene Education and Hand-washing Practices among Adolescents in the Korean Youth Risk Behavior Web-based Survey (청소년건강행태온라인조사 자료에서 개인위생 교육 경험과 손씻기 실천의 연관성)

  • Min, Jun Won;Chang, Young-Seo
    • The Journal of Korean Society for School & Community Health Education
    • /
    • v.15 no.1
    • /
    • pp.31-43
    • /
    • 2014
  • Objectives: The purpose of this study is to identify the relationship of personal hygiene education and hand-washing practices among adolescents. Then the impact of such factors on the hand-washing practices was analyzed. Methods: The data of the 2012 Youth Health Risk Behavior web-based Survey collected by Korean Center for Disease Control was analyzed using SPSS. Total 74,186 of middle and hish school students were included. Uni-variate analysis was done by complex sample crosstabs and multi-variate analysis was done by complex sample logistic regression. Results: The 26.8% of students experienced personal hygiene education. The students of boys, low school grade, coeducation, metropolitan, high school record and high economic status experienced more hygiene education. The hand-washing practices were high in the students with the experience of personal hygiene education. In the factors affecting the hand-washing practice, the experience of personal hygiene education was consistently significant. If students experienced the personal hygiene education, they showed 20~30% more rates of hand-washing practices. Conclusions: Hand-washing practice was high when experiencing personal hygiene education. The personal hygiene education was necessary to improve the rate of hand-washing practices.

  • PDF