• Title/Summary/Keyword: Personal information Protection

Search Result 783, Processing Time 0.022 seconds

The Regulations by Criminal Law against any Libel in Cyberspace (사이버명예훼손행위와 형사법적 대응방안)

  • Yoo, In-Chang
    • Journal of the Korea Society of Computer and Information
    • /
    • v.17 no.5
    • /
    • pp.177-183
    • /
    • 2012
  • There occur various crimes in cyber space hiding behind anonymity to avoid punishment by criminal law. One of the most serious crimes committed in cyber space is defamation against others under the cloak of freedom of expression. The infringements by defamations in cyber space are made all of a certain and widespread that the victims have no time to react, and for that reason, the shocks by the defamation are much serious and severe compared with that committed in off line. However, press and publication shouldn't infringe on other's honors, right, public order or social ethics in liberal democrat society which values much the human dignities and values as stipulated in Article 21 section 4 of the Constitution. Protection of personal honor is also the basic rights guaranteed by the Constitution as much as the freedom of expression, and by extension, such harmful behaviour shouldn't be included in the freedom of expression area. In this way, slander can be considered as the minimum limitation of the freedom of expression.

Physiotherapy Management for COVID-19 (코비드-19와 물리치료적 접근)

  • Han, Yun-A;Roh, Hyo-Lyun
    • Journal of the Korean Society of Physical Medicine
    • /
    • v.15 no.3
    • /
    • pp.135-147
    • /
    • 2020
  • PURPOSE: The purpose of this paper is to provide a review of physiotherapy intervention for patients with COVID-19 during their hospital admission and post-discharge. METHODS: The recommendations and guidelines of physiotherapy management, medical management, and general information of the WHO, Australian Physiotherapist, European Respiratory Society, British Thoracic Society, and American Thoracic Society were reviewed. RESULTS: This paper contains general information on COVID-19, including medical management, and the importance of physiotherapy approaches including an assessment of the patients' function, such as the 6-minute walking test, five sit to stand or sit to stand for one minute to measure their function as their recovery journey. The patients' quality of life, anxiety, and depression should be considered. Physiotherapy management should be based on an assessment of the patient's presenting impairments, including inclusion and exclusion of physiotherapy intervention. The paper also approaches step by step with the disease progress, from an intensive care unit, the general ward in the acute phase, through to the rehabilitation ward if needed, and post-discharge as an outpatient.. CONCLUSION: The paper has a limitation due to the unknown factor of the natural history of COVID-19. Depending on the patients' recovery journey and the rehabilitation needed, any physiotherapy interventions should focus on what the patients' need on their journey to recovery, e.g., pulmonary, cardiac, neurological, and general rehabilitation. In addition, applying personal protection equipment for treating physiotherapists is a mandatory requirement because this protects from the transmission of COVID-19.

Design and embodiment of XrML Document editing system for digital contents copyright administration (디지털 컨텐츠 저작권 관리를 위한 XrML 문서편집 시스템의 설계 및 구현)

  • 임지훈;강치원;정회경;최범석;홍진우
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2002.11a
    • /
    • pp.368-372
    • /
    • 2002
  • Channel of distribution of contents of digitalised multimedia contents is changing in form passed directly to consumer from manufacturer through digital network of high speed. Together, diffusion of various digital equipment that do is changing Past multimedia consumption structure with the wonderful speed so that can consume easily digital contents. Specially, Multimedia Personal Computer and fast diffusion of a digital television are acting role such as catalyst that promote easy purchase and consumption of multimedia contents of good qualify. However, this system is no method that can sell digital contents and express right that original owner for the contents can insist nothing but consume. Because consumer can distribute to another person copying contents that buy because of and user can distribute producing ashes again according to necessary field by oneself as well as, can lose meaning for original contents. In this paper, Text editing system for XrML (extensible Rights Markup Language) that describe about integrity of message and entity authentication in addition to necessary rights, fees, condition etc. and this to do fetters XML (eXtensible Markup Language) for copyright protection for digital contents in treatise that see hereupon and use digital contents design and embody.

  • PDF

Knowledge Creation Structure of Big Data Research Domain (빅데이터 연구영역의 지식창출 구조)

  • Namn, Su-Hyeon
    • Journal of Digital Convergence
    • /
    • v.13 no.9
    • /
    • pp.129-136
    • /
    • 2015
  • We investigate the underlying structure of big data research domain, which is diversified and complicated using bottom-up approach. For that purpose, we derive a set of articles by searching "big data" through the Korea Citation Index System provided by National Research Foundation of Korea. With some preprocessing on the author-provided keywords, we analyze bibliometric data such as author-provided keywords, publication year, author, and journal characteristics. From the analysis, we both identify major sub-domains of big data research area and discover the hidden issues which made big data complex. Major keywords identified include SOCIAL NETWORK ANALYSIS, HADOOP, MAPREDUCE, PERSONAL INFORMATION POLICY/PROTECTION/PRIVATE INFORMATION, CLOUD COMPUTING, VISUALIZATION, and DATA MINING. We finally suggest missing research themes to make big data a sustainable management innovation and convergence medium.

Analysis of privacy issues and countermeasures in neural network learning (신경망 학습에서 프라이버시 이슈 및 대응방법 분석)

  • Hong, Eun-Ju;Lee, Su-Jin;Hong, Do-won;Seo, Chang-Ho
    • Journal of Digital Convergence
    • /
    • v.17 no.7
    • /
    • pp.285-292
    • /
    • 2019
  • With the popularization of PC, SNS and IoT, a lot of data is generated and the amount is increasing exponentially. Artificial neural network learning is a topic that attracts attention in many fields in recent years by using huge amounts of data. Artificial neural network learning has shown tremendous potential in speech recognition and image recognition, and is widely applied to a variety of complex areas such as medical diagnosis, artificial intelligence games, and face recognition. The results of artificial neural networks are accurate enough to surpass real human beings. Despite these many advantages, privacy problems still exist in artificial neural network learning. Learning data for artificial neural network learning includes various information including personal sensitive information, so that privacy can be exposed due to malicious attackers. There is a privacy risk that occurs when an attacker interferes with learning and degrades learning or attacks a model that has completed learning. In this paper, we analyze the attack method of the recently proposed neural network model and its privacy protection method.

Security Analysis on 'Privacy-Preserving Contact Tracing Specifications by Apple and Google' and Improvement with Verifiable Computations ('애플과 구글의 코로나 접촉 추적 사양'에 대한 보안성 평가 및 검증 가능한 연산을 이용한 개선)

  • Kim, Byeong Yeon;Kim, Huy Kang
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.31 no.3
    • /
    • pp.291-307
    • /
    • 2021
  • There has been global efforts to prevent the further spread of the COVID-19 and get society back to normal. 'Contact tracing' is a crucial way to detect the infected person. However the contact tracing makes another concern about the privacy violation of the personal data of infected people, released by governments. Therefore Google and Apple are announcing a joint effort to enable the use of Bluetooth technology to help governments and health agencies reduce the spread of the virus, with user privacy and security central to the design. However, in order to provide the improved tracing application, it is necessary to identify potential security threats and investigate vulnerabilities for systematically. In this paper, we provide security analysis of Privacy-Preserving COVID-19 Contact Tracing App with STRIDE and LINDDUN threat models. Based on the analysis, we propose to adopt a verifiable computation scheme, Zero-knowledge Succinctness Non-interactive Arguments of Knowledges (zkSNARKs) and Public Key Infrastructure (PKI) to ensure both data integrity and privacy protection in a more practical way.

A Case Study: Unsupervised Approach for Tourist Profile Analysis by K-means Clustering in Turkey

  • Yildirim, Mustafa Eren;Kaya, Murat;FurkanInce, Ibrahim
    • Journal of Internet Computing and Services
    • /
    • v.23 no.1
    • /
    • pp.11-17
    • /
    • 2022
  • Data mining is the task of accessing useful information from a large capacity of data. It can also be referred to as searching for correlations that can provide clues about the future in large data warehouses by using computer algorithms. It has been used in the tourism field for marketing, analysis, and business improvement purposes. This study aims to analyze the tourist profile in Turkey through data mining methods. The reason relies behind the selection of Turkey is the fact that Turkey welcomes millions of tourist every year which can be a role model for other touristic countries. In this study, an anonymous and large-scale data set was used under the law on the protection of personal data. The dataset was taken from a leading tourism company that is still active in Turkey. By using the k-means clustering algorithm on this data, key parameters of profiles were obtained and people were clustered into groups according to their characteristics. According to the outcomes, distinguishing characteristics are gathered under three main titles. These are the age of the tourists, the frequency of their vacations and the period between the reservation and the vacation itself. The results obtained show that the frequency of tourist vacations, the time between bookings and vacations, and age are the most important and characteristic parameters for a tourist's profile. Finally, planning future investments, events and campaign packages can make tourism companies more competitive and improve quality of service. For both businesses and tourists, it is advantageous to prepare individual events and offers for the three major groups of tourists.

An exploratory analysis of factors influencing online music users' willingness to pay

  • Yu-Xuan, Yuan
    • Journal of the Korea Society of Computer and Information
    • /
    • v.28 no.2
    • /
    • pp.217-225
    • /
    • 2023
  • The willingness of online music users to pay is the key to the protection of music copyright and the sustainable development of the industry. This paper aims to study the influencing factors of online music users' willingness to pay based on exploratory analysis. Based on the theory of customer perceived value, the unified theory of technology acceptance and use, and the theory of fan enthusiasm, the research model is constructed. Validate the obtained 583 valid data. Through analysis, I got that perceived value, interpersonal influence, fan enthusiasm, and personal payment awareness directly affect online music users' willingness to pay; practical value and hedonic value have a positive impact on perceived value, and the impact of economic cost and compilation cost has not reached a significant level; Online word-of-mouth negatively moderates the impact of perceived value on users' willingness to pay for music. Music platforms can formulate operating policies based on this.

Matrix Character Relocation Technique for Improving Data Privacy in Shard-Based Private Blockchain Environments (샤드 기반 프라이빗 블록체인 환경에서 데이터 프라이버시 개선을 위한 매트릭스 문자 재배치 기법)

  • Lee, Yeol Kook;Seo, Jung Won;Park, Soo Young
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.11 no.2
    • /
    • pp.51-58
    • /
    • 2022
  • Blockchain technology is a system in which data from users participating in blockchain networks is distributed and stored. Bitcoin and Ethereum are attracting global attention, and the utilization of blockchain is expected to be endless. However, the need for blockchain data privacy protection is emerging in various financial, medical, and real estate sectors that process personal information due to the transparency of disclosing all data in the blockchain to network participants. Although studies using smart contracts, homomorphic encryption, and cryptographic key methods have been mainly conducted to protect existing blockchain data privacy, this paper proposes data privacy using matrix character relocation techniques differentiated from existing papers. The approach proposed in this paper consists largely of two methods: how to relocate the original data to matrix characters, how to return the deployed data to the original. Through qualitative experiments, we evaluate the safety of the approach proposed in this paper, and demonstrate that matrix character relocation will be sufficiently applicable in private blockchain environments by measuring the time it takes to revert applied data to original data.

Patient Safety Culture Among Dental Hygienists and Perception of Infection Control Activities (치과위생사의 환자안전문화인식과 감염관리활동)

  • Jeong, Yong-Ju;Lee, Sun-Mi
    • Journal of The Korean Society of Integrative Medicine
    • /
    • v.10 no.3
    • /
    • pp.161-172
    • /
    • 2022
  • Purpose : The study was to promote patient safety by analyzing the effect of dental hygienist's perception of patient safety culture on infection control activities. Methods : The study is based on a survey of 210 dental hygienists in total working in dental settings. To find out infection control activities according to patient safety culture awareness, there were 6 general characteristics, 3 teamwork within the department, 2 infection control systems, 4 surface management, 9 equipment washing, disinfection, and laundry management, 4 infectious wastes, and 3 personal protection phrases.The data was analyzed using the SPSS version 20.0, and p<.05 was adopted to decide on significance. Results : The longer dental hygienists have worked n the dental settings, the more active they become in infection control activities. Among the different types of dental care settings, general (university) hospitals had the largest number of infection control activities, followed by dental clinics, and network dental clinics, in descending order. The dental settings possessing a higher number of dental hygienists were found to conduct more infection control activities than other dental settings. In addition, it was found that when a dental setting adopts a patient safety policy across all the units in the hospital, more systems and procedures for patient safety tend to be established, and that stricter management response to error leads to improvement of infection control activities. Conclusion :In order to enhance infection control activities, infection control activity programs should develop and implement periodic reinforcement of infection control education. regular monitoring of infection control activities.