• Title/Summary/Keyword: Personal-usage

Search Result 468, Processing Time 0.022 seconds

Real Time User Location Information Protection Model Using Anonymity (익명성을 활용한 사용자의 실시간 위치정보 보호모델)

  • Mun, Hyung-Jin
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.17 no.10
    • /
    • pp.2316-2322
    • /
    • 2013
  • Due to the development of ICT, with using hardwares such as WiFi, 3G and GPS and so on, smartphone could have provided a lot of applications with novel functions rapidly. Through such applications, lots of personal information such as personal location, personal images, and list of phone calls is created, saved and widely used. Because there is lots of leakage of the stored personal information due to loss of phone and application, privacy violation have been important issue nowadays. Smartphone with GPS and Internet provides location information. To protect the information, the technologies that only the authorized user can access it while inquiring the location information have been proposed. In this paper, to minimize the identification information for location information subject and information user and anonymize the identifiable information such as phone number, we proposed a model that can reduce the leakage of information and avoid the wrong usage of the stored information in the server. This technique will be used for protecting privacy when developing the application that provides routing service through location history information.

The influence of smartphone addiction on mental health, campus life and personal relations - Focusing on K university students (스마트폰중독이 정신건강, 학교생활, 대인관계에 미치는 영향 - K대 대학생을 중심으로)

  • Choi, Hyun-Seok;Lee, Hyun-Kyung;Ha, Jeong-Cheol
    • Journal of the Korean Data and Information Science Society
    • /
    • v.23 no.5
    • /
    • pp.1005-1015
    • /
    • 2012
  • Since the smartphone was first released in 2009, its common use has made everyday life convenient but caused many social problems. In this article, we surveyed the status of smartphone usage and identified the influence of smartphone addiction on mental health, campus life and personal relations of university students. We gave the methods to prevent smartphone addiction, which could be used as basic materials for solving the problems. We found the smartphone addiction syndrome cause problems of mental health, campus life and personal relations in many ways. In addition to significant direct effects, smartphone addiction has significant indirect effects on personal relations via mental health and campus life as a medium.

A Method to Elicit Privacy Requirements and Build Privacy Assurance Cases for Privacy Friendly System (프라이버시 친화 시스템 개발을 위한 프라이버시 요구사항 도출 및 보증 사례 작성)

  • Cho, Ju Hye;Lee, Seok-Won
    • Journal of KIISE
    • /
    • v.44 no.9
    • /
    • pp.918-931
    • /
    • 2017
  • Recently, the spread of smartphones and various wearable devices has led to increases in the accumulation and usage of personal information. As a result, privacy protection has become an issue. Even though there have been studies and efforts to improve legal and technological security measures for protecting privacy, personal information leakage accidents still occur. Rather than privacy requirements, analysts mostly focus on the implementation of security technology within software development. Previous studies of security requirements strongly focused on supplementing the basic principles and laws for privacy protection and securing privacy requirements without understanding the relationship between privacy and security. As a result, personal information infringement occurs continuously despite the development of security technologies and the revision of the Personal Information Protection Act. Therefore, we need a method for eliciting privacy requirements based on related privacy protection laws that are applicable to software development. We also should clearly specify the relationship between privacy and security. This study aims to elicit privacy requirements and create privacy assurances cases for Privacy Friendly System development.

Contribution of Emotional Labor to Job Stress of Dietitians in School Foodservice (학교급식 영양사의 감정노동이 직무스트레스에 미치는 영향)

  • Kim, Hyun-Ah
    • Korean journal of food and cookery science
    • /
    • v.26 no.1
    • /
    • pp.41-53
    • /
    • 2010
  • The purposes of this study were to: a) investigate personal and foodservice operational factors affecting job stress of school foodservice dietitians, b) analyze the contribution of emotional labor to job stress of school foodservice dietitians. A survey was conducted from May 2 to June 13, 2008 to collect data from school foodservice dietitians (N=546). 206 questionnaires were returned completed, and 15 improperly-completed questionnaires were excluded. Finally, 191 questionnaires were used for final statistical analysis (usage rate : 34.98%). The results of the study were as follows. First, personal variables significantly affecting dietitians' job stress were 'monthly bills(p<0.05)' and 'total length of time in school foodservice (p<0.05)'. Second, foodservice operational variables affecting dietitians' job stress were 'school level (p<0.05)', 'type of school foodservice management (p<0.01)', 'number of meal service times (p<0.05)', 'total number of meals served per day (p<0.001)', 'number of meals served per day for students (p<.001)', 'number of meals served per day for teachers (p<0.001)', and 'number of foodservice staff (p<0.001)'. Third, emotional labor was found to contribute significantly to the job stress of dietitians in school foodservice (p<0.001). It was found that as dietitians experience more emotional labor at work, more job stress is experienced. Stress management is a very important and meaningful contributor to foodservice quality as well as to personal well-being for workers in school foodservice. Therefore, it is proposed that management of emotional labor is essential for stress management. Further, emotional labor and job stress should no longer be considered a personal matter, but rather should be approached systematically in all aspects of a school foodservice organization.

Three-Round Delphi Study on the Value of Rural Residence in Later Life (노년기 농촌생활의 가치에 대한 델파이연구)

  • Yoon, Soon-Duck;Park, Gong-Ju
    • Journal of Korean Society of Rural Planning
    • /
    • v.12 no.3 s.32
    • /
    • pp.97-106
    • /
    • 2006
  • In this study was investigated the value of rural residence in later life from the personal, regional, and national perspective. For this purpose, a three-round Delphi technique was used to collect data through a series of surveys to obtain the consensus of a group of 38 experts in value of rural residence in later life in the future. In the first round was sent to them unstructured questionnaire and in the second and third round, the summarized results of the first and second round were delivered to rate the importance of each item for confirmation and validation of the results. Data were analyzed using content analysis and descriptive statistics. The major findings of this study are as follows: First, the personal, regional, and national value of rural residence in later life was selected 7 domains 23 items, 4 domains 22 items, and 3 domains 20 items respectively. Experts consented that the value from the personal perspective will be the highest among 3 perspectives. Second, as the value of rural residence from the personal perspective, it was showed nature-friendly life, physical health emotional serenity, lower expenditure, enjoyable filming, feeding the safe food, and etc,. As the value of it from the regional perspective was showed usage of retirees' speciality and experience to community development and the increase of recreational function in the rural. Also, from the national perspective, it was showed the sustainability of the rural, the establishment of welfare base, balanced development between regions. Based on these results, policy implications were discussed.

Android Log Cat Systems Research for Privacy (개인정보보호를 위한 안드로이드 로그캣 시스템 연구)

  • Jang, Hae-Sook
    • Journal of the Korea Society of Computer and Information
    • /
    • v.17 no.11
    • /
    • pp.101-105
    • /
    • 2012
  • Various social problems through violating personal information and privacy are growing with the rapid spread of smartphones. For this reason, variety of researches and technology developments to protect personal information being made. The smartphone, contains almost all of the personal information, can cause data spill at any time. Collecting or analyzing evidence is not an easy job with forensic analyzing tool. Android forensics research has been focused on techniques to collect and analyze data from non-volatile memory but research for volatile data is very slight. Android log is the non-volatile data that can be collected by volatile storage. It is enough to use as a material to track the usage of the Android phone because all of the recent driven records from system to application are stored. In this paper, we propose a method to respond to determining the existence of personal information leakage by filtering logs without forensic analysis tools.

A Study of Effects of ICT Media Characteristics and Personal Innovativeness on Communication Interaction (ICT 매체특성과 개인혁신특성이 커뮤니케이션 상호작용성에 미치는 영향에 관한 연구)

  • Yoon, Jung-Hyeon
    • Management & Information Systems Review
    • /
    • v.32 no.2
    • /
    • pp.193-212
    • /
    • 2013
  • Despite widespread availability of communication media supported ICT(Information & Communication Technology), the influence factors and its role to the communication interaction is not clear. The main objective of this research is to examine the factors that affect to the efficient and effective means of communication interaction. The investigation focuses on the effect of four different factors such as ICT communication media characteristics, personal innovativeness, and ICT media attitude. The hypotheses have been tested with the survey of 159 smart phone users. The research summarized in this paper decomposes the influence of the characteristics of ICT media, IT personal innovativeness, and the attitude of ICT usage to the efficient and effective communication interaction.

  • PDF

Design of an USB Security Framework for Double Use Detection (이중사용 방지를 위한 USB 보안 프레임워크의 설계)

  • Jeong, Yoon-Su;Lee, Sang-Ho
    • Journal of the Korea Society of Computer and Information
    • /
    • v.16 no.4
    • /
    • pp.93-99
    • /
    • 2011
  • Recently, the development of internet technology makes user's personal data used by being saved in USB. But there is a critical issue that personal data can be exposed with malicious purpose because that personal data doesn't need to be certificate to use. This paper proposes USB security framework to prevent a duplicate use of personal data for protecting the data which in USB. The proposed USB security framework performs certification process of user with additional 4bite of user's identification data and usage choice of USB security token before certification data when the framework uses USB security product in different network. It makes communication overhead and service delay increased. As a result of the experiment, packet certification delay time is more increased by average 7.6% in the proposed USB security framework than simple USB driver and USB Token, and procedure rate of certification server on the number of USB is also increased by average 9.8%.

The Consideration about an Electronic Medical Record Security Standardization (전자의무기록 보안표준화에 대한 고찰)

  • Park, Doo-Hee;Song, Jae-Young;Lee, Nam-Yong
    • Journal of Information Management
    • /
    • v.36 no.1
    • /
    • pp.125-154
    • /
    • 2005
  • Due to the development of Internet and the collection and usage of the individual information, the infringements of the personal data have been increased rapidly. Regarding the personal data protection in the medical industry, it is clearly described in 'Act on Promotion of Information and Communication Network Utilization and information Protection, etc.'. the law is ratified on the basis of the service provider, therefore, it has its own limitation to be applied to medical industry. Therefore, this paper is to set the security standard and to discuss the range of legal application and considerations on its basis for the domestic medical institution at the electronic medical record system. We exemplify specific applicable content of the electronic signature in the electronic medical record also, present a security assessment item in electronic medical system and set the criteria for the security standard in the medical industry.

Personal Recognition Method using Coupling Image of ECG Signal (심전도 신호의 커플링 이미지를 이용한 개인 인식 방법)

  • Kim, Jin Su;Kim, Sung Huck;Pan, Sung Bum
    • Smart Media Journal
    • /
    • v.8 no.3
    • /
    • pp.62-69
    • /
    • 2019
  • Electrocardiogram (ECG) signals cannot be counterfeited and can easily acquire signals from both wrists. In this paper, we propose a method of generating a coupling image using direction information of ECG signals as well as its usage in a personal recognition method. The proposed coupling image is generated by using forward ECG signal and rotated inverse ECG signal based on R-peak, and the generated coupling image shows a unique pattern and brightness. In addition, R-peak data is increased through the ECG signal calculation of the same beat, and it is thus possible to improve the recognition performance of the individual. The generated coupling image extracts characteristics of pattern and brightness by using the proposed convolutional neural network and reduces data size by using multiple pooling layers to improve network speed. The experiment uses public ECG data of 47 people and conducts comparative experiments using five networks with top 5 performance data among the public and the proposed networks. Experimental results show that the recognition performance of the proposed network is the highest with 99.28%, confirming potential of the personal recognition.