• Title/Summary/Keyword: Privacy Needs

Search Result 185, Processing Time 0.038 seconds

A Study on the Service Design for the Improvement of Living Service in the Temporary Residential Facilities for the Victims (이재민 맞춤형 실내 임시주거시설의 생활서비스 개선을 위한 서비스디자인 연구)

  • Kim, Chang Ryong;Kim, Jung Woo
    • Journal of the Society of Disaster Information
    • /
    • v.16 no.3
    • /
    • pp.526-541
    • /
    • 2020
  • Purpose: The purpose of this paper is to identify and analyze the needs and complaints of the victims through the service design methodology and provide customized living services in indoor temporary residential facilities that can improve them. Method: The paper proceeded on the double diamond process. In the discovery phase, prior research analysis and surveys identified the needs and complaints of the victims. In the definition phase, persona and scenario were used to further clarify the problems of living service for indoor temporary residential facilities. In the development phase, wrote a service blueprint and found a section where problems occur during the service delivery process. In the delivery phase, compared the improved service with the existing service and proposed improvement plan. Result: Proposed service solutions that can improve privacy guarantee service, senior care service, and meal and laundry service problems. Conclusion: The proposed improvements are considered to provide improved living services in indoor temporary residential facilities.

A Study on the Basic Direction of Housign Product Development Considering the Characteristics of Urban Townhouse (도시형 타운하우스의 특성을 고려한 주택상품개발의 기본 방향에 관한 연구)

  • Seong, Ki-Seon
    • Journal of Korea Entertainment Industry Association
    • /
    • v.14 no.4
    • /
    • pp.77-89
    • /
    • 2020
  • Nowadays, urban townhouses are being developed in various forms according to the characteristics of different regions in consideration of the trends of the housing market. Misperceiving the needs of consumers or their characteristics as a house for living, however, they often end up becoming products that are not suitable for urban life or degraded on account of reckless regional development. It is so unfortunate that such trial and error keeps being repeated. Urban townhouses are advantageous because there is no such problem as either invasion of privacy or noise from neighbors, and it is possible to have one's own garden and enlarged parking space, obtain quality of grounding, and plan unique interior and exterior design. They are also equipped with the strengths of apartment houses as well, for example, the efficiency of joint control in crime and disaster prevention or security, architecture of diaphragm walls with the separation of gates, or the planning of common space like a central square or park. Therefore, there is a great chance that they can be developed as the types of urban housing. Accordingly, the purpose of this study is to establish the basic direction of developing housing products right as space for urban life and maximize the roles of urban townhouses. By understanding their spatial as well as functional elements as a house for living, this author aims to provide a guideline for housing product development to realize urban townhouses that can meet consumer needs.

Ubiquitous Sensor Network Application Strategy of Security Companies (시큐리티업체의 유비쿼터스 센서네트워크(USN) 응용전략)

  • Jang, Ye-Jin;An, Byeong-Su;Ju, Choul-Hyun
    • Korean Security Journal
    • /
    • no.21
    • /
    • pp.75-94
    • /
    • 2009
  • Since mechanical security systems are mostly composed of electronic, information and communication devices, they have effects in the aspects of overall social environment and crime-oriented environment. Also, the importance is increasing for wireless recognition of RFID and tracing function, which will be usefully utilized in controlling the incomings and outgoings of people/vehicles or allowance, surveillance and control. This is resulting from the increase in the care for the elderly according to the overall social environment, namely, the aging society, and the number of women entering, as well as the increase in the number of heinous crimes. The purpose of this study is to examine the theoretical considerations on ubiquitous sensor network and present a direction for securities companies for their development by focusing on the technological and application areas. To present strategies of response to a new environment for security companies, First, a diversification strategy is needed for security companies. The survival of only high level of security companies in accordance with the principle of liberal market competition will bring forth qualitative growth and competitiveness of security market. Second, active promotion by security companies is needed. It is no exaggeration to say that we are living in the modern society in the sea of advertisements and propaganda. The promotional activities that emphasize the areas of activity or importance of security need to be actively carried out using the mass media to change the aware of people regarding security companies, and they need to come up with a plan to simultaneously carry out the promotional activities that emphasize the public aspect of security by well utilizing the recent trend that the activities of security agents are being used as a topic in movies or TV dramas. Third, technically complementary establishment of ubiquitous sensor network and electronic tag is needed. Since they are used in mobile electronic tag services such as U-Home and U-Health Care, they are used throughout our lives by forming electronic tag environment within safe ubiquitous sensor network based on the existing privacy guideline for the support of mobile electronic tag terminal commercialization, reduction in communication and information usage costs, continuous technical development and strengthening of privacy protection, and the system of cooperation of academic-industrial-research needs to be established among the academic world and private research institutes for these parts.

  • PDF

A Remote User Authentication Scheme Preserving Anonymity and Traceability with Non-Tamper Resistant Smart Cards (정보추출 가능한 스마트카드 환경에서 익명성과 추적성을 제공하는 원격 사용자 인증 기법)

  • Kwon, Hyuck-Jin;Ryu, Eun-Kyung;Lee, Sung-Woon
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.50 no.6
    • /
    • pp.159-166
    • /
    • 2013
  • Recently, because the interest and needs in privacy protection are growing, smartcard-based remote user authentication schemes have been actively studied to provide the user anonymity. In 2008, Kim et al. first proposed an authentication scheme in order to ensure the user anonymity against both external attackers and the remote server and track malicious users with the help of a trusted trace sever. However, in 2010, Lee et al. showed that Kim et al.'s scheme cannot provide the user anonymity against remote server, which is because the server can trace users without any help of the trace server, and then proposed a improved scheme. On the other hand, in 2010, Horng et al. proposed an authentication scheme with non-tamper resistant smart cards, in which the non-tamper resistant smart card means that an attacker may find out secret information stored in the smart card through special data analysis techniques such as monitoring power consumption, to be secure against a variety of attacks and to provide the user anonymity against external attackers. In this paper, we will propose a remote user authentication scheme with non-tamper resistant smart cards not only to ensure the user anonymity against both external attackers and the remote server but also to track malicious users with only the help of a trusted trace sever.

Design and Analysis of Role-based Security Management Model for Policy-based Security Management in SNMPv3 Network (SNMPv3 통신망의 정책기반 보안관리를 위한 역할기반 보안관리 모델의 설계 및 분석)

  • Ju, Gwang-Ro;Lee, Hyeong-Ho;No, Bong-Nam
    • The KIPS Transactions:PartC
    • /
    • v.8C no.5
    • /
    • pp.573-584
    • /
    • 2001
  • Policy-Based Network Management (PBNM) architecture is to meet various needs of network users and to provide effective management facilities in distributed and large scale networks to network managers. In PBNM, network managers perform network management operations by stipulating a set of rules rather than control each network component. On the other hand, providing security services such as authentication, privacy of messages as well as a new flexible and extensible administration framework, SNMPv3 enables network managers to monitor and control the operation of network components more secure way than ever before. Despite of its enhanced security services, SNMPv3 has difficulties in managing distributed, large-scaled network because it does not provide centralized security management facilities. In this paper, we propose a new security model called Role-based Security Management model (RSM) with security management policy to support scalable and centralized security management for SNMP-based networks. Also, the structure and the operation of the security system as well as the efficiency analysis of RSM in terms of security management are also described.

  • PDF

Study on Utilization Drones in Domestic Logistics Service in Korea (한국내 물류서비스에 드론 활용을 위한 연구)

  • Kang, Ki-Seog;Jeon, In-Oh
    • Journal of Distribution Science
    • /
    • v.14 no.5
    • /
    • pp.51-57
    • /
    • 2016
  • Purpose - In the year of 2015 and 2016, one of the items that got attention in CES was a drone. It has been 100 years since a drone emerged, but most were used for military purposes. As its use became diverse as of 2010, it got attention of the general public. In Korea, it was in 2011 that a drone was known to the public through an aerial video shooting for television program. This study tried to come up with suggestions by comparing domestic with overseas cases, and tried to consider the related technologies and systems with applying the role of drones in logistics service. Research design, data, and methodology - The overseas cases were regarded as drone's logistical purpose. The Prime Air service by US Amazon is still not commercialized and under pre-testing due to Federal Aviation Regulations, although it started in 2013. In Germany, DHL succeeded in delivering service testing which is called Parcelcopter, but it is not commercialized yet. Other than these, there are more attempts to prepare logistics service in China with Taobao, in France with Geopost's test, and in Africa. In Korea, CJ Korea Express tested delivery with a self-developed drone Results - In order to study for utilizing drones for logistics as the prerequisites, some overseas and domestic cases, which are currently considered, were reviewed. Also, the technologies and institutional requirements to commercialize drones for logistical purpose were reviewed. The reasons for using drones in logistics is to ensure the price competitiveness by reducing cost. The empirical test also will be needed because drone pilot areas are designated by ministry of land, infrastructure and transport. Conclusions - In order to utilize drones in logistics and foster the industry, this study would like to suggest the followings. First of all, size of drones for logistics needs to be fixed and their operating system should be standardized. Centralized investment resources are needed through standardization to ensure the market occupancy. Secondly, it is necessary to get the converged businesses that do research, develop and commercialize drones with the investment of private sector. Example can be found in Korea aerospace Industries. We can respond to the rapid growth of the market with intensive investing by integrating the private sector investment. Thirdly, institutional arrangements are needed to be established quickly. In the case of high-technologies like drones, institutional support often does not follow the rapid development of the technology. The problems can be found in securing drones-only airspace, creating drone-specialized pilot's license, matters related to remote controller and complementary regulations for drones in Aviation Act. If these regulations are not prepared or complemented at the right timing, technologies cannot be commercialized even though the development is completed. Fourthly, there is a need to secure the transparency regarding possible privacy and personal information protection problem while operating drones. Finally, in order to foster this new industry, government should focus on supporting R&D more in the long term than short term outcomes.

A Study on the Perception about mandated CCTV among Nursery School Principals, Teachers, Parents, and General Public (CCTV 의무화에 대한 어린이집 원장, 교사, 학부모, 일반인의 인식에 관한 연구)

  • kim, Young-Hee;kim, Doo-Jung
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.19 no.2
    • /
    • pp.311-317
    • /
    • 2018
  • The purpose of this study is to identify the needs of the nursery director, teachers, parents, and the general public regarding the use of mandatory CCTV. In other words, we will examine the benefits, problems, and solutions of mandatory CCTV. The subjects of this study included families, private day care centers, private presbytery, kindergartens, teachers, parents and the general public in D metropolitan city. The research tools were modified and supplemented questionnaires appropriately for the study purpose with reference to the previous research. Collected data was analyzed by frequency and F-test using SPSS 21.0 program. The main results of this study are as follows: First, the benefits of mandatory CCTV for daycare centers is that CCTV becomes objective evidence of human rights incidents, identifies violence among children, and can take measures. In addition, mandatory CCTV can also reduce or prevent abuse. Second, major problems concerning the mandatory use of nursery school CCTV include privacy, violation of basic rights, and education. CCTV is a stressful factor that causes teachers to feel embarrassed, uncomfortable, and tense. Third, the main improvement measures for the nursery school CCTV mandate are to prevent unfair staff and complement existing guidelines for CCTV use. Based on the results of the study, we detail the benefits, problems, and solutions for the nursing home CCTV mandatory poli.

The Right To Be Forgotten and the Right To Delete News Articles A Critical Examination on the Proposed Revision of The Press Arbitration Act (기사 삭제 청구권 신설의 타당성 검토 잊힐 권리를 중심으로)

  • Mun, So Young;Kim, Minjeong
    • Korean journal of communication and information
    • /
    • v.76
    • /
    • pp.151-182
    • /
    • 2016
  • The right to be forgotten (RTBF) has been a population notion to address privacy issues associated with the digitalization of information and the dissemination of such information over the global digital network. In May 2014, the European Court of Justice (ECJ) laid down a landmark RTBF decision to grant individuals the right to be de-listed from search results. ECJ's RTBF decision sparked an increased interest in RTBF in South Korea. Academic and non-academic commentators have provided a mistaken or outstretched interpretation of RTBF in claiming that removal of news articles should be read into RTBF in Korean law. Moreover, the Press Arbitration Commission of Korea (PAC) has proposed revising the Press Arbitration Act (PAA) to allow the alleged victims of news reporting to request the deletion of news stories. This article examines the notion of RTBF from its origin to the latest development abroad and also critically explores Korean laws regulation freedom of expression to evaluate if Korea needs the proposed PAA revision.

  • PDF

A Study on the Which Facilities will Assume Charge of Management for the Private Investigation Business (민간조사업 관리.감독 기관 선정에 관한 연구)

  • Jung, Il-Seok;Park, Ji-Yong
    • Korean Security Journal
    • /
    • no.21
    • /
    • pp.135-154
    • /
    • 2009
  • For the introduction of domestic private investigation act, with beginning of private investigation act bill by Ha Soon-bong in 1999, congressmen Choi Jae-chun, Lee Sang-bae, in 2005, Lee In-gi in 2008, and Kang Sung-chun in 2009 initiate the each bill, and many researches and studies in the academia about the private investigation act bill makes have a bright prospect toward to the bill. However, up to the present, there is a debating which services will charge for management for the private investigation business. It is important that which facilities will assume charge of management for the private investigation business because this is a cornerstone to set up a successful investigation act which fulfills a nation's needs in the future. According to the other countries which induced the act earlier, they, by perceiving the act as a part of the private security, manage the act by setting the police or the separate services such as committees. In municipal laws, there was a case suggesting The National Police Agency and The Justice Department as the facilities for the management and supervision, however, for the unification of administration for the whole private security, similarities of the private investigation and police service, privacy of police services, and development for the domestic private security business, the national police agency, taking care of the private security business, should be assigned as the department for management and supervision, additionally, suggestion to establish "The Management Committee for Private Investigation Business" as a separate facility under the national police agency is needed.

  • PDF

A Study on the Importance of the Assessment of Records Management Metadata Elements Related to the Electronic Medical Records Management System for Medical Records Managers (전자의무기록 관리시스템 관련 기록관리 메타데이터 요소들에 대한 의무기록 관리자의 중요도 평가 연구)

  • Lee, Eun-Mi;Kim, Myeong;Yim, Jin Hee
    • Journal of Korean Society of Archives and Records Management
    • /
    • v.13 no.3
    • /
    • pp.151-171
    • /
    • 2013
  • To comprehend the importance and necessity of record management metadata standard implemented in an electronic medical records system, a survey was undertaken to 50 medical records managers in charge of 5 major hospitals in Seoul. Analysis of the survey results was performed by averaging the responses given by those who answered the survey. SPSS was utilized for statistical analysis. Managers of medical records placed importance on metadata that are related to security of records, such as "levels of security", "types of access to medical records", "levels of authorization granted to personnel", and "users accessing medical records". It shows that these managers need the functions of privacy protection in ERMS. Metadata on "external disclosure" had the lowest level but those surveyed with more than 7 years of experience placed greater importance in this area more those surveyed with less than 7 years of experience in a hospital. This shows that managers need the functions of external disclosure to meet the needs of third partiesfor medical research and medical education.