• Title/Summary/Keyword: Protection of Personal Data

Search Result 461, Processing Time 0.025 seconds

Rule-base Expert System for Privacy Violation Certainty Estimation (개인정보유출 확신도 도출을 위한 전문가시스템개발)

  • Kim, Jin-Hyung;Lee, Alexander;Kim, Hyung-Jong;Hwang, Jun
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.19 no.4
    • /
    • pp.125-135
    • /
    • 2009
  • Logs from various security system can reveal the attack trials for accessing private data without authorization. The logs can be a kind of confidence deriving factors that a certain IP address is involved in the trial. This paper presents a rule-based expert system for derivation of privacy violation confidence using various security systems. Generally, security manager analyzes and synthesizes the log information from various security systems about a certain IP address to find the relevance with privacy violation cases. The security managers' knowledge handling various log information can be transformed into rules for automation of the log analysis and synthesis. Especially, the coverage of log analysis for personal information leakage is not too broad when we compare with the analysis of various intrusion trials. Thus, the number of rules that we should author is relatively small. In this paper, we have derived correlation among logs from IDS, Firewall and Webserver in the view point of privacy protection and implemented a rule-based expert system based on the derived correlation. Consequently, we defined a method for calculating the score which represents the relevance between IP address and privacy violation. The UI(User Interface) expert system has a capability of managing the rule set such as insertion, deletion and update.

A study on awareness change after infection control education by dental hygiene students in Some areas (일부 치위생과 학생의 감염관리 교육 후 인식 변화에 관한 연구)

  • Son, Eun-Gyo;Jung, Hwa-Young
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.18 no.6
    • /
    • pp.494-502
    • /
    • 2017
  • This study examined the change in the students' perception of infection after school education. A self-reported questionnaire was filled out by 300 dental hygiene students in Kangwon from December 3 to December 4, 2016. The contents of the questionnaire included the general characteristics (5 items), infection-related selection (2 items), infection control recognition (5 items), and infection control behavior (10 items). The data were analyzed by frequency analysis, t-test, one way ANOVA, Chi-square test, and hierarchical multiple regression analysis using SPSS 24.0. The Cronbach's Alpha was 0.941 and 0.658, respectively. The school year and hospital practice experience had some influence on the change in infection recognition. A total of 127 students (62.6%) who had experience in practicing in hospitals knew more about antibodies. Hand washing was the highest in personal protection, followed by masks. The selection of the infectious control education method showed that the practical training class was high irrespective of the hospital practice experience, and the perceptions of patient-related infections were the greatest explanatory factor in perception after education.

A Study of Factors Affecting Use Intention of Untact Medical Diagnosis and Consultation Services (비대면 진료의 이용의도에 미치는 영향에 관한 연구)

  • Jin, Seok
    • The Journal of the Korea Contents Association
    • /
    • v.20 no.12
    • /
    • pp.180-197
    • /
    • 2020
  • The purpose of this study is to explain intention to use untact medical diagnosis and consultation services. There is a need for untact medical diagnosis and consultation services in order to increase social interests and a global trend for public protection and convenience enhancement. We carry out the analysis of the survey data using Smart PLS 3.0 to test the hypotheses. According to the empirical analysis results, this study confirms that health consciousness have significant effects on the cost saving, quality of telemedicine service and self-efficacy have significant effects on the accessibility, compatibility. cost saving, quality of telemedicine service, accessibility and compatibility have significant effects on Perceived usefulness. Perceived usefulness have significant effects on use Intention of untact medical diagnosis and consultation services. This study has its meaning because it found out that it deals structurally and expansively with use intention through Expected Benefit and usefulness based on individual characteristics for untact medical diagnosis and consultation services. In addition, The results of this study suggest that if the related policies are institutionalized based on the Expected Benefits covered in this study, the perception of untact medical diagnosis and consultation services can be changed progressively.

A Study on the Research Trends in the Fourth Industrial Revolution in Korea Using Topic Modeling (토픽모델링을 활용한 4차 산업혁명 분야의 국내 연구 동향 분석)

  • Gi Young Kim;Dong-Jo Noh
    • Journal of the Korean BIBLIA Society for library and Information Science
    • /
    • v.34 no.4
    • /
    • pp.207-234
    • /
    • 2023
  • Since the advent of the Fourth Industrial Revolution, related studies have been conducted in various fields including industrial fields. In this study, to analyze domestic research trends on the Fourth Industrial Revolution, a keyword analysis and topic modeling analysis based on the LDA algorithm were conducted on 2,115 papers included in the KCI from January 2016 to August 2023. As a result of this study, first, the journals in which more than 30 academic papers related to the Fourth Industrial Revolution were published were digital convergence research, humanities society 21, e-business research, and learner-centered subject education research. Second, as a result of the topic modeling analysis, seven topics were selected: "human and artificial intelligence," "data and personal information management," "curriculum change and innovation," "corporate change and innovation," "education change and jobs," "culture and arts and content," and "information and corporate policies and responses." Third, common research topics related to the Fourth Industrial Revolution are "change in the curriculum," "human and artificial intelligence," and "culture arts and content," and common keywords include "company," "information," "protection," "smart," and "system." Fourth, in the first half of the research period (2016-2019), topics in the field of education appeared at the top, but in the second half (2020-2023), topics related to corporate, smart, digital, and service innovation appeared at the top. Fifth, research topics tended to become more specific or subdivided in the second half of the study. This trend is interpreted as a result of socioeconomic changes that occur as core technologies in the fourth industrial revolution are applied and utilized in various industrial fields after the corona pandemic. The results of this study are expected to provide useful information for identifying research trends in the field of the Fourth Industrial Revolution, establishing strategies, and subsequent research.

A Study on the Threats of Wiretapping and Effective Security Management Strategies (도청보안의 취약성 및 개선방안에 관한 연구)

  • Lee, Young Ho;Choi, Kyung Cheol;Woo, Sang Yeob
    • Korean Security Journal
    • /
    • no.62
    • /
    • pp.347-367
    • /
    • 2020
  • Rapid advancement of technology in today's society has allowed for easy access and use of data, promoting the process of informationization. Along with the merits of such development, unintended consequences of security risks involving wiretapping have been increasing as well. The security threats posed by wiretapping technology must be addressed by every organization and individual, as it could be used to leak confidential information about the nation's security, military and diplomatic strategies, industrial technologies, and personal information. Despite increasing threats stemming from the surrounding nations using advanced wiretapping technology, there is a lack of awareness at the government level, and the existing security measures for detecting and counteracting the wiretapping equipment are ineffective. In this research, the authors offered technical suggestions for improving the security strategies against the threats of wiretapping and information leakage by conducting a content analysis. The authors suggested the units of an agency be assigned a security grade based on its importance, and that adequate security equipment should be operated according to the grade. For instance, around-the-clock surveillance is recommended for grade-1 facilities, and portable wiretapping equipment detectors should be used to protect conference rooms and other key sites.

A Study on the Performance Model and Measurement Method of the SMEs Information Security Support Policy (중소기업 정보보호 지원 사업 성과모델 및 측정 방법에 관한 연구)

  • Bae, Young-Sik;Jang, Sang-Soo
    • The Journal of Society for e-Business Studies
    • /
    • v.26 no.4
    • /
    • pp.37-52
    • /
    • 2021
  • Due to the spread of COVID-19, it is rapidly changing from face-to-face to non-face-to-face work environments and is changing to a digital work environment that can be accessed anytime, anywhere, providing convenience to all lives. However, the number of breaches, personal information leakage, and technology leakage targeting SMEs that are vulnerable to security continues to increase. Accordingly, the government has been continuously promoting the information security consulting support project for SMEs every year since 2014. Therefore, this study intends to develop a performance model and measurement methodology for continuous and more systematic support and efficient management of information protection support projects in consideration of the importance of information security for SMEs. It is intended to be used as basic data when setting future operational directions and goals. The main method of this study is to derive performance models and indicators for SME information security support projects based on domestic literature, case studies, and survey results, utilize expert advice to verify the developed performance measurement indicators, and use pilot-test questionnaires. Conduct evaluation through surveys. Based on the verified indicators, we would like to present a performance model and measurement index for the information security support project for SMEs.

Development on Early Warning System about Technology Leakage of Small and Medium Enterprises (중소기업 기술 유출에 대한 조기경보시스템 개발에 대한 연구)

  • Seo, Bong-Goon;Park, Do-Hyung
    • Journal of Intelligence and Information Systems
    • /
    • v.23 no.1
    • /
    • pp.143-159
    • /
    • 2017
  • Due to the rapid development of IT in recent years, not only personal information but also the key technologies and information leakage that companies have are becoming important issues. For the enterprise, the core technology that the company possesses is a very important part for the survival of the enterprise and for the continuous competitive advantage. Recently, there have been many cases of technical infringement. Technology leaks not only cause tremendous financial losses such as falling stock prices for companies, but they also have a negative impact on corporate reputation and delays in corporate development. In the case of SMEs, where core technology is an important part of the enterprise, compared to large corporations, the preparation for technological leakage can be seen as an indispensable factor in the existence of the enterprise. As the necessity and importance of Information Security Management (ISM) is emerging, it is necessary to check and prepare for the threat of technology infringement early in the enterprise. Nevertheless, previous studies have shown that the majority of policy alternatives are represented by about 90%. As a research method, literature analysis accounted for 76% and empirical and statistical analysis accounted for a relatively low rate of 16%. For this reason, it is necessary to study the management model and prediction model to prevent leakage of technology to meet the characteristics of SMEs. In this study, before analyzing the empirical analysis, we divided the technical characteristics from the technology value perspective and the organizational factor from the technology control point based on many previous researches related to the factors affecting the technology leakage. A total of 12 related variables were selected for the two factors, and the analysis was performed with these variables. In this study, we use three - year data of "Small and Medium Enterprise Technical Statistics Survey" conducted by the Small and Medium Business Administration. Analysis data includes 30 industries based on KSIC-based 2-digit classification, and the number of companies affected by technology leakage is 415 over 3 years. Through this data, we conducted a randomized sampling in the same industry based on the KSIC in the same year, and compared with the companies (n = 415) and the unaffected firms (n = 415) 1:1 Corresponding samples were prepared and analyzed. In this research, we will conduct an empirical analysis to search for factors influencing technology leakage, and propose an early warning system through data mining. Specifically, in this study, based on the questionnaire survey of SMEs conducted by the Small and Medium Business Administration (SME), we classified the factors that affect the technology leakage of SMEs into two factors(Technology Characteristics, Organization Characteristics). And we propose a model that informs the possibility of technical infringement by using Support Vector Machine(SVM) which is one of the various techniques of data mining based on the proven factors through statistical analysis. Unlike previous studies, this study focused on the cases of various industries in many years, and it can be pointed out that the artificial intelligence model was developed through this study. In addition, since the factors are derived empirically according to the actual leakage of SME technology leakage, it will be possible to suggest to policy makers which companies should be managed from the viewpoint of technology protection. Finally, it is expected that the early warning model on the possibility of technology leakage proposed in this study will provide an opportunity to prevent technology Leakage from the viewpoint of enterprise and government in advance.

A study on Establishment and Management of the CCTV in Operating Room (수술실 CCTV 설치 및 운영에 대한 고찰)

  • Kim, Minji
    • The Korean Society of Law and Medicine
    • /
    • v.20 no.1
    • /
    • pp.109-132
    • /
    • 2019
  • Recently, medical accidents related to surgical procedures have increased. In addition, the media reported that some of these accidents were involved in health crimes. Patient-advocate groups have called for mandatory establishment and management of CCTV in operating rooms. There is a lot of discussion among the interested parties, so it is necessary to review the relevant laws and regulations. The purpose of this study is to identify the characteristics of CCTV in operating rooms and to review legislations related to establishment and management of the CCTV in operating rooms. Medical institutions use CCTV for management of facilities and patient safety and install it in operating rooms optionally. The Constitution guarantees the privacy and the privacy of correspondence of every citizen, but it can be limited by the law for public welfare. Currently, however, there is no existing law about establishment and management of the CCTV in operating rooms and it can be defect of legal system. Under the current legislations, it is likely that the Self-determination can be violated due to the characteristic of healthcare provider when CCTV is mandatorily installed in operating room. In addition, the regulations on access and leakage of confidential information known by operator are insufficient. So that, the safety of the visual data might be threatened. Furthermore, unless the period and the place of storage of the visual data are clearly defined, it is highly unlikely to meet the original purpose of patient safety and prevention of medical accidents. This study is meaningful as there is few previous study on this topic although the need for legal review about this is growing and several bills are being proposed. It is expected that the results of this study can be utilized as basic data for enactment or amendment of the laws and regulations about establishment and management of CCTV in operating rooms.

Ethnosientific Approach of Health Practice in Korea (한국인의 건강관행에 대한 민속과학적 접근)

  • 김귀분;최연희
    • Journal of Korean Academy of Nursing
    • /
    • v.21 no.3
    • /
    • pp.396-417
    • /
    • 1991
  • In order that nursing care an essential quality of nursing practice be acceptable and satisfying, it is necessary that client's culture be respected and that nursing practice be appropriate to that culture. Since cultural elements are an important influence on health practices and life patterns related to medical treatment, recovery from and prevention of disease, nurses need to have an understanding and knowledge of social and cultural phenomena to aid in the planning of nursing interventions. To understand the health practices surrounding health and illness, the health beliefs and practices of both folk and professional healing systems should be ascertained. Cultural data are required to provide care of high quality to clients and to reduce possible conflict between the client and the nurse. It is nursing's goal to provide clients from various cultures with quality nursing care which is satisfying and valuable. The problem addressed by this study was to identify Korean health practices which would contribute to the planning of professional caring practice with the culture : ultimately this study was intended to make a contribution to the development of the science of nursing. The concrete objectives of this study were ; 1) to identify Korean health practices, 2) to interpret the identitial health practices through traditional cultural thought, and 3) to compare the Korean health practices with those of other cultures. The investigator used the ethnosceintific approach outlined by spradly in a qualitative study. To discover ancestral wisdom and knowledge related to traditional health practeces, the subjects of this study were selected from residents of a small rural mountain village in south west Korea, a place considered to be maintaining and transmitting the traditional culture in a relatively well -preserved state because of being isolated from the modern world. The number of subjects was 18, aged 71 to 89. Research data were collected from January 8 to March 31, 1990. Five categories of health practices were identified : “Manage one's own mind”, “Moderation in all thing”, “Live in accord with nature”, “Live in mutuality with others”, and “Live to the best of one's ability”. Values derived from these ways of thinking from Confucianism, Taoism and Buddhism help fashion a traditional way of life, examplified by the saying “Benifience to all”. Korean thought and philosophy is influenced primerily by Confucianism, Confucian principles of ethics, embedded deeply in the peoples' minds, form the idea that “heaven and human being are intimately united” based on concept that “heaven is, so to speak, reason”. Twoe Gae's theory of existential subjectivity develops the concept of self which is the basis of the spirit of reverence in modern Confucian philosophy. The human md is granted from heaven out of the idea of matter, and what control the mind is the spirit of reverence. Hence the idea of “The primacy of the mind" and provided that one should control one's own mind. The precepts of duty to parents, respect for elders and worship of ancestors, and moderation in all behavior put a restraint on life which directed that one live earnestly according to Nature's laws with their neighbors. Not only Confucianism, but also Buddism and Taoism have had an important effect upon these patterns of ideas. When compared with western culture, Korean health practices tend to be more inclusive, abstract and intuitive while westerner health practices found to be mere concrete, practical and personal. Values and beliefs based and pragmatism and existentialism infuence western civilization, Ethical values may be founded on utilitarianism, which considers what is good for the persons in their circumstances as the basis of conduct and takes a serious view of their practical lives including human aspirations rather than an absolute truth. These philosophical and ethical ideas are foundations for health practices related to active, practical and progressive attitudes. This study should be enable nursing not only to understand clients as reflections of the traditional culture when planning nursing practice, but to dovelop health education corresponding to cultural requiments for the purpose of protection against disease and improvement of health, and thus promote sound health practice. Eventually it is hoped that through these processes quality nursing care as the central idea of the science of nursing will be achieved.

  • PDF

Deep Learning OCR based document processing platform and its application in financial domain (금융 특화 딥러닝 광학문자인식 기반 문서 처리 플랫폼 구축 및 금융권 내 활용)

  • Dongyoung Kim;Doohyung Kim;Myungsung Kwak;Hyunsoo Son;Dongwon Sohn;Mingi Lim;Yeji Shin;Hyeonjung Lee;Chandong Park;Mihyang Kim;Dongwon Choi
    • Journal of Intelligence and Information Systems
    • /
    • v.29 no.1
    • /
    • pp.143-174
    • /
    • 2023
  • With the development of deep learning technologies, Artificial Intelligence powered Optical Character Recognition (AI-OCR) has evolved to read multiple languages from various forms of images accurately. For the financial industry, where a large number of diverse documents are processed through manpower, the potential for using AI-OCR is great. In this study, we present a configuration and a design of an AI-OCR modality for use in the financial industry and discuss the platform construction with application cases. Since the use of financial domain data is prohibited under the Personal Information Protection Act, we developed a deep learning-based data generation approach and used it to train the AI-OCR models. The AI-OCR models are trained for image preprocessing, text recognition, and language processing and are configured as a microservice architected platform to process a broad variety of documents. We have demonstrated the AI-OCR platform by applying it to financial domain tasks of document sorting, document verification, and typing assistance The demonstrations confirm the increasing work efficiency and conveniences.