• Title/Summary/Keyword: Transfer of Personal Data

Search Result 99, Processing Time 0.028 seconds

Estimative Factors and Probability Whether It is Desire or No on the Transfer of Nurses' Duty Post (간호사의 근무부서 이동 희망여부 예측요인과 추정확률)

  • Sohn, In-Soon;Han, Sang-Sook
    • Journal of Korean Academy of Nursing Administration
    • /
    • v.9 no.4
    • /
    • pp.571-583
    • /
    • 2003
  • Purpose: This study was aimed by presenting basic data of nurses' manpower management on studying about estimative variables and provability assumption whether it is desire or no on the transfer of nurses' duty post. Method: The study was designed retrospective survey and the subjects of this study consisted of 508 nurses who have engages in the K-university hospital. Data were analyzed by SPSS windows for 11.0, by logistic regression. Result: The status on clinical specific variables were verified on estimative variable about whether it is desire or no on the transfer of nurses' post of duty that staff nurses was 3.95 times when set the standard over the charge nurses, and unsatisfied nurses than satisfied nurses on the place of duty at present was 1.4 times. On the low domains of duty's satisfied degree was verified on predictive variable about whether it is desire or no on the transfer of nurses' post of duty that nurses of low feeling of satisfaction about personal relationship was 1.19 times, unsatisfied nurses about hospital management was 2.01 times verified on desiring transfer to other places. Conclusion: The suitability of estimative model whether it is desire or no on the transfer of nurses' post of duty explainable by the variable of the status, the feeling of satisfaction on post of duty, the personal relationship the hospital management and estimative probability was 80.9%.

  • PDF

The Data Transmission of Image Storage System of PACS (PACS내 영상저장 장치의 데이터 전송)

  • Cho, EuyHyun;Park, Jeongkyu
    • Journal of the Korean Society of Radiology
    • /
    • v.12 no.6
    • /
    • pp.785-791
    • /
    • 2018
  • Recently, Disk array is widely used as a long term storage device in PACS, but reliability is not enough in relation to annual failure rate of disk. Between October 2016 and February 2017, we scanned the serial port of the hard disk while reading or storing medical images on a PACS reader. The data rate was calculated from the data stored in HDD 99ea that were used in the PCAS image storage device and in HDD 101ea that were used in the Personal Computer. When a CT image was read from a PACS reader, Reading was 87.8% and Writing was 12.2% in units of several tens of megabytes or less. When the CT image was stored in the PACS reader, Reading was 11.4% and Writing was 88.6% in units of several tens of megabytes or less. While reading the excel file on the personal computer, Reading was 75% and Writing was 25% in less than 3 MB, and In the process of storing the excel file on the personal computer, Reading was carried out by 38% and Writing was carreid out 62% in the units of 3 MB or less. The transfer rate of the hard disk used in the PACS image storage device was 10 GB/h, and the transfer rate per hour of the hard disk of the personal computer was 5 GB / h. Annual failure rate of hard disk of image storage system is 0.97 ~ 1.13%, Annual failure rate of Hard Disk of personal computer is 0.97 ~ 1.13%. the higher transfer rate is, the higher annual failure rate is. These results will be used as a basis for predicting the life expectancy of the hard disk and the annual failure rate.

On the Security of Public-Key-Certificate-Relay Protocol for Smart-Phone Banking Services (스마트폰뱅킹을 위한 공인인증서 복사 프로토콜의 취약점 분석)

  • Shin, DongOh;Kang, Jeonil;Nyang, DaeHun;Lee, KyungHee
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.37C no.9
    • /
    • pp.841-850
    • /
    • 2012
  • Most of banks in Korea provide smartphone banking services. To use the banking service, public key certificates with private keys, which are stored in personal computers, should be installed in smartphones. Many banks provides intermediate servers that relay certificates to smartphones over the Internet, because the transferring certificates via USB cable is inconvenient. In this paper, we analyze the certificate transfer protocol between personal computer and smartphone, and consider a possible attack based on the results of the analysis. We were successfully able to extract a public key certificate and password-protected private key from encrypted data packets. In addition, we discuss several solutions to transfer public key certificates from personal computers to smartphones safely.

Data Transmission Rate Improvement Scheme Using Multicast ACK in IEEE 802.15.3 (IEEE 802.15.3에서 Multicast ACK를 이용한 전송률 향상 기법)

  • Jeong, Pil-Seong;Kim, Hwa-Sung;Oh, Young-Hwan
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.48 no.10
    • /
    • pp.35-42
    • /
    • 2011
  • WPAN(Wireless Personal Area Network) have many advantages such as using low power and cheap price, small size. So it is recently increasing application range such as personal portable device, home network and sensor network so and on. IEEE 802.15.3 basically has the point to point or peer to peer UM(Usage Model). But using devises that need data transmission is increasing in the house and office. Therefor UM of point to multipoint is proposed. In this paper, I proposed Multicast ACK mechanism on the point to multipoint UM. So it is able to transfer data to multiple devices as this Multicast transfer method at a time. Thus, throughput performance is improved. But the problem that increases data transfer delay is appeared because of adding Multicast ACK traffic. We compared the performance between standard and proposed mechanism through a numerical analysis.

Delegated Provision of Personal Information and Storage of Provided Information on a Blockchain Ensuring Data Confidentiality (개인정보의 위임 제공 및 데이터 기밀성을 보장하는 블록체인에 제공 정보의 저장)

  • Jun-Cheol, Park
    • Smart Media Journal
    • /
    • v.11 no.10
    • /
    • pp.76-88
    • /
    • 2022
  • Personal information leakage is very harmful as it can lead to additional attacks using leaked information as well as privacy invasion, and it is primarily caused by hacking server databases of institutions that collect and store personal information. We propose a scheme that allows a service-requesting user to authorize a secure delegated transfer of his personal information to the service provider via a reliable authority and enables only the two parties of the service to retrieve the provided information stored on a blockchain ensuring data confidentiality. It thus eliminates the necessity of storing customer information in the service provider's own database. As a result, the service provider can serve customers without requiring membership registration or storing personal information in the database, so that information leakage through the server database can be completely blocked. In addition, the scheme is free from the risk of information leakage and subsequent attacks through smartphones because it does not require a user's smartphone to store any authentication credential or personal information of its owner.

Volume Holographic Fingerprint Recognition System for Personal Identification (개인 인증을 위한 체적 홀로그래픽 지문인식 시스템)

  • 이승현
    • Journal of the Korean Society of Safety
    • /
    • v.13 no.4
    • /
    • pp.256-263
    • /
    • 1998
  • In this paper, we propose a volume holographic fingerprint recognition system based on optical correlator for personal identification. Optical correlator has high speed and parallel processing characteristics of optics. Matched filters are recorded into a volume hologram that can store data with high density, transfer them with high speed, and select a randomly chosen data element. The multiple reference images of database are prerecorded in a photorefractive crystal in the form of Fourier transform images, simply by passing the image displayed in a spatial light modulator through a Fourier transform lens. The angular multiplexing method for multiple holograms of database can be achieved by rotating the crystal by use of a step motor. Experimental results show that the proposed system can be used for the security verification system.

  • PDF

Sharing a clipboard between a personal computer and a smartphone for data transfer (PC와 스마트폰 사이의 데이터 전송을 위한 클립보드 공유)

  • Yeo, Se-Hwan;Kim, Jung-Sun
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2011.06d
    • /
    • pp.79-81
    • /
    • 2011
  • 최신 스마트폰 사용자가 급격하게 늘어남에 따라 PC와 스마트폰을 동시에 사용하는 이용자도 많아지고 있다. 이러한 경우에 글이나 그림을 PC와 스마트폰 data를 주고 받아야 하는 상황이 자주 발생한다. 하지만 데이터를 전송하는 방법이 불편하고 오래 걸린다. 따라서 본 논문에서는 Pc와 스마트폰의 서로의 클립보드를 공유하는 애플리케이션을 설치하여 dat를 쉽고 빠르게 보내는 방법을 제안하고자 한다.

A Study on ways to secure personal information stability according to the implementation of the mobile phone use system for milityary personnel (군장병 휴대전화 사용제도 시행에 따른 개인정보 안정성 확보 방안 연구)

  • Hwangbo, Wongyu;Shin, Dong-Kyoo
    • Journal of Internet Computing and Services
    • /
    • v.23 no.6
    • /
    • pp.49-58
    • /
    • 2022
  • As military service members are fully permitted to use mobile phones for sickness after work, it is time to minimize the direct collection of personal information from telecommunication companies when opening mobile phones to secure the safety of military service personnel's personal information. Prior to introducing the use of mobile phones by soldiers after work, the Ministry of National Defense established a security control system such as blocking the mobile phone shooting function to prevent security accidents and concerns about some adverse functions such as illegal cyber gambling, game addiction, and viewing pornography. come. Mobile telecommunications companies entrust personal information processing tasks, such as opening mobile phones, to telecommunications agencies and carry out management and supervision, such as checking the status of personal information protection measures. When a military service member opens a mobile phone, a personal information management agency is newly established using the right to portability of personal information, and a system for requesting the transmission of personal information from the military service member is proposed.

An Exploratory Study on the impact of EU Adequacy Decision on GDPR compliant companies (EU 적정성 결정이 GDPR 대상기업에 미치는 영향에 관한 탐색적 연구)

  • Kim, YoungSoo;Chang, Hangbae
    • Journal of Platform Technology
    • /
    • v.9 no.4
    • /
    • pp.32-41
    • /
    • 2021
  • The EU enacted a law strongly regulating the GDPR to protect the privacy of its citizens on 25 May 2018. Compliance with GDPR is an essential prerequisite for companies to enter the European market in the global economic era. In this paper, Step-by-step measures have been defined to conclude DPA agreements for the appropriate level of protection against EU personal data transfer. To explore the benefits and expected effects of determining appropriateness at the government level. As a result, enterprises benefit from simplifying processes, reducing time, and reducing costs when entering the EU. Government-level support in response to personal data breach and communication with the EU Commission will have a positive impact, However, even after the adequacy decision, the entity continues to need activities to secure personal data through compliance with GDPR principles and obligations. Major operations of companies that comply with GDPR are also maintained as important tasks that must be observed in most cases except for the Data Protection Agreement.

A Follow-up Study on the Personal Noise Exposed Dose and Hearing Loss (개인 소음폭로량과 청력손실에 관한 추적조사)

  • Kim, Won-Sool;Hong, Young-Seoub;Kim, Yang-Seak;Lee, Sang-Ju;Park, Kyung-Il;Jung, Kap-Yull;Kim, Joon-Youn
    • Journal of Preventive Medicine and Public Health
    • /
    • v.27 no.2 s.46
    • /
    • pp.286-298
    • /
    • 1994
  • For the purpose of presenting the basic data for the establishment of control measures on the long-term noise exposed workers, this study was carried out on the relationship between personal noise exposed dose and hearing loss on the 67 male workers whose hearing threshold had exceeded 40 dB in 4,000 Hz, from 1990 to 1992. Conclusively, the level of hearing loss was significantly related to personal noise exposed dose in follow-up period. We considered that personal noise exposed dose which was measured by the personal noise dosemeter was more efficient rather than the noise level of workplace for the evaluating the long-term change of hearing acuity. And although in the case of not-diagnosed as noise induced hearing loss. it was suspected that the active control programs such as improvement of noisy environment or early transfer to proper workplace were needed on the workers who exposed with over 90 dB in personal noise exposed dose.

  • PDF