• Title/Summary/Keyword: data privacy

Search Result 1,259, Processing Time 0.036 seconds

Technology Acceptance of Industry 4.0 Applying UTAUT2: Focusing on AR and Drone Services (UTAUT2를 응용한 4차 산업 기술수용에 관한 연구: 증강현실(AR)과 드론 서비스를 중심으로)

  • Kim, Ki-Bong;Chung, Byoung-Gyu
    • Journal of Information Technology Applications and Management
    • /
    • v.26 no.6
    • /
    • pp.29-46
    • /
    • 2019
  • This study analyzed the factors influencing the technology acceptance of the general public in the drones and ARs, one of the key technologies of the industry 4.0. The theoretical basis was the extended unified theory of acceptance and use of technology model(UTAUT2), which uses performance expectancy, effort expectancy, social influence, facilitating conditions, and hedonic motivation as factors common to both services. The price value factor was excluded considering that most ARs were free, and the perceived risk factors, including privacy, which were not in UTAUT2, were included because they are important factors for ICT technology acceptance. The hypothesis was tested by structure equation model. Social influence and hedonic motivation had a positive(+) effect on intention to use technology. On the other hand, in the case of effort expectancy, neither the AR nor the drone had a significant influence on intention to use technology. Furthermore, performance expectancy had a positive(+) effect on intention to use in AR, but no significant influence was found out in drones. On the contrary, in the case of the facilitating conditions, the influence of the drones was positive (+), but the relation of AR was not investigated. The perceived risk was tested for the negative (-) influence of use intention of AR, but no significant relationship was found out for the drones. Among the significant influencing factors, hedonic motivation was the most powerful factor in AR and drones. Theoretical and practical implications are presented based on these results.

Analysis of Research on Nursing Home in Korea - Focused on Theses and Journal Papers since 1990 - (노인요양시설에 관한 국내연구 분석 - 1990년 이후 학위논문과 학술지 게재논문을 대상으로 -)

  • Byun, Hea-Ryung;Chung, Mi-Ryum;Kim, Dae-Nyun;Yoon, Young-Sun
    • Journal of the Korean housing association
    • /
    • v.19 no.2
    • /
    • pp.93-103
    • /
    • 2008
  • The tendency of having fewer or no children and increasing number of single household will make the protection of the elderly with geriatric disease even harder in the future. Nursing home can provide long-term care for those who can-not be cared by the family. Korean government has been changing welfare policy for the elderly to cope with the changing needs of them regarding nursing home and geriatric disease. Researchers from various field also showed great interest in nursing home. The purpose of this study is to analyze the number and contents of theses and papers regard-ing nursing home in the 12 journals, to find out overall the research streaming of the theme, method, subject, and district of the papers in the journals. Data were collected by using keyword through library database. 246 thesis and 116 papers published from 1990 to 2006 were analyzed in 7 categories, and 66 papers in the journals were used on the content analysis for lading out research streaming. As results, research streaming according to 5 periods were identified. The most frequent subjects of theses regarding nursing home are nursing home systems and policies. Otherwise, the various subjects of papers in the journals have been deal with, especially plans of nursing home and spacial behavior of the elderly and staffs' satisfaction. In the future, the research subjects related to the nursing home should deal with total space plan as living environment for the elderly and work environment for the staffs according to privacy, spatial use and behavior, culture and lifestyle in Korea, and so on.

The Study on the Characteristics of Shared Space Composition of Shared Housing for One-Person Household - Focusing on Analysis of Shared Housing on Domestic and Overseas Cases - (1인 가구 공유 주택의 공유 공간 구성 특성에 관한 연구 - 국내·외 공유 주택 사례 분석을 중심으로 -)

  • Choi, Jun-Hwan;Park, Suh-Jun;Lee, Do-Hun
    • Journal of the Korean housing association
    • /
    • v.27 no.5
    • /
    • pp.1-10
    • /
    • 2016
  • This study was designed to derive the characteristics of shared space composition of shared housing for one-person household through an examination on domestic and overseas cases. To examine the systematic approach to the planning of shared space, the concept and current status of shared housing were analyzed; and, the concept of shared space was derived based on the concept of Altman and, through the analysis on cases of shared housing, the shared space was classified into shared spaces for living support, passage, and community. And then, based on the standard of classification of shared space, the configuration of shared space in shared housing was examined through the analysis on domestic and oversea cases. Thereby, the arrangement and function of each type of compartment in shared space were examined and the configuration of the shared space prepared for an entrance of residents was analyzed and classified into 6 types. Each type revealed a relationship between privacy, living, passage and internal community which were all provided with respective configurative characteristics of each space. Result obtained from this study is estimated that they could be used as a basic data for the design or planning of shared spaces in shared and further, they could also be employed for the design or development of shared spaces of such houses taken the type and characteristics of residents into account.

A Study of Phase Sensing Device IoT Network Security Technology Framework Configuration (디바이스 센싱 단계의 IoT 네트워크 보안 기술 프레임워크 구성)

  • Noh, SiChoon;Kim, Jeom goo
    • Convergence Security Journal
    • /
    • v.15 no.4
    • /
    • pp.35-41
    • /
    • 2015
  • Internet of Things has a wide range of vulnerabilities are exposed to information security threats. However, this does not deal with the basic solution, the vaccine does not secure encryption for the data transmission. The encryption and authentication message transmitted from one node to the construction of the secure wireless sensor networks is required. In order to satisfy the constraint, and security requirements of the sensor network, lightweight encryption and authentication technologies, the light key management technology for the sensor environment it is required. Mandatory sensor network security technology, privacy protection technology subchannel attack prevention, and technology. In order to establish a secure wireless sensor networks encrypt messages sent between the nodes and it is important to authenticate. Lightweight it shall apply the intrusion detection mechanism functions to securely detect the presence of the node on the network. From the sensor node is not involved will determine the authenticity of the terminal authentication technologies, there is a need for a system. Network security technology in an Internet environment objects is a technique for enhancing the security of communication channel between the devices and the sensor to be the center.

Awareness of Personal Information Protection for Service Users among Small and Mid-Sized Security Companies (중.소민간경비업체의 서비스 이용자 개인정보보호에 관한 인식)

  • Kim, Il Gon;Choi, Kee Nam
    • Convergence Security Journal
    • /
    • v.14 no.3_2
    • /
    • pp.3-12
    • /
    • 2014
  • The government was fully aware of the gravity of a recent massive leak of personal information of credit card users. Meanwhile, the government just took a light disciplinary action by imposing a fine, but it showed its intention to strengthen the regulations by taking the severest disciplinary action. The tightened regulations against personal information leak will be applied to the private security industry without exception to protect individual people's property and lives if such an incident occurs in that industry that deals with a wide variety of personal information such as CCTV data or privacy information all the time. The purpose of this study was to examine the state of the protection and management of personal information for service users among private security firms in an effort to suggest some reform measures. The findings of the study were as follows: First, administrators or managers who are involved with personal information protection should make a full-fledged effort to gather information. Second, counseling or related programs should be provided for small and mid-sized security firms to guarantee thorough personal information protection. Third, Korea Security Association should improve the educational system related to personal information protection to resolve problems with this education currently provided for managers and employees of these companies.

Breast Cancer Screening Barriers from the Womans Perspective: a Meta-synthesis

  • Azami-Aghdash, Saber;Ghojazadeh, Morteza;Sheyklo, Sepideh Gareh;Daemi, Amin;Kolahdouzan, Kasra;Mohseni, Mohammad;Moosavi, Ahmad
    • Asian Pacific Journal of Cancer Prevention
    • /
    • v.16 no.8
    • /
    • pp.3463-3471
    • /
    • 2015
  • Background: The principal aim of health service providers in the field of breast cancer is to detect and treat lesions at an appropriate time. Therefore, identification of barriers to screening can be very helpful. The present study aimed to systematically review the qualitative studies for extracting and reporting the barriers of screening for breast cancer from the womans perspective. Materials and Methods: In this systematic review; Pubmed, Google Scholar, Ovid Scopus, Cochrane Library, Iranmedex, and SID were searched using the keywords: screening barriers, cancer, qualitative studies, breast and their Persian equivalents, and the needed data were extracted and analyzed using an extraction table. To assess the quality of the studies, the Critical Appraisal Skills Programme (CASP) tool was used. Results: From 2,134 related articles that were found, 21 articles were eventually included in the study. The most important barriers from the point of view of 1,084 women were lack of knowledge, access barriers (financial, geographical, cultural), fear (of results and pain), performance of service providers, women's beliefs, procrastination of screening, embarrassment, long wait for getting an appointment, language problems, and previous negative experiences. Articles' assessment score was 68.9. Conclusions: Increasing women's knowledge, reducing the costs of screening services, cultural promotion for screening, presenting less painful methods, changing beliefs of health service providers, provision of privacy for giving service, decreasing the waiting time, and providing high quality services in a respectful manner can be effective ways to increase breast cancer screening.

A Key Distribution Protocol for Secure Multicasting in Large Dynamic Groups (대규모 동적 그룹에서 안전한 멀티캐스트를 위한 키 분배 프로토콜)

  • Kim, Tae-Yeon;Kim, Young-Kyoon
    • The KIPS Transactions:PartC
    • /
    • v.9C no.4
    • /
    • pp.597-604
    • /
    • 2002
  • Changing group key is necessary for the remaining members when a new member joins or a member leaves the group in multicast communications. It is required to guarantee perfect forward and backward confidentiality. Unfortunately, in large groups with frequent membership changes, key changes become the primary bottleneck for scalable group. In this paper, we propose a novel approach for providing efficient group key distribution in large and dynamic groups. Unlike existing secure multicast protocols, our protocol is scalable to large groups because both the frequency and computational overhead of re-keying is determined by the size of a subgroup instead of the size of the whole group, and offers mechanism to prevent the subgroup managers with group access control from having any access to the multicast data that are transfered by sender. It also provides security service for preserving privacy in wireless computing environments.

A Study on the U-City Information Characterization for the Effective Information Management (효율적 정보관리를 위한 U-City 정보 특성분석에 관한 연구)

  • Ahn, Jong-Wook;Shin, Dong-Bin;Kim, Jung-Hoon
    • Journal of Korean Society for Geospatial Information Science
    • /
    • v.18 no.1
    • /
    • pp.119-127
    • /
    • 2010
  • In this study, U-City to effectively manage information as a basis for studies of U-City Info characteristics were analyzed. U-City services are currently being discussed which is about 228. Short-term possibility of applying these services, the service's practicality and availability of services based on public services analyzed, 39 were selected. Next, the selected U-City to target services to analyze the flow of information and analysis based on the characteristics of U-City information was derived. U-City information derived from this study, the characteristics of real-time information, and service-specific mandatory and optional information, melting complex information, dynamic information, large amounts of data, user-customized information, and information security vulnerabilities, revealing personal information and privacy is. The results of this study, governments and municipalities to promote the construction of the U-City can be used effectively. To do so, considering the characteristics of U-City information, information management standards should be established.

A (k,t,n) verifiable multi-secret sharing scheme based on adversary structure

  • Li, Jing;Wang, Licheng;Yan, Jianhua;Niu, Xinxin;Yang, Yixian
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.8 no.12
    • /
    • pp.4552-4567
    • /
    • 2014
  • A (n,t,n) secret sharing scheme is to share a secret among n group members, where each member also plays a role of a dealer,and any t shares can be used to recover the secret. In this paper, we propose a strong (k,t,n) verifiable multi-secret sharing scheme, where any k out of n participants operate as dealers. The scheme realizes both threshold structure and adversary structure simultaneously, and removes a trusted third party. The secret reconstruction phase is performed using an additive homomorphism for decreasing the storage cost. Meanwhile, the scheme achieves the pre-verification property in the sense that any participant doesn't need to reveal any information about real master shares in the verification phase. We compare our proposal with the previous (n,t,n) secret sharing schemes from the perspectives of what kinds of access structures they achieve, what kinds of functionalities they support and whether heavy storage cost for secret share is required. Then it shows that our scheme takes the following advantages: (a) realizing the adversary structure, (b) allowing any k out of n participants to operate as dealers, (c) small sized secret share. Moreover, our proposed scheme is a favorable candidate to be used in many applications, such as secure multi-party computation and privacy preserving data mining, etc.

An Efficient IoT Healthcare Service Management Model of Location Tracking Sensor (위치 추적 센서 기반의 IOT 헬스케어 서비스 관리 모델)

  • Jeong, Yoon-Su
    • Journal of Digital Convergence
    • /
    • v.14 no.3
    • /
    • pp.261-267
    • /
    • 2016
  • As IoT technology has gained the attention all around the world, the development for various services of healthcare, smart city, agriculture, and defense based on IoT is in progress. However, it is likely that healthcare services based on IoT have a problem of being leaked of patients' biological information by a third party and that risks patients' lives. In this paper, an IoT health care service managing model based on location sensor is proposed, which secures the biological information of a patient and simplifies the procedure to process the treatment and administration steps by using the data resources sensed. Even when an emergency occurs, this proposed model can respond quickly using the location information of the patient, which enables the staff in the hospital to locate the patient in real time. In addition, there is an advantage to minimize the time and the process of care, because the location of the equipment for necessary treatment is possible to be instantaneously located with attached sensors.