• Title/Summary/Keyword: information Protection

Search Result 4,475, Processing Time 0.034 seconds

The Medical Information Protection and major Issues (의료정보 유출의 문제점과 의료정보보호)

  • Jeun, Young-Ju
    • Journal of the Korea Society of Computer and Information
    • /
    • v.17 no.12
    • /
    • pp.251-258
    • /
    • 2012
  • The protection of medical information by major Issues on medical information to protect the individuals' privacy on medical information. Especially, Issues of medical service information, medical record, insurance, employment, Genetic technology including genetic test and screening, gene therapy and genetic enhancement is developing rapidly. Defensibility of medical information documentation is tested in the courts. medical information can be illicitly accessed from anywhere and transmitted across the quickly and with risk of detection. Once data is distributed on the internet, it may become available to anyone who wishes to purchase it, and it cannot be expunge. Patient privacy protection of medical information is controlled mostly by patient consent laws that define how and when a patient must consent before a physician may disclose the patient's medical information to anyone else. enterprise that offers consumers commodities or services is checking problem about customer information of management system is checking problem about customer information of management system essentially. Therefore, in this paper will find a way out to Protection of medical information by major Issues on medical information.

A Revocable Fingerprint Template for Security and Privacy Preserving

  • Jin, Zhe;Teoh, Andrew Beng Jin;Ong, Thian Song;Tee, Connie
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.4 no.6
    • /
    • pp.1327-1342
    • /
    • 2010
  • With the wide deployment of biometric authentication systems, several issues pertaining security and privacy of the biometric template have gained great attention from the research community. To resolve these issues, a number of biometric template protection methods have been proposed. However, the design of a template protection method to satisfy four criteria, namely diversity, revocability and non-invertibility is still a challenging task, especially performance degradation when template protection method is employed. In this paper, we propose a novel method to generate a revocable minutiae-based fingerprint template. The proposed method consists of feature extraction from fingerprint minutiae pairs, quantization, histogram binning, binarization and eventually binary bit-string generation. The contributions of our method are two fold: alignment-free and good performance. Various experiments on FVC2004 DB1 demonstrated the effectiveness of the proposed methods.

Legal Issues of Blockchain in Personal Information Protection : Based on GDPR and Personal Information Protection Act (개인정보보호법제 관점에서 본 블록체인의 법적 쟁점 GDPR 및 국내 개인정보보호법을 바탕으로)

  • Park, Minjung;Chai, Sangmi;Lee, Myoung Jun
    • Journal of Information Technology Applications and Management
    • /
    • v.25 no.2
    • /
    • pp.133-146
    • /
    • 2018
  • The technical definition of Blockchain is commonly known 'distributed ledger', however, there is no legal definition for being accepted in worldwide. Therefore, unless legal definitions and concepts of Blockchain are presented, there is a possibility that various legal disputes will occur in the future in Blockchain environment. The purpose of this study is to derive legal issues related to personal information protection that can be conflicted in Blockchain environment based on domestic Privacy Act and GDPR. The outcomes of this study can prevent various legal disputes and provide solutions that may occur due to the spread of Blockchain. It also suggests the foundation for the improvement of Privacy Act. Finally, it contributes to activate of Blockchain, industry, in Korea.

The System of Radiation Dose Assessment and Dose Conversion Coefficients in the ICRP and FGR

  • Kim, Sora;Min, Byung-Il;Park, Kihyun;Yang, Byung-Mo;Suh, Kyung-Suk
    • Journal of Radiation Protection and Research
    • /
    • v.41 no.4
    • /
    • pp.424-435
    • /
    • 2016
  • Background: The International Commission on Radiological Protection (ICRP) recommendations and the Federal Guidance Report (FGR) published by the U.S. Environmental Protection Agency (EPA) have been widely applied worldwide in the fields of radiation protection and dose assessment. The dose conversion coefficients of the ICRP and FGR are widely used for assessing exposure doses. However, before the coefficients are used, the user must thoroughly understand the derivation process of the coefficients to ensure that they are used appropriately in the evaluation. Materials and Methods: The ICRP provides recommendations to regulatory and advisory agencies, mainly in the form of guidance on the fundamental principles on which appropriate radiological protection can be based. The FGR provides federal and state agencies with technical information to assist their implementation of radiation protection programs for the U.S. population. The system of radiation dose assessment and dose conversion coefficients in the ICRP and FGR is reviewed in this study. Results and Discussion: A thorough understanding of their background is essential for the proper use of dose conversion coefficients. The FGR dose assessment system was strongly influenced by the ICRP and the U.S. National Council on Radiation Protection and Measurements (NCRP), and is hence consistent with those recommendations. Moreover, the ICRP and FGR both used the scientific data reported by Biological Effects of Ionizing Radiation (BEIR) and United Nations Scientific Committee on the Effects of Atomic Radiation (UNSCEAR) as their primary source of information. The difference between the ICRP and FGR lies in the fact that the ICRP utilized information regarding a population of diverse races, whereas the FGR utilized data on the American population, as its goal was to provide guidelines for radiological protection in the US. Conclusion: The contents of this study are expected to be utilized as basic research material in the areas of radiation protection and dose assessment.

Radiation protection in dental clinic (치과에서의 방사선안전관리)

  • Lee, Sam-Sun
    • Imaging Science in Dentistry
    • /
    • v.37 no.3
    • /
    • pp.117-126
    • /
    • 2007
  • Although the diagnostic information provided by radiographs may be of definite benefit to the patients, the radiographic examination does carry the potential for harm from exposure to ionizing radiation. Therefore we should try to expose radiation as low as reasonably achievable and to give diagnostic information to patients as much as possible. All of dentists should have competence in radiation protection. I wish to deal with what we should do for the optimization of radiation protection in dental clinic.

  • PDF

Dynamic Survivable Routing for Shared Segment Protection

  • Tapolcai, Janos;Ho, Pin-Han
    • Journal of Communications and Networks
    • /
    • v.9 no.2
    • /
    • pp.198-209
    • /
    • 2007
  • This paper provides a thorough study on shared segment protection (SSP) for mesh communication networks in the complete routing information scenario, where the integer linear program (ILP) in [1] is extended such that the following two constraints are well addressed: (a) The restoration time constraint for each connection request, and (b) the switching/merging capacity constraint at each node. A novel approach, called SSP algorithm, is developed to reduce the extremely high computation complexity in solving the ILP formulation. Basically, our approach is to derive a good approximation on the parameters in the ILP by referring to the result of solving the corresponding shared path protection (SPP) problem. Thus, the design space can be significantly reduced by eliminating some edges in the graphs. We will show in the simulation that with our approach, the optimality can be achieved in most of the cases. To verify the proposed formulation and investigate the performance impairment in terms of average cost and success rate by the additional two constraints, extensive simulation work has been conducted on three network topologies, in which SPP and shared link protection (SLP) are implemented for comparison. We will demonstrate that the proposed SSP algorithm can effectively and efficiently solve the survivable routing problem with constraints on restoration time and switching/merging capability of each node. The comparison among the three protection types further verifies that SSP can yield significant advantages over SPP and SLP without taking much computation time.

An Analysis Measure for Cybersecurity linked Threat against Diverse Protection Systems (다양성보호계통 사이버보안 연계 위협 분석 방안)

  • Jung, Sungmin;Kim, Taekyung
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.17 no.1
    • /
    • pp.35-44
    • /
    • 2021
  • With the development of information technology, the cybersecurity threat continues as digital-related technologies are applied to the instrumentation and control system of nuclear power plants. The malfunction of the instrumentation and control system can cause economic damage due to shutdown, and furthermore, it can lead to national disasters such as radioactive emissions, so countering cybersecurity threats is an important issue. In general, the study of cybersecurity in instrumentation and control systems is concentrated on safety systems, and diverse protection systems perform protection and reactor shutdown functions, leading to reactor shutdown or, in the worst case, non-stop situations. To accurately analyze cyber threats in the diverse protection system, its linked facilities should be analyzed together. Risk analysis should be conducted by analyzing the potential impact of inter-facility cyberattacks on related facilities and the impact of cybersecurity on each configuration module of the diverse protection system. In this paper, we analyze the linkage of the diverse protection system and discuss the cybersecurity linkage threat by analyzing the availability of equipment, the cyber threat impact of the linked equipment, and the configuration module's cybersecurity vulnerability.

A Study on Dental Hygienist' Knowledge, Awareness and Performance of Patient's Personal Information Protection (환자 개인정보보호에 관한 치과위생사의 지식과 인식도 및 실천도에 관한 연구)

  • Choi, Ye-Jin;Kang, Hyun-Kyung
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.17 no.2
    • /
    • pp.416-426
    • /
    • 2016
  • This study intended to identify dental hygienists' knowledge and extent of awareness and performance of patient's personal information protection. In addition, this research was conducted to contribute to medical centers' preparation of measures to strengthen the personal information protection by identifying the factors affecting dental hygienists' extent of performance related to the patient's personal information protection. After explaining the purpose and meaning of the research to the survey participants and gaining their consent, a self-administered survey was conducted from November 7, 2014 to June 30, 2015. The data on 210 dental hygienists in Busan city and Gyeongsangnam-do province was used for analysis. As a result, in dental hygienists with more than 10 years experience, the extent of the performance was significantly high (p<.05). In positions higher than a senior manager, the extent of knowledge was high (p<.01) and the extent of performance was significantly high (p<.05). In hospitals with more than 10 to 20 workers, the extent of awareness was significantly high (p<.05). Regarding the correlation of knowledge and the extent of awareness and performance, a high level of knowledge showed a positive correlation of the extent of awareness and performance (p<.01). As a result of a survey regarding what effects dental hygienists' knowledge and extent of awareness of patient's personal information protection have on dental hygienists' extent of performance, it was found that knowledge (.231) and the extent of awareness (.212) are factors affecting the extent of performance. Therefore, to increase the extent of dental hygienists' performance of patient's personal information protection, there is a need to improve the knowledge of patient's personal information protection and change its awareness. To change the awareness of patient's personal information protection, there is a serious need to carry out education targeting dental hygienists.

Biological Infectious Watermarking Model for Video Copyright Protection

  • Jang, Bong-Joo;Lee, Suk-Hwan;Lim, SangHun;Kwon, Ki-Ryong
    • Journal of Information Processing Systems
    • /
    • v.11 no.2
    • /
    • pp.280-294
    • /
    • 2015
  • This paper presents the infectious watermarking model (IWM) for the protection of video contents that are based on biological virus modeling by the infectious route and procedure. Our infectious watermarking is designed as a new paradigm protection for video contents, regarding the hidden watermark for video protection as an infectious virus, video content as host, and codec as contagion medium. We used pathogen, mutant, and contagion as the infectious watermark and defined the techniques of infectious watermark generation and authentication, kernel-based infectious watermarking, and content-based infectious watermarking. We experimented with our watermarking model by using existing watermarking methods as kernel-based infectious watermarking and content-based infectious watermarking medium, and verified the practical applications of our model based on these experiments.

Ethernet Ring Protection Using Filtering Database Flip Scheme For Minimum Capacity Requirement

  • Rhee, June-Koo Kevin;Im, Jin-Sung;Ryoo, Jeong-Dong
    • ETRI Journal
    • /
    • v.30 no.6
    • /
    • pp.874-876
    • /
    • 2008
  • Ethernet ring protection is a new technology introduced in ITU-T Recommendation G.8032, which utilizes the generic Ethernet MAC functions. We introduce an alternative enhanced protection switching scheme to suppress penalty in the switching transient, in which the Ethernet MAC filtering database (FDB) is actively and directly modified by information disseminated from the nodes adjacent to failure. The modified FDB at all nodes are guaranteed to be consistent to form a complete new ring network topology immediately. This scheme can reduce the capacity requirement of the G.8032 by several times. This proposed scheme can be also applied in IP protection rings.

  • PDF