• Title/Summary/Keyword: personal connection

Search Result 238, Processing Time 0.024 seconds

The Characteristics and Spatial Configuration for a Nurse's Office in an Elementary School in a Rural Area -Focused on Cheongwon Gun Area- (농촌지역 초등학교 보건실의 공간구성 및 특성 -청원군 지역을 중심으로-)

  • Lee, Jae-Hyung;Jung, Jin-Ju
    • Journal of the Korean Institute of Rural Architecture
    • /
    • v.12 no.1
    • /
    • pp.9-16
    • /
    • 2010
  • As the importance of health and school health grows, the purposes of this research are to investigate the differences between the characteristics and the utilization of the nurse's office of an elementary school in an urban area and the nurse's office of an elementary school in a rural area, and to provide the data for the planning of construction of a nurse's office convenient for students to use after grasping the regional characteristics. The methods of this research include the interview and the survey conducted to the heath teachers after visiting 20 nurse's offices in 13 eups and myeons, and examined and analyzed the differences between the characteristics and the utilization of the nurse's office of elementary schools in an urban area and the nurse's office of an elementary school. The nurse's offices of the elementary schools in Cheongwon, a rural area, are worse in access to health care institutions and in the connection to the placement than those of the elementary schools in urban areas, so most of eups and myeons were not allowed for easy access to medical service. Depending on the bad personal surroundings of each elementary student, mental stress and the lack of heal care of each student should be taken care of along with the educating of the parents and the children. Also because of the difficulties in access to the health care institutions, it is suggested that a lot of support and interest should be provided for the nurse's offices and that a lot of changes with functions should occur to the nurse's offices so that the nurse's office of an elementary school can play the role as a local health care institution. Besides, the health teachers also should be able to provide more professional medical services by taking in-service training courses.

Hash based Secure RFID Authentication Protocol for User Privacy Protection (사용자 프라이버시 보호를 위한 해쉬 기반의 안전한 RFID 인증 프로토콜)

  • Lee, Han-Kwon;Cho, Tae-Kyung;Yoo, Hyun-Joong;Park, Byoung-Soo
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.8 no.1
    • /
    • pp.33-40
    • /
    • 2007
  • RFID, a non-contact wireless identification technology is being noticed as a technology to alternate barcode system in distribution industry and general industry. Despite of merit of RFID, there are issues to be solved for practical use. One of them, which are most important, is resolution of user's information protection. RFID system without security function bears risk exposing personal data and user's privacy. In this paper, we propose mutual authentication protocol for RFID system in order to solve this security issue. This study aimed to protect user's privacy by providing dynamic ID for tag through authentication protocol safe from security threats. Information being transmitted between backend, reader and tag has no direct connection with ID of tag, and it conducts authentication process using one-way hash function, which prevents attacker's obtaining of tag information using information being transmitted.

  • PDF

A Empirical Study on Applying Ubiquitous Technology for Gas Safety Management (U-기반 가스안전관리의 기술을 적용을 위한 실증적 연구)

  • Oh, Jeong-Seok;Choi, Kyung-Suhk;Kwon, Jeong-Rock
    • Journal of the Korean Institute of Gas
    • /
    • v.12 no.2
    • /
    • pp.63-68
    • /
    • 2008
  • The ubiquitous technology is capable of innovating various area to constructing intelligent and network to all objects. This technology can construct network infrastructure to facilities for applying legacy industry and need to develop intelligent service that analyze context-aware through network. This paper derive and propose the introduction range of ubiquitous technology, which should be testified and analyzed network, and studied the detection and analysis of information for managing gas facilities. We investigate the current status of gas facilities and automatic reading system, testing and analyzing wireless personal area network and mobile communication by scalability, self-configuration, connection in underground. Furthermore, we propose modelization method for intelligent service and derive the introduction range for applying ubiquitous technologies for managing gas facilities.

  • PDF

A Proposal of Complex Communication Structure on Public Memorial Space by Study of Interface System (공공기념공간의 인터페이스 분석을 통한 복합적 소통구조 제안)

  • Lee, Seung-Hwan;Kim, Young-Chan
    • The Journal of Art Theory & Practice
    • /
    • no.8
    • /
    • pp.145-162
    • /
    • 2009
  • Space is a phenomenon which is formed in the connection between environment and human beings and public space is built by a complex phenomenon of space. Each and every individual is connected to an environment and these individuals are connected to one another. A public commemorative space means souvenir and memorial which is designed for special purpose of remembrance of a specific area. One of the purposes of public commemorative space is memorial and that is the reason of doing public relation and educating citizens over the transom. However, the meaning and value of commemorative subject cannot be delivered or stuffed one-sidely. The target who receives messages from public commemorative space has reinterpreted the messages of his own with his personal experience, knowledge and sensitivity. It results in an unexpected phenomenon of public commemorative space. Therefore, public commemorative space should be considered in a mutual communication structure rather than a purpose of memorial itself. Korean public commemorative space is focused on public relation and education for memorial. In other words, Korean public commemorative space is neglected its important possibility of the productive chapter of mutual communication. The mutual communication structure of public commemorative space which is based on variety and haecceity is ripped up by the message over the transom. It destroys the self-control and creativity of public commemorative space, and derives a negative result. By studying the function and meaning of public commemorative space, we should make the best use of it.

  • PDF

Development of Online Education Program and Feasibility Study on Cyberbullying Response in Schools since COVID-19 (코로나-19 이후 증가한 학교 사이버폭력 대응에 대한 온라인 교육 프로그램 개발과 타당성 연구)

  • Choi, Eunsun;Park, Namje
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.31 no.5
    • /
    • pp.1071-1082
    • /
    • 2021
  • COVID-19 has changed a lot in our daily lives, where school classes and remote classes have been combined or converted to remote classes. Many students spent more time online, and cyberbullying, such as indiscriminate disclosure of their personal information, bullying of their classmates online, increased. In this paper, we propose an online education program as a countermeasure against cyberbullying. This program is designed for elementary, middle, and high school students and can also be used for informatics or ethics classes in the 2015 curriculum. The proposed program is divided into four major themes: 'Cyberbullying,' 'Information Security,' 'Cyber Crime,' and 'Language Violence,' and is divided into a total of ten topics according to its connection. It was organized to teach the topics evenly by grade. Also, the program's feasibility was verified by experts on the selection of educational contents and organizing of contents. In the future, it will be necessary to apply for this program and conduct an effectiveness analysis to measure whether it has effectively contributed to the decrease in cyberbullying rates among students and the improvement of coping skills.

A Study for Implementation of System for protecting Privacy data from IoT Things (IoT 장치의 개인정보 데이터 보호 시스템 구현에 관한 연구)

  • Kim, Seon Uk;Hong, Seong Eun;Bang, Jun Il;Kim, Hwa Jong
    • Smart Media Journal
    • /
    • v.10 no.2
    • /
    • pp.84-91
    • /
    • 2021
  • In the EU GDPR, when collecting personal information, the right of the information subject(user) to consent or refuse is given the highest priority. Therefore, the information subject must be able to withdraw consent and be forgotten and claim the right at any time. Especially, restricted IoT devices(Constrained Node) implement the function of consent of the data subject regarding the collection and processing of privacy data, and it is very difficult to post the utilization content of the collected information. In this paper, we designed and implemented a management system that allows data subjects to monitor data collected and processed from IoT devices, recognize information leakage problems, connect, and control devices. Taking into account the common information of the standard OCF(Open Connectivity Foundation) of IoT devices and AllJoyn, a device connection framework, 10 meta-data for information protection were defined, and this was named DPD (Data Protection Descriptor). we developed DPM (Data Protection Manager), a software that allows information subjects to manage information based on DPD.

The effcient management strategies local government for Broad Exchange - focusing on case of china office - (국제교류협력 확대를 위한 지방정부의 효율적인 해외사무소 운영방안에 관한 연구 - 중국 사무소 사례를 중심으로 -)

  • Jang, Jung Jae
    • International Area Studies Review
    • /
    • v.20 no.2
    • /
    • pp.235-256
    • /
    • 2016
  • The local governments have utilized overseas offices of businesses within their jurisdiction as a forward operating base to discover and expand the overseas market. In addition, overseas offices of businesses are expected to play a big role in economic, cultural, and personal exchange, and collection of information regarding overseas market trends. Recently, inviting foreign capital, promoting cities, and attracting foreign tourists are being done through them. Since foreign capital invitation has an effect on creating jobs, the population influx, increasing local government revenues, there is a high degree of competition for it among local governments. Also, while local governments have set out to actively attract foreign tourists through city promotion marketing and developing products in connection with their region, overseas offices of businesses are playing a major role in doing the job. However, due to low performance satisfaction against the budget invested, there have been criticisms that they need to improve efficiency. As a result, each local government is faced with a task to seek efficient operational plans since overseas offices of businesses in each local government are expected to play a bigger role in trade support and international exchanges.

Exploring the Factors of Decision Making by the Psychological Power of Smartphone (스마트폰의 심리적 파워에 의한 의사결정 요인 탐색)

  • Park, So-young;Kim, Mincheol
    • Journal of Digital Convergence
    • /
    • v.17 no.8
    • /
    • pp.197-204
    • /
    • 2019
  • The purpose of this study was to explore factors that influence decision making for smartphone users. This study sets intimacy, personal connection, use & dependence, familiarity and expertise, efficacy and effectance, self-identity, and control as independent variables and sets decision making as dependent variables. In this study, 200 smartphone users were collected and analyzed through questionnaires, and Smartpls 3.0 was used to understand the impact between variables. Five of the six factors that affected smartphone users' psychological strength were analyzed to have affected their decision-making. In addition, we examined the relationship between psychological effects and use period as a control variable. The results of this study can be used as a basis for the consumer behavior of smartphone devices in the development of smartphone devices.

A Study on the Security Enhancement for Personal Healthcare Information of CloudHIS (CloudHIS의 개인 의료정보를 위한 보안강화에 관한 연구)

  • Cho, Young-Sung;Chung, Ji-Moon;Na, Won-Shik
    • Journal of Convergence for Information Technology
    • /
    • v.9 no.9
    • /
    • pp.27-32
    • /
    • 2019
  • Along with the growth of u-Healthcare, we propose a security enhancement based on network separation for CloudHIS with for handling healthcare information to cope with cyber attack. To protect against all security threats and to establish clear data security policies, we apply desktop computing servers to cloud computing services for CloudHIS. Use two PCs with a hypervisor architecture to apply physical network isolation and select the network using KVM switched controller. The other is a logical network separation using one PC with two OSs, but the network is divided through virtualization. Physical network separation is the physical connection of a PC to each network to block the access path from both the Internet and the business network. The proposed system is an independent desktop used to access an intranet or the Internet through server virtualization technology on a user's physical desktop computer. We can implement an adaptive solution to prevent hacking by configuring the CloudHIS, a cloud system that handles medical hospital information, through network separation for handling security enhancement.

Telemedicine Software Application

  • UNGUREANU, Ovidiu Costica;POPESCU, Marius-Constantin;CIOBANU, Daniela;UNGUREANU, Elena;SARLA, Calin Gabriel;CIOBANU, Alina-Elena;TODINCA, Paul
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.2
    • /
    • pp.171-180
    • /
    • 2021
  • Currently, hospitals and medical practices have a large amount of unstructured information, gathered in time at each ward or practice by physicians in a wide range of medical branches. The data requires processing in order to be able to extract relevant information, which can be used to improve the medical system. It is useful for a physician to have access to a patient's entire medical history when he or she is in an emergency situation, as relevant information can be found about the patient's problems such as: allergies to various medications, personal history, or hereditary collateral conditions etc. If the information exists in a structured form, the detection of diseases based on specific symptoms is much easier, faster and with a higher degree of accuracy. Thus, physicians may investigate certain pathological profiles and conduct cohort clinical trials, including comparing the profile of a particular patient with other similar profiles that already have a confirmed diagnosis. Involving information technology in this field will change so the time which the physicians should spend in front of the computer into a much more beneficial one, providing them with the possibility for more interaction with the patient while listening to the patient's needs. The expert system, described in the paper, is an application for medical diagnostic of the most frequently met conditions, based on logical programming and on the theory of probabilities. The system rationale is a search item in the field basic knowledge on the condition. The web application described in the paper is implemented for the ward of pathological anatomy of a hospital in Romania. It aims to ease the healthcare staff's work, to create a connection of communication at one click between the necessary wards and to reduce the time lost with bureaucratic proceedings. The software (made in PHP programming language, by writing directly in the source code) is developed in order to ease the healthcare staff's activity, being created in a simpler and as elegant way as possible.