• Title/Summary/Keyword: personal development

Search Result 2,895, Processing Time 0.029 seconds

A Study on development of privacy indicators in the context of cloud service level agreement (클라우드 개인정보보호를 위한 SLA 지표 개발)

  • Kim, Jungduk;Park, Dae-Ha;Youm, Heung-Youl
    • Journal of Digital Convergence
    • /
    • v.13 no.2
    • /
    • pp.115-120
    • /
    • 2015
  • As the cloud services, the underlying technology of the digital convergence environment, have been widely adopted in the business, personal information protection has been recognized as one of the major issues to resolve. When cloud services are used to process the personal information, the personal information protection law speculates the establishment of a contract or service level agreement(SLA). This research presents 7 privacy indicators and 13 metrics which can be included in cloud SLA, based on the analysis of related regulation and standards and the SMART(Specific, Measurable, Action-oriented, Relevant and Timely) model. The proposed indicators are examined using the Focus Group Interview method in terms of materiality and feasibility. The results show that all the proposed indicators are meaningful and useful.

The Experience of Miners Relocated to Alternative Positions due to Silicosis in the Andean of CODELCO, Chile, 2010

  • Delgado, Diemen;Aguilera, Maria De Los Angeles;Delgado, Fabian;Rug, Ani
    • Safety and Health at Work
    • /
    • v.3 no.2
    • /
    • pp.140-145
    • /
    • 2012
  • Objectives: To understand the personal experiences of mine workers that have experienced job relocation due to silicosis at the Andina Division of Corporaci$\acute{o}$n Nacional del Cobre (CODELCO), Chile. The purpose of the study was to provide useful information for the development of new local, business and public policies for the care of workers with silicosis. Methods: A qualitative study based on a practical case study of 5 workers. The information was collected by means of structured individual interviews. The method of analysis was phenomenology. Results: The corporal axis was the most commented upon. It included awareness of the illness, body pains, fatigue, and antagonistic mood disorders (sadness, or the difficulty in finding meaning in life). As far as personal relationships, there was evidence of strong relationships with family, coworkers and friends, as well as extended family. Over all, the experience of relocation was positive with periods of impatience and uncertainty. The job reassignment provided a new and pleasant context for the relocated workers and in the process improved their perception of their quality of life. Conclusions: A multidisciplinary team should attend mine workers relocated because of silicosis by addressing the mental and physical aspects of their disease, along with the integral participation of close family members. It is suggested that this investigation be maintain over time to record the personal experiences in the medium-term, adding new cases with the intention of shedding more light on the phenomenon being studied. As a preventive measure, continual workshops are needed on the proper use of respiratory protection in addition, a group of monitors is required.

Development of a Smart Oriental Medical System Using Security Functions

  • Hong, YouSik;Yoon, Eun-Jun;Heo, Nojeong;Kim, Eun-Ju;Bae, Youngchul
    • International Journal of Fuzzy Logic and Intelligent Systems
    • /
    • v.14 no.4
    • /
    • pp.268-275
    • /
    • 2014
  • In future, hospitals are expected to automatically issue remote transcriptions. Many general hospitals are planning to encrypt their medical database to secure personal information as mandated by law. The electronic medical record system, picture archiving communication system, and the clinical data warehouse, amongst others, are the preferred targets for which stronger security is planned. In the near future, medical systems can be assumed to be automated and connected to remote locations, such as rural areas, and islands. Connecting patients who are in remote locations to medical complexes that are usually based in larger cities requires not only automatic processing, but also a certain amount of security in terms of medical data that is of a sensitive and critical nature. Unauthorized access to patients' transcription data could result in the data being modified, with possible lethal results. Hence, personal and sensitive data on telemedicine and medical information systems should be encrypted to protect patients from these risks. Login passwords, personal identification information, and biological information should similarly be protected in a systematic way. This paper proposes the use of electronic acupuncture with a built-in multi-pad, which has the advantage of being able to establish a patient's physical condition, while simultaneously treating the patient with acupuncture. This system implements a sensing pad, amplifier, a small signal drive circuit, and a digital signal processing system, while the use of a built-in fuzzy technique and a control algorithm have been proposed for performing analyses.

A User Privacy Protection Scheme based on Password through User Information Virtuality in Cloud Computing (클라우드 컴퓨팅에서 패스워드기반의 사용자 정보 가상화를 통한 사용자 프라이버시 보장 기법)

  • Jeong, Yoon-Su;Lee, Sang-Ho
    • Journal of Convergence Society for SMB
    • /
    • v.1 no.1
    • /
    • pp.29-37
    • /
    • 2011
  • As the area of informatization has been expanding followed by the development of information communication technology, cloud computing which can use infra sources like server, storage, and network in IT area as an efficient service whenever and wherever skyrockets. But users who use cloud computing technology may have some problems like exposure personal data, surveillance on person, and process on commercial purpose on their personal data. This paper proposes a security technique which protect user's privacy by creating imaginary user information not to be used by other people. The proposed technique virtualizes user's information as an anonymity value not to let other people know user's identity by combining PIN code with it and guarantees user's anonymity. Also it can manage and certificate personal information that is important in cloud computing, so that it can solve security problem of cloud computing which centers all informations. Therefore this paper can assist upgrading of the level of information of poor SMBs through safe use of cloud computing.

  • PDF

Concerns of Home Economics Teachers on Ohio's Work and Family Life Curriculum (미국 오하이오주의 실천적 문제 중심 모형을 적용한“일과 가족생활 교육과정”에 대한 가정과 교사의 관심도)

  • 채정현
    • Journal of the Korean Home Economics Association
    • /
    • v.34 no.4
    • /
    • pp.327-343
    • /
    • 1996
  • The objective of this study were 1) to determine the stages of concern of HE teachers about the practical problem-based curriculum approach, as illustrated by the Ohio's Work and Family Life Curriculum (W&FLC); 2) to determine the relationships between home economics (HE) teacher's stages of concern about W&FLC and personal and professional characteristics of HE teachers; and 3) to determine aspects of interest about the practical problem-based curriculum approach, such as the Ohio W&FLC. Respondents in this study were 225 HE teachers. The data were collected during the in-service teacher training sessions after presentation about W&FLC. Concerns Based Adoption Model (CBAM) was modified to provide a conceptual framework for this study. Frequencies, SD, mean, mode, range were used to determine the stages of concern of HE teachers. To determine the relationships between stages of concerns and personal and professional characteristics of HE teachers, coefficient of Chi-Square contingency tables was used. Content analysis was used to determine aspects of interest about the practical problem-bsed curriculum approach, such as W&FLC. The median of the stages of HE teachers' concerns about W&FLC was Stage 1, Information Stage. About 60% of HE teachers were interested in learning more details about W&FLC. Chi-square revealed no statistically significant relationships between stages of concerns about W&FLC and characteristics of HE teachers. Content analysis was used to determine aspects of interest about W&FLC of HE teachers. Nine categories were found: content, teaching strategies, implementation of the curriculum, philosophical framework, how to adopt W&FLC, resource materials, students' outcomes, in-service teacher training, and HE teacher organization. The majority of HE teachers were interested in relationships with family and others, resource management, family relationships, personal development, communication skill, family life, creating a self-identity, life planning, roles of family members, homemaking management, child care, and parenting.

  • PDF

Walking Environment Survey for Development of Specification on Personal Mobility (PM) Device for Elderly (고령자용 개인교통수단 개발 사양 정의를 위한 보행환경 조사)

  • Kim, Youngmin;Kim, Jisoo;Moon, Byeongsup
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.16 no.6
    • /
    • pp.156-168
    • /
    • 2017
  • Personal mobility (PM) can increase the mobility of individual, so that the elderly can be set as the target group for using PM because of relatively low walking ability to normal. In this study, we design PM device for elderly that can be used safely in the walking environment such as sidewalk. There are various obstacles in the walking environment, so the device must have mechanical performance to overcome all of them. In this study, we survey the status and level of obstacle factors in walking environment to determine the dynamic performance of the PM device for elderly. We check up several guidelines about walking facilities to define obstacle points for the device, establish field survey methodologies, and conduct field survey for some specific road sections. Based on the survey results, we confirm the possible problems that could arise when the dynamic performance of the device is selected based on the facility-related criteria. We also define the performance requirements for the device based on the requirements for electric wheelchair.

Molecular adaptation of the CREB-Binding Protein for aquatic living in cetaceans

  • Jeong, Jae-Yeon;Chung, Ok Sung;Ko, Young-Joon;Lee, Kyeong Won;Cho, Yun Sung;Bhak, Jong;Yim, Hyung-Soon;Lee, Jung-Hyun
    • Journal of Marine Bioscience and Biotechnology
    • /
    • v.6 no.2
    • /
    • pp.102-109
    • /
    • 2014
  • Cetaceans (whales, dolphins, and porpoises) are aquatic mammals that experienced drastic changes during the transition from terrestrial to aquatic environment. Morphological changes include streamlined body, alterations in the face, transformation of the forelimbs into flippers, disappearance of the hindlimbs and the acquisition of flukes on the tail. For a prolonged diving, cetaceans acquired hypoxia-resistance by developing various anatomical and physiological changes. However, molecular mechanisms underlying these adaptations are still limited. CREB-binding protein (CREBBP) is a transcriptional co-activator critical for embryonic development, growth control, metabolic homeostasis and responses to hypoxia. Natural selection analysis of five cetacean CREBBPs compared with those from 15 terrestrial relatives revealed strong purifying selection, supporting the importance of its role in mammals. However, prediction for amino acid changes that elicit functional difference of CREBBP identified three cetacean specific changes localized within a region required for interaction with SRCAP and in proximal regions to KIX domain of CREBBP. Mutations in CREBBP or SRCAP are known to cause craniofacial and skeletal defects in human, and KIX domain of CREBBP serves as a docking site for transcription factors including c-Myb, an essential regulator of haematopoiesis. In these respects, our study provides interesting insights into the functional adaptation of cetacean CREBBP for aquatic lifestyle.

A study on Password Input Method to Protect Keyboard hooking (Keyboard hooking 방지를 위한 패스워드 입력 방법 연구)

  • Kang, Seung-Gu;Kwak, Jin-Suk;Lee, Young-Sil;Lee, Hoon-Jae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2011.10a
    • /
    • pp.241-244
    • /
    • 2011
  • Recently, Due to development of Internet techniques, user suddenly increased that Used of Web services and with out constraints of place and time has been provided. typically, Web services used ID/Password authentication. User confirmed personal data Stored on Web servers after user authorized. web service provider is to provide variety security techniques for the protection personal information. However, recently accident has happened is the malicious attackers may capture user information such as users entered personal information through new keyboard hooking. In this paper, we propose a keyboard hooking protected password input method using CAPTCHA. The proposed password input method is based on entering the password using mouse click or touch pad on the CAPTCHA image. The mapping of CAPTCHA image pixels is random.

  • PDF

Healthcare service analysis using big data

  • Park, Arum;Song, Jaemin;Lee, Sae Bom
    • Journal of the Korea Society of Computer and Information
    • /
    • v.25 no.4
    • /
    • pp.149-156
    • /
    • 2020
  • In the Fourth Industrial Revolution, successful cases using big data in various industries are reported. This paper examines cases that successfully use big data in the medical industry to develop the service and draws implications in value that big data create. The related work introduces big data technology in the medical field and cases of eight innovative service in the big data service are explained. In the introduction, the overall structure of the study is mentioned by describing the background and direction of this study. In the literature study, we explain the definition and concept of big data, and the use of big data in the medical industry. Next, this study describes the several cases, such as technologies using national health information and personal genetic information for the study of diseases, personal health services using personal biometric information, use of medical data for efficiency of business processes, and medical big data for the development of new medicines. In the conclusion, we intend to provide direction for the academic and business implications of this study, as well as how the results of the study can help the domestic medical industry.

Suggestion of Elementary School Information Security Education Elements Based on Pipe Game to Understand the Principle of Data De-Identification (데이터 비식별화 원리의 이해를 위한 파이프 게임 기반 초등 정보보호 교육 요소 제언)

  • Kim, Jinsu;Kim, Sangchoon;Park, Namje
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.31 no.5
    • /
    • pp.1063-1070
    • /
    • 2021
  • The development of IT technology emphasizes the importance of training IT professionals, and the need for education for elementary and secondary education as well as adult education for training technical talent is expanding. In particular, information curriculum will be added as an essential course from the 2015 revised curriculum, and IT technology will be understood in the curriculum for elementary and secondary schools and will be required to develop applicability to solve problems based on understanding. Currently, research is under way to integrate IT technologies to provide new services, and if the use of personal information is required in the process, thorough security for the leakage of personal information is pre-empted. It also prevents the identification of personal information in the process of transmitting data to the outside world. In this paper, we propose a training method for elementary school subjects to understand the non-identification process that occurs in the process of transferring data using pipe games so that they can understand the principles of non-identification and develop applications to solve real-life problems.