• Title/Summary/Keyword: protection of personal information

Search Result 762, Processing Time 0.025 seconds

A System of Audio Data Analysis and Masking Personal Information Using Audio Partitioning and Artificial Intelligence API (오디오 데이터 내 개인 신상 정보 검출과 마스킹을 위한 인공지능 API의 활용 및 음성 분할 방법의 연구)

  • Kim, TaeYoung;Hong, Ji Won;Kim, Do Hee;Kim, Hyung-Jong
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.5
    • /
    • pp.895-907
    • /
    • 2020
  • With the recent increasing influence of multimedia content other than the text-based content, services that help to process information in content brings us great convenience. These services' representative features are searching and masking the sensitive data. It is not difficult to find the solutions that provide searching and masking function for text information and image. However, even though we recognize the necessity of the technology for searching and masking a part of the audio data, it is not easy to find the solution because of the difficulty of the technology. In this study, we propose web application that provides searching and masking functions for audio data using audio partitioning method. While we are achieving the research goal, we evaluated several speech to text conversion APIs to choose a proper API for our purpose and developed regular expressions for searching sensitive information. Lastly we evaluated the accuracy of the developed searching and masking feature. The contribution of this work is in design and implementation of searching and masking a sensitive information from the audio data by the various functionality proving experiments.

A Study on the Performance Model and Measurement Method of the SMEs Information Security Support Policy (중소기업 정보보호 지원 사업 성과모델 및 측정 방법에 관한 연구)

  • Bae, Young-Sik;Jang, Sang-Soo
    • The Journal of Society for e-Business Studies
    • /
    • v.26 no.4
    • /
    • pp.37-52
    • /
    • 2021
  • Due to the spread of COVID-19, it is rapidly changing from face-to-face to non-face-to-face work environments and is changing to a digital work environment that can be accessed anytime, anywhere, providing convenience to all lives. However, the number of breaches, personal information leakage, and technology leakage targeting SMEs that are vulnerable to security continues to increase. Accordingly, the government has been continuously promoting the information security consulting support project for SMEs every year since 2014. Therefore, this study intends to develop a performance model and measurement methodology for continuous and more systematic support and efficient management of information protection support projects in consideration of the importance of information security for SMEs. It is intended to be used as basic data when setting future operational directions and goals. The main method of this study is to derive performance models and indicators for SME information security support projects based on domestic literature, case studies, and survey results, utilize expert advice to verify the developed performance measurement indicators, and use pilot-test questionnaires. Conduct evaluation through surveys. Based on the verified indicators, we would like to present a performance model and measurement index for the information security support project for SMEs.

The Attitude of the Internet Users to Real-Name System and Suggestions for Measures to Handle Adverse Effects of Anonymity - Focused on Comparison between a Group of Experts and a Group of Non-Experts - (인터넷 이용자의 실명제에 대한 태도와 익명성의 역기능 대처 방안 - 관련 종사자 집단과 일반 사용자 집단의 비교를 중심으로 -)

  • Baek, Shin-Jung
    • The KIPS Transactions:PartC
    • /
    • v.17C no.4
    • /
    • pp.315-326
    • /
    • 2010
  • Today's society is being caught in a whirlpool of change that is not behind the Industrial Revolution, the Reformation and so on. Technological determinism is the most general perspective that explains information society. It is the belief that information technology will bring about a particular form of information society. It is the opinion that the sequence of change of technology is inevitable and asks for a particular social change(Kim, 2006). When technology asks for it, however, not only the degree of technological development but also the credibility of the degree of technological development plays an important role in changing a society. This study was implemented based on the opinion that social change and individual change can vary depending on the degree of trust of people in the Internet technology. This study analyzes preferences of real-name system depending on the credibility of anonymity on the Internet and its influences on the behaviors of users, focused on the survey on the difference between ordinary users and users related to the Internet business. It also suggests not only the potential and the appropriateness of anonymity on the Internet, but also measures to alleviate adverse effects of it. Lastly, the objective of this study is to offer a dispute of real-name system and the standard of the anonymity policy on web sites.

A self-portrait of the information society: An Arguments on the SNS users' Responsibilities

  • Seo, Ran-Sug
    • Journal of the Korea Society of Computer and Information
    • /
    • v.25 no.8
    • /
    • pp.159-172
    • /
    • 2020
  • Social networking services (SNS) are developing significantly with the Internet and smartphones. It's a friendly social media, but if you think deeply about it, you'll find that it has a variety of faces. It is a communication tool between users, a medium for delivering information, an infrastructure for providing applications, and a community where people with common interests gather. In recent years, business tools, shopping and payment methods are also being swallowed. The influence of the spread of SNS on the real world is also expanding, and the work being dealt with from a sociological perspective is also increasing. Also, if you pay attention to the technical aspects of SNS, it is composed of various technical elements, such as infrastructure that handles large-scale access, user interface that supports comfortable use, and big data analysis to understand people's behavior more deeply. However, I usually use it as usual. However, if you look through SNS, you can see that the situation is surprisingly profound and multifaceted. This study began by looking at the history and current status of SNS and attempted to find its status through comparison with other media. From the point of view of relationship with society, it can be a risk and legal issue when using SNS, such as crimes using bad social media or social media. It is also necessary to comment on the activities on SNS or the guidelines established by the operators. Therefore, various legal issues on SNS will be discussed. Also, as an example of using SNS, I will introduce an example of using SNS in disaster response. From a more technical point of view, you will receive commentary on SNS's network-based technology and SNS's information use, and these articles will help you understand and use SNS safely and help you further utilize or develop SNS.

A Study on the Research Trends in the Fourth Industrial Revolution in Korea Using Topic Modeling (토픽모델링을 활용한 4차 산업혁명 분야의 국내 연구 동향 분석)

  • Gi Young Kim;Dong-Jo Noh
    • Journal of the Korean BIBLIA Society for library and Information Science
    • /
    • v.34 no.4
    • /
    • pp.207-234
    • /
    • 2023
  • Since the advent of the Fourth Industrial Revolution, related studies have been conducted in various fields including industrial fields. In this study, to analyze domestic research trends on the Fourth Industrial Revolution, a keyword analysis and topic modeling analysis based on the LDA algorithm were conducted on 2,115 papers included in the KCI from January 2016 to August 2023. As a result of this study, first, the journals in which more than 30 academic papers related to the Fourth Industrial Revolution were published were digital convergence research, humanities society 21, e-business research, and learner-centered subject education research. Second, as a result of the topic modeling analysis, seven topics were selected: "human and artificial intelligence," "data and personal information management," "curriculum change and innovation," "corporate change and innovation," "education change and jobs," "culture and arts and content," and "information and corporate policies and responses." Third, common research topics related to the Fourth Industrial Revolution are "change in the curriculum," "human and artificial intelligence," and "culture arts and content," and common keywords include "company," "information," "protection," "smart," and "system." Fourth, in the first half of the research period (2016-2019), topics in the field of education appeared at the top, but in the second half (2020-2023), topics related to corporate, smart, digital, and service innovation appeared at the top. Fifth, research topics tended to become more specific or subdivided in the second half of the study. This trend is interpreted as a result of socioeconomic changes that occur as core technologies in the fourth industrial revolution are applied and utilized in various industrial fields after the corona pandemic. The results of this study are expected to provide useful information for identifying research trends in the field of the Fourth Industrial Revolution, establishing strategies, and subsequent research.

Effect of Demographic Factors, Radiation Knowledge Level, Radiation Awareness on Radiation Benefit by Hierarchical Regression Analysis Model (위계적 회귀분석 모형에 의한 인구학적 요인, 방사선 지식수준, 방사선 인식도가 방사선 이익성에 미치는 영향)

  • Myeong-Hoon Ji;Youl-Hun Seoung
    • Journal of radiological science and technology
    • /
    • v.46 no.5
    • /
    • pp.435-444
    • /
    • 2023
  • The purpose of this study was to analyze the factors that demographic factors, radiation knowledge level, and radiation awareness could be affecting the benefits of radiation. From July 2022 to July 2023, after receiving consent to participate by using the link of Naver through Social Network Service (SNS) for the general public, 312 people were surveyed by self-registration method without collecting personal information. The questionnaire consisted of a total of 25 questions following demographic factors (5 questions including age group by life cycle, sex, monthly household income, residence), radiation knowledge level (8 questions including basic physical, biological effects, radiation protection technology), radiation awareness (12 questions including risk, management, benefit). Independent sample T-test and ANOVA tests were performed for significant differences in the average radiation awareness between variables, and hierarchical regression was performed to identify influencing factors on radiation benefits. As a result, the benefit of radiation was significantly high among the radiation awareness, but the awareness of the danger of radiation was insufficient to the level of recognizing it as safe. Men had significantly higher awareness of radiation management and benefits than women, and the awareness of radiation management was significantly higher in the middle class with a monthly household income of 4.31 million won or more. The higher the knowledge level of radiation, the higher the awareness of the benefits of radiation. The factors that had a positive effect on radiation benefits were the high level of radiation knowledge and awareness of radiation management.

Human Rights in The Context of Digitalization. International-Legal Analysis

  • Panova, Liydmyla;Gramatskyy, Ernest;Kryvosheyina, Inha;Makoda, Volodymyr
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.5
    • /
    • pp.320-326
    • /
    • 2022
  • The use of the Internet has become commonplace for billions of people on the planet. The rapid development of technology, in particular, mobile gadgets, has provided access to communication anywhere, anytime. At the same time, there are growing concerns about the behavior of people on the Internet, in particular, towards each other and social groups in general. This raises the issue of human rights in today's information society. In this study, we focused on human rights such as the right to privacy, confidentiality, freedom of expression, the right to be forgotten, etc. We point to some differences in this regard, in particular between the EU, etc. In addition, we describe the latest legal regulation in this aspect in European countries. Such methods as systemic, factual, formal and legal, to show the factors of formation and development of human rights in the context of digitalization were used. The authors indicate which of them deserve the most attention due to their prevalence and relevance. Thus, we concluded that the technological development of social communications has laid the groundwork for a legal settlement of privacy and opinion issues on the Internet. Simultaneously, jurisdictions address issues on every aspect of human rights on the Internet, based on previous norms, case law, and principles of law. It is concluded that human rights legislation on the Internet will continue to be actively developed to ensure a balance of private and public interests, safe online access and unimpeded access to it.

A Study on Vehicle License Plate Recognition System through Fake License Plate Generator in YOLOv5 (YOLOv5에서 가상 번호판 생성을 통한 차량 번호판 인식 시스템에 관한 연구)

  • Ha, Sang-Hyun;Jeong, Seok Chan;Jeon, Young-Joon;Jang, Mun-Seok
    • Journal of the Korean Society of Industry Convergence
    • /
    • v.24 no.6_2
    • /
    • pp.699-706
    • /
    • 2021
  • Existing license plate recognition system is used as an optical character recognition method, but a method of using deep learning has been proposed in recent studies because it has problems with image quality and Korean misrecognition. This requires a lot of data collection, but the collection of license plates is not easy to collect due to the problem of the Personal Information Protection Act, and labeling work to designate the location of individual license plates is required, but it also requires a lot of time. Therefore, in this paper, to solve this problem, five types of license plates were created using a virtual Korean license plate generation program according to the notice of the Ministry of Land, Infrastructure and Transport. And the generated license plate is synthesized in the license plate part of collectable vehicle images to construct 10,147 learning data to be used in deep learning. The learning data classifies license plates, Korean, and numbers into individual classes and learn using YOLOv5. Since the proposed method recognizes letters and numbers individually, if the font does not change, it can be recognized even if the license plate standard changes or the number of characters increases. As a result of the experiment, an accuracy of 96.82% was obtained, and it can be applied not only to the learned license plate but also to new types of license plates such as new license plates and eco-friendly license plates.

Designing a Longitudinal Database for Cohort Construction in Medical Education (의학교육의 코호트 구축을 위한 종단 데이터베이스 설계방안 연구)

  • Hanna Jung;Hae Won Kim;I Re Lee;Shinki An
    • Korean Medical Education Review
    • /
    • v.25 no.2
    • /
    • pp.84-101
    • /
    • 2023
  • Longitudinal data can provide important evidence with the potential to stimulate innovation and affect policies in medical education and can serve as a driving force for further developments in medical education through evidence-based decisions. Tracking and observing cohorts of students and graduates using longitudinal data can be a way to link the past, present, and future of medical education. This study reviewed practical methods and technical, administrative, and ethical considerations for the establishment and operation of a longitudinal database and presented examples of longitudinal databases. Cohort study design methods and previous examples of research using longitudinal databases to explore major topics in medical education were also reviewed. The implications of this study are as follows: (1) a systematic design process is required to establish longitudinal data, and each university should engage in ongoing deliberation about this issue; (2) efforts are needed to alleviate "survey fatigue" among respondents and reduce the administrative burden of those conducting data collection and analysis; (3) it is necessary to regularly review issues of personal information protection, data security, and ethics regarding the survey respondents; and (4) a system should be established that integrates and manages a longitudinal database of medical education at the national level. The hope is that establishing longitudinal data and cohorts at individual medical schools will not be a temporary phenomenon, but rather that they will be well utilized at the national level to innovate and implement ongoing changes in medical education.

Analysis of University Cafeteria Safety Based on Pathfinder Simulation

  • Zechen Zhang;Jaewook Lee;Hasung Kong
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.16 no.2
    • /
    • pp.209-217
    • /
    • 2024
  • Recent years have seen a notable increase in fire incidents in university cafeterias, yet the social attention to these occurrences remains limited. Despite quick responses to these incidents preventing loss of life, the need for large-scale evacuation in such high foot traffic areas can cause significant disruptions, economic losses, and panic among students. The potential for stampedes and unpredictable damage during inadequate evacuations underscores the importance of fire safety and evacuation research in these settings. Previous studies have explored evacuation models in various university environments, emphasizing the influence of environmental conditions, personal characteristics, and behavioral patterns on evacuation efficiency. However, research specifically focusing on university cafeterias is scarce. This paper addresses this gap by employing Pathfinder software to analyze fire spread and evacuation safety in a university cafeteria. Pathfinder, an advanced emergency evacuation assessment system, offers realistic 3D simulations, crucial for intuitive and scientific evacuation analysis. The studied cafeteria, encompassing three floors and various functional areas, often exceeds a capacity of 1500 people, primarily students, during peak times. The study includes constructing a model of the cafeteria in Pathfinder and analyzing evacuation scenarios under different fire outbreak conditions on each floor. The paper sets standard safe evacuation criteria (ASET > RSET) and formulates three distinct evacuation scenarios, considering different fire outbreak locations and initial evacuation times on each floor. The simulation results reveal the impact of the fire's location and the evacuation preparation time on the overall evacuation process, highlighting that fires on higher floors or longer evacuation preparation times tend to reduce overall evacuation time.In conclusion, the study emphasizes a multifaceted approach to improve evacuation safety and efficiency in educational settings. Recommendations include expanding staircase widths, optimizing evacuation routes, conducting regular drills, strengthening command during evacuations, and upgrading emergency facilities. The use of information and communication technology for managing emergencies is also suggested. These measures collectively form a comprehensive framework for ensuring safety in educational institutions during fire emergencies.