• Title/Summary/Keyword: protection of personal information

Search Result 767, Processing Time 0.024 seconds

A Message Communication for Secure Data Communication in Smart Home Environment Based Cloud Service (클라우드 서비스 기반 스마트 홈 환경에서 안전한 데이터 통신을 위한 메시지 통신 프로토콜 설계)

  • Park, Jung-Oh
    • Journal of Convergence for Information Technology
    • /
    • v.11 no.7
    • /
    • pp.21-30
    • /
    • 2021
  • With the development of IoT technology, various cloud computing-based services such as smart cars, smart healthcare, smart homes, and smart farms are expanding. With the advent of a new environment, various problems continue to occur, such as the possibility of exposure of important information such as personal information or company secrets, financial damage cases due to hacking, and human casualties due to malicious attack techniques. In this paper, we propose a message communication protocol for smart home-based secure communication and user data protection. As a detailed process, secure device registration, message authentication protocol, and renewal protocol were newly designed in the smart home environment. By referring to the security requirements related to the smart home service, the stability of the representative attack technique was verified, and as a result of performing a comparative analysis of the performance, the efficiency of about 50% in the communication aspect and 25% in the signature verification aspect was confirmed.

De-Identified Face Image Generation within Face Verification for Privacy Protection (프라이버시 보호를 위한 얼굴 인증이 가능한 비식별화 얼굴 이미지 생성 연구)

  • Jung-jae Lee;Hyun-sik Na;To-min Ok;Dae-seon Choi
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.33 no.2
    • /
    • pp.201-210
    • /
    • 2023
  • Deep learning-based face verificattion model show high performance and are used in many fields, but there is a possibility the user's face image may be leaked in the process of inputting the face image to the model. Althoughde-identification technology exists as a method for minimizing the exposure of face features, there is a problemin that verification performance decreases when the existing technology is applied. In this paper, after combining the face features of other person, a de-identified face image is created through StyleGAN. In addition, we propose a method of optimizingthe combining ratio of features according to the face verification model using HopSkipJumpAttack. We visualize the images generated by the proposed method to check the de-identification performance, and evaluate the ability to maintain the performance of the face verification model through experiments. That is, face verification can be performed using the de-identified image generated through the proposed method, and leakage of face personal information can be prevented.

FAIR-Based BIA for Ransomware Attacks in Financial Industry (금융 산업에서 발생하는 랜섬웨어 공격에 대한 FAIR 기반의 손실 측정 모델 분석)

  • Yoon, Hyun-sik;Song, Kyung-hwan;Lee, Kyung-Ho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.27 no.4
    • /
    • pp.873-883
    • /
    • 2017
  • As Ransomware spreads, the target of the attack shifted from a single personal to organizations which lead attackers to be more intelligent and systematic. Thus, Ransomware's threats to domestic infrastructure, including the financial industry, have grown to a level that cannot be ignored. As a measure against these security issues, organizations use ISMS, which is an information protection management system. However, it is difficult for management to make decisions on the loss done by the security issues since amount of the damage done can not be calculated with just ISMS. In this paper, through FAIR-based loss measurement model based on scenario's to identify the extent of damage and calculate the reasonable damages which has been considered to be the problem of the ISMS, we identified losses and risks of Ransomeware on the financial industry and method to reduce the loss by applying the current ISMS and ISO 27001 control items rather than modifying the ISMS.

A Study on Improvement of Personal Information Protection in Apartment (공동주택의 개인정보보호 개선방안 연구)

  • Han, Choong-Hee;Park, Soon-Tai;Lee, Sang-Joon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.5
    • /
    • pp.1279-1292
    • /
    • 2018
  • An apartment house and an officetel are already our most important residential space generally. Among food, clothing and shelter, an apartment and an officetel are in charge of a shelter as the most fundamental in our life. To live in an apartment and an officetel, it is necessory for residents to write a lot of informations about themselves. Therefore massive privacy files about apartment's residents is inevitable and it is managing in its own way. A privacy accident in an apartment houses would be a big society problem. This study examined 'tenant list' to find out what it collects and what it's problems are and proposed some vairous measures about the privacy improvements like items reduction & consent process improvement in an apartment house and an officetel from privacy laws perspective.

Development of Safety Equipment Database for Effective Management in Wooden Cultural Heritage (효율적 목조 문화재 방재관리를 위한 방재설비 데이터베이스구축)

  • Kim, Donghyun;Lee, Ji-hee;Yi, Myungsun
    • Fire Science and Engineering
    • /
    • v.30 no.5
    • /
    • pp.46-53
    • /
    • 2016
  • Wooden cultural heritage is vulnerable to fire, flooding and other hazards. Therefore, an effective disaster prevention and mitigation strategy for them should include preventive measures in a full range of management. These were used to construct a disaster safety system for 508 wooden cultural heritage items by the Cultural Heritage Administration. According to the type of ownership and administration, national and public heritage is controlled by personal management or commissional management. Among them, it is arranged with the safety security institute for important cultural properties. In addition, they have problems of field management with no computerization about the management information for a disaster facility system. Therefore, this study aimed to develop a DB platform that can share information with many users who need to manage cultural heritage. Through a field survey, it is feasible to develop a disaster facility system to provide the information, such as the main data, quantity and location.

Passwordless Protection for Private Key Using USIM Information (USIM 정보를 활용한 패스워드리스 방식의 개인키 보호 방안)

  • Kim, Seon-Joo
    • The Journal of the Korea Contents Association
    • /
    • v.17 no.6
    • /
    • pp.32-38
    • /
    • 2017
  • Despite the opinion that certificate is useless, half of the population in Korea (approx. 35 million) get an certificate, and use it for internet banking, internet shopping, stock trading, and so on. Most users store their certificates on a usb memory or smartphone, and certificates or passwords stored on such storage media can be easily attacked and used to disguise as legitimate users. Due to these security problem of certificate, a various authentication technologies has been proposed such as smartphone owner authentication using SMS, and a personal authentication using biometric authentication. However, a safe technique is not presented yet without user password, and certificate. In this paper, I proposed a method to secure certificate/private key without a user password using a combination of USIM card and smartphone's information. Even if a hacker gets the user password, the certificate, and the private key, he can not use the certificate. User do not need to remember complex password which is a combination of alphabetic / numeric / special characters, and use his certificate safely.

Survey of Institutional Review Board Risk Level Classification of Clinical Trials Among Korean University Hospitals (임상시험심사위원회(Institutional Review Board)의 임상시험에 대한 위험평가 분류조사연구)

  • Lee, Sun Ju;Kang, Su Jin;Maeng, Chi Hoon;Shin, Yoo Jin;Yoo, Soyoung
    • The Journal of KAIRB
    • /
    • v.4 no.2
    • /
    • pp.36-41
    • /
    • 2022
  • Purpose: The purpose of this study is to evaluate how university hospital Institutional Review Boards (IRBs) in Korea classify risk when reviewing clinical trial protocols. Methods: IRB experts (IRB chairman, vice chairman, IRB administrator) in the university hospitals obtaining a Human research protection program (HRPP) or IRB accreditation in Korea were asked to fill out the Google Survey from September 1, 2020 to October 10, 2020. Result: Among the 23 responder hospitals, 8 were accredited by the American Association for Human Research Protection Program (AAHRPP) and 8 were accredited by the HRPP of Ministry of Food and Drug Safety (MFDS). Seven were accredited by Forum for Ethical Review Committees in Asia and the Western Pacific or Korea National Institution for Bioethics Policy. Thirteen of 23 hospitals (56.5%) had 4 levels (less than minimal, low, moderate, high risk), 4 hospitals had 3 levels (less than, slightly over, over than minimal risk), 1 hospital had 5 levels (4 levels plus required data safety monitoring board), and 1 hospital had 2 levels (less than, over than minimal risk) risk classification system. Thirteen of 23 hospitals (56.5%) had difficulty classifying the risk levels of research protocols. Fourteen hospitals (60.9%) responded that different standards among hospitals for risk level determination associated with clinical trials will affect the subject protection. Six hospitals (26.1%) responded that it will not. Three hospitals (13.0%) responded that it will affect the beginning of the clinical trial. To resolve differences in standards between hospitals, 14 hospitals (60.9%) responded that either the Korean Association of IRB or MFDS needs to provide a guideline for risk level determination in clinical trials: 5 hospitals (21.7%) responded education for IRB members and researchers is needed; 3 hospitals (13.0%) responded that difference among institutions needs to be acknowledged; and 1 hospital (4.3%) responded that there needs to be communication among IRB, investigator, and sponsor. Conclusion: After conducting a nationwide survey on how IRB in university hospital determines risk during review of clinical trials, it is reasonable to use 4-level risk classification (less than minimal, low, moderate, high risk); the most utilized method among hospitals. Moreover, personal information and conflict of interest associated with clinical trials have to be considered when reviewing clinical trial protocols.

  • PDF

Patient Safety Culture Among Dental Hygienists and Perception of Infection Control Activities (치과위생사의 환자안전문화인식과 감염관리활동)

  • Jeong, Yong-Ju;Lee, Sun-Mi
    • Journal of The Korean Society of Integrative Medicine
    • /
    • v.10 no.3
    • /
    • pp.161-172
    • /
    • 2022
  • Purpose : The study was to promote patient safety by analyzing the effect of dental hygienist's perception of patient safety culture on infection control activities. Methods : The study is based on a survey of 210 dental hygienists in total working in dental settings. To find out infection control activities according to patient safety culture awareness, there were 6 general characteristics, 3 teamwork within the department, 2 infection control systems, 4 surface management, 9 equipment washing, disinfection, and laundry management, 4 infectious wastes, and 3 personal protection phrases.The data was analyzed using the SPSS version 20.0, and p<.05 was adopted to decide on significance. Results : The longer dental hygienists have worked n the dental settings, the more active they become in infection control activities. Among the different types of dental care settings, general (university) hospitals had the largest number of infection control activities, followed by dental clinics, and network dental clinics, in descending order. The dental settings possessing a higher number of dental hygienists were found to conduct more infection control activities than other dental settings. In addition, it was found that when a dental setting adopts a patient safety policy across all the units in the hospital, more systems and procedures for patient safety tend to be established, and that stricter management response to error leads to improvement of infection control activities. Conclusion :In order to enhance infection control activities, infection control activity programs should develop and implement periodic reinforcement of infection control education. regular monitoring of infection control activities.

A Study on the Artificial Intelligence Ethics Measurement indicators for the Protection of Personal Rights and Property Based on the Principles of Artificial Intelligence Ethics (인공지능 윤리원칙 기반의 인격권 및 재산보호를 위한 인공지능 윤리 측정지표에 관한 연구)

  • So, Soonju;Ahn, Seongjin
    • Journal of Internet Computing and Services
    • /
    • v.23 no.3
    • /
    • pp.111-123
    • /
    • 2022
  • Artificial intelligence, which is developing as the core of an intelligent information society, is bringing convenience and positive life changes to humans. However, with the development of artificial intelligence, human rights and property are threatened, and ethical problems are increasing, so alternatives are needed accordingly. In this study, the most controversial artificial intelligence ethics problem in the dysfunction of artificial intelligence was aimed at researching and developing artificial intelligence ethical measurement indicators to protect human personality rights and property first under artificial intelligence ethical principles and components. In order to research and develop artificial intelligence ethics measurement indicators, various related literature, focus group interview(FGI), and Delphi surveys were conducted to derive 43 items of ethics measurement indicators. By survey and statistical analysis, 40 items of artificial intelligence ethics measurement indicators were confirmed and proposed through descriptive statistics analysis, reliability analysis, and correlation analysis for ethical measurement indicators. The proposed artificial intelligence ethics measurement indicators can be used for artificial intelligence design, development, education, authentication, operation, and standardization, and can contribute to the development of safe and reliable artificial intelligence.

Physiotherapy Management for COVID-19 (코비드-19와 물리치료적 접근)

  • Han, Yun-A;Roh, Hyo-Lyun
    • Journal of the Korean Society of Physical Medicine
    • /
    • v.15 no.3
    • /
    • pp.135-147
    • /
    • 2020
  • PURPOSE: The purpose of this paper is to provide a review of physiotherapy intervention for patients with COVID-19 during their hospital admission and post-discharge. METHODS: The recommendations and guidelines of physiotherapy management, medical management, and general information of the WHO, Australian Physiotherapist, European Respiratory Society, British Thoracic Society, and American Thoracic Society were reviewed. RESULTS: This paper contains general information on COVID-19, including medical management, and the importance of physiotherapy approaches including an assessment of the patients' function, such as the 6-minute walking test, five sit to stand or sit to stand for one minute to measure their function as their recovery journey. The patients' quality of life, anxiety, and depression should be considered. Physiotherapy management should be based on an assessment of the patient's presenting impairments, including inclusion and exclusion of physiotherapy intervention. The paper also approaches step by step with the disease progress, from an intensive care unit, the general ward in the acute phase, through to the rehabilitation ward if needed, and post-discharge as an outpatient.. CONCLUSION: The paper has a limitation due to the unknown factor of the natural history of COVID-19. Depending on the patients' recovery journey and the rehabilitation needed, any physiotherapy interventions should focus on what the patients' need on their journey to recovery, e.g., pulmonary, cardiac, neurological, and general rehabilitation. In addition, applying personal protection equipment for treating physiotherapists is a mandatory requirement because this protects from the transmission of COVID-19.