• Title, Summary, Keyword: sun protection use

Search Result 128, Processing Time 0.039 seconds

The Effects of Sunscreen Use Patterns and Awareness by Type on Product Satisfaction (자외선 차단제 유형에 따른 사용 인식 요인과 재구매 및 만족도 조사에 관한 연구)

  • Lee, Na-Young;You, Seon-Hee;Li, Shun-Hua
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.20 no.5
    • /
    • pp.363-371
    • /
    • 2019
  • In this study, 340 Korean women were surveyed to analyze the impact of the type of sunscreen and use status on the satisfaction of products and resale. Studies have shown that indoor activity is higher than outdoor activity, and both simple and complex sunscreen is often used to compensate for skin tone. Out of single sunscreen, sun cream was used and air cushion was used a lot. Although product usability and UV protection indices were important factors in purchasing, 30% experienced side effects while product satisfaction and willingness to repurchase were high. The recognition of safety, Effectiveness, convenience, usability, satisfaction, and repurchase were all higher than that of composite UV-blocking products, and among subcomponents of product usage recognition, the level of convenience, efficacy, usability, and safety affected satisfaction and repurchase in order. Consequently, the perception of simple UV protection products was higher when using products for UV protection, and its convenience had a significant impact on satisfaction and resale.

A Policy-based Privacy Authorization System in the Internet Environment (인터넷 환경용 정책 기반 프라이버시 인가 시스템)

  • Choi, Hyang-Chang;Park, Hee-Man;Lee, Seung-Yong;Noh, Bong-Nam;Lee, Hyung-Hyo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.16 no.6
    • /
    • pp.47-61
    • /
    • 2006
  • In the Internet era, enterprises want to use personal information of their own or other enterprises' subscribers, and even provide it to other enterprises for their profit. In this paper, a privacy authorization system for personal information based on privacy policies of users and enterprises is designed and implemented. Privacy policies of users and enterprises are described in XACML. Also, components of policy in XACML 2.0 such as Purpose, Obligation are suitable for expressing privacy policy. A prototype of privacy authorization system is implemented by modifying and extending the SUNXACML 1.2, a Sun's implementation of XACML 1.0 and some features of XACML 2.0, and GUI tools for composing and verifying are also developed.

Proxy Design for Improving the Efficiency of Stored MPEG-4 FGS Video Delivery over Wireless Networks

  • Liu, Feng-Jung;Yang, Chu-Sing
    • Journal of Communications and Networks
    • /
    • v.6 no.3
    • /
    • pp.280-286
    • /
    • 2004
  • The widespread use of the Internet and the maturing of digital video technology have led to an increase in various streaming media application. However, new classes of hosts such as mobile devices are gaining popularity, while the transmission became more heterogeneous. Due to the characteristics of mobile networks such as low speed, high error bit rate, etc., the applications over the wireless channel have different needs and limitations from desktop computers. An intermediary between two communicating endpoints to hide the heterogeneous network links is thought as one of the best approaches. In this paper, we adopted the concept of inter-packet gap and the sequence number between continuously received packets as the error discriminator, and designed an adaptive packet sizing mechanism to improve the network efficiency under varying channel conditions. Based on the proposed mechanism, the packetization scheme with error protection is proposed to scalable encoded video delivery. Finally, simulation results reveal that our proposed mechanism can react to the varying BER conditions with better network efficiency and gain the obvious improvement to video quality for stored MPEG-4 FGS video delivery.

Secure OTP Smart Card Authentication Protocol for Denial of Service (서비스거부공격에 안전한 OTP 스마트카드 인증 프로토콜)

  • Shin, Kwang-Cheul
    • Journal of the Korea Society of Computer and Information
    • /
    • v.12 no.6
    • /
    • pp.201-206
    • /
    • 2007
  • Development of Information and Communication technology coming to activity of internet banking and electronic business, and smart card of medium is generalized prevailing for user authentication of electronic signature certificate management center with cyber cash, traffic card, exit and entrance card. In field that using public network, security of smart cart and privacy of card possessor's is very important. Point of smart card security is use safety for smart card by user authentication. Anonymous establishment for privacy protection and denial of service attack for availability is need to provision. In this paper, after analyze for Hwang-Li, Sun's, L-H-Y scheme, password identify element is a change of safety using one time password hash function. We proposed an efficient new smart card authentication protocol against anonymity and denial of service.

  • PDF

Research on the Use of Pseudonym Data - Focusing on Technical Processing Methods and Corporate Utilization Directions - (가명 데이터 활용연구 - 기술적 처리방법 및 기업의 활용방향을 중심으로 -)

  • Kim, Jung-Sun
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.2
    • /
    • pp.253-261
    • /
    • 2020
  • This study examines the technologies and application processes related to the use of pseudonym data of companies after the passage of the Data 3 Act to activate the data economy in earnest, and what companies should prepare to use pseudonym data and what will happen in the process It was intended to contribute to the elimination of uncertainty. In the future, companies will need to extend the information security management system from the perspective of the existing IT system to manage and control data privacy protection and management from a third party provisioning perspective. In addition, proper pseudonym data use control should be implemented even in the data use environment utilized by internal users. The economic effect of market change and heterogeneous data combination due to the use of pseudonymized data will be very large, and standards for appropriate non-identification measures and risk assessment criteria for data utilization and transaction activation should be prepared in a short time.

A Scheme for Providing Anonymity and Untraceability in Mobile Computing Environments (이동 컴퓨팅 환경에서의 익명성과 불추적성 지원 기법)

  • Choi, Sun-Young;Park, Sang-Yun;Eom, Young-Ik
    • Journal of KIISE:Information Networking
    • /
    • v.28 no.4
    • /
    • pp.570-577
    • /
    • 2001
  • In recent years, Internet-based application services on the mobile environment have been activated, and the developments of mobile internet application for user authentication and privacy have been required. Especially, the research for preventing disclosure of identity caused by user mobility is on the progress. In this paper, we introduce the study of an authentication protocol for anonymity and untraceability supporting the protection of user identity and the authenticated secure association mechanism between mobile hosts and remote domains. In this protocol use public cryptography.

  • PDF

A Study on the Copyright Understanding of Information Experts in the Library and Information Center (도서관 정보전문직의 저작권 인식에 관한 조사연구)

  • Yoon, Sun-Young
    • Journal of Information Management
    • /
    • v.33 no.3
    • /
    • pp.27-43
    • /
    • 2002
  • This paper has attempted to identify use status of information reproduction in the library and information center. At the same time, it investigated how information experts understanding about the copyright protection and information experts' knowledge to relate items of the copyright law.

Proposal of new GSM Authentication protocol (새로운 GSM의 인증프로토콜 제안)

  • Choi, Hyun;Song, Yun-Kyung;Park, Dong-Sun
    • Proceedings of the IEEK Conference
    • /
    • /
    • pp.113-116
    • /
    • 2003
  • Mobile communication network because information through radio channel is passed, information may be eavesdropped and need information security countermeasure in communication network dimension for safe information exchange because there is possibility that is manufactured. This paper used Public Key Cryptography for protection and authentication connected with user authentication. Use public key and private key that is asymmetry encryption key to quote that is used at encryption, decryption of Public key. Encrypt IMSI and authentication message that is transmitted MS, VLR and HLR interval to public key, wish to embody transmitted authentication protocol safety.

  • PDF

Method for improving the accuracy of a voltage transformer considering hysteresis characteristics (히스테리시스 특성을 고려한 전압 변성기 오차 개선 방법)

  • Kang, Yong-Cheol;Lee, Byung-Eun;Park, Jong-Min;Cha, Sun-Hee;Jang, Sung-Il;Kim, Yong-Guen
    • Proceedings of the KIEE Conference
    • /
    • /
    • pp.208-209
    • /
    • 2006
  • Voltage Transformer is used to transform high voltage into low voltage to input signal of protection relay. Most of the Voltage Transformers use the iron core which maximizes the flux linkage. The ratio of the Voltage Transformer depends on the transformer turns ratio. The current which flows in the Voltage Transformer has non-linear characteristic caused by hysteresis of the iron core, it causes a voltage loss in the winding impedances which makes measurement errors. This paper describes an error compensation method considering hysteresis characteristic. The proposed compensation method improves error by calculating the primary current from the exciting current of the hysteresis loop in the Voltage Transformer, compensating the voltage loss.

  • PDF

In vitro SPF Measurement of Sunscreen Agents in Cosmetics (화장품에서 자외선 차단제의 in vitro SPF 측정)

  • Yang, Jae-Chan
    • Journal of the Korean Applied Science and Technology
    • /
    • v.27 no.3
    • /
    • pp.370-377
    • /
    • 2010
  • This study evaluated SPF (Sun Protection Factor) of various quntity and kind of sunscreen ingredients which is used in O/W and W/O emulsion by systematic and quantitative approach. Octylmethoxycinnamate(OMC), Buthylmethoxydibenzoylmethan (BMDM), Octocrylene (OC), Octylsalicylate(OS), Octyl Triazone (OT), Titanium dioxide (TD) are used for the experiment. As a result, when different chemical sunscreen ingredients are added to OMC, the synergy effect of SPF was high in order of BMDM, OC, OS, OT. There was no significant difference in O/W and W/O emulsions. It can be a guide to use sunscreen ingredients effectively when the relation between the results of in vitro SPF and in vivo SPF is comprehended.