• Title/Summary/Keyword: 보호 기기

Search Result 1,002, Processing Time 0.024 seconds

A Study on the Current State of the Integrated Human Rights of the Elderly in Rural Areas of South Korea (농촌지역 거주 노인의 통합적 인권보장 실태에 관한 연구)

  • Ahn, Joonhee;Kim, MeeHye;Chung, SoonDool;Kim, SooJin
    • 한국노년학
    • /
    • v.38 no.3
    • /
    • pp.569-592
    • /
    • 2018
  • This study purported to investigate the current state of human rights of older adults residing in rural areas of Korea. The study utilized, as an analytic framework, 4 priority directions (1. "older persons and development", 2. "rural area development", 3. "advancing health and well-being into old age", and 4. "ensuring enabling and supportive environments") with 13 task actions recommended by Madrid International Plan of Action on Ageing (MIPAA). Furthermore, the study examined gender differences in all items included in the analytic framework. Data was collected by the face-to-face survey on 800 subjects aged 65 and over. Statistical analyses were conducted using STATA 13.0 program. The main results were summarized in order of 4 priority directions as follows. First, average working hours per day were 6.2, and men reportedly participated in economic activities and needed job training more than women, while women participated in lifelong education programs more than men. Awareness of fire and disaster prevention facilities was low in both genders. Second, accessibility to the support center for the elderly living alone as well as protective services for the vulnerable elderly was found to be low. IT-based services and networking were used more by men than women, and specifically, IT-based financial transactions and welfare services were least used. Third, medical check-ups and vaccinations were well received, while consistent treatments for chronic illnesses and long-term care services were relatively less given. In addition, accessibility to mental health service centers was considerably low. Fourth, although old house structures and the lack of convenience facilities were found to be circumstantial risk factors for these elders, experiences of receiving housing support services were scarce. The elderly were found to rely more on informal care, and concerns for their care were higher in women than men. Plus, accessibility to elderly abuse services was markedly low. Based on these results, discussed were implications for implementing policies and practical interventions to raise the levels of the human rights for this population.

Implementation of An Automatic Authentication System Based on Patient's Situations and Its Performance Evaluation (환자상황 기반의 자동인증시스템 구축 및 성능평가)

  • Ham, Gyu-Sung;Joo, Su-Chong
    • Journal of Internet Computing and Services
    • /
    • v.21 no.4
    • /
    • pp.25-34
    • /
    • 2020
  • In the current medical information system, a system environment is constructed in which Biometric data generated by using IoT or medical equipment connected to a patient can be stored in a medical information server and monitored at the same time. Also, the patient's biometric data, medical information, and personal information after simple authentication using only the ID / PW via the mobile terminal of the medical staff are easily accessible. However, the method of accessing these medical information needs to be improved in the dimension of protecting patient's personal information, and provides a quick authentication system for first aid. In this paper, we implemented an automatic authentication system based on the patient's situation and evaluated its performance. Patient's situation was graded into normal and emergency situation, and the situation of the patient was determined in real time using incoming patient biometric data from the ward. If the patient's situation is an emergency, an emergency message including an emergency code is send to the mobile terminal of the medical staff, and they attempted automatic authentication to access the upper medical information of the patient. Automatic authentication is a combination of user authentication(ID/PW, emergency code) and mobile terminal authentication(medical staff's role, working hours, work location). After user authentication, mobile terminal authentication is proceeded automatically without additional intervention by medical staff. After completing all authentications, medical staffs get authorization according to the role of medical staffs and patient's situations, and can access to the patient's graded medical information and personal information through the mobile terminal. We protected the patient's medical information through limited medical information access by the medical staff according to the patient's situation, and provided an automatic authentication without additional intervention in an emergency situation. We performed performance evaluation to verify the performance of the implemented automatic authentication system.

Anti-stress and Sleep-enhancing Effects of Ptecticus tenebrifer Water Extract Through the Regulation of Corticosterone and Melatonin Levels (코르티코스테론 및 멜라토닌 수치 조절을 통한 동애등에 물 추출물의 항스트레스 및 수면 개선 효과)

  • Oh, Dool-Ri;Ko, Haeju;Hong, Seong Hyun;Kim, Yujin;Oh, Kyo-Nyeo;Kim, Yonguk;Bae, Donghyuck
    • Journal of Life Science
    • /
    • v.32 no.8
    • /
    • pp.601-610
    • /
    • 2022
  • P. tenebrifer (PT) belongs to the Diptera order and Stratiomyidae family. Recently, insect industry have been focused as food, animal feed and environmental advantages. γ-aminobutyric acid (GABA) and melatonin have been associated with regulating sleep and depression. GABA is the primary inhibitory neurotransmitter and is synthesized via biotransformation of monosodium glutamate (MSG) to GABA by lactic acid bacteria. In this study, we first used a GABA-enhanced PT extract, wherein GABA was enhanced by feeding MSG to PT. The underlying mechanisms preventing stress and insomnia were investigated in a corticosterone (CORT)-induced endoplasmic reticulum (ER) stress and chronic restraint stress (CRS)-exposed mouse model, as well as in pentobarbital (45 mg/kg)-induced sleep behaviors in mice. In the present study, the GABA peak was detected in high-performance liquid chromatography-evaporative light scattering detector (HPLC-ELSD) analysis and showed in Ptecticus tenebrifer water extract (PTW) but not in non-PTW extract. The results showed that PTW and Ptecticus tenebrifer with 70% ethanol extract (PTE) exerted neuroprotective effects by protecting against CORT-induced downregulation of phosphorylated extracellular signal-regulated kinase 1/2 (ERK1/2) and cAMP-response element binding protein (CREB) expression. In addition, PTW (300 mg/kg) significantly reduced CORT levels in CRS-exposed mice. Furthermore, PTW (100 and 300 mg/kg) significantly reduced sleep latency and increased total sleep duration in pentobarbital (45 mg/kg)-induced sleeping behaviors, which was related to serum melatonin levels. In conclusion, our results suggest that PTW exerts anti-stress and sleep-enhancing effects by regulating serum CORT and melatonin levels.

Factors Affecting the Intention to Invade Privacy on Social Network Service (SNS에서 프라이버시 침해의도에 영향을 미치는 요인)

  • Ahn, Soomi;Jang, Jaeyoung;Kim, Jidong;Kim, Beomsoo
    • Information Systems Review
    • /
    • v.16 no.2
    • /
    • pp.1-23
    • /
    • 2014
  • With side effects such as Phishing and Spam using personal information in Social Network Service, there is a growing need for studies related to harmful behaviors such as the reason for privacy violation. As such, this study assumed privacy violation to be ethical decision, making behavior and used the Theory of Planned Behavior and Motivation Theory, which are mostly used in social science to identify the factors affecting privacy violation. The results suggested that the Perceived Enjoyment and Punishment used in motivation studies affected privacy violation behaviors, and that the factors of the Theory of Planned Behavior such as Attitude toward Privacy Violation, Subjective Norms of Privacy Violation, and Perceived Behavioral Control with regard to Privacy Violation significantly influenced the Intention to Privacy Violation. On the other hand, Perceived Curiosity and Subjective Norms of Privacy Violation did not affect the Intention to Privacy Violation. Therefore, this study confirmed that the Theory of Planned Behavior was appropriate to explain the Intention to Privacy Violation, and that the variables of the Motivation Theory generally influenced the Attitude toward Privacy Violation. This study was significant since it extended the scope of theoretical privacy study from users and victims centered to inflictor and applied the Extended Theory of Planned Behavior using the variables of the Motivation Theory in the study of Intention to Privacy Violation. From the practical aspect, it provided the ground for privacy education based on the fact that the Attitude toward Privacy Violation can be curbed when education on the Privacy Concerns, Perceived Enjoyment, and Punishment with regard to privacy is strengthened. It also cited the need for the punishment of privacy violation and the practical ground to amend the terms and conditions of user license and Personal Information Protection Act to provide policy support.

A Study on the Identification of Animal Hair in Food (식품 중 동물 털 이물의 판별법 연구)

  • Lee, Jae-Hwang;Park, Young-Eun;Lim, Byung-Chul;Kim, Ju-Shin;Choi, Jong-Hyun;Kang, Tae Sun;Lee, Jin-Ha;Kwon, Kisung
    • Journal of Food Hygiene and Safety
    • /
    • v.32 no.1
    • /
    • pp.57-63
    • /
    • 2017
  • Foreign materials with a variety of types and sizes are found in food; thus, extraordinary efforts and various analytical methods are required to identify the types of foreign materials and to find out accurate causes of how they unintentionally enter food. In this study, human, cow, pig, mouse, duck, goose, dog, and cat were chosen as various types of animal hairs because they can be frequently incorporated into food during its production or consumption step. We morphologically analyzed them using stereoscopic, optical, SUMP method, and scanning electron microscopes, showing differences in each type. In addition, X-ray fluorescence spectrometer (XRF) was used to analysis chemical compositions ($^{11}Na{\sim}^{92}U$, Mass%) of samples. As a result, we observed that mammalian hairs were mainly composed of sulfur. Organic compounds of samples were further analyzed by fourier transform infrared spectroscopy (FT-IR) that can compare spectra of given materials; however, this method did not show significant differences in each sample. In this study, we suggest a rapid method for the identification of the causes and types of foreign materials in food.

Structural Identification of Antibiotics from Pseudomonas sp. RRj 228, a Antifungal Activity of Collectotrichum acutatum Causing Anthracnose on Pepper (Pseudomonas sp. RRj 228이 분비하는 항균물질의 동정과 고추탄저균 C. acutatum에 대한 항균활성)

  • Jeon, Sang-Yoon;Kim, Yong-Gyun;Lee, Sang-Mong;Son, Hong-Joo;Park, Hyean-Cheal;Kim, Sun-Tae;Park, Ki-Do;Kang, Ui-Gum;Kim, Keun-Ki
    • Journal of Life Science
    • /
    • v.20 no.8
    • /
    • pp.1254-1260
    • /
    • 2010
  • Microorganisms near the plant rhizosphere usually inhabit the surface or the inside of the plant roots and have a direct effect on plant growth by secreting plant growth promoters or antagonistic materials which protect the root zone system from various pathogens. This study was carried out to identify and isolate the antagonistic materials after isolation of microorganisms showing high antagonistic activities, in hopes of contributing to the development of sustainable agriculture and the preservation of agricultural environments. A number of antagonistic bacteria were isolated from paddy soil. Among isolates, RRj 228 showed plant growth promotion and antagonistic activity. RRj 228 was identified as Pseudomonas sp. according to the results of physiological properties and genetic methods. On the basis of the results of anti-fungal spectrum against several pathogens by RRj 228, the antagonistic effect of the isolate against Botrytis cinerea, Pythium ultimum, Phytopthola capsici, and Rhizoctonia solani, especially against red-pepper anthracnose caused by Colletotrichum acutatum, was remarkable. The experiment evaluating the biological control effect by RRj 228 revealed that the $ED_{50}$ value by the RRj 228 culture against C. acutatum, R. solani and P. ultimum were 0.14 mg/ml, 0.16 mg/ml and 0.29 mg/ml, respectively. An antagonistic substance was isolated and purified by several chromatographies from the RRj 228 culture. The $^1H$ and $^{13}C$ assignment of the antagonistic substance was achieved from two-dimensional $^1H-^1H$ COSY, HMQC, and HMBC. Finally, the antagonistic substance was identified as Phenazine-1-carboxylic acid ($C_{13}H_8N_2O_2$, M.W.=224).

Adaptive Data Hiding Techniques for Secure Communication of Images (영상 보안통신을 위한 적응적인 데이터 은닉 기술)

  • 서영호;김수민;김동욱
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.29 no.5C
    • /
    • pp.664-672
    • /
    • 2004
  • Widespread popularity of wireless data communication devices, coupled with the availability of higher bandwidths, has led to an increased user demand for content-rich media such as images and videos. Since such content often tends to be private, sensitive, or paid for, there exists a requirement for securing such communication. However, solutions that rely only on traditional compute-intensive security mechanisms are unsuitable for resource-constrained wireless and embedded devices. In this paper, we propose a selective partial image encryption scheme for image data hiding , which enables highly efficient secure communication of image data to and from resource constrained wireless devices. The encryption scheme is invoked during the image compression process, with the encryption being performed between the quantizer and the entropy coder stages. Three data selection schemes are proposed: subband selection, data bit selection and random selection. We show that these schemes make secure communication of images feasible for constrained embed-ded devices. In addition we demonstrate how these schemes can be dynamically configured to trade-off the amount of ded devices. In addition we demonstrate how these schemes can be dynamically configured to trade-off the amount of data hiding achieved with the computation requirements imposed on the wireless devices. Experiments conducted on over 500 test images reveal that, by using our techniques, the fraction of data to be encrypted with our scheme varies between 0.0244% and 0.39% of the original image size. The peak signal to noise ratios (PSNR) of the encrypted image were observed to vary between about 9.5㏈ to 7.5㏈. In addition, visual test indicate that our schemes are capable of providing a high degree of data hiding with much lower computational costs.

A Study on the infringement of privacy of unmanned aircraft : Focusing on the analysis of legislation and US policy (무인항공기의 사생활 침해에 대한 법적 대응 : 미국 정책.입법안 분석을 중심으로)

  • Kim, Sun-Ihee
    • The Korean Journal of Air & Space Law and Policy
    • /
    • v.29 no.2
    • /
    • pp.135-161
    • /
    • 2014
  • An unmanned aerial vehicle (UAV), commonly known as a drone and also referred to as an unpiloted aerial vehicle and a remotely piloted aircraft (RPA) by the International Civil Aviation Organization (ICAO), is an aircraft without a human pilot aboard. ICAO classify unmanned aircraft into two types under Circular 328 AN/190. Unmanned aircraft, which is the core of the development of the aviation industry. However, there are also elements of the legal dispute. Unmanned aircraft are manufactured in small size, it is possible to shoot a record peripheral routes stored in high-performance cameras and sensors without the consent of the citizens, there is a risk of invasion of privacy. In addition, the occurrence of the people of invasion of privacy is expected to use of civilian unmanned aircraft. If the exposure of private life that people did not want for unmanned aircraft has occurred, may occur liability to the operator of unmanned aircraft, this is a factor to be taken into account for the development of unmanned aircraft industry. In the United States, which is currently led by the unmanned aircraft industry, policy related to unmanned aircraft, invasion of privacy is under development, is preparing an efficient measures making. Unmanned aircraft special law has not been enforced. So there is a need for legal measures based on infringement of privacy by the unmanned aircraft. US was presented Privacy Protection Act of unmanned aircraft (draft). However Korea has many laws have been enacted, to enact a new law, but will be able to harm the legal stability, there is a need for the enactment of laws for public safety of life. Although in force Personal Information Protection Law, unmanned aerospace, when the invasion of privacy occurs, it is difficult to apply the Personal Information Protection Law. So, it was presented a privacy protection bill with infringement of privacy of unmanned aircraft in the reference US legislation and the Personal Information Protection Act.

Ubiquitous Sensor Network Application Strategy of Security Companies (시큐리티업체의 유비쿼터스 센서네트워크(USN) 응용전략)

  • Jang, Ye-Jin;An, Byeong-Su;Ju, Choul-Hyun
    • Korean Security Journal
    • /
    • no.21
    • /
    • pp.75-94
    • /
    • 2009
  • Since mechanical security systems are mostly composed of electronic, information and communication devices, they have effects in the aspects of overall social environment and crime-oriented environment. Also, the importance is increasing for wireless recognition of RFID and tracing function, which will be usefully utilized in controlling the incomings and outgoings of people/vehicles or allowance, surveillance and control. This is resulting from the increase in the care for the elderly according to the overall social environment, namely, the aging society, and the number of women entering, as well as the increase in the number of heinous crimes. The purpose of this study is to examine the theoretical considerations on ubiquitous sensor network and present a direction for securities companies for their development by focusing on the technological and application areas. To present strategies of response to a new environment for security companies, First, a diversification strategy is needed for security companies. The survival of only high level of security companies in accordance with the principle of liberal market competition will bring forth qualitative growth and competitiveness of security market. Second, active promotion by security companies is needed. It is no exaggeration to say that we are living in the modern society in the sea of advertisements and propaganda. The promotional activities that emphasize the areas of activity or importance of security need to be actively carried out using the mass media to change the aware of people regarding security companies, and they need to come up with a plan to simultaneously carry out the promotional activities that emphasize the public aspect of security by well utilizing the recent trend that the activities of security agents are being used as a topic in movies or TV dramas. Third, technically complementary establishment of ubiquitous sensor network and electronic tag is needed. Since they are used in mobile electronic tag services such as U-Home and U-Health Care, they are used throughout our lives by forming electronic tag environment within safe ubiquitous sensor network based on the existing privacy guideline for the support of mobile electronic tag terminal commercialization, reduction in communication and information usage costs, continuous technical development and strengthening of privacy protection, and the system of cooperation of academic-industrial-research needs to be established among the academic world and private research institutes for these parts.

  • PDF

Privacy protection of seizure and search system (압수수색과 개인정보 보호의 문제)

  • Kim, Woon-Gon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.20 no.5
    • /
    • pp.123-131
    • /
    • 2015
  • Bright development of information communication is caused by usabilities and another case to our society. That is, the surveillance which is unlimited to electronic equipment is becoming a transfiguration to a possible society, and there is case that was able to lay in another disasters if manage early error. Be what is living on at traps of surveillance through the Smart phones which a door of domicile is built, and the plane western part chaps, and we who live on in these societies are installed to several places, and closed-circuit cameras (CCTV-Closed Circuit Television) and individual use. On one hand, while the asset value which was special of enterprise for marketing to enterprise became while a collection was easily stored development of information communication and individual information, the early body which would collect illegally was increased, and affair actually very occurred related to this. An investigation agency is endeavored to be considered the digital trace that inquiry is happened by commission act to the how small extent which can take aim at a duty successful of the inquiry whether you can detect in this information society in order to look this up. Therefore, procedures to be essential now became while investigating affair that confiscation search regarding employment trace of a computer or the telephone which delinquent used was procedural, and decisive element became that dividing did success or failure of inquiry whether you can collect the act and deed which was these electronic enemy. By the way, at this time a lot of, in the investigation agencies the case which is performed comprehensively blooms attachment while rummaging, and attachment is trend apprehension to infringe discretion own arbitrary information rising. Therefore, a lot of nation is letting you come into being until language called exile 'cyber' while anxiety is exposed about comprehensive confiscation search of the former information which an investigation agency does. Will review whether or not there is to have to set up confiscation search ambit of electronic information at this respect how.