• Title/Summary/Keyword: Anonymous Communication

Search Result 75, Processing Time 0.019 seconds

The Development and Application of a Problem-based Learning Module for Physical Therapy Classes (물리치료학 수업에서의 문제중심학습(PBL)의 모듈 개발과 적용)

  • Kim, Hyun-Woo;Song, Chang-Ho
    • PNF and Movement
    • /
    • v.17 no.2
    • /
    • pp.223-236
    • /
    • 2019
  • Purpose: This research was to develop a module for problem-based learning(PBL) and to enhance the problem-solving abilities of physical therapy students in a neurological physical therapy course and to evaluate the effects of the module using quantitative and qualitative data. Methods: The PBL module was applied to 55 third-year physical therapy students who participated in a neurological physical therapy course at S university in Seoul. Anonymous self-report questionnaires and reflection journals were collected, and the data were analyzed. Results: The results of the analysis showed that the academic achievements of the students who participated in the first PBL class improved compared to the academic achievements of the students who had participated in the same class in the previous semester. Second, the students who participated in the PBL class evaluated the PBL as a very effective learning method for developing clinical practical ability. Third, the students of the PBL class showed increased cooperation and communication abilities between team members. Conclusion: The results of this study indicated that, if PBL class case studies and various types of teaching and learning methods appropriate for theoretical and practical fields are continuously studied, then it is expected that teaching models will be developed that can develop flexibility and creativity among preliminary physical therapists in a rapidly changing medical environment.

A Study on the Role and Security Enhancement of the Expert Data Processing Agency: Focusing on a Comparison of Data Brokers in Vermont (데이터처리전문기관의 역할 및 보안 강화방안 연구: 버몬트주 데이터브로커 비교를 중심으로)

  • Soo Han Kim;Hun Yeong Kwon
    • Journal of Information Technology Services
    • /
    • v.22 no.3
    • /
    • pp.29-47
    • /
    • 2023
  • With the recent advancement of information and communication technologies such as artificial intelligence, big data, cloud computing, and 5G, data is being produced and digitized in unprecedented amounts. As a result, data has emerged as a critical resource for the future economy, and overseas countries have been revising laws for data protection and utilization. In Korea, the 'Data 3 Act' was revised in 2020 to introduce institutional measures that classify personal information, pseudonymized information, and anonymous information for research, statistics, and preservation of public records. Among them, it is expected to increase the added value of data by combining pseudonymized personal information, and to this end, "the Expert Data Combination Agency" and "the Expert Data Agency" (hereinafter referred to as the Expert Data Processing Agency) system were introduced. In comparison to these domestic systems, we would like to analyze similar overseas systems, and it was recently confirmed that the Vermont government in the United States enacted the first "Data Broker Act" in the United States as a measure to protect personal information held by data brokers. In this study, we aim to compare and analyze the roles and functions of the "Expert Data Processing Agency" and "Data Broker," and to identify differences in designated standards, security measures, etc., in order to present ways to contribute to the activation of the data economy and enhance information protection.

Efficient Privacy Preserving Anonymous Authentication Announcement Protocol for Secure Vehicular Cloud Network

  • Nur Afiqah Suzelan Amir;Wan Ainun Mior Othman;Kok Bin Wong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.17 no.5
    • /
    • pp.1450-1470
    • /
    • 2023
  • In a Vehicular Cloud (VC) network, an announcement protocol plays a critical role in promoting safety and efficiency by enabling vehicles to disseminate safety-related messages. The reliability of message exchange is essential for improving traffic safety and road conditions. However, verifying the message authenticity could lead to the potential compromise of vehicle privacy, presenting a significant security challenge in the VC network. In contrast, if any misbehavior occurs, the accountable vehicle must be identifiable and removed from the network to ensure public safety. Addressing this conflict between message reliability and privacy requires a secure protocol that satisfies accountability properties while preserving user privacy. This paper presents a novel announcement protocol for secure communication in VC networks that utilizes group signature to achieve seemingly contradictory goals of reliability, privacy, and accountability. We have developed the first comprehensive announcement protocol for VC using group signature, which has been shown to improve the performance efficiency and feasibility of the VC network through performance analysis and simulation results.

An Automatic AP Connections Scheme using iBeacon (iBeacon을 이용한 AP 자동접속 방안)

  • Nam, ChoonSung;Shin, DongRyeol
    • Journal of Internet Computing and Services
    • /
    • v.18 no.2
    • /
    • pp.1-11
    • /
    • 2017
  • There are two kinds of wireless network access to a certain place by using smart devices - 1) open (anonymous) - access and 2) user-authorized access. The open-access is a non-authorization connection method which does not need to require Smart device's user authorized information. It means open-access use only user's SSID (Service Set Identifier) information to access the wireless AP devices following public wireless network standard. This access mechanism is not suitable to use all of public wireless networks because users have to get all wireless network information around them. As a result, huge data for smart devices should be one of the most critical overload problems for them. Secondly, the user-authorized access method uses wireless network information (SSID and password) chosen by the users. So, the users have to remember and use the network access information data manually whenever accessing the network. Like open-access, this access method also has the operational and inconvenient problem for the users - manually inputting access information whenever connecting to the network. To overcome this problem in both schemes, we propose two improved wireless network access methods: 1) the implementation of automatic AP connection mechanism using user-authorization and iBeacon messages, and 2) SSID registration form for public wireless networks.

Implementation of a Learning Support System that Facilitates Teacher-Student Interaction Utilizing a Digital Human (디지털 휴먼을 활용하여 교수-학생 상호작용을 촉진시키는 학습지원 시스템 구현)

  • Gyu-Sung Jung;Chan-Hyeong Im;Hae-Chan Lee;Ra Yun Boo;Soonuk Seol
    • Journal of Practical Engineering Education
    • /
    • v.14 no.3
    • /
    • pp.523-533
    • /
    • 2022
  • During the COVID-19 pandemic, the use of video classes and real-time online education has increased, but the lack of interaction between instructors and learners remains a challenging problem to be resolved. This paper designs and implements a learning support system that utilizes a digital human to improve faculty-student interaction, which plays an important role in increasing the educational effect and satisfaction of real-time online classes. In this paper, a digital human participates in a class as a virtual learner and asks questions raised by other learners through an anonymous chat system to the instructor on behalf of the learners. In addition, as a class facilitator, the digital human analyzes the lecturer's speech in real time and provides it to the learner in the form of a summary of the class, thereby facilitating faculty-student interaction. In order to confirm that the proposed system can be used in actual online real-time classes, we apply our system to Zoom classes. Experimental results show that facilitated Q&A and real-time class summaries are successfully provided through our digital human-based learning support system.

A News Frame Analysis by the South Korean Press on the Livelihoods of a North Koreans (북한주민 생활 실태에 관한 국내 신문보도 프레임연구: 조선일보, 동아일보, 한겨레, 경향신문을 중심으로)

  • Ha, Seung-Hee;Lee, Min-Kyu
    • Korean journal of communication and information
    • /
    • v.58
    • /
    • pp.222-241
    • /
    • 2012
  • Analysis research was conducted on the 'Chosen Ilbo,' 'Donga Ilbo,' 'Hankyoreh' and 'Kyunghyang Newspaper' on news reporting frame and sources regarding the North Korean population's living and status of their respective conditions throughout South Korean administrations of Kim Dae-jung, Roh Mu-hyuen, and Lee Myung-Bak. Resulting first and second frame analyses showed that the four newspapers showed clear distinctions in their execution and attitude in their reports in accordance to the philosophies of each 'progressive/left-wing newspapers' and 'conservative/right-wing newspapers'. Moreover, the first and second analyses showed that the reports mimicked each individual presidential administration and their political policy regardless of the newspaper's political voice. In terms of the usage of 'anonymous sources,' conservative newspapers were found to use them more frequently than their counterpart, the liberal newspapers. In conclusion to the overall analyses, with the continued tension between the International community and North Korea, the reports of North Korean inhabitant activities are inevitably portrayed in a negative tone in effort to plant a distorted view to the South Korean citizens. Furthermore, this manipulation of the press may affect the credibility of South Korean press in terms of the topic of North Korean culture.

  • PDF

Internet Users' Willingness to Expression and Perception of Public Opinion: The Comparison between Real Space and Cyber Space (인터넷 이용자의 여론 지각과 의견 표현: 현실공간과 사이버공간의 비교)

  • Han, Hye-Kyoung
    • Korean journal of communication and information
    • /
    • v.23
    • /
    • pp.189-221
    • /
    • 2003
  • This study compares the influence of perceived public opinion on Internet users' willingness to expression in real space with in cyber space. In real space, people who perceive their opinions as minority opinion are reluctant to express theirs publicly because of fear of isolation. But cyber space is the anonymous world. So we can expect that people express their opinions freely without the fear of isolation in this space. This study's results provide the support for our expectation. In cyber space, the minority perception group has as the high willingness to expression of their opinion about the abrogation of the Korean Family Rights Raw as the majority perception group. Both of in cyber space and in real space, it is the perception failure group that makes discrepancy in the willingness to expression. This group has the lowest willingness to expression in both space. However, the other predictors of willingness to expression in cyber space are similar to those in real space. Issue salience, Communication apprehension, and Age are the very significant predictors of willingness to expression in both spaces. Sex and ideology are significant predictors in real space, while the frequency of online conversation is the significant predictor in cyber space.

  • PDF

Secure and Efficient Protocol for Vehicular Communication with Privacy Preservation (프라이버시를 보호하며 안전하고 효율적인 차량간 통신 프로토콜)

  • Kim, In-Hwan;Choi, Hyoung-Kee;Kim, Jung-Yoon
    • Journal of KIISE:Information Networking
    • /
    • v.37 no.6
    • /
    • pp.420-430
    • /
    • 2010
  • Due to increasing demand for improving road safety and optimizing road traffic, Vehicular Ad-Hoc Networks (VANET) have been subject to extensive attentions from all aspects of commercial industry and academic community. Security and user privacy are fundamental issues for all possible promising applications in VANET. Most of the existing security proposals for secure VANET concentrate authentication with privacy preservation in vehicle-to-vehicle (V2V) and vehicle-to-roadside infrastructure (V2I) communications and require huge storage and network capacity for management of revocation list. Motivated by the fact, we propose a new scheme with security and privacy preservation which combines V2V and V2I communication. With our proposed scheme, the communication and computational delay for authentication and overhead for management of revocation list can be significantly reduced due to mutual authentication between a vehicle and a Roadside Unit (RSU) requires only two messages, and the RSU issues the anonymous certificate for the vehicle on behalf of the Trust Authority (TA). We demonstrate that the proposed protocol cannot only guarantee the requirements of security and privacy but can also provide efficiency of authentication and management of revocation list.

Knowledge of the General Community in Cordoba, Argentina, on Human Papilloma Virus Infection and its Prevention

  • Venezuela, Raul Fernando;Monetti, Marina Soledad;Kiguen, Ana Ximena;Frutos, Maria Celia;Mosmann, Jessica Paola;Cuffini, Cecilia Gabriela
    • Asian Pacific Journal of Cancer Prevention
    • /
    • v.17 no.5
    • /
    • pp.2689-2694
    • /
    • 2016
  • Background: Most studies of human papilloma virus (HPV) are aimed at the natural history of the infection and its relation to cancer; however, there are few studies to assess knowledge of the general population. Our aim was analyze the degree of knowledge of Argentinians about HPV infection and its prevention. Materials and Methods: We conducted a voluntary, anonymous and non-binding survey with 27 multiple-choice items, in twelve private and public establishments, selected to include a broad population in terms of education, age and gender. The survey consisted of three sections: individual characteristics of the volunteer, HPV infection basic knowledge, its prevention and the virus relationship with other cancers. Results: One thousand two hundred ninety seven volunteers aged 18 to 80 participated. The total number of correct answers was 45.1%. The correct answers for relationship HPV and cervical cancer was 62.1%. Almost 55% did not know about types of HPV that the vaccines for protection. Statistical analysis showed that women, single people, workers, the better educated, those who have had a STDs or HPV and receiving information through medical or educational establishments had greater knowledge of the topic. Only 0.2% of participants answered all questions correctly. Conclusions: Knowledge plays an important role in health care and the deficiency found in our population could influence the success of the measures taken in the fight against cervical cancer. In this regard, we believe it would be appropriate, not only to emphasize early diagnosis and vaccine implementation, but also incorporate new communication strategies, facilitating reception of accurate and precise information by all strata of society.

Performance Verification of a New Positioning Technology by Low-Resolution CDMA Pilot Strength Measurements (저해상도 CDMA Pilot 신호세기를 활용한 새로운 측위기법의 성능 검증)

  • Lee, Hyung Keun;Shim, Ju-Young;Kim, Hee-Sung
    • Journal of Advanced Navigation Technology
    • /
    • v.11 no.2
    • /
    • pp.154-162
    • /
    • 2007
  • This paper verifies the performance of the wireless-signal map-matching (WSMM) method that is recently proposed to mitigate the effects of non-line-of-sight (NLOS) error in positioning under wireless terrestrial network environments. The WSMM method is the new positioning technology that estimates and compensate the NLOS errors by processing the bulks of anonymous measurements at unknown locations that are collected randomly and automatically. The WSMM method would be advantageous for various configurations of future ubiquitous sensor networks since it is based on the existing network configuration for communication and it requires no additional hardware in base stations and mobile handsets. It is shown that the application of the WSMM concept to the real CDMA pilot strength measurment message (PSMM) actually mitigates the NLOS error effects and improves overall positioning accuracy.

  • PDF