• Title/Summary/Keyword: Invasion of Privacy

Search Result 159, Processing Time 0.027 seconds

A Study of Anti-collision algorithm based on RFID for Medical Service (의료 서비스를 위한 RFID 기반 충돌방지 알고리즘에 관한 연구)

  • Park, Joo-Hee;Park, Yong-Min
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2006.11a
    • /
    • pp.434-437
    • /
    • 2006
  • Today, Hospital Information System that integrates ubiquitous technologies are introduced in limited basis due to problems like standardization and limits on medical use, where responsibilities lie, legal safeguard on transmission, invasion of privacy etc. Particularly, problems like absence of tag design suitable for medical environment, compatibility issue with previous medical information system. In order to solve such problems, we have designed medical tags for the first time that are consistent with future ubiquitous environment by deciding on medically suitable field with 96bit tag offered by EFC as its base. Second, improving on previous multi-tag recognizing crash prevention algorithm, we have designed a priority anti-collision algorithm that reflects priorities on the needs in medical environment.

  • PDF

Implementation and Design of Artificial Intelligence Face Recognition in Distributed Environment (분산형 인공지능 얼굴인증 시스템의 설계 및 구현)

  • 배경율
    • Journal of Intelligence and Information Systems
    • /
    • v.10 no.1
    • /
    • pp.65-75
    • /
    • 2004
  • It is notorious that PIN(Personal Identification Number) is used widely for user verification and authentication in networked environment. But, when the user Identification and password are exposed by hacking, we can be damaged monetary damage as well as invasion of privacy. In this paper, we adopt face recognition-based authentication which have nothing to worry what the ID and password will be exposed. Also, we suggest the remote authentication and verification system by considering not only 2-Tier system but also 3-Tier system getting be distributed. In this research, we analyze the face feature data using the SVM(Support Vector Machine) and PCA(Principle Component Analysis), and implement artificial intelligence face recognition module in distributed environment which increase the authentication speed and heightens accuracy by utilizing artificial intelligence techniques.

  • PDF

A Store Recommendation Procedure in Ubiquitous Market for User Privacy (U-마켓에서의 사용자 정보보호를 위한 매장 추천방법)

  • Kim, Jae-Kyeong;Chae, Kyung-Hee;Gu, Ja-Chul
    • Asia pacific journal of information systems
    • /
    • v.18 no.3
    • /
    • pp.123-145
    • /
    • 2008
  • Recently, as the information communication technology develops, the discussion regarding the ubiquitous environment is occurring in diverse perspectives. Ubiquitous environment is an environment that could transfer data through networks regardless of the physical space, virtual space, time or location. In order to realize the ubiquitous environment, the Pervasive Sensing technology that enables the recognition of users' data without the border between physical and virtual space is required. In addition, the latest and diversified technologies such as Context-Awareness technology are necessary to construct the context around the user by sharing the data accessed through the Pervasive Sensing technology and linkage technology that is to prevent information loss through the wired, wireless networking and database. Especially, Pervasive Sensing technology is taken as an essential technology that enables user oriented services by recognizing the needs of the users even before the users inquire. There are lots of characteristics of ubiquitous environment through the technologies mentioned above such as ubiquity, abundance of data, mutuality, high information density, individualization and customization. Among them, information density directs the accessible amount and quality of the information and it is stored in bulk with ensured quality through Pervasive Sensing technology. Using this, in the companies, the personalized contents(or information) providing became possible for a target customer. Most of all, there are an increasing number of researches with respect to recommender systems that provide what customers need even when the customers do not explicitly ask something for their needs. Recommender systems are well renowned for its affirmative effect that enlarges the selling opportunities and reduces the searching cost of customers since it finds and provides information according to the customers' traits and preference in advance, in a commerce environment. Recommender systems have proved its usability through several methodologies and experiments conducted upon many different fields from the mid-1990s. Most of the researches related with the recommender systems until now take the products or information of internet or mobile context as its object, but there is not enough research concerned with recommending adequate store to customers in a ubiquitous environment. It is possible to track customers' behaviors in a ubiquitous environment, the same way it is implemented in an online market space even when customers are purchasing in an offline marketplace. Unlike existing internet space, in ubiquitous environment, the interest toward the stores is increasing that provides information according to the traffic line of the customers. In other words, the same product can be purchased in several different stores and the preferred store can be different from the customers by personal preference such as traffic line between stores, location, atmosphere, quality, and price. Krulwich(1997) has developed Lifestyle Finder which recommends a product and a store by using the demographical information and purchasing information generated in the internet commerce. Also, Fano(1998) has created a Shopper's Eye which is an information proving system. The information regarding the closest store from the customers' present location is shown when the customer has sent a to-buy list, Sadeh(2003) developed MyCampus that recommends appropriate information and a store in accordance with the schedule saved in a customers' mobile. Moreover, Keegan and O'Hare(2004) came up with EasiShop that provides the suitable tore information including price, after service, and accessibility after analyzing the to-buy list and the current location of customers. However, Krulwich(1997) does not indicate the characteristics of physical space based on the online commerce context and Keegan and O'Hare(2004) only provides information about store related to a product, while Fano(1998) does not fully consider the relationship between the preference toward the stores and the store itself. The most recent research by Sedah(2003), experimented on campus by suggesting recommender systems that reflect situation and preference information besides the characteristics of the physical space. Yet, there is a potential problem since the researches are based on location and preference information of customers which is connected to the invasion of privacy. The primary beginning point of controversy is an invasion of privacy and individual information in a ubiquitous environment according to researches conducted by Al-Muhtadi(2002), Beresford and Stajano(2003), and Ren(2006). Additionally, individuals want to be left anonymous to protect their own personal information, mentioned in Srivastava(2000). Therefore, in this paper, we suggest a methodology to recommend stores in U-market on the basis of ubiquitous environment not using personal information in order to protect individual information and privacy. The main idea behind our suggested methodology is based on Feature Matrices model (FM model, Shahabi and Banaei-Kashani, 2003) that uses clusters of customers' similar transaction data, which is similar to the Collaborative Filtering. However unlike Collaborative Filtering, this methodology overcomes the problems of personal information and privacy since it is not aware of the customer, exactly who they are, The methodology is compared with single trait model(vector model) such as visitor logs, while looking at the actual improvements of the recommendation when the context information is used. It is not easy to find real U-market data, so we experimented with factual data from a real department store with context information. The recommendation procedure of U-market proposed in this paper is divided into four major phases. First phase is collecting and preprocessing data for analysis of shopping patterns of customers. The traits of shopping patterns are expressed as feature matrices of N dimension. On second phase, the similar shopping patterns are grouped into clusters and the representative pattern of each cluster is derived. The distance between shopping patterns is calculated by Projected Pure Euclidean Distance (Shahabi and Banaei-Kashani, 2003). Third phase finds a representative pattern that is similar to a target customer, and at the same time, the shopping information of the customer is traced and saved dynamically. Fourth, the next store is recommended based on the physical distance between stores of representative patterns and the present location of target customer. In this research, we have evaluated the accuracy of recommendation method based on a factual data derived from a department store. There are technological difficulties of tracking on a real-time basis so we extracted purchasing related information and we added on context information on each transaction. As a result, recommendation based on FM model that applies purchasing and context information is more stable and accurate compared to that of vector model. Additionally, we could find more precise recommendation result as more shopping information is accumulated. Realistically, because of the limitation of ubiquitous environment realization, we were not able to reflect on all different kinds of context but more explicit analysis is expected to be attainable in the future after practical system is embodied.

A Study on the Factors Influencing Student Athletes' Human Rights Abuse Experience -Focusing on the analysis of environment in team, human right in event and human right in sports using logistic regression (학생선수의 인권침해 경험에 영향을 미치는 요인에 관한 연구 -로지스틱 회귀분석을 이용한 팀 분위기, 소속종목 인권의식, 체육계 인권의식에 대한 분석을 중심으로-)

  • Lee, Youn-Young;Lee, Je-Hun
    • Journal of the Korea Convergence Society
    • /
    • v.13 no.5
    • /
    • pp.295-305
    • /
    • 2022
  • This study aimed to present a realistic policy direction to reduce human rights violations by analyzing the mechanisms of its factors affecting the experience of human rights violations for middle and high school student athletes. The method analyzed the response data of 13,205 student athletes through a structured questionnaire using logistic regression analysis. The independent variable consisted of sexual violence, sexual shame, physical violence, verbal violence, bullying, invasion of privacy and learning rights, and unfair leaders' actions related to exercise. As a result of the analysis, first, the team atmosphere, human rights consciousness in their sports and in the sports field were found to have a significant influence on physical and language violence, bullying, privacy and infringement of learning rights. Second, for the experience of sexual violence, the team atmosphere and the level of awareness of human rights violations in the sports community had a significant effect, but the permission of violence in the sports community and human rights consciousness in their sports did not appear as meaningful variables. Third, it was found that the unfair experience related to exercise had a significant effect on the team atmosphere, the overall level of violence in the sports community, and the its awareness of human rights violations in the sports community.

Improvement of a Verified Secure Key Distribution Protocol Between RFID and Readers (RFID와 리더간의 안전성이 검증된 키 분배 프로토콜의 개선)

  • Bae, Woo-Sik;Lee, Jong-Yun
    • The KIPS Transactions:PartC
    • /
    • v.18C no.5
    • /
    • pp.331-338
    • /
    • 2011
  • The RFID system includes a section of wireless communication between the readers and the tags. Because of its vulnerability in terms of security, this part is always targeted by attackers and causes various security problems including the leakage of secret and the invasion of privacy. In response to these problems, various protocols have been proposed, but because many of them have been hardly implementable they have been limited to theoretical description and theorem proving without the accurate verification of their safety. Thus, this study tested whether the protocol proposed by Kenji et al. satisfies security requirements, and identified its vulnerabilities such as the exposure of IDs and messages. In addition, we proposed an improved RFID security protocol that reduced the number of public keys and random numbers. As one of its main characteristics, the proposed protocol was designed to avoid unnecessary calculations and to remove vulnerabilities in terms of security. In order to develop and verify a safe protocol, we tested the protocol using Casper and FDR(Failure Divergence Refinements) and confirmed that the proposed protocol is safe in terms of security. Furthermore, the academic contributions of this study are summarized as follows. First, this study tested the safety of a security protocol through model checking, going beyond theorem proving. Second, this study suggested a more effective method for protocol development through verification using FDR.

Research on Utilizing Method of CCTV System for Crime Prevention and Safety Accident Reduction (범죄예방 및 안전사고 감소를 위한 CCTV시스템의 활용방안에 관한 연구)

  • Kim, Tae-Hwan
    • Journal of the Society of Disaster Information
    • /
    • v.3 no.1
    • /
    • pp.55-68
    • /
    • 2007
  • Recently, people in cities of developed countries are exposed to unfortified damages of crime and disaster due to urbanization, industrialization and information-oriented era caused by congestion of population in terms of hardware and various social pathology phenomena and frequent and large scale of disaster caused by crime and disorder, which occur in the course of going through nuclear family, a gap between rich and poor and aging society in terms of software. In this regard, demand for security upon individual life and property has been increased but the police that are responsible for the public security does not effectively reduce damage in life and property because their activities are mainly oriented in coping with security accidents more than prevention. Shortage of manpower and budget, retarded equipment, and heavy overwork are the reasons. In order to confront with this kind of situation, we should utilize CCTV system with the purpose of declining possible chances of crime, not for eliminating cause of crime as crime prevention activities to predict danger in advance as a way of prevention and we may expect a role of damage prevention by installing CCTV in places where security accident may possibly happen. In conclusion, there are invasion of privacy, misuse of the system, insufficiency of overall monitoring office management, lack of citizens' understanding and economical allotment of the system installation costs in installation of CCTV system. However. it is necessary to install the CCTV system for effective prevention of crime and prevention activities of security accidents and accurate PR of purposes of installing CCTV to local residents, establishing relevant laws about system misuse, allotment of equipment costs and fees by R&D of the system machinery, cost reduction method of storage, management and replacement, saving costs from co-operative attitude of government, and local autonomous entities and local residents should be involved.

  • PDF

Derivation of Security Requirements of Smart TV Based on STRIDE Threat Modeling (STRIDE 위협 모델링에 기반한 스마트 TV 보안 요구사항 도출)

  • Oh, In-Kyung;Seo, Jae-Wan;Lee, Min-Kyu;Lee, Tae-Hoon;Han, Yu-Na;Park, Ui-Seong;Ji, Han-Byeol;Lee, Jong-Ho;Cho, Kyu-Hyung;Kim, Kyounggon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.2
    • /
    • pp.213-230
    • /
    • 2020
  • As smart TVs have recently emerged as the center of the IoT ecosystem, their importance is increasing. If a vulnerability occurs within a smart TV, there is a possibility that it will cause financial damage, not just in terms of privacy invasion and personal information leakage due to sniffing and theft. Therefore, in this paper, to enhance the completeness of smart TV vulnerability analysis, STRIDE threat classification are used to systematically identify threats. In addition, through the manufacture of the Attack Tree and the actual vulnerability analysis, the effectiveness of the checklist was verified and security requirements were derived for the safe smart TV use environment.

A Study about Social Inclusion of Permanent Rental and Lot-Sold Apartment (영구임대 및 분양아파트 단지의 사회적 통합 실태조사)

  • Lee, Min-Ah;Kim, Mi-Hee;Na, Ha-Young
    • Journal of Families and Better Life
    • /
    • v.27 no.2
    • /
    • pp.123-138
    • /
    • 2009
  • The purpose of this study was to investigate the social inclusion of permanent rental and lot-sold apartment and to provide basic source of their physical and social inclusion. The research method was in-depth interview for 32 residents in two apartment complex based on the social inclusion index developed in the previous study. The results of the study were summarized as follows: First, the majority of the residents' average monthly income in the permanent rental apartment were lower than the minimum cost of living. But, they were not seriously realized it and gave up any economic activities due to their poor health and age. Second, the big different indexes from the residents in lot-sold apartment were the family networks and social activity participations. They were not satisfied with their family members, seldom had social gatherings, and did not have any information of community cultural events. Third, since they had narrow sphere of activities, they could not properly evaluate the diversity of neighborhood facilities and the convenience of public transportations. But, they obviously recognized anti-social behaviors and the invasion of the privacy in the apartment complex, and maintained superficial neighborship. Fourth, on the other hand, the residents in lot-sold apartment had the feeling of being harmed by the various troubles of the permanent rental apartment.

Priority of Residential Choice and Housing Satisfaction among Studio-type Multi-family Housing Dwellers in the City of Gwangju (원룸형 다가구주택 거주자의 주거선택 중요도와 주거만족도 - 광주광역시를 중심으로 -)

  • Kang, Hi-Goo;Kim, Mi-Hee
    • Journal of the Korean housing association
    • /
    • v.21 no.3
    • /
    • pp.11-21
    • /
    • 2010
  • The purpose of this study is to gather baseline data on perceived priority of residential choice and housing satisfaction rates among consumers with the aim of using this information for future planning. Self-administered questionnaires were provided to 196 studio-type multi-family housing dwellers in the City of Gwangju from 2009 Apri 5th to 29th. The collected data was used to conduct comparative and descriptive statistical analysis: factor analysis, t-test, one-way ANOVA, correlation analysis. The main findings obtained are as follows: Firstly, in relation to perceived priority of residential choice, dwellers identified seven factors as important. Secondly, in terms of housing satisfaction about a unit room, the respondents identified five factors as important. This study confirmed that there existed passive correlation between priority of residential choice and housing satisfaction among residents in studio-type multi-family housings in Gwangju. It is very necessary to project a studio-type multi-family housing close to transportation for easy access, avoiding commercial districts. Delicate interior and design will attract more female residents as well as fully-equipped parking lots for people who drive to their workplace. According to research on a degree of housing satisfaction, all respondents expressed dissatisfaction with "noise". Therefore, in dealing with construction plans of studio apartment units, from now on, sound proofing facilities are required to reduce the acoustic invasion of privacy, especially, for units with more than two people. In order to satisfy all the demand of residents in studio apartment units, we have to pursue systematic and succeeding research about a studio-type multi-family housing well-fitted for the actual circumstances of local area and suitable for longer stay. To sum up, more research and development will be required for high-class studio-type multiplex housing for sale in dealing with households with financial stability such as two-paycheck couples, so-called DINK, or a professional single person, in the future.

Analysis and Study on Invasion Threat and Security Measures for Smart Home Services in IoT Environment (사물인터넷 환경에서의 스마트홈 서비스 침해위협 분석 및 보안 대책 연구)

  • Lee, Myongyeal;Park, Jaepyo
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.16 no.5
    • /
    • pp.27-32
    • /
    • 2016
  • In general, IoT(Internet of things) designate the intelligence technologies and services which interact all necessity information between human and things, things and thing and things and systems with all things connecting through the internet based. The smart home in present of IoT environment fuses the daily supplies/equipment which needs to use for the private life with the internet of things that is the fruit of the converged business through all most private consumption related in vastly. The concept of smart home has been built around early 2000s due to the spread of high speed internet and advanced of smart electronics and internet, furthermore influencing by the enhancement of wireless network and smart devices, it is advanced as a smart home within the internet of things environment. Smart home service inside the house which most closely implemented with personal life is being developed and advanced in various forms. These developments may exert a positive effect, but if it does not resolve the security issues for the smart home service, then it may cause a big plague of privacy and personal life.