• Title/Summary/Keyword: Personal Communication Services

Search Result 358, Processing Time 0.023 seconds

Security Measures by Diagnosing Vulnerabilities in Web Applications

  • Kim, Hee Wan
    • International journal of advanced smart convergence
    • /
    • v.10 no.4
    • /
    • pp.22-29
    • /
    • 2021
  • For web application vulnerability diagnosis, from the development stage to the operation stage, it is possible to stably operate the web only when there is a policy that is commonly applied to each task through diagnosis of vulnerabilities, removal of vulnerabilities, and rapid recovery from web page damage. KISA presents 28 evaluation items for technical vulnerability analysis of major information and communication infrastructure. In this paper, we diagnose the vulnerabilities in the automobile goods shopping mall website and suggest security measures according to the vulnerabilities. As a result of diagnosing 28 items, major vulnerabilities were found in three items: cross-site scripting, cross-site request tampering, and insufficient session expiration. Cookie values were exposed on the bulletin board, and personal information was exposed in the parameter values related to passwords when personal information was edited. Also, since the session end time is not set, it was confirmed that session reuse is always possible. By suggesting security measures according to these vulnerabilities, the discovered security threats were eliminated, and it was possible to prevent breaches in web applications and secure the stability of web services.

Nursing Guide for Occupational Health Nurses Working in Small-scale-enterprises (집단보건관리 산업간호사를 위한 간호업무 지침)

  • Yoo, Kyung Hae
    • Korean Journal of Occupational Health Nursing
    • /
    • v.8 no.1
    • /
    • pp.68-83
    • /
    • 1999
  • Occupational health nursing (OH N) guide book has been perceived as necessary since group occupational health services started. This study aimed to develop the guidebook for occupational health nurses working in small-scale enterprises(SSE). The guide area of nursing services was selected in 10 categories. These areas were 4 Workplace attitude for occupational health nursing', 'Nursing process', 'Workplace environmental monitoring', 'Personal protective devices', 'Record', 'Health counselling', 'Communication', 'Health education', 'Health screening' and 'Health promotion'. The content was mainly constructed with literature review. The pretest was done to find out what OH nurses do feel about their OH nursing services. Figures were used to guide some occupational health nursing services (OHNS). The further research was expected to develop in more extensive depth and quality.

  • PDF

A Study on Home Healthcare Convergence for IEEE 11073 Standard (IEEE 11073 표준을 위한 홈 헬스케어 융합에 대한 연구)

  • Oh, Am-Suk
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.19 no.2
    • /
    • pp.422-427
    • /
    • 2015
  • Medical paradigm shift has been based on disease treatment into wellness care so that changes need more IT-based smart medical services. In addition, individual based smart devices are more focused on healthcare services and can provide access to personal medical information, health conditions and social welfare managed by users. In this paper, IEEE11073 PHD (Personal Health Devices) and HL7 (Health Level 7) standards of legacy healthcare devices are developed for communicating with each individual based smart device and providing healthcare service in smart TV environment through a unified home healthcare gateway.

A Study on the Role and Security Enhancement of the Expert Data Processing Agency: Focusing on a Comparison of Data Brokers in Vermont (데이터처리전문기관의 역할 및 보안 강화방안 연구: 버몬트주 데이터브로커 비교를 중심으로)

  • Soo Han Kim;Hun Yeong Kwon
    • Journal of Information Technology Services
    • /
    • v.22 no.3
    • /
    • pp.29-47
    • /
    • 2023
  • With the recent advancement of information and communication technologies such as artificial intelligence, big data, cloud computing, and 5G, data is being produced and digitized in unprecedented amounts. As a result, data has emerged as a critical resource for the future economy, and overseas countries have been revising laws for data protection and utilization. In Korea, the 'Data 3 Act' was revised in 2020 to introduce institutional measures that classify personal information, pseudonymized information, and anonymous information for research, statistics, and preservation of public records. Among them, it is expected to increase the added value of data by combining pseudonymized personal information, and to this end, "the Expert Data Combination Agency" and "the Expert Data Agency" (hereinafter referred to as the Expert Data Processing Agency) system were introduced. In comparison to these domestic systems, we would like to analyze similar overseas systems, and it was recently confirmed that the Vermont government in the United States enacted the first "Data Broker Act" in the United States as a measure to protect personal information held by data brokers. In this study, we aim to compare and analyze the roles and functions of the "Expert Data Processing Agency" and "Data Broker," and to identify differences in designated standards, security measures, etc., in order to present ways to contribute to the activation of the data economy and enhance information protection.

A Study on the User Identification and Authentication in the Smart Mirror in Private (사적공간의 스마트미러에서 사용자 식별 및 인증 기법 연구)

  • Mun, Hyung-Jin
    • Journal of Convergence for Information Technology
    • /
    • v.9 no.7
    • /
    • pp.100-105
    • /
    • 2019
  • As IoT Technology develops and Era of Hyperconnectivity comes, various kinds of customized services became available. As a next-generation display, a smart mirror accesses multimedia devices and provides various services, so it can serve as a social learning tool for the children and the old ones, as well as adults who need information. Smart Mirror must be able to identify users for individualized services. However, since the Smart Mirror is an easily accessible device, there is a possibility that information such as an individual's pattern and habit stored in the smart mirror may be exposed to the outside. Also, the other possibility of leakage of personal location information is through personal schedule or appointment stored in the smart mirror, and another possibility that privacy can be violated is through checking the health state via personal photographs. In this research, we propose a system that identify users by the information the users registered about their physique just like their face, one that provides individually customized service to users after identifying them, and one which provides minimal information and service for unauthenticated users.

A Coordinated Ciphertext Policy Attribute-based PHR Access Control with User Accountability

  • Lin, Guofeng;You, Lirong;Hu, Bing;Hong, Hanshu;Sun, Zhixin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.4
    • /
    • pp.1832-1853
    • /
    • 2018
  • The personal health record (PHR) system is a promising application that provides precise information and customized services for health care. To flexibly protect sensitive data, attribute-based encryption has been widely applied for PHR access control. However, escrow, exposure and abuse of private keys still hinder its practical application in the PHR system. In this paper, we propose a coordinated ciphertext policy attribute-based access control with user accountability (CCP-ABAC-UA) for the PHR system. Its coordinated mechanism not only effectively prevents the escrow and exposure of private keys but also accurately detects whether key abuse is taking place and identifies the traitor. We claim that CCP-ABAC-UA is a user-side lightweight scheme. Especially for PHR receivers, no bilinear pairing computation is needed to access health records, so the practical mobile PHR system can be realized. By introducing a novel provably secure construction, we prove that it is secure against selectively chosen plaintext attacks. The analysis indicates that CCP-ABAC-UA achieves better performance in terms of security and user-side computational efficiency for a PHR system.

A Study of Authentication Scheme based on Personal Key for Safety Intelligent Vehicle (안전한 지능형 자동차를 위한 개인키 기반의 인증 기법에 관한 연구)

  • Lee, Keun-Ho
    • Journal of Digital Convergence
    • /
    • v.12 no.2
    • /
    • pp.549-554
    • /
    • 2014
  • Studies on the intelligent vehicles that are converged with IT and vehicular technologies are currently under active discussion. A variety of communication technologies for safety intelligent vehicle services are support. As such intelligent vehicles use communication technologies, they are exposed to the diverse factors of security threats. To conduct intelligent vehicle security authentication solutions, there are some factors that can be adopted ownership, knowledge and biometrics[6,7]. This paper proposes to analyze the factors to threaten intelligent vehicle, which are usually intruded through communication network system and the security solution using biometric authentication scheme. This study proposed above user's biometrics information-based authentication scheme that can solve the anticipated problems with an intelligent vehicle, which requires a higher level of security than existing authentication solution.

The Influence of General Characteristics, Temperament, and Attachment on the Development of Young Children in Institutional Care (양육시설 영유아의 일반적 특성과 기질 및 애착안정성이 발달에 미치는 영향)

  • Yang, Sim Young
    • Korean Journal of Child Studies
    • /
    • v.37 no.3
    • /
    • pp.83-93
    • /
    • 2016
  • Objective: This study examined that general characteristics such as gender, age, period of stay at an institution, size of facility, and temperament and attachment affect young children's development under institutional care. Methods: A total of 94 young children (ages 2-4years), who live in 32 institutions in Seoul were assessed on their development using the Korean-Age & Stage Questionnaire. Pearson productmoment correlation analysis, and multiple regression analyses were used for data analysis. Results: The major findings of this study were as follows: first, a longer period of stay at an institution had more positive effects on the development of communication. Facilities with more than 60 children had lower communication, gross motor, and fine motor development compared to facilities with less than 60 children. Second, social temperament had positive effects on communication, problem solving, and personal-social development. Emotional temperament had no effects on all development areas. Third, attachment had positive effects on all development areas. Lastly, social temperament and attachment had interactive effects on communication, gross motor, problem solving, and personal-social development. Conclusion: These results imply that caretakers in institutions should give developmental mediation services for considering temperament and facilitation of attachment.

A study on the Development Plan of Personal Information Protection System (개인정보보호 체계 발전 방안에 대한 연구)

  • Sang-Hyun Joo;Byoung-Hoon Choi;Jin-Yong Lee;Sam-Hyun Chun
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.24 no.4
    • /
    • pp.167-176
    • /
    • 2024
  • The Personal Information Protection Commission was launched in August 2020 as an integrated control tower for personal information protection, but several problems have been pointed out in the personal information protection operation system. First, despite the fact that Korea's personal information protection system has an integrated legal system that regulates both the public and private sectors, it has been pointed out that it is difficult to carry out smooth personal information protection functions due to incomplete integration of protection functions, such as the Financial Services Commission being in charge of personal credit information protection and the Korea Communications Commission being in charge of personal location information protection. Next, despite the increasing number of public sector personal information leakage incidents, there is a lack of personnel with expertise and specialized support organizations to efficiently investigate them, and there is a concern that the lack of an efficient response system to personal information infringement by global IT companies in Korea in the era of digital commerce may weaken the protection of citizens' personal information. In order to solve these problems, I reviewed overseas cases and literature and proposed the following measures. First, it is necessary to centralize the personal information protection supervision function for credit information and location information to the Personal Information Protection Commission. Second, it is necessary to secure expertise by securing specialized personnel and establishing specialized institutions to respond to public sector personal information leakage incidents. Third, it is necessary to revitalize the domestic agency designation system and establish an international cooperation system to protect people's personal information in the digital commerce era. I believe that these measures to develop the personal information protection system will lead to more systematic personal information protection.

A Design and Implementation of Personal VOD System using Multi-thread (다중 스래드를 이용한 개인용 VOD 시스템의 설계와 구현)

  • Park, Sung-Sik;Lee, Ho-Suk
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.6 no.3
    • /
    • pp.299-310
    • /
    • 2000
  • In this paper, we designed and implemented a personal VOD server using multi-thread for the real-time services of video data to the users. The system consists of service manager, disk manager, and network manager. The service manager controls the user admission to the system using the VBR(Variable Bit Rate) characteristics of MPEG (Moving Picture Experts Group) video data. The disk manager provides the functions for VCR-like operations. The disk manager reads blocks from the disk by the size of GOP(Group of Pictures) and buffers the data to the user's thread. The network manager uses TCP/IP for the communication between the server and the client. The communication starts from the client and the VOD server must respond to this request. The implemented personal VOD system shows an acceptable performance.

  • PDF