• Title/Summary/Keyword: Personal Information protection

Search Result 784, Processing Time 0.029 seconds

Activation of Health Care Big Data (헬스케어 분야에서의 빅데이터 활용 활성화 방안)

  • Moon, Ja-hwa
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2021.05a
    • /
    • pp.483-486
    • /
    • 2021
  • With the explosive increase in data, the 'big data era' has arrived, focusing on deriving new values and insights through data. With the development of data analysis technology, the importance of data analysis and utilization in the field of diagnosis and treatment as well as prevention is expanding, while the use of big data is emerging in the healthcare field. Moreover, as the three data-related laws (Personal Information Protection Act, Information and Communication Network Act, and Credit Information Act) were passed in January 2020, it became possible to use a wide range of big data through pseudonym information. However, the use of healthcare big data is still struggling due to various policies and regulations, inconsistent data quality, and the absence of specialized personnel. Therefore, in this study, examines the current state of use of big data in the healthcare field, and analyzes the challenges, overseas cases, plans, and expected effects for activation of healthcare big data.

  • PDF

Personal Information Protection Recommendation System using Deep Learning in POI (POI 에서 딥러닝을 이용한 개인정보 보호 추천 시스템)

  • Peng, Sony;Park, Doo-Soon;Kim, Daeyoung;Yang, Yixuan;Lee, HyeJung;Siet, Sophort
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2022.11a
    • /
    • pp.377-379
    • /
    • 2022
  • POI refers to the point of Interest in Location-Based Social Networks (LBSNs). With the rapid development of mobile devices, GPS, and the Web (web2.0 and 3.0), LBSNs have attracted many users to share their information, physical location (real-time location), and interesting places. The tremendous demand of the user in LBSNs leads the recommendation systems (RSs) to become more widespread attention. Recommendation systems assist users in discovering interesting local attractions or facilities and help social network service (SNS) providers based on user locations. Therefore, it plays a vital role in LBSNs, namely POI recommendation system. In the machine learning model, most of the training data are stored in the centralized data storage, so information that belongs to the user will store in the centralized storage, and users may face privacy issues. Moreover, sharing the information may have safety concerns because of uploading or sharing their real-time location with others through social network media. According to the privacy concern issue, the paper proposes a recommendation model to prevent user privacy and eliminate traditional RS problems such as cold-start and data sparsity.

Mobile App Privacy Checklist for Consumer (모바일 앱 프라이버시 보호를 위한 소비자 체크리스트)

  • Li, Hua-Yu;Kim, Lin-Ah;Rha, Jong-Youn
    • Journal of Digital Convergence
    • /
    • v.13 no.6
    • /
    • pp.1-12
    • /
    • 2015
  • In recent years, the privacy concern for mobile consumers is emerging as the use of mobile application(apps) is growing according to the rapid spread of mobile devices such as smart phones and tablet PCs. To improve privacy protections in the mobile communications and apps, overseas organizations are announcing guidelines and/or checklists for stake holders. Although personal information protection guidelines for application developers have been prepared in the country, efforts to improve consumer privacy capability is insufficient. Thus, in this paper we first scope the app privacy related guidelines in both domestic and foreign affairs, then present the risk factors of privacy invasion by the stage of mobile application use based on the "Privacy Protection Act", offering privacy checklists for consumers. This checklist will enhance the self-management capability of consumer privacy and create virtuous cycle in the mobile ecosystem.

Recognition and Using Status of Carbon Disulfide (CS2) as Fumigant for Controlling Chestnut Weevil, Curculio sikkimensis among Chestnut Farmers (일부 밤 농사 및 가공 종사자의 밤바구미 훈증제 이황화탄소 사용실태 및 인식)

  • Lee, Moo-Sik;Kim, Eun-Young;Lee, Jae-Lim;Sohn, Gi-Yeon
    • Journal of agricultural medicine and community health
    • /
    • v.41 no.2
    • /
    • pp.63-74
    • /
    • 2016
  • Objectives: We surveyed the awareness and current status of using fumigant carbon disulfide for exterminate Curculio sikkimensis among chestnut farmers in Chungnam Province to suggest directions for health education and public relations. Methods: We designed questionnaires to evaluate recognition of fumigant carbon disulfide. We conducted a questionnaire survey to assess recognition and recognition level of fumigant carbon disulfide by the study variables. Results: The recognition status for fumigant carbon disulfide was 74.5%, but the recognition level was low (know well 27.5%). The path of recognition was 45.1% and 15.7% for neighbor and rural technology center, respectively. The recognition status for warning label of fumigant carbon disulfide was 52.9%. Recognition for warning label of fumigant carbon disulfide was tended to increase with high educational attainment, bigger owning land area. Recognition on the content of warning label were 29.4%, 27.5%, 21.6%, and 21.6% for inflammability, toxicity, hazard, and explosiveness, respectively. Using personal protection equipment was tended to increase with the high status of awareness on fumigant carbon disulfide. Conclusions: Health education programs for using fumigant carbon disulfide are needed for chestnut farmers. In addition, publicity information activities about prevention and protection of carbon disulfide poisoning are needed for high risk farmers.

A study on Activation Measures of Local Mobile Easy-to-use Payment (국내 모바일 간편결제 활성화 방안에 관한 연구)

  • Jeong, Gi Seog
    • Convergence Security Journal
    • /
    • v.15 no.4
    • /
    • pp.73-82
    • /
    • 2015
  • Thanks to popularization of smart phone, mobile payment market is growing rapidly. As the obligatory use of digital certificate is abolished, easy-to-use payment that can settle with only password is being launched one after another. But its spreading speed is not fast highly. Because of concern about personal information leakage and security, unchangeability of payment habit, insufficiency of consumer protection, inadequacy of payment infrastructure and all sorts of regulations, easy-to-use payment is not activated. Recently global IT companys are entering mobile payment market competitively. It is because the sense of crisis that their survival can be dangerous from now on if they get left behind Fintech innovation and the mentality that they try to take the leadership of mobile payment market process. In this situation, the thorough preparation and a lot of effort are required to promote our autonomous easy-to-use payment growth without dependance on foreign country's. In this paper, the problems of local mobile easy-to-use payment are addressed in depth and the activation measures such as flexible and discriminative security, construction of customer protection system, law system maintenance, service differentiation are proposed.

The Disaster Welfare and Community Response in Japan (일본의 재해복지와 지역사회의 대응방안)

  • Park, Jung-Ran
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.17 no.1
    • /
    • pp.199-208
    • /
    • 2016
  • This study examined the trends and practices of disaster welfare in Japan, particularly with the point of view of the community response. This study summarized the experiences and implications of Japan's disaster welfare. First, it is necessary to establish a foundation and linkage of support networks. In case of a disaster, the linkages among administrations, social work institutions, and community residents are required to understand the accurate situation and needs, and to develop resources. In particular, the constitution of DWAT was submitted for initial intervention. Second, the establishment of a manpower dispatching system is needed for emergency situations. In addition, the methods to cover the entire areas by system are needed. Third, the intervention of psychological treatment was shown have a low agreement rate among specialists. Fourth, it is necessary to have guidelines so that privacy protection is compatible with disaster support in a disaster welfare practice process.

How Does Smart-device Literacy Shape Privacy Concerns: The Moderation of Privacy and the Mediation of Online Social Participation and Information Veracity (스마트기기 활용역량과 프라이버시 우려: 온라인 사회참여 활동과 정보 사실성 판단 능력의 매개효과 및 프라이버시의 조절효과)

  • Hyeon-jeong Kim;Beomsoo Kim
    • Knowledge Management Research
    • /
    • v.24 no.1
    • /
    • pp.51-72
    • /
    • 2023
  • Digital literacy is vital knowledge and ability of an individual in the information society. As the level of digital literacy increases, the interest in privacy protection increases. This change may hinder the use of digital technologies and services. This research examines (1) the mediating effect of online social participation and information veracity on smart device literacy and privacy concerns, and (2) the moderating effect of privacy literacy. Using Korean media panel survey data reported in 2020 and in 2021, this study analyzes the responses of 7,737 people who use smart devices and participate in online activities. SPSS and PROCESS Macro are used to test the research model and hypotheses. In the analysis of 2020 and 2021 survey, this research shows that smart device literacy has major effects on privacy concerns; confirms that the mediating effect of online social participation; moderated meditating effect of privacy literacy. Although information veracity is not significant in 2020, mediating and moderated mediating effects are found in 2021.

Smartphone User Authentication Algorithm based on Mutual Cooperation in Mobile Environment (모바일 환경에서 상호 협력 기반 스마트폰 사용자 인증 알고리즘)

  • Jeong, Pil-Seong;Cho, Yang-Hyun
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.21 no.7
    • /
    • pp.1393-1400
    • /
    • 2017
  • As the number of smartphone users increases, vulnerability to privacy protection is increasing. This is because personal information is stored on various servers connected to the Internet and the user is authenticated using the same ID and password. Authentication methods such as OTP, FIDO, and PIN codes have been introduced to solve traditional authentication methods, but their use is limited for authentication that requires sharing with other users. In this paper, we propose the authentication method that is needed for the management of shared information such as hospitals and corporations. The proposed algorithm is an algorithm that can authenticate users in the same place in real time using smart phone IMEI, QR code, BLE, push message. We propose an authentication algorithm that can perform user authentication through mutual cooperation using a smart phone and can cancel realtime authentication. And we designed and implemented a mutual authentication system using proposed algorithm.

A New Model for Codes of Ethics for Librarians of South Korea (한국의 사서직 윤리규정 방향 제안)

  • Kim, Hae-Kyoung;Nam, Tae-Woo
    • Journal of the Korean Society for information Management
    • /
    • v.21 no.4 s.54
    • /
    • pp.329-352
    • /
    • 2004
  • In this knowledge-based society of this age, librarianship takes a professional position and requires essential principles of ethics that has to be observed. Therefore, library associations and professional communities all over the world have released criteria and code of ethics to make their professional positions to keep. This research investigated and analyzed the codes of ethics for librarians in United States, Great Britain, Japan, and South Korea which are based on the mission of each library of each country. Based on these analysis and comparison, this research proposed more advanced codes of ethics for South Korea. The proposed model of codes of ethics consists of two parts: ethics for information and ethics for professional positions. The ethics for information contains six essential elements: equal access and services for information, denial of inspection, protection of privacy, neutralization of librarian, and security of intellectual freedom. The ethics for professional positions consists of 8 essential aspects: exclusion of personal benefit, continuous efforts for developing knowledge, keep the professional position, conflicts between professional task and organization, relationship with co-workers, ensure the conditions of rights and welfare for employees, cooperations among libraries, and contribution for creation of new culture.

Study on the Korea Information System of Criminal Justice Services (형사사법정보시스템(KICS)의 활용실태 및 개선방안)

  • Shin, Sung Shik
    • Convergence Security Journal
    • /
    • v.15 no.4
    • /
    • pp.141-147
    • /
    • 2015
  • KICS is intended to facilitate the computerization of the criminal justice process and realize a quick and transparent criminal justice process. Thus, it has been operating in the field of criminal justice by establishing criminal justice portal for the empowerment of the people. While in 2008 the opposition by the Court concerns the independent function of the judiciary and privacy violations presented in conjunction with its own operating system between the judiciary and other institutions. KICS improve office productivity by creating documents in a single criminal justice agencies to reduce costs, and costs of document exchange between criminal justice agencies. Secondly, the decision-making process is simplified by using the electronic documentation system and speed up, bind and document handling procedures ranging from preserving documents received are reduced dramatically contribute to the competitiveness of the organization through business improvement. Third, The use of an electronic document stored in the information is easy, and it is possible to easily access a variety of information can facilitate the realization of an open state by smoothly to provide information about the people. Finally, KICS building a network of criminal legal systems to maximize the benefits and the electronic integration effect it is being evaluated to improve the overall efficiency of the criminal legal system.