• Title/Summary/Keyword: Personal Use

Search Result 2,682, Processing Time 0.032 seconds

Design of an USB Security Framework for Double Use Detection (이중사용 방지를 위한 USB 보안 프레임워크의 설계)

  • Jeong, Yoon-Su;Lee, Sang-Ho
    • Journal of the Korea Society of Computer and Information
    • /
    • v.16 no.4
    • /
    • pp.93-99
    • /
    • 2011
  • Recently, the development of internet technology makes user's personal data used by being saved in USB. But there is a critical issue that personal data can be exposed with malicious purpose because that personal data doesn't need to be certificate to use. This paper proposes USB security framework to prevent a duplicate use of personal data for protecting the data which in USB. The proposed USB security framework performs certification process of user with additional 4bite of user's identification data and usage choice of USB security token before certification data when the framework uses USB security product in different network. It makes communication overhead and service delay increased. As a result of the experiment, packet certification delay time is more increased by average 7.6% in the proposed USB security framework than simple USB driver and USB Token, and procedure rate of certification server on the number of USB is also increased by average 9.8%.

Real-time Network Middleware Supporting Fault-Tolerant Operations for Personal Robot System

  • Choo, Seong-Ho;Park, Hong-Seong
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2005.06a
    • /
    • pp.756-760
    • /
    • 2005
  • By development of a robot technology, personal robot is being developed very actively. Various infra-technologies are accumulated in hardware and software how by internal a lot of research and development efforts, and it is circumstance that actual commodity is announced. But, personal robot is applied to be acting near human, and takes charge of safety and connected directly a lot of works of home security, gas-leakage, fire-warning facilities, or/and etc. So personal robot must do safe and stable action even if any unexpected accidents are happened, important functions are always operated. In this paper, we are wished to show design structures for supporting fault-tolerant operation from our real-time robot middleware viewpoint. Personal robot, in being developed, was designed by module structure to do to interconnect and to interoperate among each module that is mutually implemented by each research facilities or company. Also, each modules can use appreciate network system that is fit for handling and communicating its data. To guarantee this, we have being developed a real-time network middleware, for especially personal robot. Recent our working is to add and to adjust some functions like connection management, distributed routing mechanism, remote object management, and making platform independent robot application execution environment with self-moving of robot application, for fault-tolerant personal robot.

  • PDF

Safety Improvement Methods of Personal Identification Services using the i-Pin (아이핀 기반 본인확인서비스의 안전성 강화 방안)

  • Kim, Jongbae
    • Journal of Information Technology Services
    • /
    • v.16 no.2
    • /
    • pp.97-110
    • /
    • 2017
  • Due to development of IT, various Internet services via the non-face-to-face are increasing rapidly. In the past, the resident registration numbers (RRN) was used a mean of personal identification, but the use of RRN is prohibited by the relevant laws, and the personal identification services using alternative means are activated. According to the prohibition policy of RRN, i-PIN service appeared as an alternative means to identify a person. However, the user's knowledge-based i-PIN service continues to cause fraudulent issuance, account hijacking, and fraud attempts due to hacking accidents. Due to these problems, the usage rate of i-PIN service which performs a nationwide free personal identification service, is rapidly decreasing. Therefore, this paper proposes a technical safety enhancement method for security enhancement in the i-PIN-based personal identification service. In order to strengthen the security of i-PIN, this paper analyzes the encryption key exposure, key exchange and i-PIN authentication model problems of i-PIN and suggests countermeasures. Through the proposed paper, the i-PIN can be expected to be used more effectively as a substitution of RRN by suggesting measures to enhance the safety of personal identification information. Secured personal identification services will enable safer online non-face-to-face transactions. By securing the technical, institutional, and administrative safety of the i-PIN service, the usage rate will gradually increase.

A Study on the Perception of Personal Mobility Vehicle for the Improvement of Pedestrian Environment for the Disabled

  • Lee, Joohyung;Lee, Kyooil
    • Physical Therapy Rehabilitation Science
    • /
    • v.10 no.2
    • /
    • pp.124-133
    • /
    • 2021
  • Objective: In order to secure the right to walk for the weak, such as the disabled, this study aims to suggest ways to improve the pedestrian environment by identifying factors that cause obstacles to walking. Design: Data Analysis and Perception Survey. Methods: The questionnaire was conducted separately between users of personal mobility vehicle and non-users. A total of 207 effective questionnaires were collected, and the analysis analyzed the perception of personal mobility vehicle by conducting frequency analysis using SAS 9.4. The survey focused on basic information on respondents, walking conditions, understanding of personal mobility vehicle, awareness of pedestrian space passage and parking, and awareness of the possibility of securing pedestrian rights due to new regulations. Results: First, when moving a pedestrian path by personal mobility vehicle, it shall be limited to less than the walking speed of pedestrians. Second, the parking location of the personal mobility vehicle is located at the boundary of the pedestrian road and the lane. Third, pay a fair price to park in a pedestrian space. Conclusions: It is necessary to improve the system to strengthen the contents of education to take into account the safety of pedestrians in education on how to use personal mobility vehicle.

Effects of the Personal Stereo System on Hearing in Adolescents (개인용 음향기기 사용이 청소년의 청력에 미치는 영향)

  • Park, Jong-Seo;Oh, Sean-Hee;Kang, Pock-Soo;Kim, Chang-Yoon;Lee, Kyeong-Soo;Hwang, Tae-Yoon;SaKong, Joon
    • Journal of Preventive Medicine and Public Health
    • /
    • v.39 no.2
    • /
    • pp.159-164
    • /
    • 2006
  • Objectives : This study was conducted to evaluate the effects of the personal stereo system on the hearing in adolescents. Methods : A total of 68 adolescents(age: 13-18 years) who visited the ENT Department at a University Hospital in Daegu were personally interviewed. The questionnaires were about general characteristics of the subjects, the time of personal stereo system use (year, hour) and place. Cumulative exposure to the personal stereo system was calculated by the product of the total years and the daily hours of their use. Pure tone audiometry was performed and the hearing threshold was measured at 500, 1000, 2000, 4000 and 8000 Hz. Results : The average time of using a personal stereo system a day was about 3 hours and 75% of the subjects used a personal stereo system for 2-5 years. The elevation of threshold was more prominent in the subjects who used personal stereo systems for 4 years and more compared with those subjects who used them for 3 years and under. The elevation of hearing threshold was also more prominent in the subjects who used personal stereo systems for 4 hours and more a day compared with those subjects who used personal stereo systems for 3 hours and under a day. The elevation of hearing threshold was more prominent in the subjects who used personal stereo systems for 13 hour. years and more compared to the subjects who used them 12 hour. years and under. Conclusions : These results suggest that the elevation of hearing threshold can happen to adolescents who used personal stereo systems for a long time. In order to prevent hearing loss, we need to teach adolescents appropriate usage of the personal stereo system and hearing tests should be included in the periodic school-based physical examination for the adolescents.

The Influences of Family Life Cycle Stages and perceived Time Pressure on Strategies for Coping with Time Constraints in Hosuewife-Teachers (가족생활주기에 따른 교직주부의 시간제약지각이 시간제약대처전략에 미치는 영향)

  • 장윤옥
    • Journal of Families and Better Life
    • /
    • v.13 no.4
    • /
    • pp.165-180
    • /
    • 1995
  • The purpose of this study was to investigate the influences of family life cycle stages and perceived time pressure on strategies for coping with time constraints in housewife-teachers. The subjects of this study were 570 married women teachers who live with their husebands and children in junior and senior high schools in Taegu, A questionaire was used as survey method. Factor analysis and MANOVA were employed for data analysis and Scheffe test forpost-hoc analysis. The main findings were : First the effect of family life cycle stages on the use of personal time reducing strategies was different according to perceived time pressure. Second the effect of perceived time pressure on the use of personal time reducing strategies differed according to family life cycle stages. Third the use of strategies for coping with time contratins was found to be significantly different according to family life cycle stages, Forth there were significant differences in the use of strategies for coping with time constrainsts according to perceived time pressure.

  • PDF

A Study on Personal Adornment Associated with Sexual Orientation and Psychological Characteristics

  • Lee, Eun-Sil;Lee, Myoung-Hee
    • The International Journal of Costume Culture
    • /
    • v.3 no.3
    • /
    • pp.223-234
    • /
    • 2000
  • The objectives of this study were to investigate hair style preferences, and use of cosmetics according to sexual orientation and demographic variables, to examine the relationship among hair style preferences, use of cosmetics, and anxiety and self-esteem. The subjects were 536 men (heterosexual : 353, gay : 183) of 20's and 30's living in metropolitan area of Seoul. Homosexuals preferred individualistic adornments and appearance, and the higher the ability anxieties and the miscellaneous anxieties they in both sexual orientation groups preferred unique individualistic hairstyles and used coloring cosmetics more. In the sales and service workers and students both sexual orientation groups preferred individualistic personal adornment while in the office workers they both preferred conservative appearance. In the same occupations, there were significant differences in the physical adornments according to sexual orientation in the sales and service workers and students groups. Homosexuals used individual adornments according to their sexual orientation. Both homosexuals and heterosexuals had low use of physical adornments.

  • PDF

A Study on the Use Intention of Broadcasting Digital Switchover (지상파 디지털 전환 서비스 이용의도에 관한 연구)

  • Kim, Gwang-Suk;Park, Won-Jun
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.7 no.3
    • /
    • pp.507-513
    • /
    • 2012
  • This Paper focused on use intention at affect variable of broadcasting digital switchover. The author assumed that the perceived usability and perceived availability, social influence of technology acceptance model(TAM) are likely to affect the technological acceptance of broadcasting digital switchover. The results of this paper significant affect on the use intention of Social Influence, Personal Characteristics, Digital switchover perceive.

An Analysis on the Importance and Performance of Personal Information Protection for the Elderly Welfare Center Employees

  • You, Gil-Jun
    • Journal of the Korea Society of Computer and Information
    • /
    • v.23 no.11
    • /
    • pp.185-191
    • /
    • 2018
  • The purpose of this study is to present effective basic data for business management through analysis of importance and performance of personal information protection of the elderly welfare center workers. For this purpose, the questionnaire on the protection of personal information was reconstructed based on the diagnostic level of the personal information security management level of the public institution and the questionnaire was conducted on 105 employees of the elderly welfare center in Chungbuk area. Based on the responses to the importance and the degree of performance of the personal information protection of the elderly welfare center employees, technical statistics and corresponding sample T-tests were conducted and the importance-performance analysis (IPA) was used. Followings are the results of this study: First, there is a statistically significant difference between the importance and the implementation of the management system for the protection of personal information of the workers in the elderly welfare center, establishment and implementation of protection measures, establishment and implementation of infringement measures. Second, IPA analysis on the protection of personal information of the workers in the elderly welfare center shows that the establishment and implementation of protection measures are the areas to maintain good performance. Third, in IPA analysis of the sub-factors of the personal information protection of the workers in the welfare center of the elderly, in the construction and management of the management system, in performing the role of the personal information protection officer and establishing and implementing protection measures, The factors of prevention of information disclosure and exposure and the safe use and management of personal information processing system were analyzed as areas requiring intensive improvement. This study is meaningful as a basic research that can raise the awareness of the personal information protection of the workers in the elderly welfare center and induce the improvement of the related work.

A Study of the Alternative Means of Korean Resident Registration Number using the Authorized Certificate (공인인증서를 이용한 주민등록번호 대체수단에 관한 연구)

  • Lee, Young Gyo;Ahn, Jeong Hee
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.10 no.3
    • /
    • pp.107-117
    • /
    • 2014
  • The personal information extrusion accident(hacking, improper maintenance) by the internet has been increased rapidly during the last ten-year period. The personal information includes Korean resident registration number, name, cellphone number, home telephone number, E-mail address, home address, etc. Korean resident registration number is unchangeable from the cradle to the grave. Illegally accessed personal information can be wrongfully resoled or used at phishing scam. In this paper, we propose a alternative means of Korean resident registration number using the authorized certificate. The authorized certificate is in use safely in Internet. The authorized certificate(included Chinese name) is in used in offline service, the authorized certificate(included English name) is used in online(for government service) and the authorized certificate(not included name) is used in online(for private service). The authorized certificates are possible for discard, republication. The method can reduce the possibility of the personal information extrusion.