• Title/Summary/Keyword: Personal-Information

Search Result 6,006, Processing Time 0.043 seconds

Personal Identification Using Teeth Images

  • Kim Tae-Woo;Cho Tae-Kyung;Park Byoung-Soo;Lee Myung-Wook
    • Proceedings of the IEEK Conference
    • /
    • summer
    • /
    • pp.435-437
    • /
    • 2004
  • This paper presents a personal identification method using teeth images. The method uses images for teeth expressions of anterior and posterior occlusion state and LDA-based technique. Teeth images give merits for recognition because teeth, rigid objects, cannot be deformed at the moment of image acquisition. In the experiments, personal identification for 12 people was successful. It was shown that our method can contribute to multi-modal authentication systems.

  • PDF

Legal Issues of Blockchain in Personal Information Protection : Based on GDPR and Personal Information Protection Act (개인정보보호법제 관점에서 본 블록체인의 법적 쟁점 GDPR 및 국내 개인정보보호법을 바탕으로)

  • Park, Minjung;Chai, Sangmi;Lee, Myoung Jun
    • Journal of Information Technology Applications and Management
    • /
    • v.25 no.2
    • /
    • pp.133-146
    • /
    • 2018
  • The technical definition of Blockchain is commonly known 'distributed ledger', however, there is no legal definition for being accepted in worldwide. Therefore, unless legal definitions and concepts of Blockchain are presented, there is a possibility that various legal disputes will occur in the future in Blockchain environment. The purpose of this study is to derive legal issues related to personal information protection that can be conflicted in Blockchain environment based on domestic Privacy Act and GDPR. The outcomes of this study can prevent various legal disputes and provide solutions that may occur due to the spread of Blockchain. It also suggests the foundation for the improvement of Privacy Act. Finally, it contributes to activate of Blockchain, industry, in Korea.

Research Using Human Biological Materials and Institutional Review Board Review (인체유래물을 사용하는 연구와 Institutional Review Board 심의 )

  • Mi-Kyung Lee
    • The Journal of KAIRB
    • /
    • v.6 no.2
    • /
    • pp.33-37
    • /
    • 2024
  • Recently, with the development of biotechnology and molecular genetics, research using human biological materials has been receiving attention, and the demand for the use of human- biological materials has also increased significantly. In particular, human biological materials contain the personal information of the person providing them, so special care must be taken to protect personal information throughout the entire process from drafting the human biological materials research plan, Institutional Review Board (IRB) review, and research progress. In addition, it is important to appropriately utilize residual human biological materials obtained during medical diagnosis and treatment at medical institutions to achieve scientific results, while protecting the rights of human biological materials providers and improving the method of expressing consent so as not to damage the trust of human biological materials providers in researchers. To this end, it is necessary to provide sufficient information and education so that researchers and IRB members can understand and apply related laws such as the Bioethics Act and the Personal Information Protection Act.

  • PDF

The Proposal of System Structure for Using Safe Personal Mobility Devices (안전한 개인형 이동장치 사용을 위한 시스템 구조 제안)

  • Kim, Wantae;Park, Byungjoon;Kim, Hyunsik
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.18 no.3
    • /
    • pp.33-41
    • /
    • 2022
  • Recently the use of personal mobility devices is rapidly increasing, and the businesses related to personal mobility devices are quickly growing as well. Although the use of personal mobility devices provides convenience for short distance movements, many problems occur due to the lack of safety devices and the absence of associated road traffic laws. The number of accidents caused by using personal mobility devices continues increasing every year, and the injuries or deaths are seriously happening with those accidents. When using personal mobility devices, there are basic safety precautions such as wearing a helmet, prohibiting boarding with more than two people, prohibiting boarding with more than 100kg, prohibiting using after drinking alcohol, and so on. However, it is exposed to traffic accidents because there is no way to check before using the system. Therefore, to ensure the user's safety in using the electric kickboard among personal mobility devices, this paper proposes a system that can check the user's safety state before using the electric kickboard. It is possible to safely use personal mobility devices and prevent accidents by proposing a system structure of the electric kickboard that can be used after checking for the use of more than two people, overweight, wearing a helmet, and drinking alcohol.

A Legal Review of Personal Information Protection for Invigorating Online Targeted Advertising: Focusing on the Concept of Personal Information (온라인 맞춤형 광고 활성화를 위한 개인 정보 보호에 대한 법적 고찰: '개인 정보'의 개념을 중심으로)

  • Cho, Jae-Yung
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.20 no.2
    • /
    • pp.492-497
    • /
    • 2019
  • This study analysed the legal concept of personal information(PI), which was not differentiated from behavioral information, and established it clearly for invigorating online targeted advertising(OTA), which draw attention in big data era; by selecting Guidelines of Assessment of Data Breach Incident Factors and Guidelines of Measures for No-Identifying Personal Information based on Personal Information Protection Act(PIPA) and Enforcement Decree of the PIPA. As a result, PI was defined as any kind of information relating to (1)a living individual(not group, corporate body or things etc.); (2)makes possibly identify the individual by his or her identifiers such as name, resident registration number, image, etc. (not included if not identify the individual); and (3)including information like attribute values which makes possibly identify any specific individual, if not by itself, but combined with other information which can be actually collected and combined). Specifically, PI includes basic, proper distinguishable, sensitive and other PI. It is suggested that PI concept should be researched continually with digital technology development; the effectiveness of the Guidelines of PI Protection in OTA, the legal principles of PI protection from not only users' but business operators' perspectives and the differentiation between PI and behavioral information in OTA should be researched.

A Study on Dental Hygienist' Knowledge, Awareness and Performance of Patient's Personal Information Protection (환자 개인정보보호에 관한 치과위생사의 지식과 인식도 및 실천도에 관한 연구)

  • Choi, Ye-Jin;Kang, Hyun-Kyung
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.17 no.2
    • /
    • pp.416-426
    • /
    • 2016
  • This study intended to identify dental hygienists' knowledge and extent of awareness and performance of patient's personal information protection. In addition, this research was conducted to contribute to medical centers' preparation of measures to strengthen the personal information protection by identifying the factors affecting dental hygienists' extent of performance related to the patient's personal information protection. After explaining the purpose and meaning of the research to the survey participants and gaining their consent, a self-administered survey was conducted from November 7, 2014 to June 30, 2015. The data on 210 dental hygienists in Busan city and Gyeongsangnam-do province was used for analysis. As a result, in dental hygienists with more than 10 years experience, the extent of the performance was significantly high (p<.05). In positions higher than a senior manager, the extent of knowledge was high (p<.01) and the extent of performance was significantly high (p<.05). In hospitals with more than 10 to 20 workers, the extent of awareness was significantly high (p<.05). Regarding the correlation of knowledge and the extent of awareness and performance, a high level of knowledge showed a positive correlation of the extent of awareness and performance (p<.01). As a result of a survey regarding what effects dental hygienists' knowledge and extent of awareness of patient's personal information protection have on dental hygienists' extent of performance, it was found that knowledge (.231) and the extent of awareness (.212) are factors affecting the extent of performance. Therefore, to increase the extent of dental hygienists' performance of patient's personal information protection, there is a need to improve the knowledge of patient's personal information protection and change its awareness. To change the awareness of patient's personal information protection, there is a serious need to carry out education targeting dental hygienists.

Verifiable Could-Based Personal Health Record with Recovery Functionality Using Zero-Knowledge Proof (영지식 증명을 활용한 복원 기능을 가진 검증 가능한 클라우드 기반의 개인 건강기록)

  • Kim, Hunki;Kim, Jonghyun;Lee, Dong Hoon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.6
    • /
    • pp.999-1012
    • /
    • 2020
  • As the utilize of personal health records increases in recent years, research on cryptographic protocol for protecting personal information of personal health records has been actively conducted. Currently, personal health records are commonly encrypted and outsourced to the cloud. However, this method is limited in verifying the integrity of personal health records, and there is a problem with poor data availability because it is essential to use it in decryption. To solve this problem, this paper proposes a verifiable cloud-based personal health record management scheme using Redactable signature scheme and zero-knowledge proof. Verifiable cloud-based personal health record management scheme can be used to verify the integrity of the original document while preserving privacy by deleting sensitive information by using Redactable signature scheme, and to verify that the redacted document has not been deleted or modified except for the deleted part of the original document by using the zero-knowledge proof. In addition, it is designed to increase the availability of data than the existing management schemes by designing to recover deleted parts only when necessary through the Redact Recovery Authority. And we propose a verifiable cloud-based personal health record management model using the proposed scheme, and analysed its efficiency by implementing the proposed scheme.

Research on a Model that reflects requests to suspend processing personal data in real time (개인정보 처리정지 요청을 실시간 반영하는 모델 연구)

  • Younhee Hong;Sang-Soo Ye
    • Journal of Platform Technology
    • /
    • v.12 no.1
    • /
    • pp.141-150
    • /
    • 2024
  • The importance of personal data protection is increasingly emphasized both at home and abroad, and while overseas countries are applying various policies and dynamic management technologies, there are some gaps between compliance with laws and regulations and the application of technologies in Korea, and there are few user interfaces that provide convenient ways for data subjects to stop processing personal data. This study first analyzes the need for dynamic personal information consent management technology, the current state of the industry, and the prospects for its development. Next, this study proposes a basic model for dynamic management of personal information consent that maximizes the data subject's right to personal data self-determination while strictly complying with personal data protection laws in Republic of Korea. In particular, this study analyzes the basis of domestic laws and regulations related to the suspension of personal data processing, designs a basic model of personal data consent dynamic management interface, and presents its effectiveness. Based on the results of this study, we expect that the proposed dynamic management model for personal data use consent can be used in various ways for various websites and applications in the future.

  • PDF

A Study on the Priority of 『Personal Information Safety Measure』 Using AHP Method: Focus on the Defferences between Financial Company and Consignee (AHP 기법을 이용한 금융회사 『개인정보의 안전성 확보조치 기준』 우선순위에 관한 연구: 금융회사 위·수탁자 간 인식 차이를 중심으로)

  • KIM, Seyoung;KIM, Inseok
    • The Journal of Society for e-Business Studies
    • /
    • v.24 no.4
    • /
    • pp.31-48
    • /
    • 2019
  • To survive in the trend of the fourth industrial revolution, companies are putting a lot of attention and effort into personalization services using the latest technologies such as big data, artificial intelligence and the Internet of Things, while entrusting third parties to handle personal information on the grounds of work efficiency, expertise and cost reduction. In such an environment, consignors need to check trustees on a more effective and reasonable basis to ensure personal information safety for trustees. This study used AHP techniques to derive the importance and priority of each item of "Personal Information Safety Assurance Measures" for financial companies and trustees, and objectively compared and analyzed differences in perceptions of importance between financial institutions and trustees. Based on this, the company recognizes the difference between self-inspection of financial institutions and inspection of trustees and presents policy grounds and implications for applying differentiated inspection standards that reflect the weights appropriate for the purpose.

Exploring University Student's Responses to Consumer Information in Personal Media Using Critical Incident Technique: Focusing on YouTube (결정적 사건기법을 적용한 대학생의 1인 미디어 소비자정보에 대한 반응 탐색: 유튜브를 중심으로)

  • Jang, Eun-Gyo;Liu, Qiaoling;Lee, Jin-Myong
    • Journal of Digital Convergence
    • /
    • v.17 no.10
    • /
    • pp.127-139
    • /
    • 2019
  • This study aims to explore the impressive experiences of university students on YouTube media and to find ways to improve personal media as useful consumer information. 44 university students were selected, and data on the experience of using YouTube were collected and analyzed by applying the critical incident technique. As a result, the positive responses to personal media were derived from 'enhancing C2C information capabilities', 'consumer-centric usability', 'attractive information creators', 'a sense of the sameness', and 'fresh and entertaining information'. Negative responses were derived from 'spreading of harmful information', 'distrust in information creators', 'inducing excessive advertising and impulse buying', 'media addiction' and 'relative deprivation'. In addition, improvement of the personal media has been suggested. This study has differentiation and significance as a qualitative data for understanding consumer's perception and experience of personal media.