• Title/Summary/Keyword: Personal-Information

Search Result 6,006, Processing Time 0.028 seconds

A Personal Prescription Management System Employing Optical Character Recognition Technique (OCR 기반의 개인 처방전 관리 시스템)

  • Kim, Jae-wan;Kim, Sang-tae;Yoon, Jun-yong;Joo, Yang-Ick
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.19 no.10
    • /
    • pp.2423-2428
    • /
    • 2015
  • We have implemented a personal prescription management system which enables resource-limited mobile device to utilize the optical character recognition technique. The system enables us to automatically detect and recognize the text in the personal prescription by using a optical character recognition technique. We improved the recognition rate over a pre-processing in order to improve the character recognition rate of the original method. The examples such as a personal prescription management service, alarm service, and drug information service with mobile devices have been demonstrated by using the our system.

Influence of Mobile SNS on Personal Relationship Enhancement and Self-esteem of Married Women in Their 30s and 40s: Based on Usage Acceleration Factors (모바일 SNS 사용이 30~40대 기혼여성의 대인관계 강화와 자존감에 미치는 영향: 사용촉진 요인을 중심으로)

  • Kim, Jongki;Han, Ji-Yeon
    • The Journal of Information Systems
    • /
    • v.23 no.1
    • /
    • pp.53-71
    • /
    • 2014
  • The center of networking is moving toward mobile from PC based computing environment. The number of smartphone users are increasing rapidly today. One of the most popular smart phone applications is mobile SNS such as Kakao Story, Facebook, Twitter, Mobile Cyworld, etc. Mobile SNS means social network services based on mobile communication technology. This research focused on mobile SNS usage of married women who have not enough time for face-to-face communication with their friends to enhance their friendship. Married women in their 30s and 40s have lots of things to do like housework and caring their children. Mobile SNS would help their communication in aspect such of free of space and time. Through Mobile SNS married women can reinforce their personal relationship and self-esteem. Social Information Processing Theory (SIP) is an interpersonal communication theory developed by Walther(1992). Once established, online personal relationships may demonstrate the same relational dimensions and qualities as face-to-face relationships. The theory explains how people get to know one another online, without nonverbal cues, and how they develop and manage relationships in the computer-mediated environment. The result of empirical analysis indicates that marred women's Mobile SNS activities reinforce their personal relationship and self-esteem.

Protecting Individuals from Secondary Privacy Loss using Breached Personal Data Information Center (개인정보 오.남용 방지 및 보호를 위한 정보공유센터 프레임워크)

  • Ko, Yu-Mi;Choi, Jae-Won;Kim, Beom-Soo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.2
    • /
    • pp.391-400
    • /
    • 2012
  • This study focused on the role of the center for private information, which can manage and share the personal data from data breach incidents. Especially, this study addresses on the importance of establishing information management systems for preventing secondary misappropriation of breached personal data and private information. The database of breached personal data can be used for reducing privacy worries of potential victims of secondary misuse of personal data. Individuals who use the same IDs and passwords on multiple websites may find this service more effective and necessary. The effectiveness of this breached data center on reducing secondary privacy infringement may differ depending on the extend of data being shared and the conditions of data submission. When businesses experienced data breach and submission of data to this center is required by the law, the accuracy and effectiveness of this service can be enhanced. In addition, centralized database with high quality data set can increase matching for private information and control the secondary misappropriation of personal data or private information better.

The Need for Homomorphic Encryption to Protection Privacy (프라이버시 보호를 위한 동형암호의 필요성)

  • Seo, Jin-Beom;Cho, Young-Bok
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2021.10a
    • /
    • pp.47-49
    • /
    • 2021
  • According to the revision of the Data 3 Act in 2020, personal information of medical data can be processed anonymously for statistical purposes, research, and public interest record keeping. However, unidentified data can be re-identified using genetic information, credit information, etc., and personal health information can be abused as sensitive information. In this paper, we derive the need for homomorphic encryption to protect the privacy of personal information separated by sensitive information.

  • PDF

Hand Biometric Information Recognition System of Mobile Phone Image for Mobile Security (모바일 보안을 위한 모바일 폰 영상의 손 생체 정보 인식 시스템)

  • Hong, Kyungho;Jung, Eunhwa
    • Journal of Digital Convergence
    • /
    • v.12 no.4
    • /
    • pp.319-326
    • /
    • 2014
  • According to the increasing mobile security users who have experienced authentication failure by forgetting passwords, user names, or a response to a knowledge-based question have preference for biological information such as hand geometry, fingerprints, voice in personal identification and authentication. Therefore biometric verification of personal identification and authentication for mobile security provides assurance to both the customer and the seller in the internet. Our study focuses on human hand biometric information recognition system for personal identification and personal Authentication, including its shape, palm features and the lengths and widths of the fingers taken from mobile phone photographs such as iPhone4 and galaxy s2. Our hand biometric information recognition system consists of six steps processing: image acquisition, preprocessing, removing noises, extracting standard hand feature extraction, individual feature pattern extraction, hand biometric information recognition for personal identification and authentication from input images. The validity of the proposed system from mobile phone image is demonstrated through 93.5% of the sucessful recognition rate for 250 experimental data of hand shape images and palm information images from 50 subjects.

Motivating Factors for Providing Personal Data in MyData Services: The Moderating Effect of Perceived Personal Information Self-Determination (마이데이터 서비스 이용을 위한 개인정보제공 동기 요인: 개인정보자기결정권 인지 수준의 조절효과)

  • Hyeonjeong Kim;Soohyun Kwon;Jeongu Choi;Beomsoo Kim
    • Knowledge Management Research
    • /
    • v.25 no.2
    • /
    • pp.219-243
    • /
    • 2024
  • This study investigates the impact of privacy concerns, perceived utility, and awareness of the right to personal data self-determination on the effective use and expansion of MyData services, which are critical to the data economy. Integrating the value-based adoption model with privacy calculus theory, the research examines how perceived utility, privacy concerns, trust, and personal innovativeness influence perceived value, perceived privacy, and the intention to provide personal information. Data collected from an online survey of 442 MyData service users and prospective users were analyzed using PLS-SEM and Bootstrapping methods via SmartPLS 4. The results indicate that perceived utility positively affects the intention to provide personal information, while privacy concerns have a negative impact. Trust and personal innovativeness positively influence the intention to adopt MyData services, and the awareness of personal data self-determination rights moderates these intentions. The findings underscore the importance of developing beneficial services that mitigate users' privacy concerns and build trust for the successful implementation of MyData services. Additionally, the study highlights the need for education and awareness campaigns to enhance understanding of the right to personal data self-determination.

Personal Information Disclosure Control in Context-aware Healthcare Applications (컨텍스트 인식 헬스케어 어플리케이션을 위한 개인화된 정보 공개 기법)

  • Rashid, Umar;Choi, Ah-Young;Woo, Woon-Tack
    • 한국HCI학회:학술대회논문집
    • /
    • 2006.02a
    • /
    • pp.970-975
    • /
    • 2006
  • There is a tradeoff between user's privacy and utility of context-aware services in ubiquitous computing environments. Many privacy models have been proposed to support the disclosure of personal information at different levels of detail, in ubiquitous computing environments. However, most of these models do not allow for explicit criteria to assess the benefit users are likely to reap by disclosing their personal information. In this paper, we propose an automated decision making mechanism that evaluates the "benefit of disclosure" for the users based on trust relationships between users and information requesters and manages the disclosure of user's personal information accordingly. Unlike other trust models, we do not regard the reputation of an information requester as sufficient to determine his/her trustworthiness. Instead, we represent trustworthiness as a function of information requester's reputation in the eyes of the user and his/her competence in a given context. To validate our mechanism, we apply it to context-aware healthcare application that monitors physiological condition of a user.

  • PDF

Trend of Dispute on the Right to Be Forgotten and Acceptance Task of Internet Laws in Korea (잊혀질 권리의 논의 동향과 우리나라 인터넷 법제의 수용과제)

  • Chung, Sang-Ki;Kim, Kyung-Yeol
    • Journal of Information Technology Services
    • /
    • v.12 no.1
    • /
    • pp.131-141
    • /
    • 2013
  • Matters related to the right to be forgotten started the dispute Europe to introduce it first when Data Protection Directive established in 1995 proceeded revision. Relating to this, diverse disputes proceed on responding to personal information protection and internet laws in our nation. Especially as our National Assembly submitted the law regarding the promotion of information and communication network use and protection of information and amendment of copyright, it is necessary to look into the movement on introduction of law of right to be forgotten closely in detail. EU which attempted the institutionalization for the first time, relating to review of General Data Protection Regulation, proposed opinions such as the necessity to define subjects of personal information concretely and specifically and or protection target and balanced consideration on freedom of expression which is constitutional value. In the case of our nation, there was legislation attempt to introduce the regulation but it was limited in the form of fallen effectiveness without concrete and detailed review on internet law. To solve such problems, it is necessary to look into issues and matters to be considered required to accept right to be forgotten closely and discuss possibility of introducing right to be forgotten, conflicts between fundamental rights becoming issue, effect of goal achievement of personal information protection through the system introduction, and other rational acceptance method.

The Distributed Encryption Processing System for Large Capacity Personal Information based on MapReduce (맵리듀스 기반 대용량 개인정보 분산 암호화 처리 시스템)

  • Kim, Hyun-Wook;Park, Sung-Eun;Euh, Seong-Yul
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.18 no.3
    • /
    • pp.576-585
    • /
    • 2014
  • Collecting and utilizing have a huge amount of personal data have caused severe security issues such as leakage of personal information. Several encryption algorithms for collected personal information have been widely adopted to prevent such problems. In this paper, a novel algorithm based on MapReduce is proposed for encrypting such private information. Furthermore, test environment has been built for the performance verification of the distributed encryption processing method. As the result of the test, average time efficiency has improved to 15.3% compare to encryption processing of token server and 3.13% compare to parallel processing.

Blog Application of Korean Traditional Costume as Culture Information Contents (한국전통복식 문화정보의 블로그 활용에 관한 연구)

  • Hwang, Mi-Sun;Lee, Eun-Young
    • Journal of the Korea Fashion and Costume Design Association
    • /
    • v.14 no.1
    • /
    • pp.97-109
    • /
    • 2012
  • Recently, it is concentrated world interest to Korea sensational (Hanryu) exited for not only sports but korean drama, K-pop in public culture. And G20 summit meeting and Winter Olympic open city selection. It is why practical information needs of Korean traditional cooking method and Korean culture, history and architecture and easy way to gain information. Korea has strong power for internet and nuke personal media mini home page, and cafe, blog. Blog is useful for spread information and has efficiency of speedy exchange information. In this study making blog contents of Korean traditional cultural information for not only Korean but foreigner. For method find blog has possibility of cultural information spreading tool, in literature and investigate usefulness and contents of naver blog having Korean traditional costume. In this study, it is helpful to open and construction personal blog of korean traditional costume and traditional culture contents.

  • PDF