• 제목/요약/키워드: Privacy concerns

검색결과 265건 처리시간 0.027초

프라이버시와 개인화를 위한 고품질 표준 데이터 기반 약물감시 시스템 연구 (High-Quality Standard Data-Based Pharmacovigilance System for Privacy and Personalization)

  • 양세모;송인서;이강윤
    • 한국빅데이터학회지
    • /
    • 제8권2호
    • /
    • pp.125-131
    • /
    • 2023
  • 전 세계적으로 약물 부작용은 주요 사망원인의 상위를 차지하고 있다. 약물 부작용에 대해 효과적으로 대응하기 위해, 능동적인 실시간 분석 기반 약물감시 체계로의 전환과 함께 데이터의 표준화와 품질 향상이 필요하다. 이를 위해, 개별 기관의 데이터를 통합하고 대규모 데이터를 활용하여 약물 부작용 예측의 정확도를 높이는 것이 중요하다. 하지만, 각 기관 간의 데이터 공유는 프라이버시 문제를 야기시키고 각기 다른 데이터 표준 구성도 다르다. 본 연구에서는 이 문제를 해결하기 위해, 개인정보보호 법규에 따라 데이터를 직접 공유하지 않고 모델의 학습 결과를 공유하는 연합학습 방식을 채택한다. 각 기관마다 다른 데이터포맷을 Common Data Model(CDM)을 활용하여 데이터 표준화를 수행하고 데이터의 정확성과 일관성을 확립한다. 또한, 클라우드 기반의 연합학습 환경을 구성하여 보안 및 확장 관리에 효율성을 높이는 약물감시 시스템을 제안한다. 이를 통해 기관 간 데이터의 프라이버시를 보호하면서도, 효과적인 의약품 부작용 모니터링과 예측이 가능하다. 약물 부작용으로 인한 사망률 감소와 의료비용 절감을 목표로 하며, 이를 실현하기 위한 다양한 기술적 접근과 방법론을 탐구한다.

Impact of Net-Based Customer Service on Firm Profits and Consumer Welfare

  • 김은진;이병태
    • 한국경영정보학회:학술대회논문집
    • /
    • 한국경영정보학회 2007년도 International Conference
    • /
    • pp.141-146
    • /
    • 2007
  • The importance of the net-based customer service in delivering supplementary after-sale services associated with product has been well documented. The strategic advantages of a well-implemented the net-based customer service are enhanced customer loyalty and higher lock-in of customers, and the resulting reduction in competition and the consequent increase in profits. However, not all customers utilize such the net-based customer service. This is partly due to the e-commerce divide, and partly due to privacy and security concerns of the customer for sharing personal information with firms. The limited level of customer adoption of the net-based customer service affects the firm profits and the customers' welfare. We use a game-theoretic model in which we model the net-based customer service system as a mechanism to enhance customers' loyalty. We find that an increase in adoption of the net-based customer service by the customer base is not always desirable for firms. and that customers who utilize such services are better off only when the overall adoption is limited.

  • PDF

Secure Authentication with Mobile Device for Ubiquitous RFID Healthcare System in Wireless Sensor Networks

  • Kim, Jung-Tae
    • Journal of information and communication convergence engineering
    • /
    • 제9권5호
    • /
    • pp.562-566
    • /
    • 2011
  • As telecommunication technologies in telemedicine services are developed, the expeditious development of wireless and mobile networks has stimulated wide applications of mobile electronic healthcare systems. However, security is an essential system requirement since many patients have privacy concerns when it comes to releasing their personal information over the open wireless channels. Due to the invisible feature of mobile signals, hackers have easier access to hospital networks than wired network systems. This may result in several security incidents unless security protocols are well prepared. In this paper, we analyzed authentication and authorization procedures for healthcare system architecture to apply secure M-health systems in the hospital environment. From the analyses, we estimate optimal requirements as a countermeasure to its vulnerabilities.

클라우드 스토리지에서 안전한 중복 제거 기법들에 대한 보안 취약점 분석 (Analysis of Security Weakness on Secure Deduplication Schemes in Cloud Storage)

  • 박지선;신상욱
    • 한국멀티미디어학회논문지
    • /
    • 제21권8호
    • /
    • pp.909-916
    • /
    • 2018
  • Cloud storage services have many advantages. As a result, the amount of data stored in the storage of the cloud service provider is increasing rapidly. This increase in demand forces cloud storage providers to apply deduplication technology for efficient use of storages. However, deduplication technology has inherent security and privacy concerns. Several schemes have been proposed to solve these problems, but there are still some vulnerabilities to well-known attacks on deduplication techniques. In this paper, we examine some of the existing schemes and analyze their security weaknesses.

RFID Technology in Health Environment Opportunities and Challenges for Modern Cancer Care

  • Safdari, Reza;Maserat, Elham;Maserat, Elnaz
    • Asian Pacific Journal of Cancer Prevention
    • /
    • 제13권12호
    • /
    • pp.6533-6537
    • /
    • 2012
  • Cancers are significant contributors to the mortality and health care expenditures. Cancer can be reduced and monitored by new information technology. Radio frequency identification or RFID is a wireless identification technology. The use of this technology can be employed for identifying and tracking clinical staff, patients, supplies, medications and equipments. RFID can trace and manage chemotherapy drugs. There are different types of RFID. Implantable RFID allowing a chip to be embedded under the skin and that store the cancer patient's identifier. These are concerns about applications of RFID. Privacy, security and legal issues are key problems. This paper describes capabilities, benefits and confidentiality aspects in radio frequency identification systems and solutions for overcoming challenges.

Applying Metricized Knowledge Abstraction Hierarchy for Securely Personalized Context-Aware Cooperative Query

  • Kwon Oh-Byung;Shin Myung-Geun;Kim In-Jun
    • 한국지능정보시스템학회:학술대회논문집
    • /
    • 한국지능정보시스템학회 2006년도 춘계학술대회
    • /
    • pp.354-360
    • /
    • 2006
  • The purpose of this paper is to propose a securely personalized context-aware cooperative query that supports a multi-level data abstraction hierarchy and conceptual distance metric among data values, while considering privacy concerns around user context awareness. The conceptual distance expresses a semantic similarity among data values with a quantitative measure, and thus the conceptual distance enables query results to be ranked. To show the feasibility of the methodology proposed in this paper we have implemented a prototype system in the area of site search in a large-scale shopping mall.

  • PDF

Security Concerns on e-Healthcare System with Countermeasures Applied

  • ;김현호;박제훈;김창균;이훈재
    • 한국정보통신학회:학술대회논문집
    • /
    • 한국정보통신학회 2013년도 춘계학술대회
    • /
    • pp.256-259
    • /
    • 2013
  • Data and network security for e-Healthcare Systems are a primary concern due to the easiest deployment area accessibility of the sensor devices. Furthermore, they are often interacting closely in cooperation with the physical environment and the surrounding people, where such exposure increases security vulnerabilities in cases of improperly managed security of the information sharing among different healthcare organizations. Hence, healthcare-specific security standards such as authentication, data integrity, system security and internet security are used to ensure security and privacy of patients' information. This paper discusses security threats on e-Healthcare Systems where an attacker can access both data and network using masquerade attack. Moreover, an efficient and cost effective approach for countermeasures is discussed for the delivery of secure services.

  • PDF

열화상 카메라를 이용한 3D 컨볼루션 신경망 기반 낙상 인식 (3D Convolutional Neural Networks based Fall Detection with Thermal Camera)

  • 김대언;전봉규;권동수
    • 로봇학회논문지
    • /
    • 제13권1호
    • /
    • pp.45-54
    • /
    • 2018
  • This paper presents a vision-based fall detection system to automatically monitor and detect people's fall accidents, particularly those of elderly people or patients. For video analysis, the system should be able to extract both spatial and temporal features so that the model captures appearance and motion information simultaneously. Our approach is based on 3-dimensional convolutional neural networks, which can learn spatiotemporal features. In addition, we adopts a thermal camera in order to handle several issues regarding usability, day and night surveillance and privacy concerns. We design a pan-tilt camera with two actuators to extend the range of view. Performance is evaluated on our thermal dataset: TCL Fall Detection Dataset. The proposed model achieves 90.2% average clip accuracy which is better than other approaches.

제품유형에 따른 고객의 온라인 쇼핑몰 수용 정도에 관한 실증적 연구 (An Empirical Study on the Effects of Consumer Characteristics on their Acceptance of Online Shopping in the context of Different Product or Service Types)

  • 백진현
    • 경영과정보연구
    • /
    • 제26권
    • /
    • pp.153-180
    • /
    • 2008
  • Most previous electronic commerce studies have focused on a single product or similar products. The effects of different product types have been relatively neglected. and so previous studies have limited the generalization. The purpose of this study was to explore the effects of different product types. The Internet product and service classification grid proposed by Peterson et al.(1997). A survey-based approach was employed to investigate the research questions. Regression analysis demonstrated that the determinants of online shopping acceptance differ among product or service types. As a result of analysis, personal innovativeness of information technology, perceived Web security, personal privacy concerns, and product involvement can influence consumer acceptance of online shopping, but their influence varies according to product or service types.

  • PDF

RFID Tag Protection using Face Feature

  • Park, Sung-Hyun;Rhee, Sang-Burm
    • 반도체디스플레이기술학회지
    • /
    • 제6권2호
    • /
    • pp.59-63
    • /
    • 2007
  • Radio Frequency Identification (RFID) is a common term for technologies using micro chips that are able to communicate over short-range radio and that can be used for identifying physical objects. RFID technology already has several application areas and more are being envisioned all the time. While it has the potential of becoming a really ubiquitous part of the information society over time, there are many security and privacy concerns related to RFID that need to be solved. This paper proposes a method which could protect private information and ensure RFID's identification effectively storing face feature information on RFID tag. This method improved linear discriminant analysis has reduced the dimension of feature information which has large size of data. Therefore, face feature information can be stored in small memory field of RFID tag. The proposed algorithm in comparison with other previous methods shows better stability and elevated detection rate and also can be applied to the entrance control management system, digital identification card and others.

  • PDF