• Title/Summary/Keyword: Secret Data

Search Result 372, Processing Time 0.026 seconds

A Study on Satisfaction on Use of VR Tourism Program (VR관광콘텐츠의 이용만족에 대한 연구)

  • Yang, Sung-Soo
    • The Journal of the Korea Contents Association
    • /
    • v.19 no.8
    • /
    • pp.184-193
    • /
    • 2019
  • With the development of the information and communication technology, tourism items or products based on new technology is created or developed for tourists. This study examines tourist's satisfaction about VR program, "Secret Wind Forest", which is the story of Gotjawal, one of famous Jeju eco-tourism attraction. In order to achieve the study goal, it identified a study model from the previous studies. It collected data using survey from visitors who used VR program. The total of 227 questionnaires was utilized for data analysis. Based on the study model, it accepted five hypotheses (H1~H5), which are as follows. Firstly, individual innovativeness has a significant effect on perceived usefulness. Secondly, individual innovativeness influenced perceived usefulness, and perceived usefulness and ease influenced usage satisfaction. These results have both theoretical and practical contribution in terms of the development to tourist products using VR program. Academics can provide basic theories such as tourism activities, behaviors, and attitudes to tourism consumer-related studies on VR tourism program in terms of content application. Practically, it can help tourist marketers who want to use VR tourism program and content developers who use VR devices to construct VR program stories using tourism resources and to plan and execute contents considering the target market.

Design of an Effective Deep Learning-Based Non-Profiling Side-Channel Analysis Model (효과적인 딥러닝 기반 비프로파일링 부채널 분석 모델 설계방안)

  • Han, JaeSeung;Sim, Bo-Yeon;Lim, Han-Seop;Kim, Ju-Hwan;Han, Dong-Guk
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.6
    • /
    • pp.1291-1300
    • /
    • 2020
  • Recently, a deep learning-based non-profiling side-channel analysis was proposed. The deep learning-based non-profiling analysis is a technique that trains a neural network model for all guessed keys and then finds the correct secret key through the difference in the training metrics. As the performance of non-profiling analysis varies greatly depending on the neural network training model design, a correct model design criterion is required. This paper describes the two types of loss functions and eight labeling methods used in the training model design. It predicts the analysis performance of each labeling method in terms of non-profiling analysis and power consumption model. Considering the characteristics of non-profiling analysis and the HW (Hamming Weight) power consumption model is assumed, we predict that the learning model applying the HW label without One-hot encoding and the Correlation Optimization (CO) loss will have the best analysis performance. And we performed actual analysis on three data sets that are Subbytes operation part of AES-128 1 round. We verified our prediction by non-profiling analyzing two data sets with a total 16 of MLP-based model, which we describe.

A Study on Punitive Damages System in Technology Protection Related Laws: Focusing on Patent Act, TSPA, ITPA, FTSA, MBCA (기술보호 관련 법률에서의 징벌적 손해배상제도에 대한 고찰: 특허법, 영업비밀보호법, 산업기술보호법, 하도급법, 상생협력법을 중심으로)

  • Cho, Yongsun
    • Korean small business review
    • /
    • v.42 no.1
    • /
    • pp.19-41
    • /
    • 2020
  • In Korea, punitive damages were introduced in the 2011 Fair Transactions in Subcontracting Act(FTSA), and in 2019 the Patent Act, Trade Secret Protection Act(TSPA), Industrial Technology Protection Act(ITPA), and Mutually Beneficial Cooperation Act(MBCA). In punitive damages, the judgment of 'intentional' is especially important, and it is necessary to refer to US precedents since there is no accumulated case. Major Company can avoid intentional counseling through the advice of lawyers, but SMEs may have to punish punitive damages due to a lack of awareness of the system. In the case of TSPA, ITPA, FTSA, and MBCA, except for Patent Act, the provisions related to proof of damage have not been well maintained yet. Therefore, the data submission order system of these laws needs to be revised to the level of patent Act need to be. TSPA needs to be amended in the future to estimate the amount of the royalties in estimating the amount of damages so that it can receive the 'reasonably' estimated amount rather than the usual amount. On the other hand, ITPA, FTSA, and MBCA do not have any provisions for the estimation of damages. Besides, it is difficult to evaluate the technology value in the case of leakage or deodorization of new technologies. Therefore, valuation needs to be carried out by a credible institution along with the development of a model for calculating damages.

A Study on Hazard Classification by Metal Element analysis of Paints Containing Inorganic Pigment (무기안료를 함유한 도료의 금속 원소 분석에 의한 유해성 분류에 관한 연구)

  • Jeong-Hee Han;Do-Hee Lee;Na-Roo Lee
    • Journal of Korean Society of Occupational and Environmental Hygiene
    • /
    • v.34 no.3
    • /
    • pp.193-201
    • /
    • 2024
  • Objectives: Paints contain various types of metal substances. However, our review of MSDS (Material Safety Data Sheets) for paints found that their components were often kept secret or exact content information was otherwise not provided. We analyzed the metal elements in various inorganic pigment-based paints available in South Korea in this study and checked whether they contain hazardous metal substances as defined by the Occupational Safety and Health Acts. We investigated issues of health hazard classification related to the metal elements. The study is intended to contribute to strengthening the management of hazardous substances by suggesting improvements to MSDS. Methods: We randomly selected 19 samples that were predicted to contain hazardous inorganic pigments after reviewing MSDS among paints currently in use. The samples were analyzed using XRF (X-ray Fluorescence spectrometry), ICP_OES (Inductively Coupled Plasma-Optical Emission Spectroscopy) and SP-ICP-MS (Single Particle-ICP-Mass Spectroscopy). Results: The most common elements in the samples were Al (aluminum), Fe (iron), Ti (titanium), Ca (calcium), and Si (silica). One sample contained more lead than allowed by the limits. There were ten samples that could potentially contain nanoforms, seven samples that contained titanium dioxide, and six samples that contained complex inorganic color pigments (CICPs). Conclusions: Inorganic pigments in paints should be evaluated for hazards separately from other metallic compounds and reflected in the MSDS because they have different characteristics than other metallic compounds. These include particle size, crystal structure, and complex substances. The results of this study can be helpful for determining whether a paint contains sufficient hazardous metal compounds to affect its classification, and it can be a guideline for improving MSDS through comparative review and rationalization with the manufacturer's MSDS. This would make it possible to contribute to the management of chemical substances in the workplace through the proper MSDS disclosure of paints.

A Study on the Protection of Personal Information in the Medical Service Act (의료법의 개인정보보호에 관한 연구)

  • Sung, Soo-Yeon
    • The Korean Society of Law and Medicine
    • /
    • v.21 no.2
    • /
    • pp.75-103
    • /
    • 2020
  • There is a growing voice that medical information should be shared because it can prepare for genetic diseases or cancer by analyzing and utilizing medical information in big data or artificial intelligence to develop medical technology and improve patient care. The utilization and protection of patients' personal information are the same as two sides of the same coin. Medical institutions or medical personnel should take extra caution in handling personal information with high environmental distinct characteristics and sensitivity, which is different from general information processors. In general, the patient's personal information is processed by medical personnel or medical institutions through the processes of collection, creation, and destruction. Still, the use of terms related to personal information in the Medical Service Act is jumbled, or the scope of application is unclear, so it relies on the interpretation of precedents. For the medical personnel or the founder of the medical institution, in the case of infringement of Article 24(4), it cannot be regarded that it means only medical treatment information among personal information, whether or not it should be treated the same as the personal information under Article 23, because the sensitive information of patients is recorded, saved, and stored in electronic medical records. Although the prohibition of information leakage under Article 19 of the Medical Service Act has a revision; 'secret' that was learned in business was revised to 'information', but only the name was changed, and the benefit and protection of the law is the same as the 'secret' of the criminal law, such that the patient's right to self-determination of personal information is not protected. The Privacy Law and the Local Health Act consider the benefit and protection of the law in 'information learned in business' as the right to self-determination of personal information and stipulate the same penalties for personal information infringement such as leakage, forgery, alteration, and damage. The privacy regulations of the Medical Service Act require that the terms be adjusted uniformly because the jumbled use of terms can confuse information subjects, information processors, and shows certain limitations on the protection of personal information because the contents or scope of the regulations of the Medical Service Law for special corporations and the Privacy Law may cause confusion in interpretation. The patient's personal information is sensitive and must be safely protected in its use and processing. Personal information must be processed in accordance with the protection principle of Privacy Law, and the rights such as privacy, freedom, personal rights, and the right to self-determination of personal information of patients or guardians, the information subject, must be guaranteed.

A Study on the Clinical Nurse's Ethical Value (인간생명에 대한 간호사의 윤리의식)

  • Moon, Young-Im;Tak, Young-Ran;Kim, Myoung-Ae;Kim, Seon-Ae;Park, Kyung-Sook;Im, Dong-Sik;Park, Ho-Ran
    • Journal of Korean Academy of Nursing Administration
    • /
    • v.9 no.4
    • /
    • pp.541-557
    • /
    • 2003
  • Purpose: This descriptive study was designed to explore the clinical nurse's ethical value regarding human life. Method: Data were collected from September to October, 2002. Study subjects were 527 clinical nurses working in General Hospital as tertiary located in Seoul. Ethical value was measured with questionnaire developed by researchers and consisted on items regarding ethical value on human life. Result: Among the items, most nurses highly agree with the item, "When a patient requests his/her health care provider to keep his/her personal secret, the health care provider is obliged to do so." and "When a patient asks for information on his/her medicinal and dietary contents, his/her wish must be granted." Most clinical nurses mainly agree with the item. "Health care providers must always be honest to the patient and/or his/her family". However, most nurses disagree with the item, "When a patient is on the verge of death after an accident, it is justifiable to soothe his/her family by saying 'he/she is OK' instead of telling them the truth, in order to avoid a sudden shock befalling on them". Most clinical nurses mainly disagree with the items, "When a patient is on the verge of death after an accident, it is justiable to soothe his/her family by saying 'he/she is OK' instead of telling them the truth, in order to avoid a sudden shock befalling on them" and "It is justiable that various new ways of treatment should be applied to patient at his/her terminal stage to prolong his/her life, even for the purpose of research". There were significant differences in some items of ethical value according by clinical nurse's age and professional experience, current position, religion, education, marital status, continued education on ethics, and the experience of holing on life saving treatment. Conclusion: It is intensifying the notion of ethical underpinning for human rights, truthfulness is essential to a trust relationship under what circumstances. Also most clinical nurses agree with that It is essential to trust in the nurse-patient relationship, patients have the right to know and it is the ethical thing to do as health care provider.

  • PDF

A Remote User Authentication Scheme Preserving Anonymity and Traceability with Non-Tamper Resistant Smart Cards (정보추출 가능한 스마트카드 환경에서 익명성과 추적성을 제공하는 원격 사용자 인증 기법)

  • Kwon, Hyuck-Jin;Ryu, Eun-Kyung;Lee, Sung-Woon
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.50 no.6
    • /
    • pp.159-166
    • /
    • 2013
  • Recently, because the interest and needs in privacy protection are growing, smartcard-based remote user authentication schemes have been actively studied to provide the user anonymity. In 2008, Kim et al. first proposed an authentication scheme in order to ensure the user anonymity against both external attackers and the remote server and track malicious users with the help of a trusted trace sever. However, in 2010, Lee et al. showed that Kim et al.'s scheme cannot provide the user anonymity against remote server, which is because the server can trace users without any help of the trace server, and then proposed a improved scheme. On the other hand, in 2010, Horng et al. proposed an authentication scheme with non-tamper resistant smart cards, in which the non-tamper resistant smart card means that an attacker may find out secret information stored in the smart card through special data analysis techniques such as monitoring power consumption, to be secure against a variety of attacks and to provide the user anonymity against external attackers. In this paper, we will propose a remote user authentication scheme with non-tamper resistant smart cards not only to ensure the user anonymity against both external attackers and the remote server but also to track malicious users with only the help of a trusted trace sever.

XOR-based High Quality Information Hiding Technique Utilizing Self-Referencing Virtual Parity Bit (자기참조 가상 패리티 비트를 이용한 XOR기반의 고화질 정보은닉 기술)

  • Choi, YongSoo;Kim, HyoungJoong;Lee, DalHo
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.49 no.12
    • /
    • pp.156-163
    • /
    • 2012
  • Recently, Information Hiding Technology are becoming increasingly demanding in the field of international security, military and medical image This paper proposes data hiding technique utilizing parity checker for gray level image. many researches have been adopted LSB substitution and XOR operation in the field of steganography for the low complexity, high embedding capacity and high image quality. But, LSB substitution methods are not secure through it's naive mechanism even though it achieves high embedding capacity. Proposed method replaces LSB of each pixel with XOR(between the parity check bit of other 7 MSBs and 1 Secret bit) within one pixel. As a result, stego-image(that is, steganogram) doesn't result in high image degradation. Eavesdropper couldn't easily detect the message embedding. This approach is applying the concept of symmetric-key encryption protocol onto steganography. Furthermore, 1bit of symmetric-key is generated by the self-reference of each pixel. Proposed method provide more 25% embedding rate against existing XOR operation-based methods and show the effect of the reversal rate of LSB about 2% improvement.

Analysis of Threats and Countermeasures on Mobile Smartphone (스마트폰 보안위협과 대응기술 분석)

  • Jeon, Woong-Ryul;Kim, Jee-Yeon;Lee, Young-Sook;Won, Dong-Ho
    • Journal of the Korea Society of Computer and Information
    • /
    • v.16 no.2
    • /
    • pp.153-163
    • /
    • 2011
  • Smartphone is a mobile device which can perform better than feature phone. Recently, growth in demand for advanced mobile devices boasting powerful performance, market share of smartphone is increasing rapidly in mobile device market, for example, iphone and android phone. Smartphone can provide many functionalities, e-mail, scheduler, word-processing, 3D-game, and etc, based on its powerful performance. Thus, various secret information is integrated in smartphone. To provide service, sometimes, smartphone transmits informations to outside via wireless network. Because smartphone is a mobile device, user can lose his/her smartphone, easily, and losing smartphone can cause serious security threats, because of integrated information in smartphone. Also data which is transmitted in wireless network can be protected for privacy. Thus, in present, it is very important to keep secure smartphone. In this paper, we analyze threats and vulnerabilities of smartphone based on its environments and describe countermeasures against threats and vulnerabilities.

Legal and Institutional Outcomes from the 10-year Struggle against Occupational Diseases of Semiconductor workers (반도체 직업병 10년 투쟁의 법·제도적 성과와 과제)

  • Lim, Jawoon
    • Journal of Science and Technology Studies
    • /
    • v.18 no.1
    • /
    • pp.5-62
    • /
    • 2018
  • Over the last 10 years, the fight against occupational diseases of semiconductor workers led by SHARPS(the Supporters for the Health And Rights of People in the Semiconductor industry, NGO) has accomplished considerable achievements, especially in the legal and institutional aspects. First, the court and the government accepted the claims that 24 injured workers respectively filed, recognizing their 10 types of diseases as occupational illness. The court not only expanded the list of work places and diseases that it recognized, but also presented more progressive logic of recognition. The most remarkable achievement among them is the case ruled by the Supreme court in July, 2017. In terms of 'worker's right to know', which is the most important factor in preventing occupational diseases, there have been significant legislative bills, court rulings and government guidelines. The revised bill of the Industrial Safety and Health Act to strengthen workers' rights to know and to introduce the pre-review system on trade secret is currently under review by the National Assembly. The court recently ruled that the government should disclose its inspection results on safety and health management at semiconductor factories. The ministry of labor has drawn up internal guidelines to more actively open its safety and health data to public. This study looks over recent developments in such rulings, bills and guidelines and then, analyzes their implications, laying the groundwork for future actions for worker health in the electronic industry.