• Title/Summary/Keyword: information privacy

Search Result 2,430, Processing Time 0.036 seconds

A Study on Utilization of Drone for Public Sector by Analysis of Drone Industry (국내외 드론산업 동향 분석을 통한 공공분야에서의 드론 활용방안에 대한 연구)

  • Sim, Seungbae;Kwon, Hunyeong;Jung, Hosang
    • Journal of Information Technology Services
    • /
    • v.15 no.4
    • /
    • pp.25-39
    • /
    • 2016
  • The drone is an unmanned aerial vehicle which has no human pilot. Drones can be classified into military drones, commercial drones, and personal drones by usage. Also, drones can be classified from large-sized to nano-sized drone by size and autonomous, remote controlled drone by control type. Especially, military drones can be classified into low-altitude drones, medium-altitude, and high-altitude drones by altitude. Recently, the drone industry is one of the fast growing industries in the world. As drone technologies have become more advanced and cost-effective, Korean government has set its goal to become a top-level country in drone business. However, the government's strict regulation for drone operations is one of the biggest hurdles for the development of the related technologies in Korea and other countries. For example, critical problems for drone delivery can be classified into technical issues and institutional issues. Technical issues include durability, conditional awareness, grasp and release mechanisms, collision avoidance systems, drone operating system. Institutional issues include pilot and operator licensing, privacy rules, noise guidelines, security rules, education for drone police. This study analyzes the trends of the drone industry from the viewpoint of technology and regulation. Also, we define the business areas of drone utilization. Especially, the drone business types or models for public sector are proposed. Drone services or functions promoting public interests need to be aligned with the business reference model of Korean government. To define ten types of drone uses for public sector, we combine the business types of government with the future uses of drones that are proposed by futurists and business analysts. Future uses of drones can be divided into three sectors or services. First, drone services for public or military sectors include early warning systems, emergency services, news reporting, police drones, library drones, healthcare drones, travel drones. Second, drone services for commercial or industrial services include parcel delivery drones, gaming drones, sporting drones, farming and agriculture drones, ranching drones, robotic arm drones. Third, drone services for household sector include smart home drones.

The Disaster Welfare and Community Response in Japan (일본의 재해복지와 지역사회의 대응방안)

  • Park, Jung-Ran
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.17 no.1
    • /
    • pp.199-208
    • /
    • 2016
  • This study examined the trends and practices of disaster welfare in Japan, particularly with the point of view of the community response. This study summarized the experiences and implications of Japan's disaster welfare. First, it is necessary to establish a foundation and linkage of support networks. In case of a disaster, the linkages among administrations, social work institutions, and community residents are required to understand the accurate situation and needs, and to develop resources. In particular, the constitution of DWAT was submitted for initial intervention. Second, the establishment of a manpower dispatching system is needed for emergency situations. In addition, the methods to cover the entire areas by system are needed. Third, the intervention of psychological treatment was shown have a low agreement rate among specialists. Fourth, it is necessary to have guidelines so that privacy protection is compatible with disaster support in a disaster welfare practice process.

User Authentication and Secure Data Communication Based on Mobile Phone for Medical Sensor Network (의료 센서 네트워크에서 휴대폰을 이용한 사용자 인증 및 안전한 데이터 통신 방안)

  • Kim, Jee-Hyun;Doh, In-Shil;Park, Jung-Min;Chae, Ki-Joon
    • The KIPS Transactions:PartC
    • /
    • v.19C no.1
    • /
    • pp.19-28
    • /
    • 2012
  • Wireless sensor network provides services anytime and anywhere they are requested. Especially, medical sensor network based on biosensors is applied a lot to biotechnology and medical engineering. In medical sensor network, people can make their health checked at home free from temporal and spatial constraints. In ubiquitous healthcare environment, people can get instant help even in the emergency, and in hospital, patients can be taken care of efficiently. In this environment, health and life related data are delivered, and the privacy and security of personal data are very important. In this paper, we propose user authentication and data communication mechanism in two modes, normal and urgent situation using cellular phone. Through our proposal, data can be transferred in quick and secure manner.

A Remote Authentication Protocol Using Smartcard to Guarantee User Anonymity (사용자 익명성을 제공하는 스마트카드 기반 원격 인증 프로토콜)

  • Baek, Yi-Roo;Gil, Kwang-Eun;Ha, Jae-Cheol
    • Journal of Internet Computing and Services
    • /
    • v.10 no.6
    • /
    • pp.229-239
    • /
    • 2009
  • To solve user authentication problem, many remote user authentication schemes using password and smart card at the same time have been proposed. Due to the increasing of interest in personal privacy, there were some recent researches to provide user anonymity. In 2004, Das et al. firstly proposed an authentication scheme that guarantees user anonymity using a dynamic ID. In 2005, Chien et al. pointed out that Das et al.'s scheme has a vulnerability for guaranteing user anonymity and proposed an improved scheme. However their authentication scheme was found some weaknesses about insider attack, DoS attack, and restricted replay attack. In this paper, we propose an enhanced scheme which can remove vulnerabilities of Chien et al.'s scheme. The proposed authentication protocol prevented insider attack by using user's Nonce value and removed the restricted replay attack by replacing time stamp with random number. Furthermore, we improved computational efficiency by eliminating the exponentiation operation.

  • PDF

An Authentication Model based Fingerprint Recognition for Electronic Medical Records System (지문인식 기반의 전자의무기록 시스템 인증 모델)

  • Lee, Yong-Joon
    • The KIPS Transactions:PartC
    • /
    • v.18C no.6
    • /
    • pp.379-388
    • /
    • 2011
  • Ensuring the security of medical records is becoming an increasingly important problem as modern technology is integrated into existing medical services. As a consequence of the adoption of EMR(Electronic Medical Records) in the health care sector, it is becoming more and more common for a health professional to edit and view a patient's record. In order to protect the patient's privacy, a secure authentication model to access the electronic medical records system must be used. A traditional identity based digital certificate for the authenticity of EMR has private key management and key escrow of a user's private key. In order to protect the EMR, The traditional authentication system is based on the digital certificate. The identity based digital certificate has many disadvantages, for example, the private key can be forgotten or stolen, and can be easily escrow of the private key. Nowadays, authentication model using fingerprint recognition technology for EMR has become more prevalent because of the advantages over digital certificate -based authentication model. Because identity-based fingerprint recognition can eliminate disadvantages of identity-based digital certificate, the proposed authentication model provide high security for access control in EMR.

Cryptanalysis and Solution on Secure Communication Scheme for Healthcare System using Wearable Devices (웨어러블 장치를 이용한 헬스케어시스템을 위한 안전한 통신 기법에 대한 분석 및 해결책)

  • Choi, Hae-Won;Kim, Sangjin;Ryoo, Myungchun
    • Journal of Digital Convergence
    • /
    • v.17 no.2
    • /
    • pp.187-194
    • /
    • 2019
  • A security company has been proposed for various healthcare systems. However, there are improvements in order to achieve better efficiency and stability in the various protocols presented. The purpose of this paper is to provide cryptanalysis and solution on Vijayakumar et al.'s secure communication scheme for healthcare system using wearable devices. Especially, it is weak against denial of service attack and it does not provide integrity of the transmitted messages. Thereby, this paper proposes a new secure communication scheme to cope from the problems in Vijayakumar et al.'s scheme. It provides authentication and integrity, which could be the security solution against Vijayakumar et al.'s scheme. Furthermore, it also provides a good computational overhead compared to Vijayakumar et al.'s scheme.

Incident response system through emergency recognition using heart rate and real-time image sharing (심박수를 이용한 위급상황 인식 및 실시간 영상공유를 통한 사고대처 시스템)

  • Lee, In-kwon;Park, Jung-hoon;Jin, Sorin;Han, Kyung-dong;Hwang, Hoyoung
    • Journal of IKEEE
    • /
    • v.23 no.2
    • /
    • pp.358-363
    • /
    • 2019
  • In this paper, we implemented a welfare system for the elderly living alone, disabled, or babies to provide fast incident response in case of emergency situations. The proposed system can quickly recognize emergency situations using heart rate sensors and real-time image sharing. The sensors attached on a wrist band monitor the heart rate along with relevant bio signals of clients and send alarms to guardians in the emergency situations. At the same time, the real-time image signals are captured using OpenCV and sent to the guardians in order to give the exact information for fast and appropriate response to handle the situation. In the proposed system, the camera works only in the emergency situations so as to provide enough privacy to the client's every day life.

Market Segmentation by Loyalty and Switching Intentions of Mobile Social Commerce Apps -Differences in Perceived Service Quality and Switching Barriers- (모바일 소셜커머스 앱의 충성의도와 전환의도에 따른 시장세분화 -지각된 서비스 품질과 전환장벽의 차이-)

  • Sung, Heewon;Kim, Eun Young
    • Journal of the Korean Society of Clothing and Textiles
    • /
    • v.43 no.1
    • /
    • pp.65-80
    • /
    • 2019
  • Mobile shopping has spread rapidly in the consumer's daily life, and numerous fashion companies have now launched a mobile shopping application. By focusing on mobile social commerce apps, this study was to: (a) segment consumers based on loyalty and switching intentions, (b) to test differences in perceived service quality and switching barrier factors among segments, and (c) examine the effects of perceived service quality and switching barriers on loyalty intention. A total of 550 responses were obtained from mobile users in their 20s to 40s who purchased fashion products through a social commerce app in the last six months. Consumers were classified into four clusters: split-loyals, latent loyals, habitual loyals, and switchers. The split-loyal group showed the highest level of mean scores on perceived service quality and switching barrier factors; however, the switcher group showed the lowest mean scores. Of service qualities, app design had a significant effect on loyalty intentions in both split-loyal and latent loyal groups; the factors of ease of use and privacy had significant effects on loyalty intentions in switchers. Of switching barrier factors, virtual relationship had the most strongly effect on loyalty intention for the four segments.

A Study on the Customer Experience Design through analyzing Smart Hotels in China (중국 스마트 호텔의 사례 연구를 통한 사용자 경험 연구)

  • Luo, Xuan;Pan, Yonghwan
    • Journal of the Korea Convergence Society
    • /
    • v.12 no.3
    • /
    • pp.115-124
    • /
    • 2021
  • The outbreak of covid-19 has brought the characteristics and advantages of non-contact services to increased prominence, and the development of smart hotels"has accelerated. This study aims to identify, categorize and define the smart service experience at different touch points of the customer experience. The concept and characteristics of the smart hotel were examined based on existing research and literature. An analytical framework was designed using smart experience factors and customer touch points of smart hotels. Selected Chinese smart hotels were then examined under this framework. The case analysis results show that the customer experience design of smart hotels has developed to different degrees, in terms of interactivity, personalization, accessibility, information and privacy security. Based on the above findings, this article suggests that the design of smart hotels should use integrated data to further enhance personalized service experience.

A Study on Vulnerability Factors of The Smart Home Service ('스마트홈 서비스'의 보안취약요인에 관한 연구)

  • Jeon, Jeong Hoon
    • Convergence Security Journal
    • /
    • v.20 no.4
    • /
    • pp.169-176
    • /
    • 2020
  • Recently, the era in which various services using smart devices are used is sometimes referred to as the so-called "smart era". Among these, Smart Home Service' have not only brought about significant changes in the residential environment and culture, but are evolving very rapidly. and The 'Smart Home Service' provides more convenient services to users through communication between various electronic products in general homes, and has a bright future in the future. In particular,'Smart Home Service' provides various services combined based on IoT(Internet of Things) technology and wired/wireless communication in connection between various devices. However, such a "smart home service" inherits the security vulnerabilities of the underlying technologies such as the Internet of Things and wired and wireless communication technologies, and accidents that lead to the leakage of personal information and invasion of privacy continue to occur. So, it is necessary to prepare a countermeasure and prevention against the weak factors of the underlying technologies. Therefore, this paper is expected to be used as basic data for future application technology development and countermeasure technology by examining various security vulnerability factors of 'Smart Home Service'.