• Title/Summary/Keyword: information privacy

Search Result 2,401, Processing Time 0.025 seconds

Performance Evaluation of VoIP Secure Communication Protocols based on SIP in Mobile Environment (모바일 환경에서 적용 가능한 SIP기반 인터넷전화(VoIP) 보안 통신 프로토콜 성능 평가)

  • Yoon, Seok-Ung;Jung, Hyun-Cheol;Che, Xuemei;Chu, Gyeong-Ho;Park, Han;Baek, Jae-Jong;Song, Joo-Seok;Yoo, Hyeong-Seon
    • The KIPS Transactions:PartC
    • /
    • v.18C no.3
    • /
    • pp.143-150
    • /
    • 2011
  • The adoption of VoIP is continuously increasing in public institutions, private enterprises and households due to cheaper cost and various supplementary services. Also, it is expected to spread widely the use of VoIP in mobile environment through the increasing use of smartphone. With the growing concern over the incidents of VoIP service while the VoIP service has become increasingly. Especially eavesdropping, it is possible to invade user privacy and drain the secret of company. So, it is important to adopt the protocols for VoIP secure communication. VoIP security protocols are already adopted in public institutions, but it is not adopted in private enterprises and households. In addition, it is necessary to verify whether the VoIP security protocol could be adopted or not in mobile VoIP due to its limited computing power. This paper compared the VoIP security protocol under fixed network and mobile network through performance evaluation. Finally, we found that it is possible to adopt the VoIP security protocols in mobile network.

Development and Evaluation of a Protocol for Bedside Nursing Handoff with Patient Engagement in a Tertiary Hospital in South Korea (한국형 환자참여 간호사 침상인계 프로토콜 개발 및 평가)

  • Lee, Tae Wha;Ji, Yoon Jung;Jang, Yeon Soo;Do, Hyun Ok;Oh, Kyoung Hwan;Kim, Chang Kyung;Chun, Ja Hye;Shin, Hae Kyung;Cho, Mee Young;Bae, Jung Im
    • Journal of Korean Clinical Nursing Research
    • /
    • v.26 no.1
    • /
    • pp.117-130
    • /
    • 2020
  • Purpose: This study aimed to develop a bedside nursing shift report protocol and evaluate the effect of the protocol in a tertiary hospital in South Korea. Methods: The bedside nursing handoff protocol with patient engagement was developed based on the literature review and the validation of an expert group. The effect of the protocol on clinical implication was tested in three medical-surgical units in a tertiary hospital. Outcomes were assessed by patient perception, nurse perception, and reporting time. Data collected from June to August in 2018 and analyzed with descriptive statistics and One-way ANOVA using SPSS version 25.0. Results: The bedside nursing shift report protocol with patient engagement consisted of two steps: nurse to nurse report and bedside report with patients. Nurse's perception with patient engagement was significantly increased after applying protocol (F=17.85, p<.001). Patient's perception was significantly improved in the areas of discharge plan (F=7.86, p<.001), health information privacy (F=4.46, p=.012) and identify attending nurse (F=3.19, p=.042). There were no differences in reporting time between the bedside nursing shift report and a traditional shift report (F=0.61, p=.054). Conclusion: Patient perception was significantly increased, while nurse perception was not different after applying this protocol. For the change in the perception of nurses, education may be preceded to improve nurses' competence for the bedside shift report. Furthermore, the support in enough nurse staffing should be needed for encouraging the bedside shift report. The bedside shift report may enhance patient engagement. Therefore it may improve patient safety and health outcome in clinics.

A Secure and Lightweight Authentication Scheme for Ambient Assisted Living Systems (전천 후 생활보조 시스템을 위한 안전하고 경량화 된 인증기법)

  • Yi, Myung-Kyu;Choi, Hyunchul;Whangbo, Taeg-Keun
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.19 no.4
    • /
    • pp.77-83
    • /
    • 2019
  • With the increase in population, the number of such senior citizens is increasing day by day. These senior citizens have a variety of care needs, but there are not enough health workers to look after them. Ambient Assisted Living (AAL) aims at ensuring the safety and health quality of the older adults and extending the number of years the senior citizens can live independently in an environment of their own preference. AAL provides a system comprising of smart devices, medical sensors, wireless networks, computer and software applications for healthcare monitoring. AAL can be used for various purposes like preventing, curing, and improving wellness and health conditions of older adults. While information security and privacy are critical to providing assurance that users of AAL systems are protected, few studies take into account this feature. In this paper, we propose a secure and lightweight authentication scheme for the AAL systems. The proposed authentication scheme not only supports several important security requirements needed by the AAL systems, but can also withstand various types of attacks. Also, the security analysis results are presented to show the proposed authentication scheme is more secure and efficient rather than existing authentication schemes.

A Study on Legal Issues of Data Portability and the Direction of Legislative Policy (개인정보 이동권의 법적 이슈와 입법 정책 방향)

  • Yi, Chang-Beom
    • Informatization Policy
    • /
    • v.28 no.4
    • /
    • pp.54-75
    • /
    • 2021
  • The right to data portability needs to be introduced to strengthen the self-control of data subjects and promote personal data use. However, the right to data portability constitutes a high risk of invasion of privacy of data subjects and may infringe on the property rights of data controllers, so careful and thorough design is warranted. The right to data portability can intensify the concentration and monopoly of personal data, result in problems of overseas transfer of personal data held by public institutions, and enrich only the profits of giant platforms by burdening the data subject with high transfer cost. By contrast, SMEs are more likely to endure a personal data deprivation. From the proposed amendment to the Personal Data Protection Act are raised various legal issues such as. i) Whether to include inferred/derived data, personal data held by public institutions, activity data, sensitive data, and personal data of third parties within the scope of data portability; ii) whether SMEs are included in the data porting organization; iii) whether to exclude SMEs or large platforms from the scope of the data receiving organization; iv) Whether to allow the right to transmit to other data controllers, v) Whether to allow the overseas transfer of personal data held by public institutions, vi) How to safely exercise the right to data portability, vii) the scope of responsibility and immunity of a data porting organization, etc. The purpose of this paper is to propose the direction for legislative action based on various legal issues related to data portability.

Review of Reliability and Validity of Medical Service Experience Survey: Focused on the Differences by Type of Medical Institutions (의료서비스경험조사의 신뢰도 및 타당도 검토: 의료기관 특성별 차이를 중심으로)

  • Kim, Heenyun;Choi, Yongseok;Moon, Seokjun;Shin, Jeongwoo
    • Health Policy and Management
    • /
    • v.32 no.1
    • /
    • pp.94-106
    • /
    • 2022
  • Background: The efforts to build more "people centered," "patient centered" health system has been emerging all over the world. Aligning with it, the Korean government is conducing the survey called "Medical Service Experience Survey (MSES)." There are critics, however, that MSES is not scrutinizing the medical experiences of patients in various healthcare settings. For this reason, this study aims to perform an empirical analysis of the differences in answers of patients responding to various healthcare settings. Methods: There are two steps in this study. First, explanatory analysis is conducted to compare the tendency of statistical concentration on questionnaires by divided healthcare settings. Second, confirmative analysis is carried out to evaluate the construct validity, reliability, and discriminant validity of the questionnaire in each healthcare setting. The raw data of MSES, which was conducted in 2020 by the Ministry of Health and Welfare in Korea and the Korean Institute for Health and Social Affairs is used. Results: As a result of exploratory factor analysis for all outpatients, the items were classified into four factors statistically: "doctor experience," "nurse experience," "outpatient service experience," and "patient satisfaction." It was confirmed that the reliability of all factors extracted was secured. However, for patients who visited hospitals, questionnaires related to personal privacy, such as "experiences on medical staffs considering physical exposure" or "experiences related to personal information exposure," were answered in conjunction with items of "nurse experience." Besides, patients responded that administrative elements of medical services, such as "experiences of comfort in medical institutions" and "experiences of satisfactory administrative services," were related to the items of "nurse experience." The answers of patients who visited traditional medical hospitals and clinics about "doctor experience" and "nurse experience" were not discerned statistically, and the answers to "doctor experience," "nurse experience," and "medical institution experience" were entangled with the responses of patients who visited dental hospitals and clinics. On the other hand, as a result of the confirmatory factor analysis, it was found that the inquiries of MSES generally had intensive validity. Conclusion: The collection of objective and scientific data is the prominent component to enlighten the patient-centered healthcare system alongside with change of the worldwide paradigm of measuring the healthcare system performance as follows the transition of perspective of health care from provider-centered to patient-centered. This study empirically shows that the patient experience can vary as the healthcare settings. Furthermore, to make an advance in measuring the experience of patients with medical services, this article proposes the deliberate consideration of the different kinds of healthcare settings and articulate design of the survey.

A Mixed Method of Gap-jil Behavior in Educational Institutions : Focusing on abuse of authority (통합연구방법을 활용한 교육기관 내 갑질 행태에 관한 연구 : 권한남용을 중심으로)

  • Choi, Sung-Kwang;Choi, Ye-Na;Kim, Ok-Hee
    • Journal of Korea Entertainment Industry Association
    • /
    • v.15 no.4
    • /
    • pp.243-254
    • /
    • 2021
  • This study analyzed the abuse of authority among the types of power abuse in educational institutions in order to create an educational climate in which democracy and equality are respected and to create a better education and an equal society. First, we analyzed the concept and cause of power abuse through literature research, and then explored the cases of members of educational institutions according to the type of abuse of authority through qualitative research to derive implications. As a result, abuse of authority within educational institutions were found as follows: additional work without consultation, transfer of duties, coercive and unilateral instructions using status, instructions violating laws and guidelines, private instructions for personal convenience, specific institutions, personal rights, and privacy. Based on this analysis, a policy was proposed. First, an agreed standard for abuse of authority, an institutional mechanism to mediate conflicts and complaints over abuse of authority, mandatory installation and legislation of the best decision body, active and transparent disclosure of information, and a shift to open and listening administration are needed. Second, analyzing and seeking ways to reduce overuse of authority in educational institutions will be the cornerstone for leading education's democracy and equality by creating a culture of mutual respect and communication among members of the organization. Hope that follow-up studies will be carried out and that the Gap-jil in educational institutions will be reduced to create a better educational environment.

Appropriate App Services and Acceptance for Contact Tracing: Survey Focusing on High-Risk Areas of COVID-19 in South Korea (코로나 19 동선 관리를 위한 적정 앱 서비스와 도입: 고위험 지역 설문 연구)

  • Rho, Mi Jung
    • Korea Journal of Hospital Management
    • /
    • v.27 no.2
    • /
    • pp.16-33
    • /
    • 2022
  • Purposes: Prompt evaluation of routes and contact tracing are very important for epidemiological investigations of coronavirus disease 2019 (COVID-19). To ensure better adoption of contact tracing apps, it is necessary to understand users' expectations, preferences, and concerns. This study aimed to identify main reasons why people use the apps, appropriate services, and basis for voluntary app services that can improve app participation rates and data sharing. Methodology/Approach: This study conducted an online survey from November 11 to December 6, 2020, and received a total of 1,048 survey responses. This study analyzed the questionnaire survey findings of 883 respondents in areas with many confirmed cases of COVID-19. This study used a multiple regression analysis. Findings: Respondents who had experience of using related apps showed a high intention to use contact-tracing apps. Participants wished for the contact tracking apps to be provided by the government or public health centers (74%) and preferred free apps (93.88%). The factors affecting the participants' intention to use these apps were their preventive value, performance expectancy, perceived risk, facilitative ability, and effort expectancy. The results highlighted the need to ensure voluntary participation to address participants' concerns regarding privacy protection and personal information exposure. Practical Implications: The results can be used to accurately identify user needs and appropriate services and thereby improve the development of contact tracking apps. The findings provide the basis for voluntary app that can enhance app participation rates and data sharing. The results will also serve as the basis for developing trusted apps that can facilitate epidemiological investigations.

Predicting the Number of Confirmed COVID-19 Cases Using Deep Learning Models with Search Term Frequency Data (검색어 빈도 데이터를 반영한 코로나 19 확진자수 예측 딥러닝 모델)

  • Sungwook Jung
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.12 no.9
    • /
    • pp.387-398
    • /
    • 2023
  • The COVID-19 outbreak has significantly impacted human lifestyles and patterns. It was recommended to avoid face-to-face contact and over-crowded indoor places as much as possible as COVID-19 spreads through air, as well as through droplets or aerosols. Therefore, if a person who has contacted a COVID-19 patient or was at the place where the COVID-19 patient occurred is concerned that he/she may have been infected with COVID-19, it can be fully expected that he/she will search for COVID-19 symptoms on Google. In this study, an exploratory data analysis using deep learning models(DNN & LSTM) was conducted to see if we could predict the number of confirmed COVID-19 cases by summoning Google Trends, which played a major role in surveillance and management of influenza, again and combining it with data on the number of confirmed COVID-19 cases. In particular, search term frequency data used in this study are available publicly and do not invade privacy. When the deep neural network model was applied, Seoul (9.6 million) with the largest population in South Korea and Busan (3.4 million) with the second largest population recorded lower error rates when forecasting including search term frequency data. These analysis results demonstrate that search term frequency data plays an important role in cities with a population above a certain size. We also hope that these predictions can be used as evidentiary materials to decide policies, such as the deregulation or implementation of stronger preventive measures.

A Study on IP Camera Security Issues and Mitigation Strategies (IP 카메라 보안의 문제점 분석 및 보완 방안 연구)

  • Seungjin Shin;Jungheum Park;Sangjin Lee
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.12 no.3
    • /
    • pp.111-118
    • /
    • 2023
  • Cyber attacks are increasing worldwide, and attacks on personal privacy such as CCTV and IP camera hacking are also increasing. If you search for IP camera hacking methods in spaces such as YouTube, SNS, and the dark web, you can easily get data and hacking programs are also on sale. If you use an IP camera that has vulnerabilities used by hacking programs, you easily get hacked even if you change your password regularly or use a complex password including special characters, uppercase and lowercase letters, and numbers. Although news and media have raised concerns about the security of IP cameras and suggested measures to prevent damage, hacking incidents continue to occur. In order to prevent such hacking damage, it is necessary to identify the cause of the hacking incident and take concrete measures. First, we analyzed weak account settings and web server vulnerabilities of IP cameras, which are the causes of IP camera hacking, and suggested solutions. In addition, as a specific countermeasure against hacking, it is proposed to add a function to receive a notification when an IP camera is connected and a function to save the connection history. If there is such a function, the fact of damage can be recognized immediately, and important data can be left in arresting criminals. Therefore, in this paper, we propose a method to increase the safety from hacking by using the connection notification function and logging function of the IP camera.

A Study on the Method of Minimizing the Bit-Rate Overhead of H.264 Video when Encrypting the Region of Interest (관심영역 암호화 시 발생하는 H.264 영상의 비트레이트 오버헤드 최소화 방법 연구)

  • Son, Dongyeol;Kim, Jimin;Ji, Cheongmin;Kim, Kangseok;Kim, Kihyung;Hong, Manpyo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.2
    • /
    • pp.311-326
    • /
    • 2018
  • This paper has experimented using News sample video with QCIF ($176{\times}144$) resolution in JM v10.2 code of H.264/AVC-MPEG. The region of interest (ROI) to be encrypted occurred the drift by unnecessarily referring to each frame continuously in accordance with the characteristics of the motion prediction and compensation of the H.264 standard. In order to mitigate the drift, the latest related research method of re-inserting encrypted I-picture into a certain period leads to an increase in the amount of additional computation that becomes the factor increasing the bit-rate overhead of the entire video. Therefore, the reference search range of the block and the frame in the ROI to be encrypted is restricted in the motion prediction and compensation for each frame, and the reference search range in the non-ROI not to be encrypted is not restricted to maintain the normal encoding efficiency. In this way, after encoding the video with restricted reference search range, this article proposes a method of RC4 bit-stream encryption for the ROI such as the face to be able to identify in order to protect personal information in the video. Also, it is compared and analyzed the experimental results after implementing the unencrypted original video, the latest related research method, and the proposed method in the condition of the same environment. In contrast to the latest related research method, the bit-rate overhead of the proposed method is 2.35% higher than that of the original video and 14.93% lower than that of the latest related method, while mitigating temporal drift through the proposed method. These improved results have verified by experiments of this study.