• Title/Summary/Keyword: personal cause

Search Result 429, Processing Time 0.029 seconds

A Study on the Protection of Personal Information in the Medical Service Act (의료법의 개인정보보호에 관한 연구)

  • Sung, Soo-Yeon
    • The Korean Society of Law and Medicine
    • /
    • v.21 no.2
    • /
    • pp.75-103
    • /
    • 2020
  • There is a growing voice that medical information should be shared because it can prepare for genetic diseases or cancer by analyzing and utilizing medical information in big data or artificial intelligence to develop medical technology and improve patient care. The utilization and protection of patients' personal information are the same as two sides of the same coin. Medical institutions or medical personnel should take extra caution in handling personal information with high environmental distinct characteristics and sensitivity, which is different from general information processors. In general, the patient's personal information is processed by medical personnel or medical institutions through the processes of collection, creation, and destruction. Still, the use of terms related to personal information in the Medical Service Act is jumbled, or the scope of application is unclear, so it relies on the interpretation of precedents. For the medical personnel or the founder of the medical institution, in the case of infringement of Article 24(4), it cannot be regarded that it means only medical treatment information among personal information, whether or not it should be treated the same as the personal information under Article 23, because the sensitive information of patients is recorded, saved, and stored in electronic medical records. Although the prohibition of information leakage under Article 19 of the Medical Service Act has a revision; 'secret' that was learned in business was revised to 'information', but only the name was changed, and the benefit and protection of the law is the same as the 'secret' of the criminal law, such that the patient's right to self-determination of personal information is not protected. The Privacy Law and the Local Health Act consider the benefit and protection of the law in 'information learned in business' as the right to self-determination of personal information and stipulate the same penalties for personal information infringement such as leakage, forgery, alteration, and damage. The privacy regulations of the Medical Service Act require that the terms be adjusted uniformly because the jumbled use of terms can confuse information subjects, information processors, and shows certain limitations on the protection of personal information because the contents or scope of the regulations of the Medical Service Law for special corporations and the Privacy Law may cause confusion in interpretation. The patient's personal information is sensitive and must be safely protected in its use and processing. Personal information must be processed in accordance with the protection principle of Privacy Law, and the rights such as privacy, freedom, personal rights, and the right to self-determination of personal information of patients or guardians, the information subject, must be guaranteed.

Mobile Crane Ground-Fixing System (이동식 크레인의 접지설계 시스템)

  • Ho, Jong-Kwan;Seo, Jong-Min;Kim, Sun-Kuk
    • KIEAE Journal
    • /
    • v.7 no.6
    • /
    • pp.83-90
    • /
    • 2007
  • A mobile crane has been more frequently used to deal with the increased capital-intensive projects in line with the economic growth, but the operation is still heavily dependent on personal experience in the past, resulting in severe overturn accidents that cause the loss of lives and damage to the properties. A crane shall be installed in a systematic manner that proved to be safe in engineering aspect, and should the installation and operation be blindly dependent on experience alone, it would apparently cause a great risk. Particularly the mobile crane, among others, frequently causes a severe overturn accident due to poor ground-fixing device. The study therefore focused on fixing system of mobile crane and the outcome is highly expected to make a great commitment to selecting the optimal type of crane for the project as well as to securing the safety during construction.

Measurements and Modeling of Neutral Harmonic Currents on the Education Office Building (교육용 건물의 중성선 고조파 전류 측정 및 모델링)

  • 김경철;강윤모;이일무
    • Proceedings of the Korean Institute of IIIuminating and Electrical Installation Engineers Conference
    • /
    • 2002.11a
    • /
    • pp.111-116
    • /
    • 2002
  • With the proliferation of nonlinear loads such as personal computers in an educational office building, high neutral harmonic currents have been observed. High neutral currents in three-phase four-wire distribution power systems can cause overloaded neutral conductors, overloaded transformers, voltage distortion, common mode noise, and malfuntion of protective equipment. On-site measurements of harmonic currents and voltages were made and the corresponding equivalent circuits was developed. The circuit model under study was simulated numerically and graphically through the use of the software MATLAB.

  • PDF

The influence of smartphone addiction on mental health, campus life and personal relations - Focusing on K university students (스마트폰중독이 정신건강, 학교생활, 대인관계에 미치는 영향 - K대 대학생을 중심으로)

  • Choi, Hyun-Seok;Lee, Hyun-Kyung;Ha, Jeong-Cheol
    • Journal of the Korean Data and Information Science Society
    • /
    • v.23 no.5
    • /
    • pp.1005-1015
    • /
    • 2012
  • Since the smartphone was first released in 2009, its common use has made everyday life convenient but caused many social problems. In this article, we surveyed the status of smartphone usage and identified the influence of smartphone addiction on mental health, campus life and personal relations of university students. We gave the methods to prevent smartphone addiction, which could be used as basic materials for solving the problems. We found the smartphone addiction syndrome cause problems of mental health, campus life and personal relations in many ways. In addition to significant direct effects, smartphone addiction has significant indirect effects on personal relations via mental health and campus life as a medium.

A Method of Distributed Parallel Processing based on Multi-Server for Improving Encryption Performance (암호화 성능 향상을 위한 다중장비 기반 분산 병렬 처리 방법)

  • Kim, Hyun-Wook;Park, Sung-Eun;Euh, Sung-Yul
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.19 no.3
    • /
    • pp.529-536
    • /
    • 2015
  • As personal information protection act was recently enforced, a mechanism which saves encrypted personal information has been used to Information Security systems. To use the mechanism, a millions of personal information which are already saved on the system first have to be encrypted. At the moment, it may cause a resource scarcity on server, and also take a lot of time. Thus, this paper suggests a way to encrypt millions of personal information by using multi-server with low specifications and measures its performance on test environment. And, I was compared with the performance of high- specification server. As a compared result, the mechanism with three devices by parallel and distributed processing improved its performance by 128%, and the mechanism with five devices by the same processing improved its performance by 158%.

Android Log Cat Systems Research for Privacy (개인정보보호를 위한 안드로이드 로그캣 시스템 연구)

  • Jang, Hae-Sook
    • Journal of the Korea Society of Computer and Information
    • /
    • v.17 no.11
    • /
    • pp.101-105
    • /
    • 2012
  • Various social problems through violating personal information and privacy are growing with the rapid spread of smartphones. For this reason, variety of researches and technology developments to protect personal information being made. The smartphone, contains almost all of the personal information, can cause data spill at any time. Collecting or analyzing evidence is not an easy job with forensic analyzing tool. Android forensics research has been focused on techniques to collect and analyze data from non-volatile memory but research for volatile data is very slight. Android log is the non-volatile data that can be collected by volatile storage. It is enough to use as a material to track the usage of the Android phone because all of the recent driven records from system to application are stored. In this paper, we propose a method to respond to determining the existence of personal information leakage by filtering logs without forensic analysis tools.

The suggestion of new big data platform for the strengthening of privacy and enabled of big data (개인정보 보안강화 및 빅데이터 활성화를 위한 새로운 빅데이터 플랫폼 제시)

  • Song, Min-Gu
    • Journal of Digital Convergence
    • /
    • v.14 no.12
    • /
    • pp.155-164
    • /
    • 2016
  • In this paper, we investigate and analyze big data platform published at home and abroad. The results had a problem with personal information security on each platform. In particular, there was a vulnerability in the encryption of personal information stored in big data representative of HBase NoSQL DB that is commonly used for big data platform. However, data encryption and decryption cause the system load. In this paper, we propose a method of encryption with HBase, encryption and decryption systems, and methods for applying the personal information management system (PMIS) for each step of the way and big data platform to reduce the load on the network to communicate. And we propose a new big data platform that reflects this. Therefore, the proposed Big Data platform will greatly contribute to the activation of Big Data used to obtain personal information security and system performance efficiency.

Development of Internet Vulnerability Index for Youth through Internet Overdependency Analysis (인터넷 과의존 요인분석을 통한 청소년의 인터넷 취약성 지수 개발)

  • Jung, Nam-Su;Choi, Myeong-Ok;Lee, Young-Sun;Ahn, Hu-Nam
    • The Journal of the Korea Contents Association
    • /
    • v.19 no.4
    • /
    • pp.345-358
    • /
    • 2019
  • The purpose of this study is to develop the Internet vulnerability index of adolescents. To do this, we used the original data of long - term follow - up survey for the internet overdependency cause analysis conducted by NIA in 2018, and analyzed the correlation between alternatives of internet vulnerability index and personal psychology by using linear regression analysis. Factor analysis showed that the relationship with the surroundings was indexed by adding 9 items to positive factors such as family acceptance, peer attachment, and teacher favorability. The relationship between the surroundings and self - stigmatization is confirmed, and the relationship between the surroundings and the Internet fragility is predicted to be negatively related, and the digital capacity is also assumed to be negatively correlated with the Internet vulnerability. In order to develop the specific form of the Internet vulnerability index, personal psychology and linear regression analysis were conducted. As a result, positive factors and R value of personal psychology were increased when considering the relationship with the environment and the digital capacity rather than the Internet overdependency model. Based on these implications, we discussed the implications and limitations of this study.

Personal Dosimeters Worn by Radiation Workers in Korea: Actual Condition and Consideration of Their Proper Application for Radiation Protection

  • Eunbi Noh;Dalnim Lee;Sunhoo Park;Songwon Seo
    • Journal of Radiation Protection and Research
    • /
    • v.48 no.3
    • /
    • pp.162-166
    • /
    • 2023
  • Background: Assessment of the radiation doses to which workers are exposed can differ depending on the placement of dosimeters on the body. In addition, it is affected by whether the placement is under or over a shielding apron. This study aimed to evaluate the actual positioning of personal dosimeters on the body, with or without shielding aprons, among radiation workers in Korea. Materials and Methods: We analyzed the survey data, which included demographic characteristics, such as sex, age, occupation, work history, and placement of the personal dosimeter being worn, from a cohort study of Korean radiation workers. We assessed the use of personal dosimeters among workers, stratified by sex, age, working period, starting year of work, and occupation. Results and Discussion: Overall, high compliance (89.1% to 99.0%) with the wearing of dosimeters on the chest was observed regardless of workers' characteristics, such as age, sex, occupation, and work history. However, the placement of dosimeters, either under or over the shielding aprons, was inconsistent. Overall, 40.1% of workers wore dosimeters under their aprons, while the others wore dosimeters over their aprons. This inconsistency indicates that radiation doses are possibly measured differently under the same exposure conditions solely owing to variations in the placement of worn dosimeters. Conclusion: Although a lack of uniformity in dosimeter placement when wearing a shielding apron may not cause serious harm in radiation dose management for workers, the development of detailed guidelines for dosimeter placement may improve the accuracy of dose assessment.

A Study on the in Improvement of Elder Abuse through Analysis the Causes and the Type of Elder Abuse the Super-aged Society (초고령사회 노인학대의 발생원인 및 유형 분석을 통한 개선방안 연구)

  • Park, Hyun-Seung
    • Industry Promotion Research
    • /
    • v.7 no.1
    • /
    • pp.35-42
    • /
    • 2022
  • The purpose of this study was to establish an Improvement Plan to determine the cause of the abuse occurred for the elderly who live in urban areas, and analyzed by type. This study was conducted to survey targeted the more than 65-year-old man as the center of Seoul Mapo area. The independent variables in the research model is elder abuse causes, the sociological characteristics as control variables population was the dependent variable in the elderly abuse. As a result; First, investigate the differences in the cause and the cause of elder abuse according to demographic characteristics. The causes of elder abuse, age of the higher age group showed high levels of elder abuse causes. Showed that less than a high school education than graduate school. Second, investigate the factors influencing the occurrence of elder abuse experiences of the subjects. Personal factors of elder abuse causes of those surveyed, family environmental factors, social, and refers to the result that the higher the level of cultural factors increase the occurrence of elder abuse experience. Third, investigate the differences in the cause and the cause of elder abuse according to demographic characteristics. The causes of elder abuse, age of the higher age group showed that the level of elder abuse occurs and causes high experience. Fourth, investigate the factors influencing the occurrence of elder abuse experiences of the subj ects. This personal factors of elder abuse causes of those surveyed, family environmental factors, social, and refers to the results of the higher levels of cultural factors that increase the occurrence of elder abuse experience. In conclusion, elder abuse is personal factors, environmental factors, family, social and cultural factors, the higher the level can be seen that type of elder abuse Elder abuse occurs, formed by many, accordingly. Therefore, in order to improve elder abuse should be healing the cause according to the type of elder abuse appears essentially as a result from this research.