• Title/Summary/Keyword: privacy agreement

Search Result 62, Processing Time 0.022 seconds

The Disaster Welfare and Community Response in Japan (일본의 재해복지와 지역사회의 대응방안)

  • Park, Jung-Ran
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.17 no.1
    • /
    • pp.199-208
    • /
    • 2016
  • This study examined the trends and practices of disaster welfare in Japan, particularly with the point of view of the community response. This study summarized the experiences and implications of Japan's disaster welfare. First, it is necessary to establish a foundation and linkage of support networks. In case of a disaster, the linkages among administrations, social work institutions, and community residents are required to understand the accurate situation and needs, and to develop resources. In particular, the constitution of DWAT was submitted for initial intervention. Second, the establishment of a manpower dispatching system is needed for emergency situations. In addition, the methods to cover the entire areas by system are needed. Third, the intervention of psychological treatment was shown have a low agreement rate among specialists. Fourth, it is necessary to have guidelines so that privacy protection is compatible with disaster support in a disaster welfare practice process.

Lightweight Hardware Design of Elliptic Curve Diffie-Hellman Key Generator for IoT Devices (사물인터넷 기기를 위한 경량 Elliptic Curve Diffie-Hellman 키 생성기 하드웨어 설계)

  • Kanda, Guard;Ryoo, Kwangki
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2017.10a
    • /
    • pp.581-583
    • /
    • 2017
  • Elliptic curve cyptography is relatively a current cryptography based on point arithmetic on elliptic curves and the Elliptic Curve Discrete Logarithm Problem (ECDLP). This discrete logarithm problems enables perfect forward secrecy which helps to easily generate key and almost impossible to revert the generation which is a great feature for privacy and protection. In this paper, we provide a lightweight Elliptic Curve Diffie-Hellman (ECDH) Key exchange generator that creates a 163 bit long shared key that can be used in an Elliptic Curve Integrated Encryption Scheme (ECIES) as well as for key agreement. The algorithm uses a fast multiplication algorithm that is small in size and also implements the extended euclidean algorithm. This proposed architecture was designed using verilog HDL, synthesized with the vivado ISE 2016.3 and was implemented on the virtex-7 FPGA board.

  • PDF

A Study on Legal Issues between the Application of Blockchain Technology and Deletion and the Third Party Supply of Personal Information (블록체인 기술 적용과 개인정보 삭제 및 제3자 제공의 법적 문제에 관한 연구)

  • Choi, Yong-hyuk;Kwon, Hun-yeong
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.6
    • /
    • pp.1607-1621
    • /
    • 2018
  • The financial industry, which guarantees a credible transaction and can not permit forgery of its transaction information, has hitherto adhered to a traditional centralized ledger management method. However, the blockchain technology has a decentralization which has been regarded as unsafe for the time being, and the more reliable transaction agreement and data integrity are guaranteed The world's financial industry and the IT world is causing the wave. Nevertheless, the inherent characteristics of the blockchain, such as the irreversibility of block information within a blockchain and the sharing of blocks between blockchain participants, can not avoid conflicts with the privacy laws. The purpose of this study is to investigate the problems related to deletion and the third party supply of personal information by focusing on these characteristics of the blockchain and to suggest the technical alternatives of the applicable blockchain and the improvement direction of the personal information protection law for using of blockchain technology.

Blockchain-based Electronic Medical Record Sharing FrameworkUsing Ciphertext Policy Attribute-Based Cryptography for patient's anonymity (환자의 익명성이 보장되는 암호문 정책 속성중심 암호를 활용한 블록체인 기반 전자의무기록 공유 프레임워크)

  • Baek, Seungsoo
    • Convergence Security Journal
    • /
    • v.19 no.1
    • /
    • pp.49-60
    • /
    • 2019
  • Medical record is part of the personal information that values the dignity and value of an individual, and can lead to serious social prejudice and disadvantage to an individual when it is breached illegally. In addition, the medical record has been highly threatened because its value is relatively high, and external threats are continuing. In this paper, we propose a medical record sharing framework that guarantees patient's privacy based on blockchain using ciphertext policy-based attribute based proxy re-encryption scheme. The proposed framework first uses the blockchain technology to ensure the integrity and transparency of medical records, and uses the stealth address to build the unlinkability between physician and patient. Besides, the ciphertext policy attribute-based proxy re-encryption scheme is used to enable fine-grained access control, and it is possible to share information in emergency situations without patient's agreement.

Big Data and Personal Information: Needs for Regulatory Change (빅데이터와 개인정보: 규제변화의 필요성)

  • Lee, Ho-Sun
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.23 no.12
    • /
    • pp.1565-1570
    • /
    • 2019
  • Many possibilities of Big Data has been discussed widely for several years. And the importance of protecting personal information has been emphasized more strongly. During the process of integrating several personal information for the improvement of usability of Big Data, there are many problems occured like the likelihood of the identification of one person, the level of personal infomation used to create personalized services in the companies making and using Big Data. In this study, I summarize GDPR(General Data Protection Regulation) of EU, CCPA(California Consumer Privacy Act) of USA and domestic Big Data 3 Acts Amendment proposals. Also I discuss re-identifcation of de-identificated information, social costs of the usage agreement of personal information, possible problems in construction and combination of private and public big data, political suggestions about settlement of regulatory environment.

An Exploratory Study on the impact of EU Adequacy Decision on GDPR compliant companies (EU 적정성 결정이 GDPR 대상기업에 미치는 영향에 관한 탐색적 연구)

  • Kim, YoungSoo;Chang, Hangbae
    • Journal of Platform Technology
    • /
    • v.9 no.4
    • /
    • pp.32-41
    • /
    • 2021
  • The EU enacted a law strongly regulating the GDPR to protect the privacy of its citizens on 25 May 2018. Compliance with GDPR is an essential prerequisite for companies to enter the European market in the global economic era. In this paper, Step-by-step measures have been defined to conclude DPA agreements for the appropriate level of protection against EU personal data transfer. To explore the benefits and expected effects of determining appropriateness at the government level. As a result, enterprises benefit from simplifying processes, reducing time, and reducing costs when entering the EU. Government-level support in response to personal data breach and communication with the EU Commission will have a positive impact, However, even after the adequacy decision, the entity continues to need activities to secure personal data through compliance with GDPR principles and obligations. Major operations of companies that comply with GDPR are also maintained as important tasks that must be observed in most cases except for the Data Protection Agreement.

A Study on Liberalization of Cross-Border Data Transfer in Digital Trade Agreements (디지털 무역협정의 국경 간 데이터 이전 자유화 연구)

  • Chung, Jason
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2022.05a
    • /
    • pp.627-628
    • /
    • 2022
  • There is no internationally accepted codified definition of digital trade because of the wide variety and scope of related industries and transactions(product + service + data) in general. Recently, innovative changes are taking place in digital trade due to the development of technologies such as IT due to the 4th industrial revolution, and advanced countries such as the US, EU, and Japan are including digital trade issues such as data movement liberalization in the negotiation agenda of the digital trade agreement. The issue with the liberalization of cross-border data movement is that freedom of data movement is necessary to vitalize digital trade, but it also increases the risk of information security and privacy violations. Looking at the directions of advanced countries, the US favors minimization of regulations, Europe favors regional single marketization, but passively opens up to the outside world, and China promotes independent markets through regulations. Therefore, measures to strengthen restrictions on cross-border data movement are an issue that has recently been implemented by each country or an international aggrement is scheduled to be reached soon, and Korea also needs a close response.

  • PDF

An Open Medical Platform to Share Source Code and Various Pre-Trained Weights for Models to Use in Deep Learning Research

  • Sungchul Kim;Sungman Cho;Kyungjin Cho;Jiyeon Seo;Yujin Nam;Jooyoung Park;Kyuri Kim;Daeun Kim;Jeongeun Hwang;Jihye Yun;Miso Jang;Hyunna Lee;Namkug Kim
    • Korean Journal of Radiology
    • /
    • v.22 no.12
    • /
    • pp.2073-2081
    • /
    • 2021
  • Deep learning-based applications have great potential to enhance the quality of medical services. The power of deep learning depends on open databases and innovation. Radiologists can act as important mediators between deep learning and medicine by simultaneously playing pioneering and gatekeeping roles. The application of deep learning technology in medicine is sometimes restricted by ethical or legal issues, including patient privacy and confidentiality, data ownership, and limitations in patient agreement. In this paper, we present an open platform, MI2RLNet, for sharing source code and various pre-trained weights for models to use in downstream tasks, including education, application, and transfer learning, to encourage deep learning research in radiology. In addition, we describe how to use this open platform in the GitHub environment. Our source code and models may contribute to further deep learning research in radiology, which may facilitate applications in medicine and healthcare, especially in medical imaging, in the near future. All code is available at https://github.com/mi2rl/MI2RLNet.

Fusion of Gamma and Realistic Imaging (감마영상과 실사영상의 Fusion)

  • Kim, Yun-Cheol;Yu, Yeon-Uk;Seo, Young-Deok;Moon, Jong-Woon;Kim, Yeong-Seok;Won, Woo-Jae;Kim, Seok-Ki
    • The Korean Journal of Nuclear Medicine Technology
    • /
    • v.14 no.1
    • /
    • pp.78-82
    • /
    • 2010
  • Purpose: Recently, South Korea has seen a rapidly increased incidence of both breast and thyroid cancers. As a result, the I-131 scan and lymphoscintigraphy have been performed more frequently. Although this type of diagnostic imaging is prominent in that visualizes pathological conditions, which is similar to previous nuclear diagnostic imaging techniques, there is not much anatomical information obtained. Accordingly, it has been used in different ways to help find anatomical locations by transmission scan, however the results were unsatisfactory. Therefore, this study aims to realize an imaging technique which shows more anatomical information through the fusion of gamma and realistic imaging. Materials and Methods: We analyzed the data from patients who were examined by the lymphoscintigraphy and I-131 additional scan by Symbia Gamma camera (SIEMENS) in the nuclear medicine department of the National Cancer Center from April to July of 2009. First, we scanned the same location in patients by using a miniature camera (R-2000) in hyVISION. Afterwards, we scanned by gamma camera. The data we obtained was evaluated based on the scanning that measures an agreement of gamma and realistic imaging by the Gamma Ray Tool fusion program. Results: The amount of radiation technicians and patients were exposed was generated during the production process of flood source and applied transmission scan. During this time, the radiation exposure dose of technicians was an average of 14.1743 ${\mu}Sv$, while the radiation exposure dose of patients averaged 0.9037 ${\mu}Sv$. We also confirmed this to matching gamma and realistic markers in fusion imaging. Conclusion: Therefore, we found that we could provide imaging with more anatomical information to clinical doctors by fusion of system of gamma and realistic imaging. This has allowed us to perform an easier method in which to reduce the work process. In addition, we found that the radiation exposure can be reduced from the flood source. Eventually, we hope that this will be applicable in other nuclear medicine studies. Therefore, in order to respect the privacy of patients, this procedure will be performed only after the patient has agreed to the procedure after being given a detailed explanation about the process itself and its advantages.

  • PDF

A Study on Librarians' Perception about Government 3.0 (정부 3.0에 대한 도서관 사서의 인식조사 연구)

  • Noh, Younghee
    • Journal of the Korean BIBLIA Society for library and Information Science
    • /
    • v.27 no.2
    • /
    • pp.51-80
    • /
    • 2016
  • Recently in accordance with Government 3.0 policy, public data is being released in large quantities and entrepreneurs are succeeding in utilizing this policy to develop products and apps that increase the convenience of the people to use the information. As libraries belong to the public domain, libraries must open a variety of data to the public in accordance with the Government 3.0 policy, and make the various applications utilizing the data. Therefore, this study investigated the government 3.0 Policy, classified the success cases of the applications according to specific criteria, identified data having high availability from the library data, and tried to discover data that can increase the utilization value through the library from other subject areas. An awareness survey was conducted of librarians of the University and Special Library and the results are as follows: First, librarians' awareness about the Government 3.0 was more than the average of 3.6, whereas for the initiatives presented in 3.0. Second, those responding that the government 3.0 policy would have a positive effect on libraries were six times higher than those responding negatively. Third, the respondents listed the ways that the policy can be effectively utilized in the library, in order, as providing to the user public open data classified by topic, providing user education about utilizing method of public open data, and privacy-related user education regarding open data utilization. Fourth, there was overall agreement by the respondents that public open data would be helpful in improving the library's changing role and image, with 60% responding in a positive way.