• 제목/요약/키워드: privacy issues

검색결과 420건 처리시간 0.024초

Analyses of Characteristics of U-Healthcare System Based on Wireless Communication

  • Kim, Jung Tae
    • Journal of information and communication convergence engineering
    • /
    • 제10권4호
    • /
    • pp.337-342
    • /
    • 2012
  • The medical industries are integrated with information technology with mobile devices and wireless communication. The advent of mobile healthcare systems can benefit patients and hospitals, by not only providing better quality of patient care, but also by reducing administrative and medical costs for both patients and hospitals. Security issues present an interesting research topic in wireless and pervasive healthcare networks. As information technology is developed, many organizations such as government agencies, public institutions, and corporations have employed an information system to enhance the efficiency of their work processes. For the past few years, healthcare organizations throughout the world have been adopting health information systems (HIS) based on the wireless network infrastructure. As a part of the wireless network, a mobile agent has been employed at a large scale in hospitals due to its outstanding mobility. Several vulnerabilities and security requirements related to mobile devices should be considered in implementing mobile services in the hospital environment. Secure authentication and protocols with a mobile agent for applying ubiquitous sensor networks in a healthcare system environment is proposed and analyzed in this paper.

하이웨이 네트워크 기반 CNN 모델링 및 사전 외 어휘 처리 기술을 활용한 악성 댓글 분류 연구 (A Study on the Toxic Comments Classification Using CNN Modeling with Highway Network and OOV Process)

  • 이현상;이희준;오세환
    • 한국정보시스템학회지:정보시스템연구
    • /
    • 제29권3호
    • /
    • pp.103-117
    • /
    • 2020
  • Purpose Recently, various issues related to toxic comments on web portal sites and SNS are becoming a major social problem. Toxic comments can threaten Internet users in the type of defamation, personal attacks, and invasion of privacy. Over past few years, academia and industry have been conducting research in various ways to solve this problem. The purpose of this study is to develop the deep learning modeling for toxic comments classification. Design/methodology/approach This study analyzed 7,878 internet news comments through CNN classification modeling based on Highway Network and OOV process. Findings The bias and hate expressions of toxic comments were classified into three classes, and achieved 67.49% of the weighted f1 score. In terms of weighted f1 score performance level, this was superior to approximate 50~60% of the previous studies.

지능형 자동차의 사용자 인증에 대한 위협 및 대응 기법 (User Authentication Risk and Countermeasure in Intelligent Vehicles)

  • 김승환;이근호
    • 한국융합학회논문지
    • /
    • 제3권1호
    • /
    • pp.7-11
    • /
    • 2012
  • 지능형 자동차의 최종 목표는 사고 위험이 전혀 없는 무인 자동차이다. 지능형 자동차의 구현을 위해서는 무선 네트워크 데이터 통신 기술이 중요하다. 본 논문에서는 데이터 통신 기술이 구현이 되었을 때를 가정하여 네트워크 침입 기술에 대해 알아보고, 사용자 인증 및 데이터 위 변조시 그에 따른 보안 취약점과 그에 따른 대응기법을 생체인식 알고리즘 통해 적용하고자 한다. 확실한 사용자 인증 기법과 데이터 전송 기술에 대한 암호화를 통해 더욱 더 안전한 대응 기법을 제안하고자 한다.

RFID Technology in Health Environment Opportunities and Challenges for Modern Cancer Care

  • Safdari, Reza;Maserat, Elham;Maserat, Elnaz
    • Asian Pacific Journal of Cancer Prevention
    • /
    • 제13권12호
    • /
    • pp.6533-6537
    • /
    • 2012
  • Cancers are significant contributors to the mortality and health care expenditures. Cancer can be reduced and monitored by new information technology. Radio frequency identification or RFID is a wireless identification technology. The use of this technology can be employed for identifying and tracking clinical staff, patients, supplies, medications and equipments. RFID can trace and manage chemotherapy drugs. There are different types of RFID. Implantable RFID allowing a chip to be embedded under the skin and that store the cancer patient's identifier. These are concerns about applications of RFID. Privacy, security and legal issues are key problems. This paper describes capabilities, benefits and confidentiality aspects in radio frequency identification systems and solutions for overcoming challenges.

Security Attacks and Challenges of VANETs : A Literature Survey

  • Quyoom, Abdul;Mir, Aftab Ahmad;Sarwar, Abid
    • Journal of Multimedia Information System
    • /
    • 제7권1호
    • /
    • pp.45-54
    • /
    • 2020
  • This paper presented a brief introduction along with various wireless standards which provide an interactive way of interaction among the vehicles and provides effective communication in VANET. Security issues such as confidentiality, authenticity, integrity, availability and non-repudiation, which aims to secure communication between vehicle-to-vehicle (V2V) and vehicle-to-infrastructure (V2I). A detailed discussion and analysis of various possible attacks based on security services are also presented that address security and privacy concern in VANETs. Finally a general analysis of possible challenges is mentioned. This paper can serve as a source and reference in building the new technique for VANETs.

유비쿼터스 환경하에서의 헬스케어 시스템에서의 보안 문제, 해결책 및 기법 (Security Issues, Challenges and Techniques for U-Healthcare System)

  • 양지수;김한규;김승민;김정태
    • 한국정보통신학회:학술대회논문집
    • /
    • 한국정보통신학회 2013년도 춘계학술대회
    • /
    • pp.984-985
    • /
    • 2013
  • An integrated security mechanism is one of the key challenges in the open wireless network architecture because of the diversity of the wireless network in open wireless network and the unique security mechanism used in each one of these networks. In the paper we analysed some elements to guarantee security and privacy preserving in distributed IT applications which provide some kind of support to complex medical domains.

  • PDF

열화상 카메라를 이용한 3D 컨볼루션 신경망 기반 낙상 인식 (3D Convolutional Neural Networks based Fall Detection with Thermal Camera)

  • 김대언;전봉규;권동수
    • 로봇학회논문지
    • /
    • 제13권1호
    • /
    • pp.45-54
    • /
    • 2018
  • This paper presents a vision-based fall detection system to automatically monitor and detect people's fall accidents, particularly those of elderly people or patients. For video analysis, the system should be able to extract both spatial and temporal features so that the model captures appearance and motion information simultaneously. Our approach is based on 3-dimensional convolutional neural networks, which can learn spatiotemporal features. In addition, we adopts a thermal camera in order to handle several issues regarding usability, day and night surveillance and privacy concerns. We design a pan-tilt camera with two actuators to extend the range of view. Performance is evaluated on our thermal dataset: TCL Fall Detection Dataset. The proposed model achieves 90.2% average clip accuracy which is better than other approaches.

국내 마이데이터 활성화를 위한 미국, 유럽 마이데이터 비교 연구 (Comparison of MyData Use Among the U.S., Europe, and the Korean Governments)

  • 이명호
    • 한국비블리아학회지
    • /
    • 제31권2호
    • /
    • pp.183-201
    • /
    • 2020
  • 소셜 데이터, 공공 데이터, 개인정보 등을 이용한 다양한 서비스에 대한 요구가 증가하고 있다. 특히 개인정보를 활용하고 보호하기 위하여 미국, 유럽에서는 마이데이터에 대한 정책이 시도되고 있으며 2019년 국내에서도 마이데이터가 시행되었다. 본 연구는 우리나라 마이데이터 발전 방향을 제시하기 위하여 미국, 유럽의 마이데이터를 분석하였고 이를 기반으로 데이터 호환 및 데이터 품질 측면에서 발전 방향을 제안하였다.

대구경북 서비스 콘텐츠 활성화를 위한 애니메이션 콘텐츠가 학습성과의 연관관계 연구: 개인정보보안을 중심으로 (Utilizing animation contents for e-learning performance enhancement: focus on private information security)

  • 정재은
    • 한국정보통신학회논문지
    • /
    • 제15권2호
    • /
    • pp.471-476
    • /
    • 2011
  • 본 연구는 이러닝을 실시하는데 있어 플래시와 같은 애니메이션 콘텐츠가 미치는 영향에 대하여 알아보았다. 보다 구체적으로 애니메이션 콘텐츠의 어떠한 속성들이 개인정보보안 관련 이러닝 학습에 긍정적인 영향을 미치는지 알아보고자 하였다. 그 결과 플래시 애니메이션의 속성인 캐릭터와 스토리가 학습자들의 이러닝 학습 효과를 높이는데 긍정적인 영향을 미치는 것을 알 수 있었다.

유비쿼터스 환경하에서의 헬스케어 구현 시의 고려 사항 (Security Consideration for Implementation in Ubiquitous Healthcare System)

  • 김정태
    • 한국정보통신학회:학술대회논문집
    • /
    • 한국해양정보통신학회 2010년도 춘계학술대회
    • /
    • pp.639-641
    • /
    • 2010
  • Healthcare applications involve complex structures of interacting processes and professionals that need to exchange information to provide the care services. In this kind of systems many different professional competencies, ethical and sensibility requirements as well as legal frameworks coexist and because of that the information managed inside the system should not be freely accessed, on the contrary. it must be subject to very complex privacy restrictions. This is particularly critical in distributed systems, where additionally, security in remote transmissions must be ensured. In this paper, we address the fundamental security issues that must be considered in design of a distributed healthcare application.

  • PDF