• Title/Summary/Keyword: privacy protection model

Search Result 181, Processing Time 0.026 seconds

A Study on the Effect of Location-based Service Users' Perceived Value and Risk on their Intention for Security Enhancement and Continuous Use: With an Emphasis on Perceived Benefits and Risks (위치기반서비스 사용자의 지각된 가치와 위험이 보안강화의도와 지속이용의도에 미치는 영향에 관한 연구: 지각된 혜택과 위험을 중심으로)

  • Park, Kyung Ah;Lee, Dae Yong;Koo, Chulmo
    • Asia pacific journal of information systems
    • /
    • v.24 no.3
    • /
    • pp.299-323
    • /
    • 2014
  • The reason location based service is drawing attention recently is because smart phones are being supplied increasingly. Smart phone, basically equipped with GPS that can identify location information, has the advantage that it can provide contents and services suitable for the user by identifying user location accurately. Offering such diverse advantages, location based services are increasingly used. In addition, for use of location based services, release of user's personal information and location data is essentially required. Regarding personal information and location data, in addition to IT companies, general companies also are conducting various profitable businesses and sales activities based on personal information, and in particular, personal location data, comprehending high value of use among personal information, are drawing high attentions. Increase in demand of personal information is raising the risk of personal information infringement, and infringements of personal location data also are increasing in frequency and degree. Therefore, infringements of personal information should be minimized through user's action and efforts to reinforce security along with Act on the Protection of Personal Information and Act on the Protection of Location Information. This study aimed to improve the importance of personal information privacy by empirically analyzing the effect of perceived values on the intention to strengthen location information security and continuously use location information for users who received location-based services (LBS) in mobile environments with the privacy calculation model of benefits and risks as a theoretical background. This study regarded situation-based provision, the benefit which users perceived while using location-based services, and the risk related to personal location information, a risk which occurs while using services, as independent variables and investigated the perceived values of the two variables. It also examined whether there were efforts to reduce risks related to personal location information according to the values of location- based services, which consumers perceived through the intention to strengthen security. Furthermore, it presented a study model which intended to investigate the effect of perceived values and intention of strengthening security on the continuous use of location-based services. A survey was conducted for three hundred ten users who had received location-based services via their smartphones to verify study hypotheses. Three hundred four questionnaires except problematic ones were collected. The hypotheses were verified, using a statistical method and a logical basis was presented. An empirical analysis was made on the data collected through the survey with SPSS 12.0 and SmartPLS 2.0 to verify respondents' demographic characteristics, an exploratory factor analysis and the appropriateness of the study model. As a result, it was shown that the users who had received location-based services were significantly influenced by the perceived value of their benefits, but risk related to location information did not have an effect on consumers' perceived values. Even though users perceived the risk related to personal location information while using services, it was viewed that users' perceived value had nothing to do with the use of location-based services. However, it was shown that users significantly responded to the intention of strengthening security in relation to location information risks and tended to use services continuously, strengthening positive efforts for security when their perceived values were high.

Relative Importance Analysis of Management Level Diagnosis for Consignee's Personal Information Protection (수탁사 개인정보 관리 수준 점검 항목의 상대적 중요도 분석)

  • Im, DongSung;Lee, Sang-Joon
    • Asia-pacific Journal of Multimedia Services Convergent with Art, Humanities, and Sociology
    • /
    • v.8 no.2
    • /
    • pp.1-11
    • /
    • 2018
  • Recently ICT, new technologies such as IoT, Cloud, and Artificial Intelligence are changing the information society explosively. But personal information leakage incidents of consignee's company are increasing more and more because of the expansion of consignment business and the latest threats such as Ransomware and APT. Therefore, in order to strengthen the security of consignee's company, this study derived the checklists through the analysis of the status such as the feature of consignment and the security standard management system and precedent research. It also analyzed laws related to consignment. Finally we found out the relative importance of checklists after it was applied to proposed AHP(Analytic Hierarchy Process) Model. Relative importance was ranked as establishment of an internal administration plan, privacy cryptography, life cycle, access authority management and so on. The purpose of this study is to reduce the risk of leakage of customer information and improve the level of personal information protection management of the consignee by deriving the check items required in handling personal information of consignee and demonstrating the model. If the inspection activities are performed considering the relative importance of the checklist items, the effectiveness of the input time and cost will be enhanced.

A study on Model of Personal Information Protection based on Artificial Intelligence Technology or Service (인공지능 기술/서비스 기반의 개인정보 보호 모델에 대한 연구)

  • Lee, Won-Tae;Kang, JangMook
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.16 no.4
    • /
    • pp.1-6
    • /
    • 2016
  • A.I. has being developed from the technology for Big data analysis to the technology like a human being. The sensing technology of IOT will make A.I. have the more delicate sense than human's five senses. The computer resource is going to be able to support A.I. by clouding networking technology wherever and whenever. Like this A.I. is getting developed as a golden boy of the latest technologies At the same time, many experts have the anxiety and bleak outlook about A.I. Most of dystopian images of the future come out when the contemplative view is lost or it is not possible to view the phenomena objectively. Or it is because of the absence of confidence and ability to convert from the visions of technology development to the subject visions of human will. This study is not about the mass dismissal, unemployment or the end of mankind by machinery according to the development of A.I. technology and service, but more about the occurrent issue like the personal information invasion in daily life. Also the ethical and institutional models are considered to develop A.I. industry protecting the personal information.

A Scalable Data Integrity Mechanism Based on Provable Data Possession and JARs

  • Zafar, Faheem;Khan, Abid;Ahmed, Mansoor;Khan, Majid Iqbal;Jabeen, Farhana;Hamid, Zara;Ahmed, Naveed;Bashir, Faisal
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.6
    • /
    • pp.2851-2873
    • /
    • 2016
  • Cloud storage as a service provides high scalability and availability as per need of user, without large investment on infrastructure. However, data security risks, such as confidentiality, privacy, and integrity of the outsourced data are associated with the cloud-computing model. Over the year's techniques such as, remote data checking (RDC), data integrity protection (DIP), provable data possession (PDP), proof of storage (POS), and proof of retrievability (POR) have been devised to frequently and securely check the integrity of outsourced data. In this paper, we improve the efficiency of PDP scheme, in terms of computation, storage, and communication cost for large data archives. By utilizing the capabilities of JAR and ZIP technology, the cost of searching the metadata in proof generation process is reduced from O(n) to O(1). Moreover, due to direct access to metadata, disk I/O cost is reduced and resulting in 50 to 60 time faster proof generation for large datasets. Furthermore, our proposed scheme achieved 50% reduction in storage size of data and respective metadata that result in providing storage and communication efficiency.

Discussion on Sustaining "Olle" without Losing Integrity of Local Identity - Focused on downtown area called Mu-geun-sung at Jeju city - (올래의 지속가능한 재생방식에 관한 연구 - 제주시 무근성 지역을 중심으로 -)

  • Yi, Yong Kyu;Yi, Yun Kyu;Jing, Li-Yuan
    • Journal of the Korean Institute of Rural Architecture
    • /
    • v.20 no.3
    • /
    • pp.19-26
    • /
    • 2018
  • There are still a number of "olles" existing with traditional alley characteristics in the inner city of Jeju. As a matter of fact, the renovation of old buildings and the protection of alley space are facing a dilemma due to the existence of less than 4m-width-roads in the area of "Mu-geun-sung". This study examines the current status of alley space in "Mu-geun-sung" area; and puts forward to the potential possibility and limitation of alley space regeneration via exploring the applicable scheme of building agreement. In the field survey, a number of regions in inner city of Jeju witnesses the existing majority of invaluable, conventional olles. So as to grasp the feasibility in "Mu-geun-sung" area, we designs a simulating experiment to carry out the Building Agreement; and compares with the current development model in this area. Building Agreement implies to establish gradually a separation of land ownership under the existing unified development of landowners and users, thus to explore a variety of land exploitation systems by separating land ownership and right to use land. As a result, the deterioration of the street landscape results from the increase of building storey numbers. The damages to the surrounding environment brought by the newly built buildings will be minimized as well as keeping the maximum building volume rate. Obviously, these measures will alleviate infringement to the traditional residential sunlight and privacy space effectively, and reduce the pressure from high-rise buildings to the alley space, so that the landscape of the alley will enhance to form a more comfortable alley environment.

Sensitive Personal Information Protection Model for RBAC System (역할기반 접근제어시스템에 적용가능한 민감한 개인정보 보호모델)

  • Mun, Hyung-Jin;Suh, Jung-Seok
    • Journal of the Korea Society of Computer and Information
    • /
    • v.13 no.5
    • /
    • pp.103-110
    • /
    • 2008
  • Due to the development of the e-commerce, the shopping mall such as auction collects and manages the personal information of the customers for efficient service. However, because of the leakage of the Personal information in auction, the image of the companies as well as the information subjects is damaged. Even though the organizations and the companies store the personal information as common sentences and protect using role based access control technique, the personal information can be leaked easily in case of getting the authority of the database administrator. And also the role based access control technique is not appropriate for protecting the sensitive information of the information subject. In this paper, we encrypted the sensitive information assigned by the information subject and then stored them into the database. We propose the personal policy based access control technique which controls the access to the information strictly according to the personal policy of the information subject. Through the proposed method we complemented the problems that the role based access control has and also we constructed the database safe from the database administrator. Finally, we get the control authority about the information of the information subject.

  • PDF

Study on the Factors Affecting the Intention to Share Electronic Medical Records (전자의무기록 공유 의도에 영향을 미치는 요인 연구)

  • Young Eun Kim;Jee Yeon Lee
    • Journal of the Korean Society for information Management
    • /
    • v.41 no.1
    • /
    • pp.283-311
    • /
    • 2024
  • This study examined the factors affecting the intention of the public to share electronic medical records(EMR) based on the theory of reasoned action and the privacy calculus model. It also investigated whether the purpose of EMR sharing varies depending on personal characteristics, such as the degree of interest in health and personal medical history. According to an online survey of 145 people, altruistic enjoyment, awareness of personal information protection, recognition of legal and institutional roles, and interest in health had a positive impact on the level of EMR sharing, and trust in hospitals positively adjusted the relationship between recognition of legal and institutional roles and sharing intentions. Accordingly, we confirmed that the public recognized the role of the government and hospitals in the sharing process as necessary. The public interest benefits of sharing are critical to activating public participation in the sharing of EMR, and it is also essential to prepare guidelines that legally guarantee the security and proper use of EMR.

Cancer Registration in Korea: The Present and Furtherance (암 등록사업의 현황과 추진방향)

  • Ahn, Yoon-Ok
    • Journal of Preventive Medicine and Public Health
    • /
    • v.40 no.4
    • /
    • pp.265-272
    • /
    • 2007
  • It was not until 1975 that cancer registration was initiated in Korea; voluntary registration of cancer patients of training hospitals throughout the country began under the auspices of the Korean Cancer Society(KCS). However, an official cancer registration, the Korea Central Cancer Registry(KCCR), began on July 1st, 1980. Forty-five training and two non-training hospitals throughout the country initiated registration of patients in whom neoplasms had been found. Data related to case information specified are to be sent to the KCCR at the National Medical Center(it moved at National Cancer Center in 2000). The initial cancer registration of KCS was merged to the KCCR in 1980. Although the KCCR covers most all the large training hospitals in Korea, it cannot provide incidence data. It is, however, the only of its kind in the world, being neither hospital nor population based. The first population based cancer registry(PBCR) was launched in a small county, Kangwha(it has around 80,000 inhabitants), by Yonsei University Medical College in 1983. All data were collected by active methods, and incidence statistics for 1986-1992 appeared in Vol VII of the CI5. Another PBCR, Seoul Cancer Registry(SCR), started in 1991. It was supported by a civilian foundation, the Korean Foundation for Cancer Research. The basic idea of case registration of SCR was the incorporation of KCCR data to PBCR, e. g. dual sources of case registration, i.e., from the KCCR and also including cases diagnosed in small hospitals and other medical facilities. Assessing completeness and validity of case registration of SCR, the program and methodology used by the SCR was later extended to other large cities and areas in Korea, and the PBCR in each area was established. Cancer incidence statistics of Seoul for 1993-1997, Busan for 1996-1997, and Daegu for 1997-1998, as well as Kangwha for 1993-1997, appeared eventually in Vol VIII of the CI5. The Korean or 'pillar' model for a PBCR is a new one. The KCCR data file is a reliable basis, as a pillar, for a PBCR in each area. The main framework of the model for such a registry is the incorporation of a KCCR data file with data from additionally surveyed cases; the data related to cancer deaths, medical insurance claims, and visit-and surveillance of non-KCCR medical facilities. Cancer registration has been adopted as a national cancer control program by Korean government in 2004 as the Anti-Cancer Act was enacted. Since then, some officers have tried to launch a nation-wide PBCR covering whole country. In the meantime, however, cancer registration was interrupted and discontinued for years due to the Privacy Protection Law, which was solved by an amendment of the Anti-Cancer Act in 2006. It would be premature to establish the nation-wide PBCR in Korea. Instead, continuous efforts to improve the completeness of registration of the KCCR, to progress existing PBCRs, and to expand PBCRs over other areas are still to be devoted. The nation-wide PBCR in Korea will be established eventually with summation of the PBCRs of the Korean model.

A Secure Access Control Model for Privacy Protection using Purpose Classification (사용목적 분류화를 통한 프라이버시 보호를 위한 보안 접근제어 모델)

  • Na Seok-Hyun;Park Seog
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2006.06c
    • /
    • pp.265-267
    • /
    • 2006
  • 사용목적(Purpose)은 최근 개인 프라이버시 보호와 관련하여 데이타 수집과 수집 후 보안관리에 있어서 중요한 요소로 사용되고 있다. W3C(World Wide Web Consortium)는 데이타 제공자가 자신이 방문한 웹 사이트에 개인정보를 제공하는 것을 통제할 수 있도록 하는 표준을 제시하였다. 그러나 데이타 수집 후 유통과정에서 개인정보에 대한 보안관리에 대한 언급이 없다. 현재 히포크라테스 데이타베이스(Hippocratic Databases), 사용목적기반 접근제어(Purpose Based Access Control)등은 W3C의 데이타 수집 메커니즘을 따르고 있으며, 데이타 수집 후 보안관리에 대하여 사용목적 관리와 접근제어 기법을 사용하여 관리를 하고 있으나 사용목적에 대한 표현과 사용목적 관리의 미흡함으로 인하여 그에 따르는 개인정보의 프라이버시 보호에 있어서 효과적인 해결책을 제시하지 못하고 있다. 본 논문은 사용목적의 표현력을 향상시키면서. 사용목적의 효과적인 관리기법을 제시한다. 또한 개인의 프라이버시 보호를 위한 방법으로 사용목적의 분류화를 통해 최소권한의 원칙을 따르는 접근제어 기법을 제시한다. 본 논문에서는 사용목적을 상속적, 시간적 그리고 독립적 구조로 분류화하였으며, 이렇게 분류화된 사용목적에 대한 각기 다른 관리기법을 제시한다. 또한 접근제어의 유연성을 위해 RBAC의 역할계층 구조를 사용하였으며, 일의 최소 단위인 태스크(task)의 최소권한을 얻기 위한 조건으로 몇몇 특성의 사용목적을 사용하여 만족할 경우 태스크를 처리하기 위한 기존 모델보다 향상된 최소사용권한을 제공하는 기법을 제시한다. Interference Contrast)에 의한 내부구조 관찰이 최종 동정기준이 되어야할 것으로 나타났다.cillus로 구성되었다. 한편, DAL세균군(42균주)은 high G+C 및 low G+C gram positive 계통군 이외에도 proteobacteria -subdivision에 속하는 Afipia와 Ralstonia, proteobacteria -subdivision에 속하는 Variovorax, proteobacteria $\beta$-subdivision에 속하는Pseudomonas로 구성되어 계통학적으로 다양한 세균임이 확인되었다. 40%까지 대체가 가능하였으며, 아울러 높은 라이신 부산물의 대체 수준에 있어서 사료효율과 단백질 전환효율을 고려한다면 아미노산 첨가(라이신과 아르지닌)와 중화 효과에 좋은 결과가 있을 것으로 사료된다.의한 적정 양성수용밀도는 각고 5~6cm 크기의 경우 10~15개체가 적합하였다. 수증별 성장은 15~20 m 수층에서 빨랐으며, 성장촉진과 폐사를 줄이기 위해서는 고수온이 지속되는 7~10월에는 20~30m수층으로 채롱을 내려 양성하고 그 외 시기에는 15 m층 내외가 좋은 것으로 나타났다. 상품으로 출하 가능한 크기 인 각고 10 cm이상, 전중량 140 g 내외로 성장시 키기까지는 채묘후 22개월이 소요되었고, 출하시기는 전중량 증가가 최대에 이르는 3월에서 4월 중순이 경제적일 것으로 판단된다.er 90 % of good relative dynamic modulus of elasticity due to fineness of formation caused by the

  • PDF

Federated learning-based client training acceleration method for personalized digital twins (개인화 디지털 트윈을 위한 연합학습 기반 클라이언트 훈련 가속 방식)

  • YoungHwan Jeong;Won-gi Choi;Hyoseon Kye;JeeHyeong Kim;Min-hwan Song;Sang-shin Lee
    • Journal of Internet Computing and Services
    • /
    • v.25 no.4
    • /
    • pp.23-37
    • /
    • 2024
  • Digital twin is an M&S (Modeling and Simulation) technology designed to solve or optimize problems in the real world by replicating physical objects in the real world as virtual objects in the digital world and predicting phenomena that may occur in the future through simulation. Digital twins have been elaborately designed and utilized based on data collected to achieve specific purposes in large-scale environments such as cities and industrial facilities. In order to apply this digital twin technology to real life and expand it into user-customized service technology, practical but sensitive issues such as personal information protection and personalization of simulations must be resolved. To solve this problem, this paper proposes a federated learning-based accelerated client training method (FACTS) for personalized digital twins. The basic approach is to use a cluster-driven federated learning training procedure to protect personal information while simultaneously selecting a training model similar to the user and training it adaptively. As a result of experiments under various statistically heterogeneous conditions, FACTS was found to be superior to the existing FL method in terms of training speed and resource efficiency.