• Title/Summary/Keyword: 개인정보보호행동

Search Result 91, Processing Time 0.025 seconds

Effects on cooperative spirit of a cohort by instruction types of Taekwondo (태권도 지도자의 지도유형이 집단응집력에 미치는 영향)

  • Jeong, Chan-Sam
    • Korean Security Journal
    • /
    • no.13
    • /
    • pp.471-485
    • /
    • 2007
  • This study is performed to find out what type instructions are produced to players by coaches and what effects are resulted in cooperative spirit of the concerned group. Furthermore the study has its aims at advancing instructors' skills by using finding of it. The study used 'SPSS 11.0 FOR WINDOW - Statistical Package' to analyze the collected samples and dealt with data of 174 individuals. Statistical analysis of the research for hypothesis verification was about frequency, trust level, mutual relationship, variables, and T-verification. The meaningful level for any result was ranged within 95%(p< .05), 99%(p<.01). The finding are as follows. Effects on pleasure, one of elements of team spirits taken by instructor's training style are analyzed as follows. It was proved to be meaningful in relation with a series of activities like training, democratic, social, compensatory aspects and showed also considerable relation with power based behaviors. That says, players are found to enjoy high pleasure when social and bureaucratic behaviors of instructors are very energetic. In addition to that, training, democratic, and compensatory activities didn't show any meaningful effect. Team spirit was found to play a main role between instructor's behaviors and training, democratic, social rewarding activities. Democratic and social acts influence on team spirit. Looking into the detailed aspects, team spirit was resulted very high in the individuals with low democratic mind and was shown high group spirit by groups with high sociable activities. Teamworks was found to be affected by relation between instructor's acts and training, democratic, social and compensatory aspects and it showed meaningful relations with training, social, bureaucratic behaviors. Low degree of training and bureaucratic activities are found to prefer for power team spirit, and high social activities led a strong teamworks. Group binding spirit was influenced by training, democratic, social compensatory, bureaucratic behaviors and it showed to give effects on democratic, social, and bureaucratic activities of instructors. Low degree of democratic and bureaucratic behaviors are found to produce strong team spirit. In contrast with that, strong social activities was found to be motive of powerful team spirit. Value of team spirit was found to play a main role between instructor's behaviors and training, democratic, social, rewarding activities. It didn't show any meaningful effect on behavior of instructors.

  • PDF

Differences in Privacy-Protective Behaviors by Internet Users in Korea and China (인터넷 사용자의 개인정보보호 행동의 차이에 관한 연구)

  • Zhang, Chao;Wan, Lili;Min, Dai-Hwan;Rim, Seong-Taek
    • Journal of Information Technology Services
    • /
    • v.11 no.1
    • /
    • pp.93-107
    • /
    • 2012
  • Privacy-protective behavior can be classified into passive behavior and active behavior. Passive behavior includes refusal, misrepresentation, and removal, while word-of-mouth, complaint, and seeking for help belong to active behavior. Internet users in different countries may take different types of privacy-protective behavior because of cultural and social differences. This study analyzes the differences in Internet users' privacy-protective behavior between Korea and China. Korean Internet users take refusal, complaint, and seeking to protect their privacy information, while misrepresentation is not an option for Korean Internet users. Chinese Internet users take refusal, complaint, seeking, and misrepresentation to protect their privacy information. In Korea, passive behavior (refusal) is chosen more often than active behavior (complaint and seeking for help), while in China active behavior(complaint and seeking for help) is preferred to passive behavior (refusal and misrepresentation). The differences of privacy-protective behavior in the two countries may provide some implications for online companies, if they want to avoid the business risk due to privacy concerns and to take appropriate steps to deal with privacy-protective behavior by Internet users.

The Structural Relationships among Information Security Threat Factors and Information Protection Behavior of the FinTech Services: Focus on Theoretical Perspectives of Technology Threat Avoidance and Health Protective Behaviors (핀테크(FinTech) 서비스의 정보보안 위협요인과 개인정보보호행위와의 구조적 관계에 관한 연구: 기술위협회피와 건강행동이론 관점에서)

  • Bae, Jae Kwon
    • The Journal of Information Systems
    • /
    • v.26 no.3
    • /
    • pp.313-337
    • /
    • 2017
  • Purpose Financial technology, also known as FinTech, is conceptually defined as a new type of financial service which is combined with information technology and other traditional financial services like payments, investments, financing, insurance, asset management and so on. Most of the studies on FinTech services have been conducted from the viewpoint of technical issues or legal and institutional studies, and few studies are conducted from the health belief perspectives and security behavior approaches. In this regard, this study suggest an extended information protection behavior model. Design/Methodology/Approach The Health Belief Model (HBM), the Protection Motivation Theory (PMT), and the Technology Threat Avoidance Theory (TTAT) were employed to identify constructs relevant to information protection behavior of FinTech services. A new extended information protection behavior model in which the influence factors of information protection behavior (i.e., perceived susceptibility, perceived severity, perceived benefits, perceived barriers, perceived self-efficacy, subjective norms) affect perceived threats and perceived responsiveness positively, leading to information protection behavior of FinTech users eventually. This study developed an extended information protection behavior model to explain the protection behavior intention in FinTech users and collected 272 survey responses from the mobile users who had experiences with such mobile payments and FinTech services. Findings The finding of this study suggests that the influence factors of information protection behavior affect perceived threats and perceived responsiveness positively, and information protection behavior of FinTech users as well.

The System Developing Social Network Group by Using Life Logging Data (라이프로깅 데이터를 이용한 소셜 네트워크 그룹 생성 시스템)

  • Jo, Youngho;Woo, Jincheol;Lee, Hyunwoo;Cho, Ayoung;Whang, Mincheol
    • Journal of the HCI Society of Korea
    • /
    • v.12 no.2
    • /
    • pp.13-19
    • /
    • 2017
  • Various life-logging based on cloud service have developed social network according to the advanced technology of smartphone and wearable device. Daily digital life on social networks has been shared information and emotion and developed new social relationships. Recent life-logging has required social relationships beyond extension of personal memory and anonymity for privacy protection. This study is to determine social network group by using life-logging data obtained in daily lives and to categorize emotion behavior with anonymity guarantee. Social network group was defined by grouping similar representative emotional behavior. The public's patterns and trends was able to be inferred by analyzing representative emotion and behavior of the social groups network.

Intrinsic and Extrinsic Factors Affecting Use of Sharing Economy Services and the Moderating Effect of Benefits (공유경제 서비스 사용에 영향을 미치는 사용자의 내외적 요인과 이익의 조절효과)

  • Kim, Sanghyun;Park, Hyunsun;Lim, Jeongtaek
    • The Journal of the Korea Contents Association
    • /
    • v.20 no.12
    • /
    • pp.482-491
    • /
    • 2020
  • This study proposed a research model based on self-determination theory and unified theory of acceptance and use of technology to explain the factors influencing intention to use sharing economy services. A total of 392 responses were collected, and structural equation analysis was performed with AMOS 22.0. The results are summarized as follows. First, self-technological aptness and trust had a positive effect on intention to use sharing economy services. Second, access bigger market and environmental friendliness had a positive effect on intention to use sharing economy services. Third, intention to use sharing economy services had a positive effect on actual usage of sharing economy services. Finally, benefits was found to strengthen the relationship between intention to use sharing economy services and actual usage of sharing economy services. The findings of this study would provide a theoretical framework for sharing economy services and important information for understanding individuals using the sharing economy services.

Travel mode classification method based on travel track information

  • Kim, Hye-jin
    • Journal of the Korea Society of Computer and Information
    • /
    • v.26 no.12
    • /
    • pp.133-142
    • /
    • 2021
  • Travel pattern recognition is widely used in many aspects such as user trajectory query, user behavior prediction, interest recommendation based on user location, user privacy protection and municipal transportation planning. Because the current recognition accuracy cannot meet the application requirements, the study of travel pattern recognition is the focus of trajectory data research. With the popularization of GPS navigation technology and intelligent mobile devices, a large amount of user mobile data information can be obtained from it, and many meaningful researches can be carried out based on this information. In the current travel pattern research method, the feature extraction of trajectory is limited to the basic attributes of trajectory (speed, angle, acceleration, etc.). In this paper, permutation entropy was used as an eigenvalue of trajectory to participate in the research of trajectory classification, and also used as an attribute to measure the complexity of time series. Velocity permutation entropy and angle permutation entropy were used as characteristics of trajectory to participate in the classification of travel patterns, and the accuracy of attribute classification based on permutation entropy used in this paper reached 81.47%.

Application of the Fuzzy Set Theory to Uncertain Parameters in a Countermeasure Model (비상대응모델의 불확실한 변수에 대한 퍼지이론의 적용)

  • Han, Moon-Hee;Kim, Byung-Woo
    • Journal of Radiation Protection and Research
    • /
    • v.19 no.2
    • /
    • pp.109-120
    • /
    • 1994
  • A method for estimating the effectiveness of each protective action against a nuclear accident has been proposed using the fuzzy set theory. In most of the existing countermeasure models in actions under radiological emergencies, the large variety of possible features is simplified by a number of rough assumptions. During this simplification procedure, a lot of information is lost which results in much uncertainty concerning the output of the countermeasure model. Furthermore, different assumptions should be used for different sites to consider the site specific conditions. Tn this study, the diversity of each variable related to protective action has been modelled by the linguistic variable. The effectiveness of sheltering and evacuation has been estimated using the proposed method. The potential advantage of the proposed method is in reducing the loss of information by incorporating the opinions of experts and by introducing the linguistic variables which represent the site specific conditions.

  • PDF

Effective Strategies for Activating IT Ethics Education: A Study on Improving Internet Ethical Education for University Students (효과적인 IT윤리 교육 활성화 방안 : 대학생들의 인터넷 윤리적 교육 개선에 대한 연구)

  • Seung-Young Jang
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.19 no.1
    • /
    • pp.197-208
    • /
    • 2024
  • In today's era, where internet technology and culture are advancing rapidly, the importance of systematic internet ethics education has been underscored to address the insufficient levels of internet ethics among college students. This research primarily focused on assessing the level of internet ethics among college students, who represent a significant proportion of internet users. The innovative Flip Learning teaching method and the introduction of the Wheeler Model, along with the application of frequency measurement theory, allowed us to explore ways to maximize the effectiveness of the education. It was confirmed that students who received internet ethics education demonstrated improved levels of ethics. This study concluded that significant progress has been made in systematizing and effectively promoting internet ethics education. It also proposed the need for systematic ethics education and provided future directions for improving internet ethics education.

A Remote User Authentication Scheme Preserving Anonymity and Traceability with Non-Tamper Resistant Smart Cards (정보추출 가능한 스마트카드 환경에서 익명성과 추적성을 제공하는 원격 사용자 인증 기법)

  • Kwon, Hyuck-Jin;Ryu, Eun-Kyung;Lee, Sung-Woon
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.50 no.6
    • /
    • pp.159-166
    • /
    • 2013
  • Recently, because the interest and needs in privacy protection are growing, smartcard-based remote user authentication schemes have been actively studied to provide the user anonymity. In 2008, Kim et al. first proposed an authentication scheme in order to ensure the user anonymity against both external attackers and the remote server and track malicious users with the help of a trusted trace sever. However, in 2010, Lee et al. showed that Kim et al.'s scheme cannot provide the user anonymity against remote server, which is because the server can trace users without any help of the trace server, and then proposed a improved scheme. On the other hand, in 2010, Horng et al. proposed an authentication scheme with non-tamper resistant smart cards, in which the non-tamper resistant smart card means that an attacker may find out secret information stored in the smart card through special data analysis techniques such as monitoring power consumption, to be secure against a variety of attacks and to provide the user anonymity against external attackers. In this paper, we will propose a remote user authentication scheme with non-tamper resistant smart cards not only to ensure the user anonymity against both external attackers and the remote server but also to track malicious users with only the help of a trusted trace sever.

Practitioners' Needs Analysis to Improve the Youth Theft Prevention Program (청소년 절도비행 재범방지 프로그램 개선을 위한 실무자 요구조사 연구)

  • Choi, Jaegwang;Jang, Heamin;Lee, Yu-Kyeong;Song, Wonyoung
    • Journal of Convergence for Information Technology
    • /
    • v.11 no.9
    • /
    • pp.145-156
    • /
    • 2021
  • This study is aimed to improve the youth theft prevention program with rationality and practicality, based on the needs of practitioners who conduct these programs in fields. The survey questionnaire was prepared based on previous researches, and the survey was conducted on 72 probation officers and education instructors nationwide running a youth theft prevention program. As a result, practitioners reported the lack of self-control and high impulsivity as the main characteristics of the theft delinquent adolescents. And they recognized peer alignment and family problems as the causes of theft. As for the contents of the program, they reported that recidivism prevention skills such as understanding psychological problems, peer relationships, raising a sense of law compliance, anger, impulse control, dealing with negative emotions, and finding alternative behaviors, as well as moral development, are necessary. These results indicate that multi-dimensional interventions such as individuals, families, and peers are needed to prevent recidivism of juvenile theft. Implications of these results, future research directions, and limitations and significance of the study were discussed.