• Title/Summary/Keyword: 익명화

Search Result 95, Processing Time 0.023 seconds

A Study on the Contextual special quality in Jean Nouvel's projects (장 누벨 작품 공간에 나타나는 맥락적 특성에 관한 연구)

  • Lee, Chan;Yun, Hyun-Sook
    • Archives of design research
    • /
    • v.20 no.1 s.69
    • /
    • pp.111-120
    • /
    • 2007
  • This research proposes contextual space expression as a possibility of solution methods for local and historical issues, the matters that our contemporary architecture has to overcome. When modernistic architecture aimed for anonymous public interests denying the characteristics in historical and spacial contexts, postmodern architecture and regional architecture, etc have been striving to revive discontinued contextual meanings using various historical and environmental elements. While such attempts only borrowed architectural materials by superficially understanding the context, they could not comprehend ceaselessly changing contexts sufficiently. Choosing Jean Nouvel as one of the architects that can explain spatial plan to properly respond to such ever-changing, contemporary contexts, the researcher intended to understand his line of expressional characteristics of his architectural space and analyze his works as examples.

  • PDF

An Exploratory Study on University Students' Perception of Internet Addiction : Using Photovoice (대학생들의 인터넷 중독 인식에 대한 탐색적 연구 : 포토보이스 적용)

  • Kim, Soo Jin
    • Journal of Korean Society of Disaster and Security
    • /
    • v.13 no.3
    • /
    • pp.59-74
    • /
    • 2020
  • The purpose of this study is to explore the subjective perception of college students' Internet addiction by applying photovoice method, a participatory research method. The subjects of the study were nine university students at G University. The data were analyzed by orientation, photo collection, photo selection, contextualizing and codifying according to the general photo voice research procedure.As a result, 15 sub-categories were derived based on the meaning of Internet addiction, the effects of Internet addiction on life, and how to get out of Internet addiction. The perception of the meaning of Internet addiction was divided into five categories: 'loss of self-regulation', 'habit without exit', 'disconnection from the world', 'loss of me', and 'voluntary prison'. The effects of Internet addiction on life were 5 categories: 'health deterioration', 'social isolation', 'broken daily life', 'anonymous violence' and 'my discovery and life extension'. In terms of how to get out of internet addiction, 'self-looking', 'new hobbies', 'nearby', 'reality meetings', and 'forced blocking' were derived. It suggested the discussion about Internet addiction viewed by college students and the implications of constructing a counseling program that can help to use the Internet correctly.

Biasing Factors in Self-Report Assessment of Bullying/Victimization: Examining Variability in Involvement Rates by Testing Conditions (자기보고식 괴롭힘 경험률 평가의 편향요인 탐색: 평가조건 변인을 중심으로)

  • Lee, Donghyung
    • Korean Journal of School Psychology
    • /
    • v.15 no.3
    • /
    • pp.459-488
    • /
    • 2018
  • The self-report assessment has been most commonly used to estimate bullying/victimization (B/V) rates in most domestic and international prevalence studies. However, the presence of many potential biasing factors in such an assessment method, including specific operationalization/measurement strategies and testing conditions, has become an issue due to a considerable variability in reported involvement rates across studies. This study analyzed self-reported B/V involvement rates on Olweus Bullying Questionnaire (OBQ) among 690 Korean middle school students by gender and two different cut-offs (generous vs. strict cut-offs) and examined if the involvement rates were significantly varied by testing conditions such as presentation vs. omission of a precise definition of B/V, anonymous vs. non-anonymous/confidential administration, and the use of global vs. specific questions. Chi-square analyses revealed that boys displayed higher involvement rates on global measures of B/V and on items related to direct forms of B/V, with no significant gender differences on specific measures of relational B/V rates. It was also found that a global rate of bullying and specific rates of verbal B/V were 111% to 157% higher when no definition was provided. However, anonymous vs. non-anonymous administration had no significant impacts on rates of involvement, except for one item; there were also no significant differences in reported degrees of frankness and perceived confidentiality of their responses across two adminstration conditions. Finally, when involvement rates were assessed by using specific vs. global items, they were 68% to 148% higher with binominal correlations in low to moderate ranges. Findings also indicated that global items had a high specificity but a relatively low sensitivity. Implications of these findings were fully discussed for researchers and practitioners in the field of B/V assessment.

Improvement of Personal Information Protection Laws in the era of the 4th industrial revolution (4차 산업혁명 시대의 개인정보보호법제 개선방안)

  • Choi, Kyoung-jin
    • Journal of Legislation Research
    • /
    • no.53
    • /
    • pp.177-211
    • /
    • 2017
  • In the course of the emergence and development of new ICT technologies and services such as Big Data, Internet of Things and Artificial Intelligence, the future will change by these new innovations in the Fourth Industrial Revolution. The future of this fourth industrial revolution will change and our future will be data-based society or economy. Since there is personal information at the center of it, the development of the economy through the utilization of personal information will depend on how to make the personal information protection laws. In Korea, which is trying to lead the 4th industrial revolution, it is a legal interest that can not give up the use of personal information, and also it is an important legal benefit that can not give up the personal interests of individuals who want to protect from personal information. Therefore, it is necessary to change the law on personal information protection in a rational way to harmonize the two. In this regard, this article discusses the problems of duplication and incompatibility of the personal information protection law, the scope of application of the personal information protection law and the uncertainty of the judgment standard, the lack of flexibility responding to the demand for the use of reasonable personal information, And there is a problem of reverse discrimination against domestic area compared to the regulated blind spot in foreign countries. In order to solve these problems and to improve the legislation of personal information protection in the era of the fourth industrial revolution, we proposed to consider both personal information protection and safe use by improving the purpose and regulation direction of the personal information protection law. The balance and harmony between the systematical maintenance of the personal information protection legislation and laws and regulations were also set as important directions. It is pointed out that the establishment of rational judgment criteria and the legislative review to clarify it are necessary for the constantly controversial personal information definition regulation and the method of allowing anonymization information as the intermediate domain. In addition to the legislative review for the legitimate and non-invasive use of personal information, there is a need to improve the collective consent system for collecting personal information to differentiate the subject and to improve the legislation to ensure the effectiveness of the regulation on the movement of personal information between countries. In addition to the issues discussed in this article, there may be a number of challenges, but overall, the protection and use of personal information should be harmonized while maintaining the direction indicated above.

Legal Issues on the Collection and Utilization of Infectious Disease Data in the Infectious Disease Crisis (감염병 위기 상황에서 감염병 데이터의 수집 및 활용에 관한 법적 쟁점 -미국 감염병 데이터 수집 및 활용 절차를 참조 사례로 하여-)

  • Kim, Jae Sun
    • The Korean Society of Law and Medicine
    • /
    • v.23 no.4
    • /
    • pp.29-74
    • /
    • 2022
  • As social disasters occur under the Disaster Management Act, which can damage the people's "life, body, and property" due to the rapid spread and spread of unexpected COVID-19 infectious diseases in 2020, information collected through inspection and reporting of infectious disease pathogens (Article 11), epidemiological investigation (Article 18), epidemiological investigation for vaccination (Article 29), artificial technology, and prevention policy Decision), (3) It was used as an important basis for decision-making in the context of an infectious disease crisis, such as promoting vaccination and understanding the current status of damage. In addition, medical policy decisions using infectious disease data contribute to quarantine policy decisions, information provision, drug development, and research technology development, and interest in the legal scope and limitations of using infectious disease data has increased worldwide. The use of infectious disease data can be classified for the purpose of spreading and blocking infectious diseases, prevention, management, and treatment of infectious diseases, and the use of information will be more widely made in the context of an infectious disease crisis. In particular, as the serious stage of the Disaster Management Act continues, the processing of personal identification information and sensitive information becomes an important issue. Information on "medical records, vaccination drugs, vaccination, underlying diseases, health rankings, long-term care recognition grades, pregnancy, etc." needs to be interpreted. In the case of "prevention, management, and treatment of infectious diseases", it is difficult to clearly define the concept of medical practicesThe types of actions are judged based on "legislative purposes, academic principles, expertise, and social norms," but the balance of legal interests should be based on the need for data use in quarantine policies and urgent judgment in public health crises. Specifically, the speed and degree of transmission of infectious diseases in a crisis, whether the purpose can be achieved without processing sensitive information, whether it unfairly violates the interests of third parties or information subjects, and the effectiveness of introducing quarantine policies through processing sensitive information can be used as major evaluation factors. On the other hand, the collection, provision, and use of infectious disease data for research purposes will be used through pseudonym processing under the Personal Information Protection Act, consent under the Bioethics Act and deliberation by the Institutional Bioethics Committee, and data provision deliberation committee. Therefore, the use of research purposes is recognized as long as procedural validity is secured as it is reviewed by the pseudonym processing and data review committee, the consent of the information subject, and the institutional bioethics review committee. However, the burden on research managers should be reduced by clarifying the pseudonymization or anonymization procedures, the introduction or consent procedures of the comprehensive consent system and the opt-out system should be clearly prepared, and the procedure for re-identifying or securing security that may arise from technological development should be clearly defined.

A Proposal for the Practical and Secure Electronic Voting Protocol (실용적이고 안전한 전자투표 프로토콜에 관한 연구)

  • 김순석;이재신;김성권
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.10 no.4
    • /
    • pp.21-32
    • /
    • 2000
  • We have seen a lot of developments on computer application areas with the wide spread use of computers and the rapid growth of communication network. It is necessary to use a cryptographic technique for electronic voting, but, at present, despite of its importance electronic voting protocols so far have many shortcomings. In this paper, with the assumption of a trustable voting centers we propose a large-scale and practical electronic voting protocol satisfying protocol requirements, such as secureness, fairness, privacy of voter and correctness. Voters are able to get a vote without revealing their voted information by using the blinding technique. We can find the injustice between a voter and the tallier by using undeniable challenge and responsible protocol. Also, we proposes a secure protocol that compensates a integrity of electronic voting and protects a privacy of voter from outer attacks as using a anonymity of voter.

Anonymous Blockchain Voting Model using the Master Node Network (마스터 노드 네트워크를 사용한 블록체인 익명 투표 모델)

  • Cho, Jae-Han;Lee, Lee-Sub;Choi, Chang-Hoon
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.22 no.5
    • /
    • pp.394-402
    • /
    • 2021
  • Electronic voting systems have been widely used in many countries around the world since the mid-1990s. In recent years, studies have applied blockchain to existing electronic voting systems in order to provide reliability, fairness, and transparency for voters. This approach is highly useful as a technology that promotes decentralized citizen participation. However, the existing electronic voting systems using blockchain have not sufficiently considered anonymity. Lack of anonymity acts as an important constraint in cases of small- and medium-sized voting, which is often required in decentralized citizen participation. In this study, we propose a model that provides anonymity to a voting system using blockchain by applying the concept of the master node in Dash cryptocurrency. First, we define the differences in the requirements of the transfer and voting systems in blockchain. We propose a parallel and autonomous model and algorithm to provide anonymity in the blockchain-that is, a decentralized development environment. In addition, a discussion of security and the environment for the proposed model is described.

Using Python Programming Language for Teaching Industrial Engineering Subjects: A Case Study on Engineering Economy (산업공학 전공 교과목 강의를 위한 파이썬 프로그래밍 활용: 경제성공학 교육 사례 연구)

  • Cho, Yongkyu
    • Journal of Practical Engineering Education
    • /
    • v.14 no.2
    • /
    • pp.245-258
    • /
    • 2022
  • Computational thinking with programming skills has been widely emphasized for future industrial engineering researchers and practitioners in Industry 4.0. However, industrial engineering students still have limited opportunities to improve their computational thinking abilities during university coursework. In this regard, this research study proposes to use Python programming language for teaching classical Industrial Engineering subjects. For a specific case study, we designed and instructed an Engineering Economy lecture which cultivates the concept and techniques of economic analysis for engineering students. During the class, we introduced the usage of several Python libraries that include numpy-financial for basic financial functions, numpy and scipy for simple numerical computation and analysis, and matplotlib for data visualization. Anonymous class evaluation survey showed the effectiveness of the proposed teaching method in terms of both educational satisfaction and contents delivery. Finally, we found additional needs for providing lectures that adopt the similar teaching style to the proposed method.

Clickstream Big Data Mining for Demographics based Digital Marketing (인구통계특성 기반 디지털 마케팅을 위한 클릭스트림 빅데이터 마이닝)

  • Park, Jiae;Cho, Yoonho
    • Journal of Intelligence and Information Systems
    • /
    • v.22 no.3
    • /
    • pp.143-163
    • /
    • 2016
  • The demographics of Internet users are the most basic and important sources for target marketing or personalized advertisements on the digital marketing channels which include email, mobile, and social media. However, it gradually has become difficult to collect the demographics of Internet users because their activities are anonymous in many cases. Although the marketing department is able to get the demographics using online or offline surveys, these approaches are very expensive, long processes, and likely to include false statements. Clickstream data is the recording an Internet user leaves behind while visiting websites. As the user clicks anywhere in the webpage, the activity is logged in semi-structured website log files. Such data allows us to see what pages users visited, how long they stayed there, how often they visited, when they usually visited, which site they prefer, what keywords they used to find the site, whether they purchased any, and so forth. For such a reason, some researchers tried to guess the demographics of Internet users by using their clickstream data. They derived various independent variables likely to be correlated to the demographics. The variables include search keyword, frequency and intensity for time, day and month, variety of websites visited, text information for web pages visited, etc. The demographic attributes to predict are also diverse according to the paper, and cover gender, age, job, location, income, education, marital status, presence of children. A variety of data mining methods, such as LSA, SVM, decision tree, neural network, logistic regression, and k-nearest neighbors, were used for prediction model building. However, this research has not yet identified which data mining method is appropriate to predict each demographic variable. Moreover, it is required to review independent variables studied so far and combine them as needed, and evaluate them for building the best prediction model. The objective of this study is to choose clickstream attributes mostly likely to be correlated to the demographics from the results of previous research, and then to identify which data mining method is fitting to predict each demographic attribute. Among the demographic attributes, this paper focus on predicting gender, age, marital status, residence, and job. And from the results of previous research, 64 clickstream attributes are applied to predict the demographic attributes. The overall process of predictive model building is compose of 4 steps. In the first step, we create user profiles which include 64 clickstream attributes and 5 demographic attributes. The second step performs the dimension reduction of clickstream variables to solve the curse of dimensionality and overfitting problem. We utilize three approaches which are based on decision tree, PCA, and cluster analysis. We build alternative predictive models for each demographic variable in the third step. SVM, neural network, and logistic regression are used for modeling. The last step evaluates the alternative models in view of model accuracy and selects the best model. For the experiments, we used clickstream data which represents 5 demographics and 16,962,705 online activities for 5,000 Internet users. IBM SPSS Modeler 17.0 was used for our prediction process, and the 5-fold cross validation was conducted to enhance the reliability of our experiments. As the experimental results, we can verify that there are a specific data mining method well-suited for each demographic variable. For example, age prediction is best performed when using the decision tree based dimension reduction and neural network whereas the prediction of gender and marital status is the most accurate by applying SVM without dimension reduction. We conclude that the online behaviors of the Internet users, captured from the clickstream data analysis, could be well used to predict their demographics, thereby being utilized to the digital marketing.

Privacy Protection for 5G Mobile-based IoT Users (5G 이동 통신 기반의 IoT 사용자를 위한 프라이버시 보호 기법)

  • Jeong, Yoon-Su;Yoon, Deok-Byeong;Shin, Seung-Soo
    • Journal of the Korea Convergence Society
    • /
    • v.11 no.1
    • /
    • pp.1-7
    • /
    • 2020
  • Recently 5G technology is one of the technologies that has been receiving much positive responses from users as it is integrated with virtual technology. However, 5G's security issues have not been fully resolved and more security is soon required. In this paper, an approach technique is proposed as a probability-based hierarchy to provide personal privacy for 5G-based IoT users more safely. The proposed technique is aimed at not exposing the privacy of IoT users to third parties by using two random keys created personally by IoT users. In order to satisfy both safety and efficiency, the proposed technology divides the privacy of IoT users into two layers. In the first stage, IoT users will control access to intermediate media using anonymous keys generated by IoT users, and in the second stage, information of IoT users registered with servers will be darkened and replicated. The proposed technique has improved the accuracy of the privacy protection of IoT users as they assign weights to layered information after layering users' privacy information on a probabilistic basis.