• Title/Summary/Keyword: K-Anonymity

Search Result 227, Processing Time 0.031 seconds

Basic Research to Identify Application Criterion for Korean Version of FSFI as an Assessment Tool for Clinical Trial of Sexual Dysfunction in Female (여성의 성기능장애 평가 척도인 한글판 FSFI 척도의 임상시험 적용 기준에 관한 기초 연구)

  • Kim, dong-Il
    • The Journal of Korean Obstetrics and Gynecology
    • /
    • v.21 no.3
    • /
    • pp.121-131
    • /
    • 2008
  • Purpose: To confirm reference value for Korean version of FSFI in selecting subjects for clinical trial of sexual dysfunction in female. Methods: Purpose of the research was explained and anonymity was guaranteed to 41 women enlisted in 6 oriental medical clinics in Seoul and Incheon province and the scores for Korean version of FSFI which participants made out themselves were analyzed so that mean value and the distribution could be investigated. Results: Mean value for Korean version of FSFI of 40 participants scored 26.32 and from this score, the participants of clinical trial were enlisted to confirm whether or not the mean value could be applied. Conclusion: The mean value for Korean version of FSFI, which scored 26 might be acceptable as a criterion for selecting participants in clinical trial of sexual dysfunction.

  • PDF

Privacy Preserving Data Publication of Dynamic Datasets (동적 데이터를 위한 프라이버시 보호 기법)

  • Lee, Joochang;Kim, Ung Mo
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2007.11a
    • /
    • pp.254-257
    • /
    • 2007
  • 정보기술의 발달로 정보를 수집, 관리, 공유하기가 용이해 짐에 따라 여러 조직이나 기관에서는 개인정보를 수집해 관리하고 있다. 수집한 개인정보를 통계나 연구 등을 목적으로 배포할 때 개인의 프라이버시를 보호하기 위해 k-anonymity 와 l-diversity 원리가 제안되었고 이를 기반으로 하는 프라이버시 보호 기법들이 제안되었다. 그러나 기존 방법들은 정적인 데이터를 단 한번 배포하는 것을 가정하기 때문에 지속적으로 데이터에 삽입이나 삭제가 발생하는 동적 데이터 환경에 그대로 적용하기 적합하지 않다. 본 논문에서는 동적 데이터 환경에서 l-diversity 을 유지하면서 데이터 삽입과 삭제를 효율적으로 처리할 수 있는 기법을 제안한다. 제안 기법은 일반화를 사용하지 않기 때문에 일반화에서 발생하는 정보의 손실이 발생하지 않고 삽입과 삭제의 처리가 간단한 것이 특징이다.

De-identifying Unstructured Medical Text and Attribute-based Utility Measurement (의료 비정형 텍스트 비식별화 및 속성기반 유용도 측정 기법)

  • Ro, Gun;Chun, Jonghoon
    • The Journal of Society for e-Business Studies
    • /
    • v.24 no.1
    • /
    • pp.121-137
    • /
    • 2019
  • De-identification is a method by which the remaining information can not be referred to a specific individual by removing the personal information from the data set. As a result, de-identification can lower the exposure risk of personal information that may occur in the process of collecting, processing, storing and distributing information. Although there have been many studies in de-identification algorithms, protection models, and etc., most of them are limited to structured data, and there are relatively few considerations on de-identification of unstructured data. Especially, in the medical field where the unstructured text is frequently used, many people simply remove all personally identifiable information in order to lower the exposure risk of personal information, while admitting the fact that the data utility is lowered accordingly. This study proposes a new method to perform de-identification by applying the k-anonymity protection model targeting unstructured text in the medical field in which de-identification is mandatory because privacy protection issues are more critical in comparison to other fields. Also, the goal of this study is to propose a new utility metric so that people can comprehend de-identified data set utility intuitively. Therefore, if the result of this research is applied to various industrial fields where unstructured text is used, we expect that we can increase the utility of the unstructured text which contains personal information.

A Study of Uncertainty Factors Affecting Consumers' Purchase Intention in Online Shopping (온라인 쇼핑에서 소비자의 구매의도에 영향을 미치는 불확실성 요인에 관한 연구)

  • Dilshodjon, Gafurov;Shin, Ho Young;Kim, Kisu
    • Information Systems Review
    • /
    • v.15 no.1
    • /
    • pp.45-68
    • /
    • 2013
  • Despite improved technologies, procedures, and regulations, consumers are still uncertain about purchasing online. The objective of this study is to understand uncertainty factors in online shopping and their relationships with the consumers' intention to purchase. For this objective we derived seller anonymity, lack of product transparency, and lack of process transparency as uncertainty factors from previous researches which may affect consumers' perceived uncertainty on online shopping. Then, a causal model was developed to conceptualize the relationships between these uncertainty factors as antecedent variables and consumer's intention to purchase as consequent variable with perceived uncertainty as an intermediary variable. Purchase involvement was used as a moderating variable on the relationship between perceived uncertainty and the intention to purchase online. The model was tested empirically to find meaningful relationships among these variables. The findings indicate that all antecedent variables affect perceived uncertainty significantly and perceived uncertainty negatively affects consumers' intention to purchase. Moreover, the results of analysis show purchase involvement has a significant moderating effect on the relationship between perceived uncertainty and intention to purchase online.

  • PDF

An Investigation of Users' Privacy Protection Behaviors: Factors Affecting Privacy Protection Technology Adoption (개인정보보호 기술 수용행동에 영향을 미치는 요인에 대한 연구)

  • Choi, Bomi;Park, Minjung;Chai, Sangmi
    • Information Systems Review
    • /
    • v.17 no.3
    • /
    • pp.77-94
    • /
    • 2015
  • As Internet has become a popular media for sharing information, users create and share tremendous volume of information including large amount of personal information in cyberspace. Sharing private information online can enhance strength of social relationship but it could also bring negative consequences like information privacy invasion. Although many companies and governments address the importance of information privacy online, there are countless cases of crimes and hackings relating personal information online world wide. Since there are some researches investigating the role of governments and organizations on online privacy domain but there is little research regarding users' privacy protection behaviors. This study investigates relationship between Internet users' information privacy protection behavior and environmental factors. Especially, this study focuses on users' behaviors regarding information privacy protection technology adoption. According to our research results, users' online privacy protective behaviors positively affected by governmental regulations expressed as an information privacy protection law. In addition, if user is allowed to use anonymity when he or she uses online services, they have more tendencies to adopt privacy protection technologies. The detailed research findings and contribution are discussed as well.

A de-identification technique using generalization and insert a salt data (일반화와 데이터 삽입을 이용한 익명화 처리 기법)

  • Park, Jun-Bum;Cho, Jin-Man;Choi, Dae-Seon;Jin, Seung-Hun
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2015.04a
    • /
    • pp.351-353
    • /
    • 2015
  • 공공정보 공유 및 개방, 소셜네트워크서비스의 활성화 그리고 사용자 간의 공유 데이터 증가 등의 이유로 인터넷상에 노출되는 사용자의 개인 정보가 증가하고 있다. 인터넷상에 노출된 사용자들의 개인정보들은 연결공격(linkage attack), 배경지식 공격(background attack)으로 프라이버시를 침해할 수 있다. 이를 막기 위해 관계형 데이터베이스에서는 대표적으로 k-익명성(k-anonymity)을 시작으로 l-다양성(l-diversity), t-밀집성(t-closeness)이라는 익명화 모델이 제안되었으며 계속해서 익명화 알고리즘의 성능은 개선되고 있다. 하지만 k-익명성, l-다양성, t-밀집성 모델의 조건을 만족하기 위해서는 준식별자(quasi-identifier)를 일반화(generalization)처리 해주어야 하는데 이 과정에서 준식별자의 가치를 손실된다는 단점이 있다. 본 논문에서 준식별자의 정보 손실을 최소화하기 위해 k-익명성 모델을 만족시키는 과정에서 일반화와 데이터를 삽입을 사용하는 익명화 처리하는 방법을 제안한다.

A Design of Cloaking Region using Dummy for Privacy Information Protection on Location-Based Services (위치기반서비스의 개인정보보호를 위해 Dummy를 이용한 Cloaking 영역 설계)

  • Kim, Ju-Yung;Jeong, Eun-Hee;Lee, Byung-Kwan
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.36 no.8B
    • /
    • pp.929-938
    • /
    • 2011
  • The setting algorithm of cloaking region using dummy which is proposed in this paper solves the problem which counts the building with duplication that exists in several cells of Privacy Grid by adding the building grouping item to the index structure of the existing Privacy Grid, and by increasing K value after searching the contiguous cells in the comer of each building, the exposure problem of private location information due to the minimum cloaking region setting of the existing GBC is solved. In addition, this paper reduces the searching time of K value by setting smaller cloaking region than Privacy Grid and GBC with dummy K before expanding cloaking region and strengthens the location information protection of users using dummy K.

Leisure Activities, Cognitive Function and Depression in Female Elderly (여성 노인의 여가활동, 인지기능 및 우울에 관한 연구)

  • Kim, Ok Soo;Yang, Sook Ja;Kim, Jung Hee;Kim, Nam Young;Jeon, Hae Ok
    • Korean Journal of Adult Nursing
    • /
    • v.19 no.3
    • /
    • pp.436-446
    • /
    • 2007
  • Purpose: The purpose of this study was to investigate cognitive function, leisure activities and depression in female elderly, to examine the relationships among those variables and to investigate leisure activities and depression according to cognitive function. Methods: The subjects were 105 female elderly visiting two senior citizen centers in Seoul, Korea. Data were collected from November to December 2006. The participants were assured of anonymity and confidentiality. All information was collected through face-to-face interviews using questionnaires. Results: 26.0% of the participants were cognitive impaired but not demented and 17.3% were demented. The level of depression was severe and 77.9% of the subjects were depressed. The subjects were not actively engaging in leisure activities. There were significant correlations between cognitive function, leisure activities and depression in female elderly. Demented or CIND subjects were more actively engaging in extra family fulfillment type leisure activities than normal subjects, Conclusion: These findings showed the need for a program for female elderly regarding leisure activities. When counseling the elderly, nurses must consider their cognitive function, leisure activities and depression.

  • PDF

Cyberbullying and a Mobile Game App? An Initial Perspective on an Alternative Solution

  • Singh, Manmeet Mahinderjit;Ng, Ping Jie;Ya, Kar Ming;Husin, Mohd Heikal;Malim, Nurul Hashimah Ahamed Hassain
    • Journal of Information Processing Systems
    • /
    • v.13 no.3
    • /
    • pp.559-572
    • /
    • 2017
  • Cyberbullying has been an emerging issue in recent years where research has revealed that users generally spend an increasing amount of time in social networks and forums to keep connected with each other. However, issue arises when cyberbullies are able to reach their victims through these social media platforms. There are different types of cyberbullying and like traditional bullying; it causes victims to feel overly selfconscious, increases their tendency to self-harm and generally affects their mental state negatively. Such situations occur due to security issues such as user anonymity and the lack of content restrictions in some social networks or web forums. In this paper, we highlight the existing solutions, which are Intrusion Prevention System and Intrusion Detection System from a number of researchers. However, even with such solutions, cyberbullying acts still occurs at an alarming rate. As such, we proposed an alternative solution that aims to prevent cyberbullying activities at a younger age, e.g., young children. The application would provide an alternative method to preventing cyberbullying activities among the younger generations in the future.

A User Anonymous Mutual Authentication Protocol

  • Kumari, Saru;Li, Xiong;Wu, Fan;Das, Ashok Kumar;Odelu, Vanga;Khan, Muhammad Khurram
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.9
    • /
    • pp.4508-4528
    • /
    • 2016
  • Widespread use of wireless networks has drawn attention to ascertain confidential communication and proper authentication of an entity before granting access to services over insecure channels. Recently, Truong et al. proposed a modified dynamic ID-based authentication scheme which they claimed to resist smart-card-theft attack. Nevertheless, we find that their scheme is prone to smart-card-theft attack contrary to the author's claim. Besides, anyone can impersonate the user as well as service provider server and can breach the confidentiality of communication by merely eavesdropping the login request and server's reply message from the network. We also notice that the scheme does not impart user anonymity and forward secrecy. Therefore, we present another authentication scheme keeping apart the threats encountered in the design of Truong et al.'s scheme. We also prove the security of the proposed scheme with the help of widespread BAN (Burrows, Abadi and Needham) Logic.