• Title/Summary/Keyword: Location Information Exposure

Search Result 63, Processing Time 0.028 seconds

Estimation of Absorbed Dose for Anterior and Posterior Organs with Body Mass Index in Standing Whole Spine Examination (Standing Whole Spine 검사 시 체질량지수 (BMI)에 따른 전방 및 후방장기의 흡수선량 평가)

  • Shim, Ji Na;Lee, Yong-Gu;Lee, Youngjin
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.53 no.12
    • /
    • pp.147-151
    • /
    • 2016
  • Automatic exposure control (AEC) is frequently used in many hospitals for Standing Whole Spine examination which is able to control radiation dose with respect to the body type such as body mass index (BMI) and we can measure dose area product (DAP) based on respective patient information. However, few studies have been conducted organ absorbed dose evaluation based on location of patient organ. The purpose of this study was to evaluate the relationships between BMI and organ absorbed dose along with location of patient organ. For that purpose, we calculated absorbed dose with selected 5 patient organ (thyroid, breast, heart, kidney, and pancreas) using a PCXMC simulation tool with measured DAP. According to the results, measured DAP increases with BMI and organ absorbed dose decreases with BMI in anterior organs such as thyroid, breast, and heart. On the other hand, there is no correlation between organ absorbed dose and BMI in posterior organs such as kidney and pancreas. In conclusion, our results demonstrated that the radiation effects are different with respect to BMI and location of patient organ in Standing Whole Spine examination.

A Study on the Ethical Issues and Sharing Behavior of User's Information in the Era of Big Data

  • Lee, Myung-Suk
    • Journal of the Korea Society of Computer and Information
    • /
    • v.21 no.10
    • /
    • pp.43-48
    • /
    • 2016
  • This study is to examine how big data collects user's information and is used; the status quo of exposures of user's information, and various measures of self-control by the user. This study is also to look their ethical issues and discuss problems of privacy concerning big data. As a way for users to self-control their information, they need to check the log-in state of web portal sites and set up their account so that customized advertisement and location information cannot be tracked. When posting a blog, the value of posting should be controlled. When becoming a member of a web site, users must check the access terms before agreement and beware of chained agreements and/or membership joins in order to control the exposure of their personal information. To prevent information abuse through big data through which user's information is collected and analyzed, all users must have the right to control, block or allow personal information. For an individual to have the right to control over his information, users must understand the concept of user's information and practice ethics accompanied by newly given roles in the Internet space, which will lead to the establishment of the sound and mature information society on the Internet.

A Study on the Guidance Signage System of Outpatient in General Hospital using Spatial Configuration Theory - View from G.D.Weisman's Way-finding Influence Factors (공간구조론을 적용한 종합병원 외래부 유도사인 배치 및 평가에 관한 연구 - G.D.Weisman의 길찾기 요소를 중심으로)

  • Kim, Suktae;Paik, Jinkyung
    • Journal of The Korea Institute of Healthcare Architecture
    • /
    • v.21 no.3
    • /
    • pp.25-35
    • /
    • 2015
  • Purpose: Signs that are installed at unnoticeable places or that disconnect before the destination can bring errors of location information delivery. Therefore, this study aims to find out the spatial relation between structure of space and signs in the perspective of visual exposure possibility, operating arrangement and assesment by applying spatial structure theory. Methods: Effectiveness of organization of guidance signs was evaluated after the four way-finding factors(Plan Configuration, Sign System, Perceptual Access, Architectural Difference) that G.D.Weisman suggested were interpreted by spatial structure theory(J-Graph analysis, Space Syntax, Visual Graph Analysis) under the premise that it is closely related to the structure of space. Results: 1) Because the south corridor that connects each department of outpatient division is located in the hierarchy center of the space, and walking density is expected to be high, guidance signs need to be organized at the place with high integration value. 2) The depth to the destination space can be estimated through J-Graph analysis. The depth means a switch of direction, and the guidance signs are needed according to the number. 3) According to visibility graph analysis, visual exposure can be different in the same hierarchy unit space according to the shape of the flat surface. Based on these data, location adjustment of signs is possible, and the improvement effect can be estimated quantitatively. Implications: Spatial structure theory can be utilized to design and evaluate sign systems, and it helps to clearly understand the improvement effect. It is desirable to specify design and estimation of sign systems in the order of J-Graph analysis${\rightarrow}$Space Syntax Theory${\rightarrow}$visibility graph analysis.

Associated Keyword Recommendation System for Keyword-based Blog Marketing (키워드 기반 블로그 마케팅을 위한 연관 키워드 추천 시스템)

  • Choi, Sung-Ja;Son, Min-Young;Kim, Young-Hak
    • KIISE Transactions on Computing Practices
    • /
    • v.22 no.5
    • /
    • pp.246-251
    • /
    • 2016
  • Recently, the influence of SNS and online media is rapidly growing with a consequent increase in the interest of marketing using these tools. Blog marketing can increase the ripple effect and information delivery in marketing at low cost by prioritizing keyword search results of influential portal sites. However, because of the tough competition to gain top ranking of search results of specific keywords, long-term and proactive efforts are needed. Therefore, we propose a new method that recommends associated keyword groups with the possibility of higher exposure of the blog. The proposed method first collects the documents of blog including search results of target keyword, and extracts and filters keyword with higher association considering the frequency and location information of the word. Next, each associated keyword is compared to target keyword, and then associated keyword group with the possibility of higher exposure is recommended considering the information such as their association, search amount of associated keyword per month, the number of blogs including in search result, and average writhing date of blogs. The experiment result shows that the proposed method recommends keyword group with higher association.

Factors Influencing the Adoption of Location-Based Smartphone Applications: An Application of the Privacy Calculus Model (스마트폰 위치기반 어플리케이션의 이용의도에 영향을 미치는 요인: 프라이버시 계산 모형의 적용)

  • Cha, Hoon S.
    • Asia pacific journal of information systems
    • /
    • v.22 no.4
    • /
    • pp.7-29
    • /
    • 2012
  • Smartphone and its applications (i.e. apps) are increasingly penetrating consumer markets. According to a recent report from Korea Communications Commission, nearly 50% of mobile subscribers in South Korea are smartphone users that accounts for over 25 million people. In particular, the importance of smartphone has risen as a geospatially-aware device that provides various location-based services (LBS) equipped with GPS capability. The popular LBS include map and navigation, traffic and transportation updates, shopping and coupon services, and location-sensitive social network services. Overall, the emerging location-based smartphone apps (LBA) offer significant value by providing greater connectivity, personalization, and information and entertainment in a location-specific context. Conversely, the rapid growth of LBA and their benefits have been accompanied by concerns over the collection and dissemination of individual users' personal information through ongoing tracking of their location, identity, preferences, and social behaviors. The majority of LBA users tend to agree and consent to the LBA provider's terms and privacy policy on use of location data to get the immediate services. This tendency further increases the potential risks of unprotected exposure of personal information and serious invasion and breaches of individual privacy. To address the complex issues surrounding LBA particularly from the user's behavioral perspective, this study applied the privacy calculus model (PCM) to explore the factors that influence the adoption of LBA. According to PCM, consumers are engaged in a dynamic adjustment process in which privacy risks are weighted against benefits of information disclosure. Consistent with the principal notion of PCM, we investigated how individual users make a risk-benefit assessment under which personalized service and locatability act as benefit-side factors and information privacy risks act as a risk-side factor accompanying LBA adoption. In addition, we consider the moderating role of trust on the service providers in the prohibiting effects of privacy risks on user intention to adopt LBA. Further we include perceived ease of use and usefulness as additional constructs to examine whether the technology acceptance model (TAM) can be applied in the context of LBA adoption. The research model with ten (10) hypotheses was tested using data gathered from 98 respondents through a quasi-experimental survey method. During the survey, each participant was asked to navigate the website where the experimental simulation of a LBA allows the participant to purchase time-and-location sensitive discounted tickets for nearby stores. Structural equations modeling using partial least square validated the instrument and the proposed model. The results showed that six (6) out of ten (10) hypotheses were supported. On the subject of the core PCM, H2 (locatability ${\rightarrow}$ intention to use LBA) and H3 (privacy risks ${\rightarrow}$ intention to use LBA) were supported, while H1 (personalization ${\rightarrow}$ intention to use LBA) was not supported. Further, we could not any interaction effects (personalization X privacy risks, H4 & locatability X privacy risks, H5) on the intention to use LBA. In terms of privacy risks and trust, as mentioned above we found the significant negative influence from privacy risks on intention to use (H3), but positive influence from trust, which supported H6 (trust ${\rightarrow}$ intention to use LBA). The moderating effect of trust on the negative relationship between privacy risks and intention to use LBA was tested and confirmed by supporting H7 (privacy risks X trust ${\rightarrow}$ intention to use LBA). The two hypotheses regarding to the TAM, including H8 (perceived ease of use ${\rightarrow}$ perceived usefulness) and H9 (perceived ease of use ${\rightarrow}$ intention to use LBA) were supported; however, H10 (perceived effectiveness ${\rightarrow}$ intention to use LBA) was not supported. Results of this study offer the following key findings and implications. First the application of PCM was found to be a good analysis framework in the context of LBA adoption. Many of the hypotheses in the model were confirmed and the high value of $R^2$ (i.,e., 51%) indicated a good fit of the model. In particular, locatability and privacy risks are found to be the appropriate PCM-based antecedent variables. Second, the existence of moderating effect of trust on service provider suggests that the same marginal change in the level of privacy risks may differentially influence the intention to use LBA. That is, while the privacy risks increasingly become important social issues and will negatively influence the intention to use LBA, it is critical for LBA providers to build consumer trust and confidence to successfully mitigate this negative impact. Lastly, we could not find sufficient evidence that the intention to use LBA is influenced by perceived usefulness, which has been very well supported in most previous TAM research. This may suggest that more future research should examine the validity of applying TAM and further extend or modify it in the context of LBA or other similar smartphone apps.

  • PDF

A Secure Routing Scheme for Wireless Sensor Network with a Mobile Sink (이동 싱크를 가진 무선 센서 네트워크의 안전한 라우팅 기법)

  • Kim Taekvun;Kim Sangjin;Lee Ik-Seob;Yoo Dongyoung;Oh Heekuck
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.15 no.2
    • /
    • pp.53-64
    • /
    • 2005
  • Previous secure routing protocols for wireless sensor networks assume that a sink is static. In many cases, however, a sink operated by man or vehicle is moving. A mobile sink creates a lot of technical problems such as reconfiguration of routing path exposure of sink location. and selection of secure access point node, which are not considered by many previous researches. In this paper, we propose a new secure routing scheme for solving such problems using hi-directional hash chain and delegation nodes of grid structure. This scheme provides a secure routing path and prevents attacker from recognizing the location of a mobile sink in sensor networks. This new method reduces the resource requirements compared to the cashed routing schemes. Simulation results also show that the system is secure and efficient enough.

The Measurement of Flight Data of Golfball with High-Speed Multi-Exposure Image (고속 다중 노출 영상을 이용한 골프공의 비행 요소 측정)

  • Kim, Ki-Hyun;Park, Hyun-Woo;Ju, Woo-Suk;Lee, Dong-Hoon;Yun, Tae-Soo
    • Journal of Korea Multimedia Society
    • /
    • v.12 no.5
    • /
    • pp.699-707
    • /
    • 2009
  • Recently, while 3D sports game increases, the research that it recognizes the operation of the real user actively progresses. Most of all, the research about the golf is active. In this paper, the camera acquiring in a high-speed multi-exposure image measures the flight data of the golf ball through the image processing. While photographing, the high-speed camera, using this system, exposes an image at regular intervals. And line scan camera checks whether the golf ball passed or not. After the location information of the calculated golf ball calculates a speed and a direction by using the physical formula, it applies the golf simulation. After, this system is possible the measurement of the physical element of the spherical object.

  • PDF

Efficient k-ATY Method to Protect the User's Trajectory in Continuous Queries (연속적인 질의에서 사용자의 이동 경로를 보호할 수 있는 효율적인 k-ATY 기법)

  • Song, Doo Hee
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.10 no.8
    • /
    • pp.231-234
    • /
    • 2021
  • Various problems arise as applications using locations increase. In order to solve this problem, related works are being conducted to protect the location of users. A fundamental reason for this problem is that users must provide their location information to the service provider (server) to receive the service. To improve these problems, there are works such as generating cloaking regions or generating dummies around them. However, if a user periodically asks the server for queries, the user's trajectory may be exposed by time zone. To improve this problem, in this paper, we propose a k-Anonymity Trajectory (k-ATY) technique that can improve the exposure probability of the trajectory even if the user requests continuous queries. Experimental results demonstrated the superiority of the proposed technique.

A Study on Detection Methodology for Influential Areas in Social Network using Spatial Statistical Analysis Methods (공간통계분석기법을 이용한 소셜 네트워크 유력지역 탐색기법 연구)

  • Lee, Young Min;Park, Woo Jin;Yu, Ki Yun
    • Journal of Korean Society for Geospatial Information Science
    • /
    • v.22 no.4
    • /
    • pp.21-30
    • /
    • 2014
  • Lately, new influentials have secured a large number of volunteers on social networks due to vitalization of various social media. There has been considerable research on these influential people in social networks but the research has limitations on location information of Location Based Social Network Service(LBSNS). Therefore, the purpose of this study is to propose a spatial detection methodology and application plan for influentials who make comments about diverse social and cultural issues in LBSNS using spatial statistical analysis methods. Twitter was used to collect analysis object data and 168,040 Twitter messages were collected in Seoul over a month-long period. In addition, 'politics,' 'economy,' and 'IT' were set as categories and hot issue keywords as given categories. Therefore, it was possible to come up with an exposure index for searching influentials in respect to hot issue keywords, and exposure index by administrative units of Seoul was calculated through a spatial joint operation. Moreover, an influential index that considers the spatial dependence of the exposure index was drawn to extract information on the influential areas at the top 5% of the influential index and analyze the spatial distribution characteristics and spatial correlation. The experimental results demonstrated that spatial correlation coefficient was relatively high at more than 0.3 in same categories, and correlation coefficient between politics category and economy category was also more than 0.3. On the other hand, correlation coefficient between politics category and IT category was very low at 0.18, and between economy category and IT category was also very weak at 0.15. This study has a significance for materialization of influentials from spatial information perspective, and can be usefully utilized in the field of gCRM in the future.

The Distribution of Place Name 'Dumo' and Location of Settlements (두모계 지명의 분포와 취락입지)

  • Na, Yoojin
    • Journal of the Korean Geographical Society
    • /
    • v.47 no.6
    • /
    • pp.884-898
    • /
    • 2012
  • Place names represent a lot of information about the region and the life of the local residents. In particular, old geographical names have more spatial informations than recent place names. This paper tried to analyze the distribution and characteristic of 'Dumo' which is one of the ancient place names and was studied by Nam youngwoo in 1996 for the first time. After considering the etymology and phonological structure of 'Dumo', the name 'Dumo' included the geographic conditions related to a mountain and river in itself. The total number of place names in the line of 'Dumo' which were collected by the author were 417 and they were distributed evenly on the Korean Peninsula. 85% of them were used for the human place names and 73% of the human place names were served as settlement names standing for a village or an administrative district. Thus the author analyzed the location and diffusion of 220 of settlement names in depth. As a result, villages named in the line of 'Dumo' preferred southern or eastern exposure and located in front of a mountain and around a river. After a village name 'Dumo' was set up, it produces other similar names in the line of 'Dumo' near the village so most place names of 'Dumo' were found with several names of 'Dumo' not alone.

  • PDF