• Title/Summary/Keyword: Mean Analysis

Search Result 14,894, Processing Time 0.039 seconds

Information Privacy Concern in Context-Aware Personalized Services: Results of a Delphi Study

  • Lee, Yon-Nim;Kwon, Oh-Byung
    • Asia pacific journal of information systems
    • /
    • v.20 no.2
    • /
    • pp.63-86
    • /
    • 2010
  • Personalized services directly and indirectly acquire personal data, in part, to provide customers with higher-value services that are specifically context-relevant (such as place and time). Information technologies continue to mature and develop, providing greatly improved performance. Sensory networks and intelligent software can now obtain context data, and that is the cornerstone for providing personalized, context-specific services. Yet, the danger of overflowing personal information is increasing because the data retrieved by the sensors usually contains privacy information. Various technical characteristics of context-aware applications have more troubling implications for information privacy. In parallel with increasing use of context for service personalization, information privacy concerns have also increased such as an unrestricted availability of context information. Those privacy concerns are consistently regarded as a critical issue facing context-aware personalized service success. The entire field of information privacy is growing as an important area of research, with many new definitions and terminologies, because of a need for a better understanding of information privacy concepts. Especially, it requires that the factors of information privacy should be revised according to the characteristics of new technologies. However, previous information privacy factors of context-aware applications have at least two shortcomings. First, there has been little overview of the technology characteristics of context-aware computing. Existing studies have only focused on a small subset of the technical characteristics of context-aware computing. Therefore, there has not been a mutually exclusive set of factors that uniquely and completely describe information privacy on context-aware applications. Second, user survey has been widely used to identify factors of information privacy in most studies despite the limitation of users' knowledge and experiences about context-aware computing technology. To date, since context-aware services have not been widely deployed on a commercial scale yet, only very few people have prior experiences with context-aware personalized services. It is difficult to build users' knowledge about context-aware technology even by increasing their understanding in various ways: scenarios, pictures, flash animation, etc. Nevertheless, conducting a survey, assuming that the participants have sufficient experience or understanding about the technologies shown in the survey, may not be absolutely valid. Moreover, some surveys are based solely on simplifying and hence unrealistic assumptions (e.g., they only consider location information as a context data). A better understanding of information privacy concern in context-aware personalized services is highly needed. Hence, the purpose of this paper is to identify a generic set of factors for elemental information privacy concern in context-aware personalized services and to develop a rank-order list of information privacy concern factors. We consider overall technology characteristics to establish a mutually exclusive set of factors. A Delphi survey, a rigorous data collection method, was deployed to obtain a reliable opinion from the experts and to produce a rank-order list. It, therefore, lends itself well to obtaining a set of universal factors of information privacy concern and its priority. An international panel of researchers and practitioners who have the expertise in privacy and context-aware system fields were involved in our research. Delphi rounds formatting will faithfully follow the procedure for the Delphi study proposed by Okoli and Pawlowski. This will involve three general rounds: (1) brainstorming for important factors; (2) narrowing down the original list to the most important ones; and (3) ranking the list of important factors. For this round only, experts were treated as individuals, not panels. Adapted from Okoli and Pawlowski, we outlined the process of administrating the study. We performed three rounds. In the first and second rounds of the Delphi questionnaire, we gathered a set of exclusive factors for information privacy concern in context-aware personalized services. The respondents were asked to provide at least five main factors for the most appropriate understanding of the information privacy concern in the first round. To do so, some of the main factors found in the literature were presented to the participants. The second round of the questionnaire discussed the main factor provided in the first round, fleshed out with relevant sub-factors. Respondents were then requested to evaluate each sub factor's suitability against the corresponding main factors to determine the final sub-factors from the candidate factors. The sub-factors were found from the literature survey. Final factors selected by over 50% of experts. In the third round, a list of factors with corresponding questions was provided, and the respondents were requested to assess the importance of each main factor and its corresponding sub factors. Finally, we calculated the mean rank of each item to make a final result. While analyzing the data, we focused on group consensus rather than individual insistence. To do so, a concordance analysis, which measures the consistency of the experts' responses over successive rounds of the Delphi, was adopted during the survey process. As a result, experts reported that context data collection and high identifiable level of identical data are the most important factor in the main factors and sub factors, respectively. Additional important sub-factors included diverse types of context data collected, tracking and recording functionalities, and embedded and disappeared sensor devices. The average score of each factor is very useful for future context-aware personalized service development in the view of the information privacy. The final factors have the following differences comparing to those proposed in other studies. First, the concern factors differ from existing studies, which are based on privacy issues that may occur during the lifecycle of acquired user information. However, our study helped to clarify these sometimes vague issues by determining which privacy concern issues are viable based on specific technical characteristics in context-aware personalized services. Since a context-aware service differs in its technical characteristics compared to other services, we selected specific characteristics that had a higher potential to increase user's privacy concerns. Secondly, this study considered privacy issues in terms of service delivery and display that were almost overlooked in existing studies by introducing IPOS as the factor division. Lastly, in each factor, it correlated the level of importance with professionals' opinions as to what extent users have privacy concerns. The reason that it did not select the traditional method questionnaire at that time is that context-aware personalized service considered the absolute lack in understanding and experience of users with new technology. For understanding users' privacy concerns, professionals in the Delphi questionnaire process selected context data collection, tracking and recording, and sensory network as the most important factors among technological characteristics of context-aware personalized services. In the creation of a context-aware personalized services, this study demonstrates the importance and relevance of determining an optimal methodology, and which technologies and in what sequence are needed, to acquire what types of users' context information. Most studies focus on which services and systems should be provided and developed by utilizing context information on the supposition, along with the development of context-aware technology. However, the results in this study show that, in terms of users' privacy, it is necessary to pay greater attention to the activities that acquire context information. To inspect the results in the evaluation of sub factor, additional studies would be necessary for approaches on reducing users' privacy concerns toward technological characteristics such as highly identifiable level of identical data, diverse types of context data collected, tracking and recording functionality, embedded and disappearing sensor devices. The factor ranked the next highest level of importance after input is a context-aware service delivery that is related to output. The results show that delivery and display showing services to users in a context-aware personalized services toward the anywhere-anytime-any device concept have been regarded as even more important than in previous computing environment. Considering the concern factors to develop context aware personalized services will help to increase service success rate and hopefully user acceptance for those services. Our future work will be to adopt these factors for qualifying context aware service development projects such as u-city development projects in terms of service quality and hence user acceptance.

Activation of NF-${\kappa}B$ in Lung Cancer Cell Lines in Basal and TNF-${\alpha}$ Stimulated States (폐암 세포에서 기저 상태와 TNF-${\alpha}$ 자극 시 NF-${\kappa}B$의 활성화)

  • HwangBo, Bin;Lee, Seung-Hee;Lee, Choon-Taek;Yoo, Chul-Gyu;Han, Sung-Koo;Shim, Young-Soo;Kim, Young-Whan
    • Tuberculosis and Respiratory Diseases
    • /
    • v.52 no.5
    • /
    • pp.485-496
    • /
    • 2002
  • Background : The NF-${\kappa}B$ transcription factors control various biological processes including the immune response, acute phase reaction and cell cycle regulation. NF-${\kappa}B$ complexes are retained in the cytoplasm in the basal state and various stimuli cause a translocation of the NF-${\kappa}B$ complexes into the nucleus where they bind to the ${\kappa}B$ elements and regulate the transcription of the target genes. Recent reports also suggest that NF-${\kappa}B$ proteins are involved in oncogenesis, tumor growth and metastasis. High expression of NF-${\kappa}B$ expression was reported in many cancer cell lines and tissues. The constitutive activation of NF-${\kappa}B$ was also reported in several cancer cell lines supporting its role in cancer development and survival. The anti-apoptotic action of NF-${\kappa}B$ is important for cancer survival. NF-${\kappa}B$ also controls the expression of several proteins that are important for cellular adhesion (ICAM-1, VCAM-1) suggesting a role in cancer metastasis. In lung cancer, high expression levels of the NF-${\kappa}B$ subunit p50 and c-Rel were reported. In fact, high expression does not mean a high activity, and the activation pattern of NF-${\kappa}B$ in lung cancer has not been reported. Materials and Methods : In this study, the NF-${\kappa}B$ nuclear binding activity in the basal and TNF-${\alpha}$ stimulated states were exmined in various lung cancer cell lines and compared with the normal bronchial epithelial cell line. Twelve lung cancer cell lines including the non-small cell and small cell lung cancer cell lines (A549, NCI-H358, NCI-H441, NCI-H552, NCI-H2009, NCI-H460, NCI-H1229, NCI-H1703, NCI-H157, NCI-H187, NCI-H417, NCI-H526) and BEAS-2B bronchial epithelial cell line were used. To evaluate the NF-${\kappa}B$ expression and DNA binding activity, western blot analysis and an electrophoretic mobility shift assay with the nuclear protein extracts. Results : The basal expressions of the p65 and p50 subunits were observed in the BEAS-2B cell line and all lung cancer cell lines except for NCI-H358 and NCI-H460. The expression levels of p65 and p50 were increased 30 minutes after stimulation with TNF-${\alpha}$ in BEAS-2B and in 10 lung cancer cell lines. In the NCI-H358 and NCI-H460 cell lines, p65 expression was not observed in the basal and stimulated states and the two p50 related protein levels were higher after stimulation with TNF-${\alpha}$ These new proteins were smaller than p50 and are thought to be variants of p50. In the basal state, NF-${\kappa}B$ was nearly activated in the BEAS-2B and all lung cancer cell lines. The DNA binding activity of the NF-${\kappa}B$ complexes was markedly higher after stimulation with TNF-${\alpha}$ In the BEAS-2B and all lung cancer cell line except for NCI-H358 and NCI-H460, the activated NF-${\kappa}B$ complex was a p65/p50 heterodimer. In the NCI-H358 and NCI-H460 lung cancer cell lines, the NF-${\kappa}B$ complex was variant of a p50/p50 homodimer. Conclusion : The NF-${\kappa}B$ activation pattern in the lung cancer cell lines and the normal bronchial epithelial cell lines was similar except for the activation of a variant of the p50/p50 homodimer in some lung cancer cell linse.

Internet Addiction in Adolescents and its Relation to Sleep and Depression (청소년의 인터넷 중독 : 수면, 우울과의 관련성)

  • Song, Ho-Kwang;Jeong, Mi-Hyang;Sung, Da-Jung;Jung, Jung-Kyung;Choi, Jin-Sook;Jang, Yong-Lee;Lee, Jin-Seong
    • Sleep Medicine and Psychophysiology
    • /
    • v.17 no.2
    • /
    • pp.100-108
    • /
    • 2010
  • Objectives: "Internet-addiction" came into common use not only in clinical setting but also in everyday life. But, pathophysiology and diagnostic criteria of the internet addiction remain unknown. Because adolescents are in developing period, they might be vulnerable to the internet addiction, depression and sleep-related problem. The objectives of this study were to investigate the characteristics of internet addiction and its association with sleep pattern and depression in Korean adolescence. Methods: Subjects were 799 middle and high school students in Seoul, Korea. We administered a self-reported questionnaire including socio-demographic data, Korean versions of Young's Internet Addiction Scale (YIAS), Pittsburgh Sleep Quality Index (PS-QI), the Center for Epidemiologic Studies for Depression Scale (CES-D) and questions about internet using patterns. Data of 696 subjects were included in analysis. Chi-square tests were used to analyze proportional differences, and ANOVA with post-hoc tests were used to analyze differences among groups. Partial correlation analyses were performed to analyze the correlation of internet addiction with other variables (two-tailed, p<0.05). Results: Of the 696 participants (grade 2 of middle school; M2 135 vs. grade 1 of high school; H1 238 vs. grade 2 of high school; H2 323), 2.0% (n=14) were internet-addicted (IA), 27.7% (n=193) were over-using (OU) and 70.3% (n=489) were not-addicted (NA). The mean scores of YIAS, PSQI and CES-D scores were 35.24${\pm}$12.78, 5.53${\pm}$3.04 and 16.72${\pm}$8.69, respectively. In higher grade students, average total sleep time was shorter (M2 426.20${\pm}$67.68 min. vs. H1 380.47${\pm}$62.57 min. vs. H2 354.67${\pm}$73.37 min., F=51.909, p<0.001), and PSQI (4.69${\pm}$3.14 vs. 5.42${\pm}$3.15 vs. 5.97${\pm}$2.83, F=8.871, p<0.001) CES-D (13.53${\pm}$8.37 vs. 16.96${\pm}$8.24 vs. 17.87${\pm}$8.84, F=12.373, p<0.001) scores were higher than those of lower grade students. Comparing variables among IA, OU and NA groups, computer using time not for study (96.36${\pm}$63.31 min. vs. 134.92${\pm}$86.79 min. vs. 213.57${\pm}$136.87 min., F=34.287, p<0.001) and portable device using time not for study (84.22${\pm}$79.11 min. vs. 96.97${\pm}$91.89 min. vs. 152.31${\pm}$93.64 min., F= 5.400, p=0.005) were different among groups. PSQI (5.26${\pm}$2.97 vs. 6.08${\pm}$2.97 vs. 7.50${\pm}$4.41, F=8.218, p<0.001) and CES-D scores (15.40${\pm}$8.08 vs. 19.05${\pm}$8.42 vs. 30.43${\pm}$13.69, F=32.692, p<0.001) were also different among groups. YIAS score were correlated with computer using time not for study (r=0.356, p<0.001) and portable device using time not for study (r= 0.136, p<0.001). PSQI score (r=0.237, p<0.001) and CES-D score (r=0.332, p<0.001). YIAS score and PSQI score (r=0.131, p= 0.001), YIAS and CES-D score (r=0.265, p<0.001), PSQI score and CES-D score (r=0.357, p<0.001) were correlated each other. Conclusion: These results suggested that adolescents' internet-addiction was correlated with not only computer and portable device using time not for study but also depression and sleep-related problems. We should pay attention to depression and sleep-related problems, when evaluating internet-addiction in adolescents.

  • PDF

Home Economics teachers' concern on creativity and personality education in Home Economics classes: Based on the concerns based adoption model(CBAM) (가정과 교사의 창의.인성 교육에 대한 관심과 실행에 대한 인식 - CBAM 모형에 기초하여-)

  • Lee, In-Sook;Park, Mi-Jeong;Chae, Jung-Hyun
    • Journal of Korean Home Economics Education Association
    • /
    • v.24 no.2
    • /
    • pp.117-134
    • /
    • 2012
  • The purpose of this study was to identify the stage of concern, the level of use, and the innovation configuration of Home Economics teachers regarding creativity and personality education in Home Economics(HE) classes. The survey questionnaires were sent through mails and e-mails to middle-school HE teachers in the whole country selected by systematic sampling and convenience sampling. Questionnaires of the stages of concern and the levels of use developed by Hall(1987) were used in this study. 187 data were used for the final analysis by using SPSS/window(12.0) program. The results of the study were as following: First, for the stage of concerns of HE teachers on creativity and personality education, the information stage of concerns(85.51) was the one with the highest response rate and the next high in the following order: the management stage of concerns(81.88), the awareness stage of concerns(82.15), the refocusing stage of concerns(68.80), the collaboration stage of concerns(61.97), and the consequence stage of concerns(59.76). Second, the levels of use of HE teachers on creativity and personality education was highest with the mechanical levels(level 3; 21.4%) and the next high in the following order: the orientation levels of use(level 1; 20.9%), the refinement levels(level 5; 17.1%), the non-use levels(level 0; 15.0%), the preparation levels(level 2; 10.2%), the integration levels(level 6; 5.9%), the renewal levels(level 7; 4.8%), the routine levels(level 4; 4.8%). Third, for the innovation configuration of HE teachers on creativity and personality education, more than half of the HE teachers(56.1%) mainly focused on personality education in their HE classes; 31.0% of the HE teachers performed both creativity and personality education; a small number of teachers(6.4%) focused on creativity education; the same number of teachers(6.4%) responded that they do not focus on neither of the two. Examining the level and type of performance HE teachers applied, the average score on the performance of creativity and personality education was 3.76 out of 5.00 and the mean of creativity component was 3.59 and of personality component was 3.94, higher than standard. For the creativity education, openness/sensitivity(3.97) education was performed most and the next most in the following order: problem-solving skill(3.79), curiosity/interest(3.73), critical thinking(3.63), problem-finding skill(3.61), originality(3.57), analogy(3.47), fluency/adaptability(3.46), precision(3.46), imagination(3.37), and focus/sympathy(3.37). For the personality education, the following components were performed in order from most to least: power of execution(4.07), cooperation/consideration/just(4.06), self-management skill(4.04), civic consciousness(4.04), career development ability(4.03), environment adaptability(3.95), responsibility/ownership(3.94), decision making(3.89), trust/honesty/promise(3.88), autonomy(3.86), and global competency(3.55). Regarding what makes performing creativity and personality education difficult, most HE teachers(64.71%) chose the lack of instructional materials and 40.11% of participants chose the lack of seminar and workshop opportunity. 38.5% chose the difficulty of developing an evaluation criteria or an evaluation tool while 25.67% responded that they do not know any means of performing creativity and personality education. Regarding the better way to support for creativity and personality education, the HE teachers chose in order from most to least: 'expansion of hands-on activities for students related to education on creativity and personality'(4.34), 'development of HE classroom culture putting emphasis on creativity and personality'(4.29), 'a proper curriculum on creativity and personality education that goes along with students' developmental stages'(4.27), 'securing enough human resource and number of professors who will conduct creativity and personality education'(4.21), 'establishment of the concept and value of the education on creativity and personality'(4.09), and 'educational promotion on creativity and personality education supported by local communities and companies'(3.94).

  • PDF