• Title/Summary/Keyword: Personal Data Control

Search Result 678, Processing Time 0.029 seconds

An Access Control Method Based on a Synthesized Metric from Trust and Risk Factors for Online Social Networks (신뢰도와 위험도로부터 합성된 지표에 기반을 둔 온라인 소셜 네트워크를 위한 접근 제어 방법)

  • Seo, Yang-Jin;Han, Sang-Yong
    • The KIPS Transactions:PartC
    • /
    • v.17C no.1
    • /
    • pp.15-26
    • /
    • 2010
  • Social Networks such as 'Facebook' and 'Myspace' are regarded as useful tools for people to share interests and maintain or expand relationships with other people. However, they pose the risk that personal information can be exposed to other people without explicit permission from the information owner. Therefore, we need a solution for this problem. Although existing social network sites allow users to specify the exposing range or users who can access their personal information, this cannot be a practical solution because the information can still be revealed to third parties through the permitted users albeit unintentionally. Usually, people allow the access of unknown person to personal data in online social networks and this implies the possibility of information leakage. We could use an access control method based on trust value, but this has the limitation that it cannot reflect the quantitative risk of information leakage. As a solution to this problem, this paper proposes an access control method based on a synthesized metric from trust and risk factors. Our various experiments show that the risk of information leakage can play an important role in the access control of online social networks.

Factors Influencing Health Promoting Behavior in Patients with Multiple Myeloma (다발성골수종 환자의 건강증진행위에 영향을 미치는 요인)

  • Choi, Geon-Hui;Kang, Hee-Young
    • Journal of Korean Academy of Fundamentals of Nursing
    • /
    • v.18 no.2
    • /
    • pp.217-225
    • /
    • 2011
  • Purpose: The purpose of this study was to analyzing the relationship between perceived health status, health locus of control, self-esteem, self-efficacy and HPB in patients with multiple myeloma to identify factors influencing health promoting behavior (HPB). Methods: One hundred patients were recruited into the study. The data were collected by personal interviews using questionnaires. Descriptive statistics, Pearson's correlation coefficients and stepwise multiple regression analysis were used with SPSS program to were analyze the data. Results: There were significant relationships between self-esteem (r=.787, p<.001), self-efficacy (r=.681, p<.001), internal health locus of control (r=.557, p<.001), powerful others health locus of control (r=.517, p<.001), chance health locus of control (r=-.251, p=.012), perceived health status (r=.532, p<.001) and HPB. Significant factors in explaining HPB were self-esteem, powerful others health locus of control, self-efficacy and perceived health status and together they accounted for 71% of variance. Conclusion: The study findings indicate that self-esteem, powerful others health locus of control, self-efficacy, and perceived health status were important factors in explaining HPB in patients with multiple myeloma. As self-esteem was an important variable in HPB, health promotion program designed for this population should focus on self-esteem and these other factors to enhance effective health promotion behavior.

Development of PLC networking for communication with mobile phones

  • Tasapark, Jirawan;Tangsrirat, Worapong
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2004.08a
    • /
    • pp.1221-1224
    • /
    • 2004
  • This paper presents the programmable logic controller (PLC) networking development for communication with the mobile phone. The proposed technique is suitable for remote sensing control systems, which can display the operation status and monitoring fault diagnosis of a system. The system operation is based on the use of personal computer (PC) to logically analyze data from PLC, and existing internet protocol for sending information messages to mobile phones.

  • PDF

PC-based Control System of Serially Connected Multi-channel Speakers (직렬연결 다채널 스피커의 PC 기반 제어 시스템)

  • Lee, Sun-Yong;Kim, Tae-Wan;Byun, Ji-Sung;Song, Moon-Vin;Chung, Yun-Mo
    • The KIPS Transactions:PartA
    • /
    • v.15A no.6
    • /
    • pp.317-324
    • /
    • 2008
  • In this paper, we propose a system which easily controls the existing serially connected multi-channel speakers in a general personal computer by using a USB(Universal Serial Bus) interface. The personal computer as a host of the USB interface analyzes a sound source and sends audio data in a real-time fashion by the use of the isochronous transmission, one of four transmission methods provided by the USB interface. In addition, a channel is assigned by means of the bulk transmission, one of four transmission methods provided by the USB interface. Transmitted data from the USB host are sent to each speaker through compression and packet generation process. Each speaker detects corresponding digital data and regenerates audio signals through DAC(Digital-to-Analog Converter). A user can easily select a sound source file and a channel by the use of a GUI environment in a personal computer.

Fraud Detection in E-Commerce

  • Alqethami, Sara;Almutanni, Badriah;AlGhamdi, Manal
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.6
    • /
    • pp.312-318
    • /
    • 2021
  • Lack of knowledge and digital skills is a threat to the information security of the state and society, so the formation and development of organizational culture of information security is extremely important to manage this threat. The purpose of the article is to assess the state of information security of the state and society. The research methodology is based on a quantitative statistical analysis of the information security culture according to the EU-27 2019. The theoretical basis of the study is the theory of defense motivation (PMT), which involves predicting the individual negative consequences of certain events and the desire to minimize them, which determines the motive for protection. The results show the passive behavior of EU citizens in ensuring information security, which is confirmed by the low level of participation in trainings for the development of digital skills and mastery of basic or above basic overall digital skills 56% of the EU population with a deviation of 16%. High risks to information security in the context of damage to information assets, including software and databases, have been identified. Passive behavior of the population also involves the use of standard identification procedures when using the Internet (login, password, SMS). At the same time, 69% of EU citizens are aware of methods of tracking Internet activity and access control capabilities (denial of permission to use personal data, access to geographical location, profile or content on social networking sites or shared online storage, site security checks). Phishing and illegal acquisition of personal data are the biggest threats to EU citizens. It have been identified problems related to information security: restrictions on the purchase of products, Internet banking, provision of personal information, communication, etc. The practical value of this research is the possibility of applying the results in the development of programs of education, training and public awareness of security issues.

Detection of the Change in Blogger Sentiment using Multivariate Control Charts (다변량 관리도를 활용한 블로거 정서 변화 탐지)

  • Moon, Jeounghoon;Lee, Sungim
    • The Korean Journal of Applied Statistics
    • /
    • v.26 no.6
    • /
    • pp.903-913
    • /
    • 2013
  • Social network services generate a considerable amount of social data every day on personal feelings or thoughts. This social data provides changing patterns of information production and consumption but are also a tool that reflects social phenomenon. We analyze negative emotional words from daily blogs to detect the change in blooger sentiment using multivariate control charts. We used the all the blogs produced between 1 January 2008 and 31 December 2009. Hotelling's T-square control chart control chart is commonly used to monitor multivariate quality characteristics; however, it assumes that quality characteristics follow multivariate normal distribution. The performance of a multivariate control chart is affected by this assumption; consequently, we introduce the support vector data description and its extension (K-control chart) suggested by Sun and Tsung (2003) and they are applied to detect the chage in blogger sentiment.

The Condition Analysis about Job Satisfaction and Separation Propensity of Foodservice Industry Culinary Employee′s (외식산업 조리종사자의 직무만족과 이직성향에 대한 실태분석)

  • 이선호;김선희;김민수
    • Culinary science and hospitality research
    • /
    • v.9 no.4
    • /
    • pp.37-53
    • /
    • 2003
  • The purpose of this study was to find out efficient control plan for productivity increase. To analyze the data, the measure of question a paper was used to 5 a point measure, statistics disposition was used to SPSS, the analyze method was used to frequency analyze, trust degree analyze, difference analyze useful average value, person's correlation analyze, revolution analyze. The results of this study could be explained as follow: First, find out high change separation propensity. Secondly, was subjected important for atmosphere composition and was required strategy consideration for stable job recognition. Third, was operated affirmative to recognition about separation and was increased to job satisfaction according as a colleague relation and team work. Fourth, was increased to comparative separation propensity in case that high job satisfaction. Therefore it is required interesting labor item and treatment development about personal evaluation.

  • PDF

Marketer-Generated Content Sharing Among Social Broadcasting Users: Effects of Intrinsic Motivations, Social Capital and the Moderating Role of Prevention Focus

  • Li, Yuhao;Wang, Kanliang
    • Asia pacific journal of information systems
    • /
    • v.25 no.4
    • /
    • pp.719-745
    • /
    • 2015
  • Social networking services provide individuals with an easy approach for exchanging messages with others based on interpersonal relationships. However, why individuals spread marketer-generated content (MGC) in their online social circles remains unclear. Therefore, we develop a theoretical model to examine how social capital, intrinsic motivations, personal perceptions, past behavior, and personal traits influence MGC sharing behavior of social media users in micro-blogging context. Data collected from 319 social networking users support the proposed model. The results from partial least squares analyses show that enjoyment, perceived control, and outcome expectations are significant indicators of individual's MGC sharing intention in the social broadcasting environment. Results also suggest that social capital, users' intention, and past behavior positively influence the MGC sharing behavior of users. Moreover, individual prevention pride exhibits a significant interaction effect on the relationships between users' MGC sharing and its antecedents. Implications for research and practice are discussed.

Improvement Plan and Analysis of Construction Safety Management for Risk Management (리스크관리에 의한 건설안전관리의 분석 및 발전방안)

  • Chung, Byoung-Hwa;Kim, Sung-Deuk
    • Journal of the Korea Institute of Building Construction
    • /
    • v.6 no.4 s.22
    • /
    • pp.53-60
    • /
    • 2006
  • Quality control and safety represent increasingly important concerns for project managers. In the worst case, failures may cause personal injuries or fatalities. Accidents during the construction process can similarly result in personal injuries and large costs. We present the results of a study designed to identify the tools that are most widely used and those that are associated with successful project management in general, and with effective project risk management in particular. The study is based on a questionnaire administered to a sample of project managers from construction enterprises. The response data was analyzed in order to find which tools are more likely to be used in the those organizations that report better project management performance and in those that value the contribution of risk management processes.

Sketch-based Graph-Control User Interface Method for Personal Information Management (개인정보관리를 위한 스케치기반 그래프 컨트롤 사용자 인터페이스 기법)

  • Kim, Jung-Jin;Park, Tae-Jin;Jeon, Jae-Woong;Choy, Yoon-Chul
    • Journal of Korea Multimedia Society
    • /
    • v.12 no.7
    • /
    • pp.893-902
    • /
    • 2009
  • Many People are collecting and managing variable information(Image, Graphic, Animation, Text, music files etc.) about personal interests and holding them in common. Most users are using Microsoft Explorer to make a folder and classify many files. but It's difficult to understand the relation of the data instinctively. To resolve this problem, we adopt information visualization method (especially tree-graph control interface). We suggest an interface that all user can drawing a Graph easily and rapidly. So user can see the relations of their data instinctively and control the relation directly with our sketch-based interface.

  • PDF