• Title/Summary/Keyword: Personal Data Control

Search Result 677, Processing Time 0.024 seconds

A Study on Maternal Verbal Control Pattens and Children's Recognition against those (어머니의 언어통제유형과 그에 대한 아동의 인지 연구)

  • 이희자
    • Journal of the Korean Home Economics Association
    • /
    • v.30 no.4
    • /
    • pp.231-247
    • /
    • 1992
  • A Study on Maternal Verbal Control Patterns and Children's Recognition against those. The primary objective of the material presented in this dissertation is the analysis of the maternal verbal control patterns. The major focus is given to the differences between maternal verbal control patterns and children's recognition against those. The purspoe of this study were; 1) to investigate the maternal verbal control patterns recognized by children according to their family and personal surroundings; 2) to investigate the verbal control patterns in mother's response according to the differences of family and personal surroundings; 3) to find the differences between children's recognition and maternal verbal control patterns; 4) How the maternal verbal control patterns recognized by children are? The materials of this study were 81(37; boys, 44; girl)) from kindergarten in Seou. The sample of age used in this study was 5 to 7 years old. The test about maternal verbal environment used the question sheet for reaction between mother and children by Gumperz. The kids got interviews with same questions as mothers with question sheet. The statistical tools used is the analysis of the data were frequency, crosstab, and t-test. The result of the study were summarized as follows; 1) The maternal verbal control patterns recognized by children had differences according to whether living with grand-parent or not. Living with grand-parent are more person-oriented than without grand-parent group. 2) The maternal verbal control patterns of mother response show the differences within mother's academic background, present situation of child, and parent's expection to child. The imperative verbal control pattern was more frequently used of low academic background who just fraduate the middle or high school. The personal verbal control pattern was more frequently used of high educational background's like university graduate or more educated group. 3) The differences between maternal verbal control patterns with children's recognition and with mother response is that mother responseis more person-oriented than children's. 4) The imperative verbal control pattern used command, verbal purnishment, and physical purnishment. the status-oriented verbal control pattern used univesal positional appeals and limited positional appeals. The person-oriented verbal control pattern used child-oriented cognitive affective appeals.

  • PDF

Big Data Key Challenges

  • Alotaibi, Sultan
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.4
    • /
    • pp.340-350
    • /
    • 2022
  • The big data term refers to the great volume of data and complicated data structure with difficulties in collecting, storing, processing, and analyzing these data. Big data analytics refers to the operation of disclosing hidden patterns through big data. This information and data set cloud to be useful and provide advanced services. However, analyzing and processing this information could cause revealing and disclosing some sensitive and personal information when the information is contained in applications that are correlated to users such as location-based services, but concerns are diminished if the applications are correlated to general information such as scientific results. In this work, a survey has been done over security and privacy challenges and approaches in big data. The challenges included here are in each of the following areas: privacy, access control, encryption, and authentication in big data. Likewise, the approaches presented here are privacy-preserving approaches in big data, access control approaches in big data, encryption approaches in big data, and authentication approaches in big data.

Redactable Blockchain Based Authority Alteration and Accessn Control System (수정 가능한 블록체인 기반 권한 변경 및 접근 제어시스템)

  • Lee, Yeon Joo;Choi, Jae Hyun;Noh, Geontae;Jeong, Ik Rae
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.32 no.3
    • /
    • pp.513-525
    • /
    • 2022
  • The immutability of blockchain is core elements of security of blockchain and guarantee data integrity. However, the characteristic that the data recoreded once in the blockchain cannot be modified has place for abuse by a specific user. In fact improper contents that is inappropriate to be recorded on the blockchain, such as harmful data and user personal data, is exposed on Bitcoin. As a way to manage improper content existing in the blockchain, there is a redactable blockchain using chameleon hash proposed for the first time by Ateniese. The redactable blockchain meet the right to be forgotten of GDPR by allowing data modification and deletion. Recently, Research on personal data management is being conducted in a redactable blockchain. Research by Jia et al. proposed a model that enables users to manage their personal data in the redactable blockchain. However, semi trusted regulators, which are blockchain participation nodes, have powerful authority in the blockchain, such as modification rights and deprivation of transaction rights for all blocks, which may cause side effects. In this paper, to weaken the authority of regulators in Y. Jia et al., we propose a method of authority subject altering and authority sharing, and propose a redactable blockchain-based authority change and access control system model based on applicable scenarios.

Policy Directions for Boosting Fusion of PC in the Mechatronics Industry (메카트로닉스산업의 PC 융합 촉진을 위한 기술정책 방향)

  • 이공래
    • Journal of Korea Technology Innovation Society
    • /
    • v.3 no.2
    • /
    • pp.78-93
    • /
    • 2000
  • Since computerized numerical controller(CNC) emerged as a result of the fusion of the electronics technology and the mechanical technology, there has been continuous evolution of CNC technology in the mechatronics industry. The industry is recently developing a new control system based on the fusion of personal computer(PC) and CNC. Upgraded PC has now integrated into CNC, making various machines possible to exchange data, software and hardware, and to greatly improve man-machine interface. The fusion of PC and CNC can form a new paradigm in technological innovation of not only control system but also whole machinery industry in near the future. Korea lagged behind the developed countries in the development of open control system with the fusion of PC. Turbotek, Hyundai Motor and Daewoo are leading companies, but their commercial possibility seems to be low because domestic market is too small to reap a commercial benefit. Nevertheless, the development of the system is an essential step for Korea to embark on a future technological paradigm of the machinery industry. The government needs to play some role for the development, for instance, government R&D projects, institutional building and training of related technicians.

  • PDF

The Design and Implementation of the Data Link System based on the Off-the-shelf Ultra Mobile Personal Computer for Network Centric Warfare(NCW) (네트워크중심전(NCW)을 위한 UMPC 기반 데이터 링크 시스템 설계 및 구축)

  • Sim, Dong-Sub;Kim, Ki-Hyung
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.12 no.2
    • /
    • pp.175-181
    • /
    • 2009
  • All of the military aircrafts in Korea Air Force are administered and operated together in the same system regardless of whether they are equipped with the data communication capability or not. The absence of the data communication capability in some of the aircrafts might increase whole kill chain hour at the point of the Network Centric Warfare achievement. Network synergy effects cannot also be desired if the section which is not connected to the network influences to the whole tactical network. Equipping aircrafts with the data communication capability could be done by upgrading the aircrafts, but resulting in high costs and long updating time. This paper is a research about the design and implementation of the UMPC based Data Link System to aircrafts that do not have the data communication capability. The proposed system grafts the UHF-based wireless modem technology and the aircraft flight mission support software onto the off-the-shelf UMPC and GPS system. The employed UHF radio equipment allows communicating tactic data with another aircrafts on the air, the ground control point, and even the Tactical Air Control Party(TACP) control vehicle that achieve missions with aircrafts. It thereby increases such capabilities as navigation aid, situation awareness, quick target identification and attack. We also applied Closed Air Support(CAS) scenarios, which is very close to the real environment, to the experiments of the proposed system. The experimental results show that the proposed system could support the data communication capability effectively and the flight mission at low costs of money and time.

Implementation of Privacy Protection Policy Language and Module For Social Network Services (소셜 네트워크 서비스를 위한 프라이버시 보호 정책언어 및 프라이버시 보호 모듈 구현)

  • Kim, Ji-Hye;Lee, Hyung-Hyo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.21 no.1
    • /
    • pp.53-63
    • /
    • 2011
  • An SNS(Social Network Service) enables people to form a social network on online as in the real world. With the rising popularity of the service, side effects of SNSs were issued. Therefore we propose and implement a policy-based privacy protection module and access control policy language for ensuring the right of control of personal information and sharing data among SNSs. The policy language for protecting privacy is based on an attribute-based access control model which grants an access to personal information based on a user's attributes. The policy language and the privacy protection module proposed to give the right of control of personal information to the owner, they can be adopted to other application domains in which privacy protection is needed as well as secure sharing data among SNSs.

Implementation of Electronic Personal Dosimeter Using Silicon PIN Photodiode (실리콘 핀 포토다이오드를 이용한 능동형 방사선 피폭 전자선량계의 구현)

  • 이운근;백광렬;권석근
    • Journal of Institute of Control, Robotics and Systems
    • /
    • v.9 no.4
    • /
    • pp.296-303
    • /
    • 2003
  • A personal portable type electronic dosimeter using silicon PIN photodiode and small GM tube is recently attracting much attention due to its advantages such as an immediate indication function of dose and dose rate, alerting function, and efficient management of radiation exposure history and dose data. We designed and manufactured a semiconductor radiation detector aimed to directly measure X-ray and v-ray irradiated in silicon PIN photodiode, without using high-priced scintillation materials. Using this semiconductor radiation detector, we developed an active electronic dosimeter, which measures the exposure dose using pulse counting method. In this case, it has a shortcoming of over-evaluating the dose that shows the difference between the dose measured with electronic dosimeter and the dose exposed to the human body in a low energy area. We proposed an energy compensation filter and developed a dose conversion algorithm to make both doses indicated on the detector and exposed to the human body proportional to each other, thus enabling a high-precision dose measurement. In order to prove its reliability in conducting personal dose measurement, crucial for protecting against radiation, the implemented electronic dosimeter was evaluated to successfully meet the IEC's criteria, as the KAERI (Korea Atomic Energy Research Institute) conducted test on dose indication accuracy, and linearity, energy and angular dependences.

The Analysis of Factors affecting Workers' Knowledge Sharing Intention in a University Hospital (일 대학병원 근로자의 지식공유 의도에 미친 영향분석)

  • Lee, Hyun-Sook;Kim, Young-Hoon;Lee, Hae-Jong;Kim, Young-Bae
    • Korea Journal of Hospital Management
    • /
    • v.18 no.4
    • /
    • pp.131-144
    • /
    • 2013
  • The purpose of this study is to analysis factors affecting workers' knowledge sharing intention in a hospital. This study is based on personal factors such as perceived incentives, perceived reciprocal benefits, perceived behavioral control, and subjective norm. Also, there are organizational factors such as organizational climate, CEO's support, rewards system, trust, and IT system. Data were assessed using 107 employees who work at C university hospital in Chunkcheong-do and collected with self-administered questionnaires from April 1 to 13 in 2013. This study was analyzed SPSS 18 by using frequency and multi regression analysis. The results of the study were as follows. First, knowledge sharing intention among personal factors was statistically significant in perceived behavioral control. Second, the awareness of knowledge sharing intention among organizational factors was turned out to be positive effect for CEO's support and trust. This study was identified a couple of factors affecting knowledge sharing intention between personal and organizational factors. The the implications of these factors are discussed and areas for developing hospital management strategies are fostered knowledge sharing.

  • PDF

Automation System for Sharing CDM Data (CDM 데이터 공유를 위한 자동화 시스템)

  • Jeong, Chae-Eun;Kang, Yunhee;Park, Young B.
    • Journal of Platform Technology
    • /
    • v.8 no.3
    • /
    • pp.3-9
    • /
    • 2020
  • As the need for sharing for research purposes in the medical field increases, the use of a Common Data Model (CDM) is increasing. However, when sharing CDM data, there are some problems in that access control and personal information in the data are not protected. In this paper, in order to solve this problem, access to CDM data is controlled by using an encryption method in a blockchain network, and information of CDM data is recorded to enable tracking. In addition, IPFS was used to share a large amount of CDM data, and Celery was used to automate the sharing process. In other words, we propose a multi-channel automation system in which the information required for CDM data sharing is shared by a trust-based technology, a distributed file system, and a message queue for automation. This aims to solve the problem of access control and personal information protection in the data that occur in the process of sharing CDM data.

  • PDF

The Effects of Perceived Risk and Interactivity on User's Satisfaction and Commitment in Personal Media (1인 미디어의 지각된 위험 및 상호작용성이 사용자 만족과 몰입에 미치는 영향)

  • Chung, Young-Soo;Jung, Chul-Ho
    • Management & Information Systems Review
    • /
    • v.28 no.1
    • /
    • pp.125-156
    • /
    • 2009
  • The primary purpose of this study is to identify the determinants of the users' satisfaction and commitment in personal media. For these purposes, we developed a research model based on the literature reviews of personal media, perceived risk and interactivity, satisfaction, and commitment. This study has identified four dimensions in the concept of perceived risk, such as privacy risk, social risk, time loss risk, and economic risk, and three dimensions in the concept of perceived interactivity, such as active control, two-way communication, and responsiveness. In survey, data were collected from 428 male and female who have an experience in personal media. Data was analyzed factor analysis, reliability analysis, measurement model analysis, and structural model analysis by utilizing SPSS 15.0 and AMOS 5.0 program. Analysis results of research model indicate the following. Firstly, privacy risk, active control, two-way communication, and responsiveness are significantly related satisfaction. Secondly, privacy risk, time loss risk, economic risk, active control, and two-way communication are significantly related commitment. Thirdly, users' satisfaction has positive relationship with commitment in personal media. Based on these results, theoretical implications for relevant researchers and managerial implications for personal media vitalization and marketing strategy are discussed. Finally, limitations for this study and further research issues are suggested.

  • PDF