• Title/Summary/Keyword: Personal Data Management

Search Result 1,507, Processing Time 0.03 seconds

Determinant of the Personal Relationship of University Students' Health- Promoting Lifestyles - Focusing on D University- (대학생의 건강행위가 대인관계에 미치는 영향 -일개 D대학을 중심으로-)

  • Yoon, Tae-Hyung
    • The Korean Journal of Health Service Management
    • /
    • v.9 no.1
    • /
    • pp.145-156
    • /
    • 2015
  • The aim of this study is to analyze the determinant factors of the personal relationships among university students. We collected data for 41 days, from 1 November to 10 December of, 2013. This study surveyed 221 university students at a university located in the metropolitan city of Busan. The findings were as follows. There were statistically significant differences in the relationships according to sex, smoking, drinking, and health status(p<0.05). Males showed this better than female. Smokers(drinkers) showed a greater difference than non-smokers(non-drinkers). Greater subjective health status was associated with more personal relationships. Students who managed their mental health and stress showed good personal relationships. From a multiple regression analysis, it was found that the determining factors as regards personal relationships were health status, current smoker, management of health, and gender health, all of which showed statistically significant differences(p<0.05). As a result, we suggest that we must provide information about health-promoting lifestyles at university to enhance personal relationships.

The Relationship Between Emotional Exhaustion, Depersonalization, Personal Accomplishment, and Job Satisfaction: An Empirical Study in Saudi Arabia

  • ALLAM, Zafrul;MALIK, Azam;GEORGE, Shaju
    • The Journal of Asian Finance, Economics and Business
    • /
    • v.8 no.5
    • /
    • pp.1109-1117
    • /
    • 2021
  • The main aim of this investigation is to explore the relationships between emotional exhaustion, depersonalization, personal accomplishment, and job satisfaction among employees working in the banking sector. A total of 214 respondents were surveyed for the purpose of this investigation and selected randomly from different banks located in the Kingdom of Saudi Arabia (K.S.A.). Job Burnout Inventory developed by Maslach and Jackson (1981) was taken into consideration to assess emotional exhaustion, depersonalization, and sense of personal accomplishment, and job satisfaction scale was used to measure the degree of satisfaction level of the employees. The collected data were analyzed by means of descriptive and inferential statistics with the help of statistical Package for Social Sciences (SPSS). The most eye-catching findings of the investigation revealed that emotional exhaustion had the greater mean as compared to depersonalization and personal accomplishment. The inverse significant correlation has been observed between emotional exhaustion, depersonalization, and job satisfaction while positive and significant relationship was observed between personal accomplishment and job satisfaction. Further, the result of the investigation from regression test indicates that the relationship existed between emotional exhaustion, depersonalization, personal accomplishment, and job satisfaction among employees working in the banking sector in the Kingdom.

Study of PDA based Personal Asthma Management System Development (PDA 기반 천식관리 시스템 개발에 관한 연구)

  • Park, Jong-Cheon;Hwang, Dong-Guk;Lee, Woo-Ram;Jun, Byoung-Min;Kim, Kyung-Ah;Cha, Eun-Jong
    • Proceedings of the KAIS Fall Conference
    • /
    • 2006.11a
    • /
    • pp.216-219
    • /
    • 2006
  • Self management of chronic asthma is of great importance, since the disease could lead the patient into an emergent situation. In the present study, we describe design and implementation of a personal digital assistant(PDA) based asthma management system for personal application including symptom and medication to prevent from the potential exac-erbation of the disease. The software program was written by the Visual C++ tool in the mobile computing environment and Object Store was applied for data management. User friendly GUI environment was provided for the patient to input his/her daily condition and self treatment such as medication for suc-cessful management. The input screen design substituted for keyboard input to a mouse in order to easy to select an item and minimize the keyboard input. The implementation results of this system., Real-time data collection and process were possible and be able to have been carried effectively out a continuous symptom, a medication of asthma patients, risk management.

  • PDF

Analysis of problems caused by Big Data's private information handling (빅데이터 개인정보 취급에 따른 문제점 분석)

  • Choi, Hee Sik;Cho, Yang Hyun
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.10 no.1
    • /
    • pp.89-97
    • /
    • 2014
  • Recently, spread of Smartphones caused activation of mobile services, because of that Big Data such as clouding service able to proceed with large amount of data which are hard to collect, save, search and analyze. Many companies collected variety of private and personal information without users' agreement for their business strategy and marketing. This situation raised social issues. As companies use Big Data, numbers of damage cases are growing. In this Thesis, when Big Data process, methods of analyze and research of data are very important. This thesis will suggest that choices of security levels and algorithms are important for security of private informations. To use Big Data, it has to encrypt the personal data to emphasize the importance of security level and selection of algorithm. Thesis will also suggest that research of utilization of Big Data and protection of private informations and making guidelines for users are require for security of private information and activation of Big Data industries.

Blockchain Framework for Occupant-centered Indoor Environment Control Using IoT Sensors

  • Jeoung, Jaewon;Hong, Taehoon;Jung, Seunghoon;Kang, Hyuna;Kim, Hakpyeong;Kong, Minjin;Choi, Jinwoo
    • International conference on construction engineering and project management
    • /
    • 2022.06a
    • /
    • pp.385-392
    • /
    • 2022
  • As energy-saving techniques based on human behavior patterns have recently become an issue, the occupant-centered control system is adopted for estimating personal preference of indoor environment and optimizing environmental comfort and energy consumption. Accordingly, IoT devices have been used to collect indoor environmental quality (IEQ) data and personal data. However, the need to safely collect and manage data has been emerged due to cybersecurity issues. Therefore, this paper aims to present a framework that can safely transmit occupant-centered data collected from IoT to a private blockchain server using Hyperledger fabric. In the case study, the minimum value product of the mobile application and smartwatch application was developed to evaluate the usability of the proposed blockchain-based occupant-centered data collection framework. The results showed that the proposed framework could collect data safely and hassle-free in the daily life of occupants. In addition, the performance of the blockchain server was evaluated in terms of latency and throughput when ten people in a single office participated in the proposed data collection framework. Future works will further apply the proposed data collection framework to the building management system to automatically collect occupant data and be used in the HVAC system to reduce building energy consumption without security issues.

  • PDF

The Evaluation for Web Mining and Analytics Service from the View of Personal Information Protection and Privacy (개인정보보호 관점에서의 웹 트래픽 수집 및 분석 서비스에 대한 타당성 연구)

  • Kang, Daniel;Shim, Mi-Na;Bang, Je-Wan;Lee, Sang-Jin;Lim, Jong-In
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.19 no.6
    • /
    • pp.121-134
    • /
    • 2009
  • Consumer-centric marketing business is surely one of the most successful emerging business but it poses a threat to personal privacy. Between the service provider and the user there are many contrary issues to each other. The enterprise asserts that to abuse the privacy data which is anonymous there is not a problem. The individual only will not be able to willingly submit the problem which is latent. Web traffic analysis technology itself doesn't create issues, but this technology when used on data of personal nature might cause concerns. The most criticized ethical issue involving web traffic analysis is the invasion of privacy. So we need to inspect how many and what kind of personal informations being used and if there is any illegal treatment of personal information. In this paper, we inspect the operation of consumer-centric marketing tools such as web log analysis solutions and data gathering services with web browser toolbar. Also we inspect Microsoft explorer-based toolbar application which records and analyzes personal web browsing pattern through reverse engineering technology. Finally, this identified and explored security and privacy requirement issues to develop more reliable solutions. This study is very important for the balanced development with personal privacy protection and web traffic analysis industry.

Risk Analysis for Protecting Personal Information in IoT Environments (사물인터넷(IoT) 환경에서의 개인정보 위험 분석 프레임워크)

  • Lee, Ae Ri;Kim, Beomsoo;Jang, Jaeyoung
    • Journal of Information Technology Services
    • /
    • v.15 no.4
    • /
    • pp.41-62
    • /
    • 2016
  • In Internet of Things (IoT) era, more diverse types of information are collected and the environment of information usage, distribution, and processing is changing. Recently, there have been a growing number of cases involving breach and infringement of personal information in IoT services, for examples, including data breach incidents of Web cam service or drone and hacking cases of smart connected car or individual monitoring service. With the evolution of IoT, concerns on personal information protection has become a crucial issue and thus the risk analysis and management method of personal information should be systematically prepared. This study shows risk factors in IoT regarding possible breach of personal information and infringement of privacy. We propose "a risk analysis framework of protecting personal information in IoT environments" consisting of asset (personal information-type and sensitivity) subject to risk, threats of infringement (device, network, and server points), and social impact caused from the privacy incident. To verify this proposed framework, we conducted risk analysis of IoT services (smart communication device, connected car, smart healthcare, smart home, and smart infra) using this framework. Based on the analysis results, we identified the level of risk to personal information in IoT services and suggested measures to protect personal information and appropriately use it.

A Study on Reinforcing Non-Identifying Personal Sensitive Information Management on IoT Environment (IoT 환경의 비식별 개인 민감정보관리 강화에 대한 연구)

  • Yang, Yoon-Min;Park, Soon-Tai;Kim, Yong-Min
    • The Journal of the Korea Contents Association
    • /
    • v.20 no.8
    • /
    • pp.34-41
    • /
    • 2020
  • An era of stabilizing IoT markets and rapid expansion is coming. In an IoT environment, communication environments where objects take the lead in communication can occur depending on the situation, and communication with unspecified IoT environments has increased the need for thorough management of personal sensitive information. Although there are benefits that can be gained by changing environment due to IoT, there are problems where personal sensitive information is transmitted in the name of big data without even knowing it. For the safe management of personal sensitive information transmitted through sensors in IoT environment, the government plans to propose measures to enhance information protection in IoT environment as the use of non-identifiable personal information in IoT environment is expected to be activated in earnest through the amendment of the Data 3 Act and the initial collection method.

Online Privacy Protection: An Analysis of Social Media Reactions to Data Breaches (온라인 정보 보호: 소셜 미디어 내 정보 유출 반응 분석)

  • Seungwoo Seo;Youngjoon Go;Hong Joo Lee
    • Knowledge Management Research
    • /
    • v.25 no.1
    • /
    • pp.1-19
    • /
    • 2024
  • This study analyzed the changes in social media reactions of data subjects to major personal data breach incidents in South Korea from January 2014 to October 2022. We collected a total of 1,317 posts written on Naver Blogs within a week immediately following each incident. Applying the LDA topic modeling technique to these posts, five main topics were identified: personal data breaches, hacking, information technology, etc. Analyzing the temporal changes in topic distribution, we found that immediately after a data breach incident, the proportion of topics directly mentioning the incident was the highest. However, as time passed, the proportion of mentions related indirectly to the personal data breach increased. This suggests that the attention of data subjects shifts from the specific incident to related topics over time, and interest in personal data protection also decreases. The findings of this study imply a future need for research on the changes in privacy awareness of data subjects following personal data breach incidents.

Empirical Validation of Personal Information Violation Risks with Use Intention : Focusing on Domestic Smart Banking Services (개인정보 침해위험이 이용의도에 미치는 영향에 대한 연구 - 국내은행의 스마트뱅킹 서비스 중심으로)

  • Kim, Jeongwook;Jeon, Youngchan
    • Journal of Korean Society for Quality Management
    • /
    • v.45 no.3
    • /
    • pp.583-594
    • /
    • 2017
  • Purpose: The purpose of this study is how personal information protection risks affect the intention to use domestic smart banking services. VAM(Value based Adoption Model) model is validated as a theoretical background, selecting ease of use, usefulness and perceived security as a benefit factor, and considers perceived cost, technical complexity, and risk of personal information leakage as a sacrifice factor. Methods: The method of this study used questionnaire survey to collect 365 data on suer's perception on smart banking services, and also performed a structural equation modeling method using by AMOS 23. Results: The result of this paper shows that all hypothesis are accepted statistically significant except 1 hypothesis. Conclusion: This research is concluded that perceived value is affected on statistically positive impact on ease of use, usefulness and perceived security, and negative impact on perceived cost and risk of personal information violation, not statistically technical complexity.