• Title/Summary/Keyword: Personal Information Exposure

Search Result 195, Processing Time 0.02 seconds

Exposure assessment of musculoskeletal disorder risk factors in non routinized work: An application of PATH-KOSHA observational tool to hospital workers (비정형작업 근골격계질환 위험요인의 노출평가: 일부 병원근로자에 대한 PATH-KOSHA 관찰도구 적용사례)

  • Park, Jung-Keun;Han, Young-Sun
    • Journal of Korean Society of Occupational and Environmental Hygiene
    • /
    • v.19 no.4
    • /
    • pp.412-422
    • /
    • 2009
  • This study was conducted to assess exposure to musculoskeletal disorder(MSD) risk factors in hospital personnel who performed non-routinized work tasks. A tool ("PATH-KOSHA" version) was newly revised from PATH(Posture, Activity, Tools and Handling) method and uploaded into a personal digital assistant(PDA). The version was used, on a basis of direct-observation, to collect PATH data at the 2 hospital settings in different regions. Job analysis was performed to get various information (e.g., work and rest time, task type) as well. The data collected were visually checked for data cleaning and stored for future data analysis. A total of 1,992 PATH observations were made for 37 hospital workers. Exposure levels varied across 18 items of the MSD risk factors. The highest percent time spent on non-neutral postures was 53% for wrist deviation, followed by 47%(pinch grip), 35%(trunk posture), 23%(neck posture), and 20%(shoulder/arm posture). The highest percent time spent among hand activity level(HAL) variables was 55% for HAL-cat2 (HAL: 3.3 - <6.7). The percent time of items with respect to both loads with more than 5kg and contact stress was less than 4%. Vibration was not exposed in the study workers. Different aspects were discussed for findings. The study results showed that wrist deviation was highest in percent time spent on awkward posture while HAL-cat2 was highest in hand repetition. The study suggests that distal upper extremity posture and HAL should be primarily addressed and controlled in non-routinized work including the hospital settings.

A Study on the Print Quality of Computer to Plate offset Lithography (CTP 평판오프셋 인쇄의 품질에 관한 연구)

  • Kim, Sung-Su;Shin, Chun-Beom;Kang, Sang-Hoon
    • Journal of the Korean Graphic Arts Communication Society
    • /
    • v.22 no.1
    • /
    • pp.1-8
    • /
    • 2004
  • The key points of the CTP board is as follows: Film, brightness, plate exposure is eliminated, the reduction of personal expenses, and the reduction of time consumption. But above all, the accurate reappearance of the highlighting and shadow portion as well as self modification of the dust edge portion stands out as the most impressive improvements. In this paper, using a digital test from 4.0 and a Thermal CTP color printing control, the two parts of the Thermal CTP utilized a 1%-99% dot reappearance. Also, using an opposite line target, the results of the CTP plates and printing were compared. Finally, research was made on the printing quality on the slur development of the plate and the result when there was a lack of weave connection.

  • PDF

A Study on New Alternatives for Overflowing Internet Information and Blocking Harmful Information (인터넷 정보과잉과 유해정보 차단을 위한 새로운 대안 연구)

  • Kim, Sang-Geun
    • Journal of Convergence for Information Technology
    • /
    • v.9 no.10
    • /
    • pp.81-86
    • /
    • 2019
  • Problems related to information overload and harmful information have already expanded to national social problems as well as personal problems. This study explores the causes of Internet addiction, exposure to harmful information, malicious comments, fake information/information manipulation, and new alternatives that have recently been felt as social problems. Assuming that existing technologies/policies were not applied effectively, psychological cause analysis was performed for the fundamental problem approach. As a result, internal problems such as obsession with knowledge/understanding of wrong information/black and white stereotypes and prejudice were analyzed as main causes. Each proposed solution aims to help improve national technology/policy regarding internet addiction and blocking harmful information.

The Effect of Risk Issue Exposure and Social Capital on Risk Perception in Social Media (소셜 미디어 환경에서 위험이슈 노출과 사회자본이 위험인식에 미치는 영향)

  • Kwak, Eun-A;Choi, Jin-Ho;Han, Dong-Sub
    • Korean journal of communication and information
    • /
    • v.78
    • /
    • pp.7-34
    • /
    • 2016
  • The purpose of this study is to examine the factors that influence the risk perception of reality on social media. Specifically, we analyzed how exposure to risk issues through media and bridging/bonding social capital influence social and personal risk perception. Here, we categorized risk issues into infectious diseases, sex crimes, and radioactive contamination. Findings are as follows. The effect that the type of media and social capital have on risk perception vary depending on the risk issues. Regarding issues of disease and radiation, bridging social capital had a positive effect on social risk perception whereas bonding social capital had a negative effect on personal risk perception. In the case of sex crimes, bonding social capital affected both social and personal risk perception negatively, and an interaction effect between exposures and social capital could be found. The significance of this study is that it considers both media variables from previous studies and social capital variables essential to social media studies and combines the two in order to study the factors that influence risk perception.

  • PDF

On the Double-Sidedness of Facebook Users: The Desire to Hide vs. Peeping Voyeurism (Facebook 사용자들의 양면성에 대하여 - 감추고 싶은 욕구와 타인을 훔쳐보는 관음증적 욕구)

  • Lee, Eunji;Li, Hyung-Chul O.;Kim, ShinWoo
    • Journal of the HCI Society of Korea
    • /
    • v.9 no.1
    • /
    • pp.1-9
    • /
    • 2014
  • Use of smart phones and other means allowed ready access to social networking service (SNS) and its users have explosively increased. In the meantime, Facebook which has the largest user community has caused various social problems due to its conservative privacy policy; yet its users are continuously increasing and committed to the service although its privacy policy has not so much changed. In this research, we studied the irony of increasing popularity of Facebook despite its negative privacy policy in the light of its users' double-sided desire. That is, users use Facebook because they are curious about other users' personal information and activities although they are at the same time anxious about public exposure of their own personal information and activities. To test this conjecture, we investigated users' double-sided desire (privacy protection, viewing others' activities) using questionnaire and reverse scenario test and confirmed that proper balance of privacy protection and activity exposure is an important contributor to continued popularity of Facebook. Much research studied SNS focusing on self-presentation that is on the side of self-exposure. This research highlights the importance of balance keeping between hide-and-seek for SNS companies such as Facebook in the use of privacy policy.

Reliability of Self-Reported Information by Farmers on Pesticide Use (일부 농업인에서 자기 기입식 농약 노출 설문에 대한 신뢰도 연구)

  • Lee, Yo-Han;Cha, Eun-Shil;Moon, Eun-Kyeong;Kong, Kyoung-Ae;Koh, Sang-Baek;Lee, Yun-Keun;Lee, Won-Jin
    • Journal of Preventive Medicine and Public Health
    • /
    • v.43 no.6
    • /
    • pp.535-542
    • /
    • 2010
  • Objectives: Exposure assessment is a major challenge faced by studies that evaluate the association between pesticide exposure and adverse health outcomes. The objective of this study was to investigate the reliability of information that farmers self-report regarding their pesticide use. Methods: Twenty five items based upon existing questionnaires were designed to focus on pesticide exposure. In 2009, a selfadministrated survey was conducted on two occasions four weeks apart among 205 farmers residing in Gyeonggi and Gangwon provinces. For a reliability measure, we calculated the percentage agreement, the kappa statistics and the intraclass correlation coefficient (ICC) between the two reports according to the characteristics of the subjects. Results: Agreement for ever-never use of any pesticide was 96.4% (kappa 0.61). For both 'years used' and 'age at the first use' of overall pesticides, high agreement was obtained (ICC: 0.88 and, 0.78, respectively), whereas those of 'days used' and 'hours used' were relatively low (ICC: 0.42 and, 0.66, respectively). The kappa value for the use of personal protective equipment ranged from 0.46 to 0.59, and hygiene activities came out at 0.19 to 0.37. The agreement for individual pesticide use ranged widely and there was relatively low agreement due to the low response rates. The reliability scores did not significantly vary according to gender, age, the education level, the types of crop or the years of farming. Conclusions: Our results support that carefully designed, self-reported information on ever-never pesticide use among farmers is reliable. However, the reliability of data on individual pesticide exposure may be unstable due to low response rates and needs to be refined.

The Priority of Internal Control Factors for Information Systems based on Individual Characteristics (개인 특성에 따른 정보시스템 내부통제요소 중요도에 관한 연구)

  • 박종은;이우형;이명호
    • Korean Management Science Review
    • /
    • v.21 no.1
    • /
    • pp.57-76
    • /
    • 2004
  • The development of informational technology has lead to a sharp change in not only the existing way of operations and management, but the way of human life or thinking as well. Those shifts of the paradigm in information technology have also affected Individuals to the organizational structure. A series of unexpected problems was, however, accompanied by the advance in informational technology, which had broaden its own area of application. Those problems include the losses of property or data the malfunction of systems and their wastefulness would result in, continuous increases in computer crimes, reliability and efficiency of the functional process with the development of information systems, such as the processing problems of inaccurate data, economical issues, and subjects related to safety, as interruptions of privacy, which would result from lots of one's exposure to the drains of personal information. Accordingly, Auditors' roles of information systems, for now, is more important than anything else in that they are responsible for the objective assessment of relevance and effectiveness of internal control systems under the environment of information systems. The objective of the study is, so as to obtain safety of information systems: First, to provide data to line-design internal control systems after finding internal control factors to prevent and eliminate the risks of information systems. Second, to evaluate the priorities of internal control factors with their effective management being considered as the key to settle the problems of risks of information systems. Third, to discriminate what factors affect In evaluating the relative degrees of Importance of internal control factors.

Research on the Design of Drone System for Field Support Using AR Smart Glasses Technology (AR스마트안경 기술을 접목한 현장 지원용 드론(Drone)시스템 설계에 대한 연구)

  • Lee, Kyung-Hwan;Jeong, Jin-Kuk;Ryu, Gab-Sang
    • Journal of the Korea Convergence Society
    • /
    • v.11 no.4
    • /
    • pp.27-32
    • /
    • 2020
  • High-resolution images taken by drones are being used for a variety of information, including monitoring. The management of agricultural facilities still uses mostly human survey methods. Surveying agricultural facilities, surveying the appearance of agricultural facilities, and the sleeping environment have legal and environmental constraints that are inaccessible to humans. In addition, in an area where information such as 3D maps and satellite maps are outdated or not provided, human investigation is inevitable, and a lot of time and money are invested. The purpose of this research is to design and develop drone system for field support incorporating AR smart glasses technology for the maintenance and management of agricultural facilities to improve the difficulties of using existing drones. In addition, We will also suggest ways to secure the safety of personal information in order to solve the damages caused by the exposure of personal information that may occur through video shooting.

A Countermeasure to the Stealth Sniff of the Private Media Information (개인 영상 및 음성 정보의 임의수집에 대한 대응방안)

  • Lee, Kyung-Roul;Yim, Kang-Bin
    • Journal of Advanced Navigation Technology
    • /
    • v.15 no.3
    • /
    • pp.378-385
    • /
    • 2011
  • This paper introduces technical aspects of the privacy exposure problem of the video and the audio information on the personal computer and proposes a countermeasure to them. According to the increased number of peripherals for computers, especially including the cameras and the mikes, it is required to be careful on the privacy exposure. Currently, some incorporated or standalone cameras have a pilot lamp to indicate their usage. However, many other cameras and all mikes have not equipped with the pilot lamp or other dedicated indicator. Even though this problem doesn't obstruct their assigned functionalities, it should make the devices susceptible to be exposed with the information they are gathering without any notice to the owners. As a countermeasure to the problem, this paper proposes a reasonable solution that alarms the access trials to the devices and implements programs for the practical sniffing and its counterpart.

Two-factor Authentication technology based on Key-Stroke (Key-Stroke 기반 Two-Factor 인증 기술)

  • An, Jun-Yeon;Ko, Gwang-Feel;Lee, Tae-jin
    • Convergence Security Journal
    • /
    • v.20 no.3
    • /
    • pp.29-37
    • /
    • 2020
  • Password based authentication technology is yet certain and id to provide a level of security being used in most systems, but already a myriad of personal information exposure to the accident. Above all, and once exposed, it is difficult to recover the password. Thus, the various authentication techniques - factor two was introduced, but they are expensive and discomfort to users, to lead. In this paper, the existing unique to users in such a single accreditation process / password id key - stroke, user authentication and cost effectively and at the same time. And not cause discomfort, suggested technologies that can also ensure high security exposure, password id. This paper's proposals and determine the effectiveness of the system to build model.