• Title/Summary/Keyword: Personal Information Search

Search Result 247, Processing Time 0.031 seconds

Impact of SNS Flow on Sociality (SNS몰입이 사회성에 미치는 영향)

  • Lee, Seoung-Ho;Kwahk, Kee-Young
    • Knowledge Management Research
    • /
    • v.19 no.2
    • /
    • pp.21-45
    • /
    • 2018
  • With the widespread use of smartphones and the development of information technology, an online service called SNS(social network service) has emerged, and as an increasing number of people began to use SNS, extensive research has been conducted on SNS. SNS is an important factor for adolescents who are developing social skills that help them to adapt to the society, and for adults who are stepping into the society. The present study investigates the effects of information search, self-disclosure, interaction, and playfulness, all of which are motivational factors for SNS use, on flow in SNS, and empirically analyzes the degree of these variables influence according to flow in SNS and individual's personal nature(extrovert, introvert). The analysis results showed that information search, self-disclosure, interaction, and playfulness were positively correlated with flow in SNS, and flow in SNS was positively correlated with social skills. The degree of influence varied depending on the individual's personal nature(extrovert, introvert). These findings may provide important insights for researchers studying SNS, SNS managers, and company officials using SNS.

A basic study on human error proneness in computerized work environment (전산화된 작업환경에서 인간의 오류성향에 관한 기초연구)

  • Jeong, Gwang-Tae;Lee, Yong-Hui
    • Journal of the Ergonomics Society of Korea
    • /
    • v.19 no.1
    • /
    • pp.1-9
    • /
    • 2000
  • This study was performed to investigate some characteristics on human error proneness in the computerized work environment. Our concerning theme was on human error likelihood according to personal temperament. Two experiments were performed. The first experiment was to study the effect of field- independence/dependence on error likelihood. The second experiment was on error proneness. These experiments were performed in information search task. which was most frequent task in computerized work environment such as the control room of nuclear power plant. Ten subjects were participated in this study. Analyzed results are as follows. Field-independence/dependence had a significant effect in both information search time and error frequency. Error proneness had a significant effect in both factors, too. And, a positive correlation was found between error frequency and information search time. These results will be utilized as a basis to study operator's error proneness in the computerized control room of nuclear power plant. later on.

  • PDF

A Study on Fashion Leadership of Clothing and Make-up, Information Sources, and Ongoing Information Search (의복 및 화장유행선도력, 정보원과 지속적 정보탐색에 관한 연구)

  • Lee, Juyoung
    • Journal of Fashion Business
    • /
    • v.17 no.1
    • /
    • pp.157-169
    • /
    • 2013
  • The purpose of this study was to analyze clothing fashion leadership and make-up fashion leadership of women's university students and investigate the relationships of information sources and ongoing information search. To achieve the purposes, a questionnaire was conducted to 400 female students from September 21 to October 30, 2011. The final data was analyzed with spss 17.0 program. The results were follows. First, It was found that information sources were classified 3 factors of marketer source, personal source, and mass media source. Second, there were significant differences of clothing fashion leadership and make-up fashion leadership by major and clothes and cosmetics purchasing expenses. Third, there were significant differences of clothing information sources and ongoing information search by major and clothes and cosmetics purchasing expenses. Forth, there were significant differences of make-up information sources and ongoing information search by major and clothes and cosmetics purchasing expenses. Fifth, there were significant relations of clothing/make-up fashion leadership, information sources, and ongoing information search. Thus, it was found that clothing fashion leadership and make-up fashion leadership are related to information sources and ongoing information search.

The Effects of Subjective Knowledge on Information Search as Related to a Consumer's Life Cycle (의류제품 소비자의 생활주기에 따른 주관적 지식이 정보탐색에 미치는 영향)

  • Hwang, Jeong-In;Park, Jae-Ok
    • Journal of the Korean Home Economics Association
    • /
    • v.48 no.9
    • /
    • pp.41-54
    • /
    • 2010
  • This study attempted to determine how the subjective knowledge related to a consumer's life cycle influences their information search in the decision making process. The data was collected using a total of 349 questionnaires for the final analysis of this study. SPSS 12.0 for windows was used for the data analysis and the detailed analyses included descriptive analysis, factor analysis, reliability tests, one way ANOVA, multiple regression analysis and t-tests. The results of this study showed that there are differences in the subdivisions of subjective knowledge of apparel according to the consumer's life cycle and there is a difference in the types of information searches according to the consumer's subjective knowledge, and the subdivisions of subjective knowledge of the consumers influence their information search. This study showed that although it affected the internal search, the media search, and the store search, it did not influence the personal search in the decision making process.

A Legislative Proposal to Prevent the Infringement of Privacy and to Solve Operational Problems by Drones (드론에 의한 프라이버시 침해 방지 및 운용 상 문제 해결을 위한 입법 제안)

  • Kim, Yongho;Rhee, Kyung-Hyune
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.27 no.5
    • /
    • pp.1141-1147
    • /
    • 2017
  • An unmanned aerial vehicle(UAV), commonly known as a drone, is an aircraft without a human pilot aboard, which is operated by wireless device. A drone provides the capability for the aerial search and traffic control as a police equipment. It has benefits for the missions for the aerial photography with the high resolution camera which can replace eye-dependent search processes. Moreover it has advantage of retrieving several times for the recorded videos. However, if the law enforcement agency misuse and overuse a drone for investigations and search missions without certain regulations and principles, it breaches privacy and personal information infringement. In this paper, we issue a lawful challenges on drone operations and discuss solutions to those challenges.

Web Document Analysis based Personal Information Hazard Classification System (웹 문서 분석 기반 개인정보 위험도 분류 시스템)

  • Lee, Hyoungseon;Lim, Jaedon;Jung, Hoekyung
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.22 no.1
    • /
    • pp.69-74
    • /
    • 2018
  • Recently, personal information leakage has caused phishing and spam. Previously developed systems focus on preventing personal information leakage. Therefore, there is a problem that the leakage of personal information can not be discriminated if there is already leaked personal information. In this paper, we propose a personal information hazard classification system based on web document analysis that calculates the hazard. The system collects web documents from the Twitter server and checks whether there are any user-entered search terms in the web documents. And we calculate the hazard classification weighting of the personal information leaked in the web documents and confirm the authority of the Twitter account that distributed the personal information. Based on this, the hazard can be derived and the user can be informed of the leakage of personal information of the web document.

Tag Search System Using the Keyword Extraction and Similarity Evaluation (키워드 추출 및 유사도 평가를 통한 태그 검색 시스템)

  • Jung, Jaein;Yoo, Myungsik
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.40 no.12
    • /
    • pp.2485-2487
    • /
    • 2015
  • Recently, Hashtag is widely used in SNS like Facebook, Twitter and personal blogs. However, the efficiency of tag search system is poor due to the indiscriminate use of hashtags. To enhance the accuracy of tag search system, we proposed a tag search system using the keyword extraction and similarity evaluation. The experimental results show that the proposed system provides the higher accuracy on tag search results.

Improvement Method of ELIS Local Laws and Regulations Format for Personal Information Protection (개인정보보호를 위한 ELIS의 자치법규서식 개선방안)

  • Choi, Chul-Jae;Lee, Young-Sik;Lee, Tae-Hee
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.11 no.11
    • /
    • pp.1017-1024
    • /
    • 2016
  • In this paper, we have figured out status and demand about personal information in local laws and regulations of the four major city out of the municipality 18 institutions of Gangwon Province. To take advantage of the autonomous regulations Information System(ELIS), and research and analysis in the autonomy regulations of local governments to object to the attachment format. To object to the Attachment to the request of the resident registration number notation is a super key. There is a disclosure resistance sense of personal information, and research analysis of the smart phone number and home phone number. We have proposed the urgent development of automatic search engine of PIMS compliance with personal information.

A Study on De-Identification of Metering Data for Smart Grid Personal Security in Cloud Environment

  • Lee, Donghyeok;Park, Namje
    • Journal of Multimedia Information System
    • /
    • v.4 no.4
    • /
    • pp.263-270
    • /
    • 2017
  • Various security threats exist in the smart grid environment due to the fact that information and communication technology are grafted onto an existing power grid. In particular, smart metering data exposes a variety of information such as users' life patterns and devices in use, and thereby serious infringement on personal information may occur. Therefore, we are in a situation where a de-identification algorithm suitable for metering data is required. Hence, this paper proposes a new de-identification method for metering data. The proposed method processes time information and numerical information as de-identification data, respectively, so that pattern information cannot be analyzed by the data. In addition, such a method has an advantage that a query such as a direct range search and aggregation processing in a database can be performed even in a de-identified state for statistical processing and availability.

Personalized and Social Search by Finding User Similarity based on Social Networks (소셜 네트워크 기반 사용자 유사성 발견을 통한 개인화 및 소셜 검색)

  • Park, Gun-Woo;Oh, Jung-Woon;Lee, Sang-Hoon
    • The KIPS Transactions:PartD
    • /
    • v.16D no.5
    • /
    • pp.683-690
    • /
    • 2009
  • Social Networks which is composed of network with an individual in the center in a web support mutual-understanding of information by searching user profile and forming new link. Therefore, if we apply the Social Network which consists of web users who have similar immanent information to web search, we can improve efficiency of web search and satisfaction of web user about search results. In this paper, first, we make a Social Network using web users linked directly or indirectly. Next, we calculate Similarity among web users using their immanent information according to topics, and then reconstruct Social Network based on varying Similarity according to topics. Last, we compare Similarity with Search Pattern. As a result of this test, we can confirm a result that among users who have high relationship index, that is, who have strong link strength according to personal attributes have similar search pattern. If such fact is applied to search algorithm, it can be possible to improve search efficiency and reliability in personalized and social search.