• Title/Summary/Keyword: Personal Information Sharing

Search Result 250, Processing Time 0.029 seconds

Construction of Complemented Hybrid Group Cellular Automata with Maximum Equal Lengths (최대 동일 길이를 갖는 여원 HGCA구성)

  • Cho S.J.;Choi U.S.;Hwang Y.H.;Kim J.G.;Pyo Y.S.;Kim H.D.
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.10 no.9
    • /
    • pp.1565-1572
    • /
    • 2006
  • Recently with the ever increasing growth of data communication, the need for security and privacy has become a necessity. The advent of wireless communication and other handheld devices like Personal Digital Assistants and smart cards have made the implementation of cryptosystems a major issue. The Cellular Automata(CA) can be programmed to implement hardware sharing between the encryption and decryption. In this paper, we give conditions for a linear hybrid cellular automata with 60, 102 or 204 to be a linear hybrid group cellular automata C. And we present the conditions which the complemented hybrid group cellular automata C' with complement vectors derived from C has maximum equal lengths in the state transition diagram of C' Also we analyze the relationship among cycles of C' These results generalize Mukhopadhyay's results.

Characterization of Uniform/Hybrid Complemented Group Cellular Automata with Rules 195/153/51 (전이규칙 195,153,51을 갖는 Uniform/Hybrid 여원 그룹 셀룰라 오토마타의 특성화)

  • Hwang, Yoon-Hee;Cho, Sung-Jin;Choi, Un-Sook;Kim, Seok-Tae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • v.9 no.1
    • /
    • pp.315-318
    • /
    • 2005
  • Recently, the advent of wireless communication and other handhold devices like Personal Digital Assistants and smart cards have made in implementation of cryptosystems a major issue. One important aspect of modern day ciphers is the scope for hardware sharing between the encryption and decryption algorithm. The cellular Automata which have been proposed as an alternative to linear feedback shift registers(LFSRs) can be programmed to perform the operations without using any dedicated hardware. But to generalize and analyze CA is not easy. In this paper, we characterizes uniform/hybird complemented group CA with rules 195/153/51 that divide the entire state space into smaller spaces of maximal equal lengths. This properties can be useful in constructing key agreement algorithm.

  • PDF

An Exploratory Study on Purchase Decision Making Process and Clothing Shopping Orientation of Fashion Products Rental Service Users (패션제품 대여 서비스 이용자의 구매의사결정과정과 의복 쇼핑성향에 관한 탐색적 연구)

  • Lee, Ji-Yoon;Shin, Eun-Jung;Koh, Ae-Ran
    • Human Ecology Research
    • /
    • v.56 no.6
    • /
    • pp.555-571
    • /
    • 2018
  • This study identified the characteristics of fashion rental service users as well as analyzed their purchase decision-making processes. A qualitative investigation was conducted through in-depth interviews with 13 women in their 20s-30s who have experienced renting fashion items due to a high interest in fashion. The results of the study are summarized as follows. The need recognition stage analyzed ventilation by mass media, SNS impact, curiosity, saving shopping time and money, awareness of situational necessity, and creation of various styles. The information search stage analyzed how users obtained information from 2 different sources of nonmarketer-dominated sources and marketer-dominated sources. The pre-purchase stage analyzed the evaluation of alternatives in which study participants used 2 evaluation criteria for fashion rental services and fashion rental items. The purchase stage analyzed how participants wait and select desired items (when receiving the notification of rentable items) or select alternative products. The consumption stage examined the usage frequency and usage method. The study divided the post-consumption evaluation stage into 2 categories for evaluation: personal feelings and service. The post-consumption behavior stage analyzed how participants displayed WOM, eWOM and purchase rental product behavior. Clothing shopping orientation of study participants is displayed in 5 dimensions of brand-seeking propensity, individuality-seeking propensity, economic efficiency-seeking propensity, rationality-seeking propensity, and pleasure-seeking propensity. This study identified three main characteristics in the study participants: interest in the fashion, favorable attitude toward used fashion items, consciousness of others.

Factors Related to Emotional Leadership in Nurses Manager: Systematic Review and Meta-Analysis (간호관리자의 감성리더십 관련 변인: 체계적 문헌 고찰 및 메타분석)

  • Jang, Se Young;Park, Chan Mi;Yang, Eun Hee
    • Journal of Korean Academy of Nursing
    • /
    • v.54 no.2
    • /
    • pp.119-138
    • /
    • 2024
  • Purpose: This study aimed to identify research trends related to emotional leadership among nurse managers by conducting a systematic literature review and meta-analysis. This study sought to derive insights that could contribute to improving emotional leadership in nursing practice. Methods: A systematic review and meta-analysis were conducted according to the Preferred Reporting Items for Systematic Reviews and Meta-Analysis (PRISMA) and Meta-Analysis Of Observational Studies in Epidemiology (MOOSE) guidelines. Databases including PubMed, Cumulative Index to Nursing and Allied Health Literature, Scopus, Web of Science, Research Information Sharing Service, Koreanstudies Information Service System, Korean Medical Database, KoreaMed, ScienceON, and DBpia were searched to obtain papers published in English and Korean. Literature searches and screenings were conducted for the period December 1, 2023 to December 17, 2023. The effect size correlation (ESr) was calculated for each variable and the meta-analysis was performed using the statistical software SPSS 29.0, R 4.3.1. Results: Twenty-five (four personal, six job, and fifteen organizational) relevant variables were identified through the systematic review. The results of the meta-analysis showed that the total overall effect size was ESr = .33. Job satisfaction (ESr = .40) and leader-member exchange (ESr = .75) had the largest effect size among the job and organizational-related factors. Conclusion: Emotional leadership helps promote positive changes within organizations, improves organizational effectiveness, and increases member engagement and satisfaction. Therefore, it is considered an important strategic factor in improving organizational performance.

Mediating Roles of Attachment for Information Sharing in Social Media: Social Capital Theory Perspective (소셜 미디어에서 정보공유를 위한 애착의 매개역할: 사회적 자본이론 관점)

  • Chung, Namho;Han, Hee Jeong;Koo, Chulmo
    • Asia pacific journal of information systems
    • /
    • v.22 no.4
    • /
    • pp.101-123
    • /
    • 2012
  • Currently, Social Media, it has widely a renown keyword and its related social trends and businesses have been fastly applied into various contexts. Social media has become an important research area for scholars interested in online technologies and cyber space and their social impacts. Social media is not only including web-based services but also mobile-based application services that allow people to share various style information and knowledge through online connection. Social media users have tendency to common identity- and bond-attachment through interactions such as 'thumbs up', 'reply note', 'forwarding', which may have driven from various factors and may result in delivering information, sharing knowledge, and specific experiences et al. Even further, almost of all social media sites provide and connect unknown strangers depending on shared interests, political views, or enjoyable activities, and other stuffs incorporating the creation of contents, which provides benefits to users. As fast developing digital devices including smartphone, tablet PC, internet based blogging, and photo and video clips, scholars desperately have began to study regarding diverse issues connecting human beings' motivations and the behavioral results which may be articulated by the format of antecedents as well as consequences related to contents that people create via social media. Social media such as Facebook, Twitter, or Cyworld users are more and more getting close each other and build up their relationships by a different style. In this sense, people use social media as tools for maintain pre-existing network, creating new people socially, and at the same time, explicitly find some business opportunities using personal and unlimited public networks. In terms of theory in explaining this phenomenon, social capital is a concept that describes the benefits one receives from one's relationship with others. Thereby, social media use is closely related to the form and connected of people, which is a bridge that can be able to achieve informational benefits of a heterogeneous network of people and common identity- and bonding-attachment which emphasizes emotional benefits from community members or friend group. Social capital would be resources accumulated through the relationships among people, which can be considered as an investment in social relations with expected returns and may achieve benefits from the greater access to and use of resources embedded in social networks. Social media using for their social capital has vastly been adopted in a cyber world, however, there has been little explaining the phenomenon theoretically how people may take advantages or opportunities through interaction among people, why people may interactively give willingness to help or their answers. The individual consciously express themselves in an online space, so called, common identity- or bonding-attachments. Common-identity attachment is the focus of the weak ties, which are loose connections between individuals who may provide useful information or new perspectives for one another but typically not emotional support, whereas common-bonding attachment is explained that between individuals in tightly-knit, emotionally close relationship such as family and close friends. The common identify- and bonding-attachment are mainly studying on-offline setting, which individual convey an impression to others that are expressed to own interest to others. Thus, individuals expect to meet other people and are trying to behave self-presentation engaging in opposite partners accordingly. As developing social media, individuals are motivated to disclose self-disclosures of open and honest using diverse cues such as verbal and nonverbal and pictorial and video files to their friends as well as passing strangers. Social media context, common identity- and bond-attachment for self-presentation seems different compared with face-to-face context. In the realm of social media, social users look for self-impression by posting text messages, pictures, video files. Under the digital environments, people interact to work, shop, learn, entertain, and be played. Social media provides increasingly the kinds of intention and behavior in online. Typically, identity and bond social capital through self-presentation is the intentional and tangible component of identity. At social media, people try to engage in others via a desired impression, which can maintain through performing coherent and complementary communications including displaying signs, symbols, brands made of digital stuffs(information, interest, pictures, etc,). In marketing area, consumers traditionally show common-identity as they select clothes, hairstyles, automobiles, logos, and so on, to impress others in any given context in a shopping mall or opera. To examine these social capital and attachment, we combined a social capital theory with an attachment theory into our research model. Our research model focuses on the common identity- and bond-attachment how they are formulated through social capitals: cognitive capital, structural capital, relational capital, and individual characteristics. Thus, we examined that individual online kindness, self-rated expertise, and social relation influence to build common identity- and bond-attachment, and the attachment effects make an impact on both the willingness to help, however, common bond seems not to show directly impact on information sharing. As a result, we discover that the social capital and attachment theories are mainly applicable to the context of social media and usage in the individual networks. We collected sample data of 256 who are using social media such as Facebook, Twitter, and Cyworld and analyzed the suggested hypotheses through the Structural Equation Model by AMOS. This study analyzes the direct and indirect relationship between the social network service usage and outcomes. Antecedents of kindness, confidence of knowledge, social relations are significantly affected to the mediators common identity-and bond attachments, however, interestingly, network externality does not impact, which we assumed that a size of network was a negative because group members would not significantly contribute if the members do not intend to actively interact with each other. The mediating variables had a positive effect on toward willingness to help. Further, common identity attachment has stronger significant on shared information.

  • PDF

A Case Study on the Introduction and Use of Artificial Intelligence in the Financial Sector (금융권 인공지능 도입 및 활용 사례 연구)

  • Byung-Jun Kim;Sou-Bin Yun;Mi-Ok Kim;Sam-Hyun Chun
    • Industry Promotion Research
    • /
    • v.8 no.2
    • /
    • pp.21-27
    • /
    • 2023
  • This study studies the policies and use cases of the government and the financial sector for artificial intelligence, and the future policy tasks of the financial sector. want to derive According to Gartner, noteworthy technologies leading the financial industry in 2022 include 'generative AI', 'autonomous system', 'Privacy Enhanced Computation (PEC) was selected. The financial sector is developing new technologies such as artificial intelligence, big data, and blockchain. Developments are spurring innovation in the financial sector. Data loss due to the spread of telecommuting after the corona pandemic As interests in sharing and personal information protection increase, companies are expected to change in new digital technologies. Global financial companies also utilize new digital technology to develop products or manage and operate existing businesses. I n order to promote process innovation, I T expenses are being expanded. The financial sector utilizes new digital technology to prevent money laundering, improve work efficiency, and strengthen personal information protection. are applying In the era of Big Blur, where the boundaries between industries are disappearing, the competitive edge in the challenge of new entrants In order to preoccupy the market, financial institutions must actively utilize new technologies in their work.

Analysis of the Information in the COVID-19 Emergency Alert : Focusing on Essential Information Factors and Privacy Invasion Information Factors (코로나19 안전안내문자 정보 속성 분석 : 필수 정보 요인과 프라이버시 침해 정보 요인을 중심으로)

  • Kim, Minjin;Kim, Miyea;Kim, Beomsoo
    • Knowledge Management Research
    • /
    • v.22 no.2
    • /
    • pp.227-246
    • /
    • 2021
  • In the context of the global pandemic caused by COVID-19, emergency alert text messages can violate the privacy of confirmed corona positive cases. This study used conjoint analysis to identify the essential information factors and the privacy invasion information factors of local government initiated safety notices. As a result of this study, we found eight essential information factors, including all routes of the confirmed case and ten privacy invasion factors of safety notices. In addition, we found that there is a similarity between the combinations of information perceived to be the most essential and perceived as the most significant privacy invasion; both combinations include the confirmed case's personal and route information. This study ultimately tried to suggest a way to lower the concern about privacy invasion of the confirmed cases without damaging the emergency alert text messages' essential information. We expect that this study will provide researchers and policymakers interested in disaster communication with valuable theoretical and practical implications.

Investigating the Influence of Perceived Usefulness and Self-Efficacy on Online WOM Adoption Based on Cognitive Dissonance Theory: Stick to Your Own Preference VS. Follow What Others Said (온라인 구전정보 수용자의 지각된 정보유용성과 자기효능감이 구전정보 수용의도에 미치는 영향에 관한 연구: 의견고수와 구전수용의 비교)

  • Lee, Jung Hyun;Park, Joo Seok;Kim, Hyun Mo;Park, Jae Hong
    • Asia pacific journal of information systems
    • /
    • v.23 no.3
    • /
    • pp.131-154
    • /
    • 2013
  • New internet technologies have created a revolutionary new platform which allows consumers to make decision about product price and quality quickly and provides information about themselves through the transcript of online reviews. By expressing their feelings toward products or services on virtual opinion platforms, users extend their influence into cyberspace as electronic word-of-mouth (e-WOM). Existing research indicates that an impact of eWOM on the consumer decision process is influential. For both academic researchers and practitioners, investigating this phenomenon of information sharing in online website is essential given the increasing number of consumers using them as sources of purchase decisions. It is worthwhile to examine the extent to which opinion seekers are willing to accept and adopt online reviews and which factors encourage adoption. Discerning the most motivating aspects of information adoption in particular, could help electronic marketers better promote their brand and presence on the internet. The objectives of this study are to investigate how online WOM influences a persons' purchase decision by discovering which factors encourage information adoption. Especially focused on the self-efficacy, this research investigates how self-efficacy affects on information usefulness and adoption of online information. Although people are exposed to same review or comment about product or service, some accept the reviews while others do not. We notice that accepting online reviews mainly depends on the person's preference or personal characteristics. This study empirically examines this issue by using cognitive dissonance theory. Specifically, in the movie industry, we address few questions-is always positive WOM generating positive effect? What if the movie isn't the person's favorite genre? What if the person who is very self-assertive so doesn't take other's opinion easily? In these cases of cognitive dissonance, is always WOM generating same result? While many studies have focused on one direct of WOM which indicates positive (or negative) informative reviews or comments generate positive (or negative) results and more (or less) profits, this study investigates not only directional properties of WOM but also how people change their opinion towards product or service positive to negative, negative to positive through the online WOM. An experiment was conducted quantitatively by using a sample of 168 users who have experience within the online movie review site, 'Naver Movie'. Users were required to complete a survey regarding reviews and comments taken from the real movie page. The data reflected user's perceptions of online WOM information that determined users' adoption level. Analysis results provide empirical support for the proposed theoretical perspective. When user can't agree with the opinion of online WOM information, in other words, when cognitive dissonance between online WOM information and users' preference occurs, perceived self-efficacy significantly decreases customers' perception of usefulness. And this perception of usefulness plays an important role in determining users' intention to adopt online WOM information. Most of researches have been concentrated on characteristics of online WOM itself such as quality or vividness of information, credibility of source and direction of online WOM, etc. for describing effect of online WOM, but our results suggest that users' personal character (e.g., self-efficacy) plays decisive role for acceptance of online WOM information. Higher self-efficacy means lower possibility to accept the information that represents counter opinion because of cognitive dissonance, whereas the people that have lower self-efficacy are willing to accept the online WOM information as true and refer to purchase decision. This study suggests a model for understanding role of direction of online WOM information. Also, our result implicates the importance of online review supervision and personalized information service by confirming switching opinion negative to positive is more difficult than positive to negative through the online WOM information. This implication would help marketers to manage online reviews of their products or services.

A Study on Big Data Based Non-Face-to-Face Identity Proofing Technology (빅데이터 기반 비대면 본인확인 기술에 대한 연구)

  • Jung, Kwansoo;Yeom, Hee Gyun;Choi, Daeseon
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.6 no.10
    • /
    • pp.421-428
    • /
    • 2017
  • The need for various approaches to non-face-to-face identification technology for registering and authenticating users online is being required because of the growth of online financial services and the rapid development of financial technology. In general, non-face-to-face approaches can be exposed to a greater number of threats than face-to-face approaches. Therefore, identification policies and technologies to verify users by using various factors and channels are being studied in order to complement the risks and to be more reliable non-face-to-face identification methods. One of these new approaches is to collect and verify a large number of personal information of user. Therefore, we propose a big-data based non-face-to-face Identity Proofing method that verifies identity on online based on various and large amount of information of user. The proposed method also provides an identification information management scheme that collects and verifies only the user information required for the identity verification level required by the service. In addition, we propose an identity information sharing model that can provide the information to other service providers so that user can reuse verified identity information. Finally, we prove by implementing a system that verifies and manages only the identity assurance level required by the service through the enhanced user verification in the non-face-to-face identity proofing process.

Experience of Participation in Educational Community in Early Childhood Mathematics Education Using Storytelling and its Meaning (스토리텔링을 활용한 유아수학교육 교육공동체 참여경험과 그 의미)

  • Kim, Kyung-Eun
    • Journal of Convergence for Information Technology
    • /
    • v.11 no.2
    • /
    • pp.219-228
    • /
    • 2021
  • The purpose of this study was to examine the experiences of participation in the educational community through cooperative relationships between early childhood teachers and researchers in early childhood mathematics education using storytelling, and to find out the meaning of those experiences. Reputable researchers began with the formation of the educational community on March 14, 2016, and continued until July 26, 2016, and collected transcripts of discussions of educational community meetings, reflective journal data of teachers and researchers, and transcript of individual interviews by teachers. As a result of the study, first, the experience of participating in the educational community in early childhood mathematics education using storytelling shared personal mathematics experiences and mathematical situations, understood and learned mathematics content knowledge through sharing, and communicated through the educational community. Second, looking at the meaning of the experience of participating in the early childhood mathematics education educational community using storytelling, learn together through mathematical errors and learn the direction of better instruction through sharing. Grown up as a teacher who enjoys the mathematics exploration process, and promoted joint practice through cooperation in early childhood mathematics education using storytelling.