• Title/Summary/Keyword: Personal Information Sharing

Search Result 250, Processing Time 0.028 seconds

The effects on privacy protection behavior through mobile messenger security awareness and security intention - Focus on Theory of Self-Determination - (모바일 메신저 보안인식과 보안의도를 통한 개인정보 보호행동에 미치는 영향 - 자기결정성 이론을 중심으로 -)

  • Min, Kyeong-Eun;Kim, Sung-Jun;Kwon, Du-Soon
    • Management & Information Systems Review
    • /
    • v.35 no.1
    • /
    • pp.207-233
    • /
    • 2016
  • Currently mobile messenger industry, based on mobile application, is growing. And it has aroused innovative change, offering services in various forms beyond the form simply sharing messengers. Also because messenger securities are becoming personalized and intelligent, the importance of more diverse mobile applications' securities is increasing. This study carries out the empirical study of the causal relationship that the factors of using application services influence on security recognition and security Intention of mobile securities, and consequentially impact upon protection of personal information of users. In order that, we present the research model which prime variables of SDT, which emphasized on natural immanent motivation of human, applied to. To verify the research model of this study empirically, we conducted a survey targeting the public and university students which have ever used mobile messenger applications. With this, we desire to contribute to emphasizing the significance of individual messenger security and playing a positive role to develop security guide for consumers. The path analysis results are as follows. First, perceived autonomy has a positive effect on both security awareness and security intention. Second, perceived competence has a positive effect on security intention. Third, perceived relatedness has a positive effect on both security awareness and security intention. Last, security awareness and security intention. have a positive effect on privacy protection behavior. Through emphasizing the importance of the security of the messenger of individuals and contribute to a positive role for development of the necessary security guidelines to consumers.

  • PDF

Data Mapping of the Terms for Developing an Integrated Information System in Home and Visiting Healthcare Documents (재가.방문 건강관리 통합정보시스템 구축을 위한 관련 서식지 항목 매핑 연구)

  • Kim, Jeong-Eun;Park, Sung-Ae;Yoon, Soon-Nyoung;Lee, In-Sook;Park, Hyeon-Ae;Kim, Jin-Hyun;Lee, Kyung-Soon
    • Perspectives in Nursing Science
    • /
    • v.8 no.1
    • /
    • pp.32-41
    • /
    • 2011
  • Purpose: This study sought to determine the possibility of developing the data-sharing infrastructure of an integrated information system to improve the quality of home and visit-based healthcare services. Methods: The articles of study here were the forms used by a visiting healthcare agency, a home healthcare system of a home healthcare agency, and those used in long-term care insurance for elderly. We visited a visit-based healthcare agency and a home healthcare agency to survey their forms and interviewed relevant practitioners, and we searched for forms associated with long-term care insurance for the elderly on the Internet. We then organized the terms in each form and mapped them among the form after analyzing the concepts as a whole to inquiry into the possibility of integration. Results: The mapping procedure divided the terms into those related to personal information, problems and interventions. Mapping between the standard system (Omaha system) and the type of form was also done. Conclusion: In this study, we found that programs were configured differently depending on the objectives of the service. It is necessary to develop the program with an integrated information system by comparing the three services in terms of their distinct advantages, after which such a service should be utilized. The results of this study can serve as a database for the creation of a new integrated system.

  • PDF

A Study on Creation and Development of Folksonomy Tags on LibraryThing (폭소노미 태그의 생성과 성장에 관한 연구 - LibraryThing을 중심으로 -)

  • Kim, Dong-Suk;Chung, Yeon-Kyoung
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.44 no.4
    • /
    • pp.203-230
    • /
    • 2010
  • This study analyzed the development and growth of folksonomy by examining tags associated with 40 bestsellers on LibraryThing.com in 6-month intervals. It was found that tag values do not decrease but grow in terms of quantity and quality. Accordingly, we examined the major significances of the tags and their potential utilization as an expression of subjects. Our findings were as follows. First, the motivations for tagging can be categorized into personal information for search purposes, self-fulfillment such as sense of achievement, display of emotion and sharing of one's experience with others, or an altruistic objective that emphasizes sociality with a desire that one's actions might provide social benefits. According to our analysis, 74.12% of tags had a social motivation. Second, the total number of tags and the frequency of usage increased with time. Third, the categories that showed a high increase in tag usage were dates of publication and reading, key words, main characters, and book reviews. Tags related to subjects had the highest ratio. Fourth, among Library of Congress Subject Headings (LCSH), multiple genres, key words and main characters were assigned to books, and specific key words and other properties were added as time progressed. There was also a slight increase in the number of tags consistent with LCSH. Fifth, we found that key tags could serve as a compilation of terms that reflects the knowledge base of the corresponding era. Thus, folksonomy should be continuously monitored for its quantitative and qualitative development of the tags to make improvements on its formative disadvantages, and identify internal semantic significance, be actively utilized in conjunction with taxonomy as a flexible compilation of terms that incorporate the history of a specific era.

A Study on Security Policy Violations of Organization Members (조직 구성원들의 보안정책 위반에 관한 연구)

  • Kim, Jong-Ki;Oh, Da-Woon
    • Informatization Policy
    • /
    • v.25 no.3
    • /
    • pp.95-115
    • /
    • 2018
  • This study aims to examine organization members' intention to violate security policies based on the Person-Environment Fit Model. This study investigated the effect of the relationship between organizational security environment and the individual security value on the intention of organizational security policy violation. The security environments are classified into the organizational information security culture and peers' behavior of security compliance, while the personal values are classified into reconstructing the conduct, distorting the consequence, and devaluing the organization as presented in the moral disengagement theory. Based on the concept of the moral disengagement theory, we measured the individual security values as a second order factor. This study found that the information security culture had a statistically significant impact on devaluing the organization, but did not have as much impact on reconstructing the conduct and distorting the consequence. Peers' behavior of security compliance had a significant impact on reconstructing the conduct, distorting the consequence and devaluing the organization, all of which also had relevant impact on the organizational members' intention of security policy violation.This study measured a persons' perception on security policy breach by presenting scenarios of password sharing that is common in many organizations. This study is expected to make practical contributions, as it deals with challenges that many organizations are actually faced with.

Research on Vehicle Diagnostic and Monitoring technology Using WiBro Portable Device (와이브로 휴대기기를 사용한 차량진단 및 모니터링 기술에 관한 연구)

  • Ryoo, Hee-Soo;Won, Yong-Gwan;Park, Kwon-Chul;Ahn, Yong-Beom
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.47 no.10
    • /
    • pp.17-26
    • /
    • 2010
  • This is concerned with the technology to monitor the vehicle operation, failure and disorder by using WiBro portable device. More precisely, the technology makes it possible that the information collection device is connected to both ECU(Electronic Control Unit) which is the device for controlling engine, transmission, brake, air-bag, etc that are connected to in-vehicle network and OBD-II connector that is for data collection from various sensors. In addition, with a WiBro portable device (cell phone, PDA, PMP, UMPC, etc). equipped with a vehicle diagnostic programs, information for operation, failure and malfunction can be obtained and analyzed in real-time, and alarm is alerted when the vehicle is in abnormal status, which makes the early reactions to the status. Furthermore, the collected data can be sent through WiBro network to the server managed by the company specialized in managing the vehicles, thus the technology could help the drivers who have less knowledge about their auto-vehicles have safe and economic driving. There is always a possibility of malfunction due to various types of noise that are caused by wring-harness when the device is wired-connected. In this research, in order to overcome this problem, we propose a system configuration that can do monitoring and diagnosis with a device for collecting data from vehicle and a personal WiBro device. Also, we performed research on data acquisition and interlock for the system defined by the definition for information and data sharing platform.

A Study on the Development of Cyberpolice Volunteer System Using the Collective Intellectual Network (집단지성 네트워크형 사이버폴리스 자원봉사시스템 구축에 관한 연구)

  • Kim, Doo-Hyun;Park, Sung-Joon;Na, Gi-Sung
    • Korean Security Journal
    • /
    • no.61
    • /
    • pp.59-85
    • /
    • 2019
  • In the reality that the boundary between the real world and the virtual world disappears with the 4th Industrial Revolution, cyber crimes that occur beyond time and space have clear limitations in fulfilling their duties only with the police force of government organizations established under the real law system. The research method of this thesis is based on the literature research and the experience of security work. The purpose of this paper is to establish a social system where collective intelligence of each social field can participate voluntarily to respond to cyber crimes occurring beyond the time and space before the law and institutionalization. In addition, the social system in which collective intelligence in each social sector can participate voluntarily was established to define crime types in cyberspace in real time and to prevent crimes defined by the people themselves and the counter-measures had been proposed in order to form social consensus. First, it is necessary to establish a collective intelligent network-type cyberpolice volunteer system. The organization consists of professors of security and security related departments at universities nationwide, retired public officials from the National Intelligence Service, the National Police Agency, and the National Emergency Management Agency, security companies and the organizations, civilian investigators, security & guard, firefighting, police, transportation, intelligence, security, national security, and research experts. Second, private sector regulation should be established newly under the Security Business Act. Third, the safety guard of the collective intelligent cyberpolice volunteer system for the stability of the people's lives should strengthen volunteer work. Fourth, research lessons and legal countermeasures against cybercrime in advanced countries should be introduced. Fifth, the Act on the Protection of Personal Information, the Act on Promotion of Information and Communication Network Utilization and Information Protection, the Act on the Utilization and Protection of Credit Information, and the Special Act on the Materials and Parts Industry should be amended. Sixth, police officers should develop cybercrime awareness skills for proactive prevention activities.

A Study on the Possibility of Blockchain Technology Adoption in the Logistics Industry (물류산업 내 블록체인 기술 도입 가능성 연구)

  • Kye, Dong Min;Hur, Sung Ho
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.21 no.2
    • /
    • pp.116-131
    • /
    • 2022
  • With the recent progress of the 4th industrial revolution, the logistics industry is also making efforts to introduce smart logistics, and various attempts are being made to spread logistics informatization, which is the core of smart logistics. Among these, blockchain technology is considered as a technology that will contribute to the spread of logistics informatization and is being applied to various fields. Accordingly, in this study, to discuss the applicability of blockchain technology to the logistics industry, the characteristics of blockchain technology were defined, related cases were reviewed, and a survey was conducted on the possibility of application in the industry. Blockchain technology can be defined as having the characteristics of economic feasibility, speed, transparency in terms of work efficiency, and scalability, decentralization (decentralization), reliability (security) in terms of added value creation. It was confirmed that many are being introduced in the fields of distribution, finance, personal information, and public services. As a result of the survey on the logistics industry, it was confirmed that the level of informatization of the logistics industry had entered the stage of generating profits by using information, but the industry was passive in sharing and utilizing information due to concerns about information leakage. Nevertheless, the awareness and expectation of the need for informatization is high, and it is expected that the informatization of the logistics industry and realizing smart logistics based on it will advance one step further with the introduction of blockchain technology in the future.

Design of an Intellectual Smart Mirror Appication helping Face Makeup (얼굴 메이크업을 도와주는 지능형 스마트 거울 앱의설계)

  • Oh, Sun Jin;Lee, Yoon Suk
    • The Journal of the Convergence on Culture Technology
    • /
    • v.8 no.5
    • /
    • pp.497-502
    • /
    • 2022
  • Information delivery among young generation has a distinct tendency to prefer visual to text as means of information distribution and sharing recently, and it is natural to distribute information through Youtube or one-man broadcasting on Internet. That is, young generation usually get their information through this kind of distribution procedure. Many young generation are also drastic and more aggressive for decorating themselves very uniquely. It tends to create personal characteristics freely through drastic expression and attempt of face makeup, hair styling and fashion coordination without distinction of sex. Especially, face makeup becomes an object of major concern among males nowadays, and female of course, then it is the major means to express their personality. In this study, to meet the demands of the times, we design and implement the intellectual smart mirror application that efficiently retrieves and recommends the related videos among Youtube or one-man broadcastings produced by famous professional makeup artists to implement the face makeup congruous with our face shape, hair color & style, skin tone, fashion color & style in order to create the face makeup that represent our characteristics. We also introduce the AI technique to provide optimal solution based on the learning of user's search patterns and facial features, and finally provide the detailed makeup face images to give the chance to get the makeup skill stage by stage.

Changes in Consumption Life and Consumer Education in the Fourth Industrial Revolution (제4차 산업혁명 시대의 소비생활 변화와 소비자교육)

  • Jung, Joowon
    • Journal of Korean Home Economics Education Association
    • /
    • v.29 no.3
    • /
    • pp.89-104
    • /
    • 2017
  • Considering the advent of the Fourth Industrial Revolution, this study examines the changes and influences of intelligent information technology and the role of consumer education in the context of consumption life. The purpose of this study is to provide a theoretical foundation to effectively respond to the future consumption society as an independent consumer by enhancing the understanding of the Fourth Industrial Revolution in terms of consumption life. First, in terms of changes in the consumption paradigm in the Fourth Industrial Revolution, production and consumption are converged by being shared through a comprehensive connection platform in real time. Regarding the meaning of consumption, mental experience is being emphasized; moreover, usage and sharing, rather than ownership, are being highlighted. In terms of major changes in consumption life, the emergence of a more convenient smart consumption life and the possibility of personalized consumption optimized for individual demand are anticipated. Moreover, sustainable eco-friendly consumption is expected to increase further, and rapidly changing consumption trends will experience accelerated progress in consumer-centered changes. Next, the predicted problems in consumption life in the Fourth Industrial Revolution include unequal consumption due to intelligent information technology power center and the use and management of personal information data. Furthermore, ethical concerns related to the introduction of new technologies will become prominent, eventually resulting in issues concerning consumption satisfaction. To effectively respond to these new paradigm changes, consumer education should be value-centered. Ethical aspects of consumption should be considered, and consumption life should include trust and mutual cooperation. Furthermore, consumer education should facilitate creative convergence.

The Role of Social Capital and Identity in Knowledge Contribution in Virtual Communities: An Empirical Investigation (가상 커뮤니티에서 사회적 자본과 정체성이 지식기여에 미치는 역할: 실증적 분석)

  • Shin, Ho Kyoung;Kim, Kyung Kyu;Lee, Un-Kon
    • Asia pacific journal of information systems
    • /
    • v.22 no.3
    • /
    • pp.53-74
    • /
    • 2012
  • A challenge in fostering virtual communities is the continuous supply of knowledge, namely members' willingness to contribute knowledge to their communities. Previous research argues that giving away knowledge eventually causes the possessors of that knowledge to lose their unique value to others, benefiting all except the contributor. Furthermore, communication within virtual communities involves a large number of participants with different social backgrounds and perspectives. The establishment of mutual understanding to comprehend conversations and foster knowledge contribution in virtual communities is inevitably more difficult than face-to-face communication in a small group. In spite of these arguments, evidence suggests that individuals in virtual communities do engage in social behaviors such as knowledge contribution. It is important to understand why individuals provide their valuable knowledge to other community members without a guarantee of returns. In virtual communities, knowledge is inherently rooted in individual members' experiences and expertise. This personal nature of knowledge requires social interactions between virtual community members for knowledge transfer. This study employs the social capital theory in order to account for interpersonal relationship factors and identity theory for individual and group factors that may affect knowledge contribution. First, social capital is the relationship capital which is embedded within the relationships among the participants in a network and available for use when it is needed. Social capital is a productive resource, facilitating individuals' actions for attainment. Nahapiet and Ghoshal (1997) identify three dimensions of social capital and explain theoretically how these dimensions affect the exchange of knowledge. Thus, social capital would be relevant to knowledge contribution in virtual communities. Second, existing research has addressed the importance of identity in facilitating knowledge contribution in a virtual context. Identity in virtual communities has been described as playing a vital role in the establishment of personal reputations and in the recognition of others. For instance, reputation systems that rate participants in terms of the quality of their contributions provide a readily available inventory of experts to knowledge seekers. Despite the growing interest in identities, however, there is little empirical research about how identities in the communities influence knowledge contribution. Therefore, the goal of this study is to better understand knowledge contribution by examining the roles of social capital and identity in virtual communities. Based on a theoretical framework of social capital and identity theory, we develop and test a theoretical model and evaluate our hypotheses. Specifically, we propose three variables such as cohesiveness, reciprocity, and commitment, referring to the social capital theory, as antecedents of knowledge contribution in virtual communities. We further posit that members with a strong identity (self-presentation and group identification) contribute more knowledge to virtual communities. We conducted a field study in order to validate our research model. We collected data from 192 members of virtual communities and used the PLS method to analyse the data. The tests of the measurement model confirm that our data set has appropriate discriminant and convergent validity. The results of testing the structural model show that cohesion, reciprocity, and self-presentation significantly influence knowledge contribution, while commitment and group identification do not significantly influence knowledge contribution. Our findings on cohesion and reciprocity are consistent with the previous literature. Contrary to our expectations, commitment did not significantly affect knowledge contribution in virtual communities. This result may be due to the fact that knowledge contribution was voluntary in the virtual communities in our sample. Another plausible explanation for this result may be the self-selection bias for the survey respondents, who are more likely to contribute their knowledge to virtual communities. The relationship between self-presentation and knowledge contribution was found to be significant in virtual communities, supporting the results of prior literature. Group identification did not significantly affect knowledge contribution in this study, inconsistent with the wealth of research that identifies group identification as an important factor for knowledge sharing. This conflicting result calls for future research that examines the role of group identification in knowledge contribution in virtual communities. This study makes a contribution to theory development in the area of knowledge management in general and virtual communities in particular. For practice, the results of this study identify the circumstances under which individual factors would be effective for motivating knowledge contribution to virtual communities.

  • PDF