• Title/Summary/Keyword: Personal Value

Search Result 1,146, Processing Time 0.03 seconds

Comparison of personal computer with CT workstation in the evaluation of 3-dimensional CT image of the skull (전산화단층촬영 단말장치와 개인용 컴퓨터에서 재구성한 두부 3차원 전산화단층영상의 비교)

  • Kang Bok-Hee;Kim Kee-Deog;Park Chang-Seo
    • Imaging Science in Dentistry
    • /
    • v.31 no.1
    • /
    • pp.1-7
    • /
    • 2001
  • Purpose : To evaluate the usefulness of the reconstructed 3-dimensional image on the personal computer in comparison with that of the CT workstation by quantitative comparison and analysis. Materials and Methods : The spiral CT data obtained from 27 persons were transferred from the CT workstation to a personal computer, and they were reconstructed as 3-dimensional image on the personal computer using V-works 2.0/sup TM/. One observer obtained the 14 measurements on the reconstructed 3-dimensional image on both the CT workstation and the personal computer. Paired Nest was used to evaluate the intraobserver difference and the mean value of the each measurement on the CT workstation and the personal computer. Pearson correlation analysis and % incongruence were also performed. Results: I-Gn, N-Gn, N-A, N-Ns, B-A, and G-Op did not show any statistically significant difference (p>0.05), B-O, B-N, Eu-Eu, Zy-Zy, Biw, D-D, Orbrd R, and L had statistically significant difference (p<0.05), but the mean values of the differences of all measurements were below 2 mm, except for D-D. The value of correlation coefficient y was greater than 0.95 at I-Gn, N-Gn, N-A, N-Ns, B-A, B-N, G-Op, Eu-Eu, Zy-Zy, and Biw, and it was 0.75 at B-O, 0.78 at D-D, and 0.82 at both Orbrd Rand L. The % incongruence was below 4% at I-Gn, N-Gn, N-A, N-Ns, B-A, B-N, G-Op, Eu-Eu, Zy-Zy, and Biw, and 7.18%, 10.78%, 4.97%, 5.89% at B-O, D-D, Orbrd Rand L respectively. Conclusion : It can be considered that the utilization of the personal computer has great usefulness in reconstruction of the 3-dimensional image when it comes to the economics, accessibility and convenience, except for thin bones and the landmarks which are difficult to be located.

  • PDF

A Study on Privacy Protection Technology based on Blockchain and Zero Knowledge Proof (블록체인과 영지식 증명에 기반한 프라이버시 보호 기술 연구)

  • Kwang Kyu Lee
    • Smart Media Journal
    • /
    • v.12 no.9
    • /
    • pp.95-102
    • /
    • 2023
  • As the utilization value of personal information increases, discussions on how to provide personal information are active, but information required by institutions to utilize personal information is being exposed more than necessary. Therefore, personal privacy protection is essential to overcome the problems and limitations of personal information protection. In this study, a decentralized identity information management model that overcomes the problems and limitations of the centralized identity management method of personal information and manages and selectively provides personal information by the information owner himself and demonstrates the excellence of personal information by implementing the Smart Personal Information Provision System (SPIPS) in the PBFT consensus algorithm through experiments.

Value Recognition and Intention to Adopt Smart City Services: A Public Value Management Theory Approach

  • Lee, Seung Ha;Lee, Jung Hoon;Lee, Young Joo
    • Journal of Contemporary Eastern Asia
    • /
    • v.18 no.1
    • /
    • pp.124-152
    • /
    • 2019
  • Smart city, which employs information and communication technology (ICT) to resolve urban problems, is gaining more research attention in the innovation research. However, most previous studies regard citizens as merely passive accepters of the smart city services, focusing on individual private values. The present study aims to expand existing limited perspectives by applying public value management theory. Drawing from the literature review, we developed a dual perspective that a smart city service should encompass: private and public value. Then we set up a causal relationship between the value recognitions and intention to adopt smart city services. We further related antecedent variables to the dual value recognition in terms of citizens' characteristics: prior knowledge, personal innovativeness, and citizenship. Two case subjects among currently operating smart city services in South Korea were selected to empirically investigate our hypothesis. Results confirm the recognition of both public and private value is significantly related to the citizens' personal characteristics and resultant attitude towards acceptance and support for diffusion of the smart city services. This study is expected to provide useful implications for a new angle for the recipient of the smart city services, value orientation of the services, citizen's participation, and method selection for promotion.

A Study on Intention to Use Personal Cloud Services: Focusing on Value Comparison (개인용 클라우드 서비스 사용 의도 연구: 가치 비교를 중심으로)

  • Kyunghoi Min;Chanhee Kwak;HanByeol Stella Choi;Heeseok Lee
    • Information Systems Review
    • /
    • v.22 no.2
    • /
    • pp.1-24
    • /
    • 2020
  • Cloud computing technology is expanding its services to individual consumers through storage and applications. This study aims to compare the predisposing factors that affect the perceived value and the intention to use between users who have used or experienced services and those who have never experienced services from the perspective of benefit and sacrifice based on the value-based acceptance model. The results showed that the sacrifice factor (perceived cost) had a significant effect on perceived value and perceived value had a significant effect on intention to use, but showed a difference in perceived benefit. Perceived usefulness, ubiquity, and network effects had significant impact for experienced users' perceived value, but for inexperienced users, ubiquity did not have significant impact. In addition, usefulness was the most significant factor for experienced users while network effect was the same for inexperienced users. The results of this study suggest that consumers' intention to use personal cloud service is evaluated as a benefit and sacrifice point and a new attempt to re-examine the role of previous experience.

Trends in Data Privacy Protection Technologies with Enhanced Utilization (활용성 강화 데이터 프라이버시 보호 기술 동향)

  • Kim, J.Y.;Jho, N.S.;Chang, K.Y.
    • Electronics and Telecommunications Trends
    • /
    • v.35 no.6
    • /
    • pp.88-96
    • /
    • 2020
  • As the usability and value of personal information increase, the importance of privacy protection has increased. In Korea, the scope of the use of pseudonymized personal information has increased because of revisions to the law. In the past, security technologies were used to safely store and manage personal information, but now, security technologies focused on usability are needed to safely use personal information. In this paper, we look at issues related to the de-identification and re-identification of personal information. Moreover, we examine the standards and techniques related to the de-identification of personal information.

Fashion Blogging and Personal Style Bloggers: The Evolving Enterprise

  • Reddy, Shweta Linga
    • International Journal of Costume and Fashion
    • /
    • v.13 no.1
    • /
    • pp.1-10
    • /
    • 2013
  • This study examines existing literature and uses case studies to identify the scope of fashion blogging and the evolving role of the personal style bloggers in the fashion business. Information on six popular personal style bloggers has been gathered to demonstrate the evolving business of these bloggers and their scope of operations that are relevant to fashion. The case of these six bloggers were drawn from popular media publications such as CNN, Wall Street Journal (WSJ), Time, Women's Wear Daily (WWD) and The New York Times. The case study of these six bloggers reveals that these personal style bloggers have used their reach and influence on the blog audience to procure and access business opportunities to grow their enterprise. The findings indicate that affiliation, partnership or collaboration with brands or established designers adds more value to a personal style bloggers resume. However, the findings also indicate that the popular fashion bloggers provide a new opportunity for marketing and promoting fashion brands and products to the younger generation.

A Study on the Attitudes on the Clothing of the Korean People Implied in the Korean Proverb (韓國俗談에 나타나는 韓國人의 衣服態度에 관한 硏究)

  • 김진구
    • The Research Journal of the Costume Culture
    • /
    • v.3 no.1
    • /
    • pp.83-92
    • /
    • 1995
  • The purpose of this study was to find the attitudes on clothing of the Korean people implied in the Korean proverb. The results of the analysis of this research was as follows: It was found that the Koreans regarded clothing and personal appearance as important matter in their everyday life. The awareness of the importance of wearing clothes and personal appearance was usual matter to the Koreans. Thus they put a great value on good and appropriate clothing behavior and personal appearance. The Koreans understood the meaning of clothes make the man and they knew how to use the clothing and personal appearance to relate people in the social order. They showed a tendency to treat a personal in terms of his appearance. it seems that since the Koreans knew the importance of clothing and personal appearance in the relationship between person and person they emphasized appropriate clothing behavior and decency.

  • PDF

Influence of Value Consciousness on Purchase Behavior and Repurchase Intention for Personal Beauty Devices among Women in Self-Beauty Care (셀프 뷰티족 여성의 가치의식이 개인용 뷰티디바이스의 구매행동 및 재구매의도에 미치는 영향)

  • Baek, Hyun Jin;Lee, Jae-Nam
    • Journal of the Korean Applied Science and Technology
    • /
    • v.37 no.4
    • /
    • pp.958-968
    • /
    • 2020
  • This study attempted to investigate the value consciousness of purchasing behavior and purchasing intentions of personal beauty devices for women undergoing self-behavioral therapy. To this end, a survey was conducted, and a total of 342 copies of data were analyzed. As a result, In terms of the value consciousness, purchase behavior, and repurchase intention of the individual's personal beauty device, the value consciousness was the most materialistic, and the purchase behavior was the most economical. The overall repurchase intention was M=3.73 and SD=0.80. In correlations among value consciousness, purchase behavior and repurchase intention, positive correlations were confirmed (p<0.01). In terms of the influence of value consciousness on purchase behavior (aesthetics, conformity, effectiveness), 'aesthetic-pursuit factor' was the largest. In the effects of value consciousness on the economic aspect of purchase behavior, 'materialistic factor' was the highest. Lastly, in the influence of value consciousness on reliability, 'self-esteem factor' revealed the greatest effect. Furthermore, self-esteem factors had the biggest influence on repurchase intention. The above results confirmed that value consciousness of women in self-beauty care have a positive influence on their purchase behavior and repurchase intention for personal beauty devices. It is anticipated that they would be available as important marketing data in beauty device market.

A Balance of Primary and Secondary Values: Exploring a Digital Legacy

  • Cushing, Amber L.
    • International Journal of Knowledge Content Development & Technology
    • /
    • v.3 no.2
    • /
    • pp.67-94
    • /
    • 2013
  • This exploratory research explores the concept of a digital legacy as a general concept and as a collection of digital possessions with unique characteristics. The results reported in this article are part of a larger study. In Cushing (2013), the author identified the characteristics of a digital possession. In this study, these characteristics of a digital possession were utilized to explore how the characteristics of several digital possessions could form a collection, or a digital legacy. In addition to being explored as a collection of digital possessions, data was collected about the general concept of a digital legacy. In part I of the study, 23 participants from three age groups were interviewed about their general concept of a digital legacy. Five general characteristics describing a digital legacy were identified. In part II of the study, interview data from Cushing (2013) was used to create statements describing digital possessions. The statements were classified utilizing the archival concept of primary and secondary values, as well as the consumer behavior concepts of self extension to possessions and possession attachment. Primary value refers to the purpose for which the item was created, while secondary value refers to an additional value that the participants can perceive the item to hold, such as a perception that an item can represent one's identity. Using standard Q method procedure, 48 participants were directed to rank their agreement with 60 statements (written on cards), along a distribution of -5 to +5, according to the characteristics of the digital possession they would most like to maintain for a digital legacy. The ranked statements were analyzed using Q factor analysis, in order to perceive the most common statements associated with maintaining digital possessions for a digital legacy. Q method results suggested that most individuals described the digital possessions they wanted to maintain for a digital legacy using various combinations of characteristics associated with primary and secondary values. This suggests that while some participants will respond to personal archiving based on the concept of preserving identity (a perceived secondary value), this will not appeal to everyone. Information professional could consider this difference in appeal when marketing personal archiving assistance to patrons.

A Mutual P3P Methodology for Privacy Preserving Context-Aware Systems Development (프라이버시 보호 상황인식 시스템 개발을 위한 쌍방향 P3P 방법론)

  • Kwon, Oh-Byung
    • Asia pacific journal of information systems
    • /
    • v.18 no.1
    • /
    • pp.145-162
    • /
    • 2008
  • One of the big concerns in e-society is privacy issue. In special, in developing robust ubiquitous smart space and corresponding services, user profile and preference are collected by the service providers. Privacy issue would be more critical in context-aware services simply because most of the context data themselves are private information: user's current location, current schedule, friends nearby and even her/his health data. To realize the potential of ubiquitous smart space, the systems embedded in the space should corporate personal privacy preferences. When the users invoke a set of services, they are asked to allow the service providers or smart space to make use of personal information which is related to privacy concerns. For this reason, the users unhappily provide the personal information or even deny to get served. On the other side, service provider needs personal information as rich as possible with minimal personal information to discern royal and trustworthy customers and those who are not. It would be desirable to enlarge the allowable personal information complying with the service provider's request, whereas minimizing service provider's requiring personal information which is not allowed to be submitted and user's submitting information which is of no value to the service provider. In special, if any personal information required by the service provider is not allowed, service will not be provided to the user. P3P (Platform for Privacy Preferences) has been regarded as one of the promising alternatives to preserve the personal information in the course of electronic transactions. However, P3P mainly focuses on preserving the buyers' personal information. From time to time, the service provider's business data should be protected from the unintended usage from the buyers. Moreover, even though the user's privacy preference could depend on the context happened to the user, legacy P3P does not handle the contextual change of privacy preferences. Hence, the purpose of this paper is to propose a mutual P3P-based negotiation mechanism. To do so, service provider's privacy concern is considered as well as the users'. User's privacy policy on the service provider's information also should be informed to the service providers before the service begins. Second, privacy policy is contextually designed according to the user's current context because the nomadic user's privacy concern structure may be altered contextually. Hence, the methodology includes mutual privacy policy and personalization. Overall framework of the mechanism and new code of ethics is described in section 2. Pervasive platform for mutual P3P considers user type and context field, which involves current activity, location, social context, objects nearby and physical environments. Our mutual P3P includes the privacy preference not only for the buyers but also the sellers, that is, service providers. Negotiation methodology for mutual P3P is proposed in section 3. Based on the fact that privacy concern occurs when there are needs for information access and at the same time those for information hiding. Our mechanism was implemented based on an actual shopping mall to increase the feasibility of the idea proposed in this paper. A shopping service is assumed as a context-aware service, and data groups for the service are enumerated. The privacy policy for each data group is represented as APPEL format. To examine the performance of the example service, in section 4, simulation approach is adopted in this paper. For the simulation, five data elements are considered: $\cdot$ UserID $\cdot$ User preference $\cdot$ Phone number $\cdot$ Home address $\cdot$ Product information $\cdot$ Service profile. For the negotiation, reputation is selected as a strategic value. Then the following cases are compared: $\cdot$ Legacy P3P is considered $\cdot$ Mutual P3P is considered without strategic value $\cdot$ Mutual P3P is considered with strategic value. The simulation results show that mutual P3P outperforms legacy P3P. Moreover, we could conclude that when mutual P3P is considered with strategic value, performance was better than that of mutual P3P is considered without strategic value in terms of service safety.