• Title/Summary/Keyword: Personal data

Search Result 5,555, Processing Time 0.044 seconds

Distribution of Personal Income on Donating Behavior: Application of Theory of Planned Behaviors

  • Martaleni, Martaleni;YASA, Ni Nyoman Kerti
    • Journal of Distribution Science
    • /
    • v.19 no.8
    • /
    • pp.57-67
    • /
    • 2021
  • Purpose: The purpose of this study was to explain the application of TPB and personal happiness on donation behavior and willingness to donate. Research design, data, and methodology: The population of this research is people in Indonesia who have a tendency in its culture to donate. The sample size used was 245 people with a purposive sampling method. The analysis technique used is Path Analysis using SEM-PLS. Result: The results show that the subjective norm had appositive and significant effect on attitude to donate; subjective norm has appositive and significant effect on the donation behavior. Personal happiness has a positive and significant effect on attitude to donate, and personal happiness also has a positive and significant effect on the donation behavior, and the donation behavior has a positive and significant effect on the attitude to donate. Conclusions: Being a responsible person to other people's conditions, as you see other people needing help, you will feel that you have the power to help them. you are often helping people in need, which concludes you are a compassionate person.

The Need for Homomorphic Encryption to Protection Privacy (프라이버시 보호를 위한 동형암호의 필요성)

  • Seo, Jin-Beom;Cho, Young-Bok
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2021.10a
    • /
    • pp.47-49
    • /
    • 2021
  • According to the revision of the Data 3 Act in 2020, personal information of medical data can be processed anonymously for statistical purposes, research, and public interest record keeping. However, unidentified data can be re-identified using genetic information, credit information, etc., and personal health information can be abused as sensitive information. In this paper, we derive the need for homomorphic encryption to protect the privacy of personal information separated by sensitive information.

  • PDF

Detection of hydin Gene Duplication in Personal Genome Sequence Data

  • Kim, Jong-Il;Ju, Young-Seok;Kim, Shee-Hyun;Hong, Dong-Wan;Seo, Jeong-Sun
    • Genomics & Informatics
    • /
    • v.7 no.3
    • /
    • pp.159-162
    • /
    • 2009
  • Human personal genome sequencing can be done with high efficiency by aligning a huge number of short reads derived from various next generation sequencing (NGS) technologies to the reference genome sequence. One of the major obstacles is the incompleteness of human reference genome. We tried to analyze the effect of hidden gene duplication on the NGS data using the known example of hydin gene. Hydin2, a duplicated copy of hydin on chromosome 16q22, has been recently found to be localized to chromosome 1q21, and is not included in the current version of standard human genome reference. We found that all of eight personal genome data published so far do not contain hydin2, and there is large number of nsSNPs in hydin. The heterozygosity of those nsSNPs was significantly higher than expected. The sequence coverage depth in hydin gene was about two fold of average depth. We believe that these unique finding of hydin can be used as useful indicators to discover new hidden multiplication in human genome.

Prediction Approaches of Personal Exposure from Ambient Air Pollution Using Spatial Analysis: A Pilot Study Using Ulsan Cohort Data (공간분석 기법을 이용한 대기오염 개인노출추정 방안 소개 및 적용의 사례)

  • Son, Ji-Young;Kim, Yoon-Shin;Cho, Yong-Sung;Lee, Jong-Tae
    • Journal of Korean Society for Atmospheric Environment
    • /
    • v.25 no.4
    • /
    • pp.339-346
    • /
    • 2009
  • The objectives of this study were to introduce spatial interpolation methods which have been applied in recent papers, to apply three methods (nearest monitor, inverse distance weighting, kriging) to domestic data (Ulsan cohort) as an example of estimating the personal exposure levels. We predicted the personal exposure estimates of 2,102 participants in Ulsan cohort using spatial interpolation methods based on information of their residential address. We found that there was a similar tendency among the estimates of each method. The correlation coefficients between predictions from pairs of interpolation methods (except for the correlation coefficient between nearest montitor and kriging of CO and $SO_2$) were generally high (r=0.84 to 0.96). Even if there are some limitations such as location and density of monitoring station, spatial interpolation methods can reflect spatial aspects of air pollutant and spatial heterogeneity in individual level so that they provide more accurate estimates than monitor data alone. But they may still result in misclassification of exposure. To minimize misclassification for better estimates, we need to consider individual characteristics such as daily activity pattern.

Chracteristics of Somatotype for Boys of Elementary School Age I - In point of the Characteristics of Changing Somatotype in each period of Elementary School Age- (학령기 남아의 체형특성 I - 학령기별 체형변이특성을 중심으로-)

  • Yeo, Hye-Rin;Kwon, Young-Suk
    • Journal of the Korean Society of Costume
    • /
    • v.46
    • /
    • pp.31-48
    • /
    • 1999
  • The purpose of this study is to offer fundamental data for classification of somatotype for boys of elementary school age. The subject were 458 elementary school boys aged from 7 to 12 living in Pusan. Data were collected by 56 anthropometric 11 photoraphic measurements and 41 body indices. 56 anthropometric measurements were analyzed by ANOVA and method of Duncan-test as Multiple Range Test among 6 grade groups and then total 108 measurments were analyzed by statistical data processing. The results are as followings: 1, In Duncan-test boys were significantly different in most of height and length items but were not significantly different in main items for clothing construction among 1.2/3.4/5.6 grades so that the period of elementary school age were divided with 3 periods. 2. According to increase school age most of item's means increased gradually and personal difference for each items increased too. In case of height and length items the items of lower half were greater than the items of upper half in personal difference and depth items were greater than the breadth items in personal difference. And weight and angle items were very great personal difference is specially.

  • PDF

Development of combustion zone monitoring system for a blast furnace (용광로 연소대 관리시스템 개발)

  • Choi, Tae-Hwa
    • Journal of Institute of Control, Robotics and Systems
    • /
    • v.3 no.3
    • /
    • pp.318-322
    • /
    • 1997
  • A prototype of combustion zone monitoring system as been developed and installed into tuyeres of the blast furnace. The system consists of CCD(charge coupled device) cameras, sonic flow meters, an image processor and a personal computer. The personal computer collects raceway luminance data and operational data from the image processor that is connected to the color CCD camera from the blast furnace process computer, respectively. In addition, the sonic flow meters supply coal injection rate data to the personal computer. Then, the personal computer evaluates the combustion conditions with the raceway inspection algorithm. This integrated monitoring system allows us to detect abnormal raceway conditions and the clogging status of coal injection pipe. The image processing techniques of the system enable us to effectively monitor unburnt coal sticking to tuyere tip and injection lance wear conditions. Such a developed system ensures rapid and precise raceway inspection. The image processing capability of the system has helped operator to early detect both the unburnt coal sticking problem and the errosion problem of injection lance. Furthermore, the system could control the abnormal raceway condition based the the analysis results obtained from combustion monitoring.

  • PDF

The Meaning and Tasks of Guidelines for Utilization of Healthcare Data (보건의료 데이터 활용 가이드라인의 의미와 과제)

  • Shin, Tae-Seop
    • The Korean Society of Law and Medicine
    • /
    • v.22 no.3
    • /
    • pp.31-55
    • /
    • 2021
  • The Personal Information Protection Act, one of the revised 3 Data Laws, established a special cases concerning pseudonymous data. As a result, a personal information controller may process pseudonymized information without the consent of data subjects for statistical purposes, scientific research purposes, and archiving purposes in the public interest, etc. In addition, as a follow-up to the revised Personal Information Protection Act, a 'Guidelines for Utilization of Healthcare Data' was prepared, which deals with the pseudonymization in the medical sector. The guidelines are meaningful in that they provide practical criteria for accomplices by defining specific interpretations and examples that take into account the characteristics of healthcare data. However, the guidelines need to clarify the purpose of using pseudonymous data and strengthen the fairness of the composition of the data deliberation committee. The guidelines also require establishing a healthcare data compensation framework and strengthening the protection of rights for vulnerable subjects. In addition, the guidelines need to be adjusted for inconsistency with the Bioethics and Safety Act and the Medical Service Act. It is expected that this study will contribute to the creation of a safe environment for the utilization of healthcare data as well as the improvement of related laws and systems.

The Relationships of Home Environment and Personal factors to Children's Prosocial behaviors : Analysis of sex & age (가정환경적 변인 및 아동개인적 변인과 친사회적 행동간의 관계 : 성과 연령에 따른 분석)

  • 정희원
    • Journal of the Korean Home Economics Association
    • /
    • v.36 no.11
    • /
    • pp.103-117
    • /
    • 1998
  • The purpose of this study was to investigate the relationships of home environments, personal factors on prosocial behaviors through analysis on children's sex and age. The data were collected by questionnaire method from 190 elementary school and 102 middle school children in Pusan. The instruments used are the child's prosocial behavior test on the basis of the self report scale by Yang, Jean Sook(1991). Frequency and regression analysis were applied for data analyses. The main results of the study were as follows; (1) Prosocial behaviors were directly influenced by home environments and personal factors on children's prosocial behaviors. Personal factors were stronger than home environments in influencing on children's prosocial behaviors. (2) Girl's prosocial behaviors were influenced by home economic level, parent's educational level, leaderships, the sphere of peer relations, popularity, prosocial behavior experience and maturity of prosocial motive. Boy's prosocial behaviors were influenced by leaderships, the sphere of peer relations, popularity, prosocial behavior experience and maturity of prosocial motive. (3) The effects of home environments and personal factors for prosocial behavior differed accoring to children's age. The more children aged, the less home environment & effective factors influenced.

  • PDF

A Structural Model Development of Health Insensitivity in Korean Adult (한국인 성인의 건강불감증 구조모형 구축)

  • Lee, Dong-Suk
    • Korean Journal of Adult Nursing
    • /
    • v.16 no.3
    • /
    • pp.355-365
    • /
    • 2004
  • Purpose: The aims of this study were to develope a structural model of health insensitivity and to verify the model of health insensitivity. Method: There were three theoretical variables in the hypothetical model. The endogenous variable was health insensitivity which is a concept including bluntness of health risk perception and unhealthy behavior. The exogenous variables were composed of personal factors and socio-cultural factors. In personal factors, neuroticism, external health locus of control, blunting style of information-seeking, deficit of self-efficacy, knowledge deficit related to health, health-related experience, age and education were included. Whereas socio-cultural factors include perceived group size of unhealthy behavior and stereotypes of unhealthy behavior. Result: Personal factors and sociocultural factors were significant in explanation of the health insensitivity. Relationship between personal factors and sociocultural factors was significant, too. However, the optimistic bias as part of health insensitivity was not supported by these data. GFI, AGFI and PGFI were .95, .92, .65, respectively. Therefore, this model was verified to be a good fit to the data and parsimonious. Conclusion: Nursing to change unhealthy behavior has focused on personal factors rather than sociocultural factors. Based on this result, however, the sociocultural factors should be considered as well.

  • PDF

Novel Multi-user Conjunctive Keyword Search Against Keyword Guessing Attacks Under Simple Assumptions

  • Zhao, Zhiyuan;Wang, Jianhua
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.7
    • /
    • pp.3699-3719
    • /
    • 2017
  • Conjunctive keyword search encryption is an important technique for protecting sensitive personal health records that are outsourced to cloud servers. It has been extensively employed for cloud storage, which is a convenient storage option that saves bandwidth and economizes computing resources. However, the process of searching outsourced data may facilitate the leakage of sensitive personal information. Thus, an efficient data search approach with high security is critical. The multi-user search function is critical for personal health records (PHRs). To solve these problems, this paper proposes a novel multi-user conjunctive keyword search scheme (mNCKS) without a secure channel against keyword guessing attacks for personal health records, which is referred to as a secure channel-free mNCKS (SCF-mNCKS). The security of this scheme is demonstrated using the Decisional Bilinear Diffie-Hellman (DBDH) and Decision Linear (D-Linear) assumptions in the standard model. Comparisons are performed to demonstrate the security advantages of the SCF-mNCKS scheme and show that it has more functions than other schemes in the case of analogous efficiency.