• Title/Summary/Keyword: Privacy Evaluation

Search Result 171, Processing Time 0.025 seconds

Comparison of Websites Offering Nutrition Services Controlled by Registered Dietitians and Those Controlled by Non-dietitian Nutrition Consultants

  • Hires Brigette;Ham Sunny;Forsythe Hazel W.
    • Journal of Community Nutrition
    • /
    • v.8 no.1
    • /
    • pp.9-15
    • /
    • 2006
  • Health care is one of the most popular reasons for accessing the Internet. Of concern is the amount of information from disreputable sources available on the Internet. A review of websites offering nutrition consulting services suggests sites are controlled by both registered dietitians and non-dietitian professionals marketing themselves as nutrition consultants. The purpose of this study was to investigate structure and content of websites controlled by registered dietitians and nondietitians professionals marketing themselves as nutritionists or nutrition consultants. Internet search queries of 'dietitian', 'dietitian consultant', and 'nutrition consultant' were completed for website selection. Thirty websites controlled by registered dietitians and 10 websites controlled by nutrition consultants were reviewed using an 18-item website evaluation instrument developed for this study. Five evaluators were recruited from the dietetics program at the University of Kentucky. Overall, websites controlled by registered dietitians ranked higher than websites controlled by nutrition consultants in a majority of categories. Sites controlled by registered dietitians ranked statistically higher for the following categories: 'accuracy of information'(p<.0001), 'inclusion of professional resume of owner or primary manager' (p<.05), and 'explanation of the affiliation to externallinks'(p<.05). A majority of sites controlled by both dietitians and nutrition consultants achieved a poor ranking in regards to provision of a legal disclaimer and inclusion of a privacy policy. Prior studies suggest personal privacy is the most important concern for consumers accessing health information on the Internet. Findings from this project will benefit dietitians to assist in development of reputable nutrition related websites.

Investigating the Impact of Affective Factors on Self-disclosure

  • Kim, Gimun
    • Journal of the Korea Society of Computer and Information
    • /
    • v.27 no.9
    • /
    • pp.235-242
    • /
    • 2022
  • One of the important research streams in the privacy literature for the past decade has been to discover factors affecting the decision-making process related to self-disclosure, called the cost-benefit analysis. However, although human behavior is greatly influenced by affective as well as cognitive factors, most of the factors found in previous studies are those with cognitive properties. Based on the awareness of this imbalanced situation, the study examines the role of affective factors on self-dislosure decision-making, especially SNS enjoyment and SNS fatigue. As a result of data analysis, the study finds that the influence of these affective factors is significant, and the influence of SNS enjoyment is greater than that of SNS fatigue. As for the relationship between the affective factors and the decision-making factors, the study finds that the positive affect(enjoyment) relates to only the positive evaluation factor(benefit) and the negative affect(fatigue) relates only the negative evaluation factor(cost), which demonstrate the congruent effect mechanism. Based on the result, the study discusses meaningful implications and suggestions for future studies.

A Study on the Environmental Evaluation for Bed Room Space of University Dormitories in North Region in Gyeongbuk Province (경북 북부권 대학교 기숙사 침실 공간 환경평가에 관한 연구)

  • Hwang, Yong-Woon
    • Journal of the Korean housing association
    • /
    • v.19 no.1
    • /
    • pp.67-77
    • /
    • 2008
  • In general, the function of university dormitory includes residental, educational and many other functions for students who need quite environment and energetic living life. Among these many functions, the most important function is residental function (bed room). This study attempts to evaluate the bed room environment of four university dormitories in north region of Gyeongbuk Province using resident's (students) need and satisfaction. In the present work, SPSS window version12.0 program's Anova (duncan, scheff, t-test.) was used for analysis of statistical data which obtained from survey. The field surveys carried out for a total samples of 473 residents such as AD (118), DY (159), Kw (101) and SJ (95)) types of bed room in four university dormitories. The result appears that the most dissatisfied factor of resident was personal privacy, and the most satisfied factor was the direction (location) of bed room space.

Residents' Evaluation for Rural Housing Environment (농가 주거환경 평가)

  • 김유일;윤진옥
    • Journal of Korean Society of Rural Planning
    • /
    • v.4 no.2
    • /
    • pp.79-88
    • /
    • 1998
  • The purpose of this study was to identify factors related to residential satisfaction, and to examine the rural housing and village environment which enable to derive what should be considered in the future rural housing improvement. Data were collected by questionnaire survey in 11 rural villages - suburban rural area, plain rural area, intermediate rural area, mountainous rural area. The major findings are as follows: 1) The rural residents rather dissatisfied with'management/maintenance','economic value','facade'in housing level, The overall housing satisfaction level was just medium(neither satisfied nordissatisfied). 2) They also dissatisfied with'playground for children','education condition','medical facilities', 'market'in village level. The overa'll village satisfaction level was just above average(slightly satisfied). 3) Vrom the result of ANOVA test, there are no significant differences in residents evaluation for tiousing and village attributes among 4 rural areas. 4) Factor analysis identified six rural housing environmental factors:'inside utilities','housing size' 'aesthetic aspects','safety','privacy','outside utilities'. 5) For the rural village environments six important factors were derived :'public services','commercial convenience facilities','social interaction','environmental pollution','amenity','agricultural service facilities'.

  • PDF

A Designing Method of Performance Evaluation for Network Security Equipment of Korean Style (한국형 네트워크 보안 시스템 성능 평가 방법론 실계)

  • Ju, Seung Hwan;Seo, Hee Suk;Kim, Sang Youn
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.7 no.3
    • /
    • pp.97-105
    • /
    • 2011
  • With the advancement of network, privacy information as well as confidential information that belongs to government and company are exposed to security incident like spreading viruses or DDoS attack. To prevent these security incident and protect information that belongs to government and company, Security system has developed such as antivirus, firewall, IPS, VPN, and other network security system. Network security systems should be selected based on purpose, usage and cost. Verification for network security product's basic features performed in a variety of ways at home and abroad, but consumers who buy these network security product, just rely on the information presented at companies. Therefore, common user doing self performance evaluation for perform Verification before buying network security product but these verification depends on inaccurate data which based on some user's criteria. On this paper, we designing methodology of network security system performance evaluation focused on Korean using other cases of performance evaluation.

A Study on Priority Rankings of Actions Providing Personal Information Security (개인정보의 안전성 확보조치 기준에서의 우선순위 정립에 관한 연구)

  • Kim, Young Hee;Kook, Kwang Ho
    • Convergence Security Journal
    • /
    • v.14 no.4
    • /
    • pp.9-17
    • /
    • 2014
  • With the rapid development of the Internet and information technology, a company that deals with personal information does not have proper action to protect personal privacy and not take measures for the safe handling and management of personal information. It generates the case to abuse of personal information occurring frequently. In order to focus the effort to reduce damage and protect the privacy of personal information entity and enhance privacy laws based on the connection method and the processing of personal information, Korea encourages a company to follow regulation by providing certain criteria. However, in the case of items of measures standard of safety of personal information such as priority applicable criteria in accordance with the importance of itemized characteristics and the company of each individual information processing is not taken into account, and there are some difficulties to execute. Therefore, we derive criteria by law and reviewing existing literature related, the details of the measures standard of safety of personal information in this study and generate a hierarchical structure by using the KJ method for layering and quantification of the evaluation in integration of the reference item similar and the grouping. Accordingly, the weights calculated experts subject using the AHP method hierarchical structures generated in this manner, it is an object of the proposed priority for privacy and efficient more rational enterprise.

A Study on Security Requirements for 5G Base Station (5G 기지국에 대한 보안성평가기준 연구)

  • Hong, Paul;Kim, Yejun;Cho, Kwangsoo;Kim, Seungjoo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.31 no.5
    • /
    • pp.919-939
    • /
    • 2021
  • As a next-generation communication technology, 5G networks are capable of handling large amounts of traffic based on higher speeds, shorter communication delays, and higher connectivity compared to 4G networks. In this 5G network environment, base stations are installed all over the city at high density due to their characteristics, and are connected to user terminals to provide services. Therefore, if the base station is damaged by a malicious attacker, it is expected to cause great damage to users and society as a whole. So the need for secure communication equipment such as 5G base stations has emerged. Therefore, in this paper, we propose the security functional requirements derived using threat modeling, a systematic methodology for 5G base stations, and the security assurance requirements at the level that can cope with the backdoor issues. The security requirements proposed in this paper can be used for base station design and development to construct a secure network environment as a security evaluation standard for 5G base stations.

Model Inversion Attack: Analysis under Gray-box Scenario on Deep Learning based Face Recognition System

  • Khosravy, Mahdi;Nakamura, Kazuaki;Hirose, Yuki;Nitta, Naoko;Babaguchi, Noboru
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.3
    • /
    • pp.1100-1118
    • /
    • 2021
  • In a wide range of ML applications, the training data contains privacy-sensitive information that should be kept secure. Training the ML systems by privacy-sensitive data makes the ML model inherent to the data. As the structure of the model has been fine-tuned by training data, the model can be abused for accessing the data by the estimation in a reverse process called model inversion attack (MIA). Although, MIA has been applied to shallow neural network models of recognizers in literature and its threat in privacy violation has been approved, in the case of a deep learning (DL) model, its efficiency was under question. It was due to the complexity of a DL model structure, big number of DL model parameters, the huge size of training data, big number of registered users to a DL model and thereof big number of class labels. This research work first analyses the possibility of MIA on a deep learning model of a recognition system, namely a face recognizer. Second, despite the conventional MIA under the white box scenario of having partial access to the users' non-sensitive information in addition to the model structure, the MIA is implemented on a deep face recognition system by just having the model structure and parameters but not any user information. In this aspect, it is under a semi-white box scenario or in other words a gray-box scenario. The experimental results in targeting five registered users of a CNN-based face recognition system approve the possibility of regeneration of users' face images even for a deep model by MIA under a gray box scenario. Although, for some images the evaluation recognition score is low and the generated images are not easily recognizable, but for some other images the score is high and facial features of the targeted identities are observable. The objective and subjective evaluations demonstrate that privacy cyber-attack by MIA on a deep recognition system not only is feasible but also is a serious threat with increasing alert state in the future as there is considerable potential for integration more advanced ML techniques to MIA.

Deriving Usability Evaluation Criteria for Threat Modeling Tools (위협 모델링 도구의 사용성 평가기준 도출)

  • In-no Hwang;Young-seop Shin;Hyun-suk Cho;Seung-joo Kim
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.34 no.4
    • /
    • pp.763-780
    • /
    • 2024
  • As the domestic and international landscape undergoes rapid changes, the importance of implementing security measures in response to the growing threats that businesses face is increasing. In this context, the need for Security by Design (SbD), integrating security from the early design stages, is becoming more pronounced, with threat modeling recognized as a fundamental tool of SbD. Particularly, to save costs and time by detecting and resolving security issues early, the application of the Shift Left strategy requires the involvement of personnel with limited security expertise, such as software developers, in threat modeling. Although various automated threat modeling tools have been released, their lack of user-friendliness for personnel lacking security expertise poses challenges in conducting threat modeling effectively. To address this, we conducted an analysis of research related to threat modeling tools and derived usability evaluation criteria based on the GQM(Goal-Question-Metric) approach. An expert survey was conducted to validate both the validity and objectivity of the derived criteria. We performed usability evaluations of three threat modeling tools (MS TMT, SPARTA, PyTM), and the evaluation results led to the conclusion that MS TMT exhibited superior usability compared to other tools. This study aims to contribute to the creation of an environment where personnel with limited security expertise can effectively conduct threat modeling by proposing usability evaluation criteria.

A Study on the Post-Occupancy Evaluation of the Types of the Learning Space Unit in Elementary Schools (열린 학교 단위학습공간의 구성유형별 건물성능평가에 관한 연구 - 대구광역시 소재 초등학교를 대상으로 -)

  • Choi, Jae-Young;Lee, Sang-Hong;Choi, Moo-Hyuck
    • Journal of the Korean Institute of Educational Facilities
    • /
    • v.10 no.2
    • /
    • pp.15-22
    • /
    • 2003
  • The purpose of this study is to find problems and to provide architectural design standards of the Learning Space Unit(L.S.U.) in Elementary Schools through the Post-occupancy Evaluation(POE). In this study, we found six major problems of the type of the L.S.U. in elementary schools. More than 50% of users expressed dissatisfactions in these items : size, safety, cooling facility, noise, privacy and primary meaning for its original purpose. After the interrelation-analysis, we checked pros and cons about each forms of L.S.U. It is the result of analysis of the layout method in L.S.U. 1) "$8.4m{\times}8.4m$" classroom unit got the highest positive responses 2) "2-classroom type" and "4-classroom type" got higher score than "3-classroom type" 3) "Whole faced type" 1) made more active Multi-space than "Partial faced type" 4) prefered prepared "Open-classroom" to "Closed-classroom" 5) 'Zoning type between L.S.U.s' couldn't influence to user's responses. Designers can consult those informations when they plan a new, remodeling and additional elementary school.