• Title/Summary/Keyword: Private Use

Search Result 1,491, Processing Time 0.025 seconds

A Study on the de-identification of Personal Information of Hotel Users (호텔 이용 고객의 개인정보 비식별화 방안에 관한 연구)

  • Kim, Taekyung
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.12 no.4
    • /
    • pp.51-58
    • /
    • 2016
  • In the area of hotel and tourism sector, various research are analyzed using big data. Big data is being generated by any digital devices around us all the times. All the digital process and social media exchange produces the big data. In this paper, we analyzed the de-identification method of big data to use the personal information of hotel guests. Through the analysis of these big data, hotel can provide differentiated and diverse services to hotel guests and can improve the service and support the marketing of hotels. If the hotel wants to use the information of the guest, the private data should be de-identified. There are several de-identification methods of personal information such as pseudonymisation, aggregation, data reduction, data suppression and data masking. Using the comparison of these methods, the pseudonymisation is discriminated to the suitable methods for the analysis of information for the hotel guest. Also, among the pseudonymisation methods, the t-closeness was analyzed to the secure and efficient method for the de-identification of personal information in hotel.

Study on Radio Frequency to Secure Private Use in Railroad (철도전용무선주파수 확보방안연구)

  • Quan, Zhong-Hua;Park, Duk-Kyu;Park, Gie-Soo;Ryou, Myung-Seon;Kim, Jae-Sik;Choi, Seung-Gap
    • Proceedings of the KSR Conference
    • /
    • 2009.05a
    • /
    • pp.2030-2037
    • /
    • 2009
  • In this paper, the study on the allocation of dedicated radio frequency for the radio communication based CBTC system is performed. The dedicated bandwidth for the the private use in railroad is figured out and the allocatable frequency band, which should be investigated hereafter, is proposed. The result of this study provides the basis to present the requirement of dedicated railroad radio frequency and can be used as an important material for the frequency allocation. Furthermore, it is expected that the result can be contributed to the development on railroad radio communication.

  • PDF

Research on Pre-service Inspection on Electrical Installations for Private Use based on Self-reliance (자가용전기설비의 사용전 자율검사제도 도입추진방안)

  • Kim, Han-Young;Ryu, Gi-Hyeon;Hwang, Min-Su
    • Proceedings of the KIEE Conference
    • /
    • 2005.07e
    • /
    • pp.112-114
    • /
    • 2005
  • It is obvious that electrical safety cannot be secured soley by the efforts from public sector including government. With the global trend of deregulation as WTO/TBT agreement comes into effect, foreign countries strive to minimize unnecessary and inefficient regulations in every field by sharing responsibilities with the privae sector to secure international competency in trade. To this same end, in this paper 2 level approach plan is suggested to pave the way to the self-security system in electrical field by introducing self-reliance safety system by stage for pre-service inspection on the electrical installations for private use based on product requirements in terms of performance.

  • PDF

A Study on Modeling Instruction And Training Program for Korean Private Security Guard (한국 민간경호원 교육프로그램 방향에 관한 연구)

  • Lee, Sang-Chul;Shin, Sang-Min
    • Korean Security Journal
    • /
    • no.9
    • /
    • pp.201-235
    • /
    • 2005
  • This study is designed to contribute for development of Private Security Business by fact-finding in instruction and training of private security guard serviced in this realm and domestic and foreign guard service and modeling effective and rational instruction and training program based on drawn problem. For this study, basically I collected and analyzed documents, theses, and papers of the inside and outside of the country. For practical use of data, I used materials of private security related institutes and police agency. And for private security educating training programs of the inside and outside of the country, I collected materials on internet, and with the help of police agency and interpol. For korean private security company's educating training programs, I made a study with the interview of private security company's businessmen. This study's conclusion is as follows. In a domestic private security enterprise, when set theory instruction minimize instruction and training program and must set up instruction and training program as practical affairs center enemy instruction, and theory instruction must be composed for instruction me that it is connected to practical affairs instruction too. The instruction course of private security guard instruction and training program composed with a security outline, a security plan, an information-gathering, civilian expenses, a security way, terror and terrorism, a related law, security trial, electronic security, a security analysis technique, company introduction, instruction and training program about a professional tube with theory instruction. Practical affairs instruction composed with the selection and a preventive security, close contact attendance security, vehicle security, security driving the security martial arts and self-protection liquor, first aid, security equipment, a gun and shooting, a security protocol, customer satisfaction, facilities security and expenses, a fire fighting instruction, teamwork training, explosive and a dangerous substance, physical strength, a documentation practical affairs, service, instruction and training program about foreigh language instruction.

  • PDF

Analysis of Anchoring Effects on the Internet : In the Case of Instant Poll (인터넷에서의 Anchoring 효과 분석 : Instant Poll을 중심으로)

  • Kim, Jong-Jin;Yang, Kwang-Min
    • Journal of Information Technology Applications and Management
    • /
    • v.14 no.1
    • /
    • pp.21-36
    • /
    • 2007
  • We face with numerous situation of decision making. In this situation, we would make decision through individual's own information, or others' decision making with ignoring private information, Also we would make decision through compromise of private information and others' information. like this, we call situation to imitate information of previous decision maker, with disregarding private own information,'information cascades' Also, anchoring effects are results of insufficient adjustment from an arbitrary value. In this paper, we examined how information cascades effects and anchoring effects would be generated in the people who use IT technique as instant poll of website. And this paper presents alternatives to decrease information cascades effects and anchoring effects. This exercise provides facts anchoring effects occur when voters can see poll result. And this paper shows that more degree of output difference is deepened, and more anchoring effects occur. Also this paper shows that when website gives positive payoff, more anchoring effects occur.

  • PDF

A study on the designing f private networks considering response time under packet switching network environment (패킷교환망 환경하에서 응답시간을 고려한 사설망 설계에 관한 연구)

  • 이영찬;민재형
    • Proceedings of the Korean Operations and Management Science Society Conference
    • /
    • 1996.10a
    • /
    • pp.157-161
    • /
    • 1996
  • This paper presents a method for designing private networks considering response time under packet switching network environment Specifically, we propose the designing process of a private network, where the host is assumed to be synchronous and the terminals to be asynchronous, according to protocol and access lines. To calculate the response time for the networks, we use the mutual independent M/M/1 and M/W/s queueing models. Comparing the response time derived from the model with the actual one, it is found that the model yields almost same performance in a more economic way. From the experiment, it is suggested that the necessary number of lines as well as the response time for a specific network can be estimated properly by sensitivity analysis.

  • PDF

A Microgrid Operation based on a Power Market Environment

  • Kim, Hak-Man;Kinoshita, Tetsuo
    • Journal of the Korean Institute of Illuminating and Electrical Installation Engineers
    • /
    • v.23 no.11
    • /
    • pp.61-68
    • /
    • 2009
  • A Microgrid is a private small-scale power system composed of distributed energy resources (DERs), storage devices and loads. And it is expected that the Microgrid will come into wide use in the near future. For this, the establishment of the Microgrid operation methodology is a very important problem. Especially, the Microgrid is greatly different from existing private small-scale power systems because of the multiple participants. Therefore, the Microgrid operation considered various requirements according to multiple participants is more complicated than the operation of existing private small-scale power systems. In this paper, Microgrid operation methodology based on a market environment is suggested. Through case studies, the effectiveness of the suggested methodology is verified.

An overview and preparation of Korean pediatrician according to the expansion of national immunization program coverage (필수예방접종경비 국가부담 사업의 확대계획에 따른 소아청소년과의 준비)

  • Cho, In Sung
    • Clinical and Experimental Pediatrics
    • /
    • v.51 no.12
    • /
    • pp.1275-1281
    • /
    • 2008
  • National Immunization Program (NIP) in korea is regulated by government for effective prevention of infectious diseases since 1954. But the program is only performed in public health center, so many people had various complaints such as inconvenience to use public center, high cost when vaccinated in private medical organization and lack of speciality and registration etc. In this reason, it was very difficult to raise the vaccination rate to 95 percent, infectious disease preventable rate. With this background national assembly and government try to expand the NIP coverage both public health center and private medical organization with increasing budget from 2009. So in this paper an overview and preparation of Korean pediatrician according to the expanding plan of NIP are described.

One Improved RLWE-based FHE and Fast Private Information Retrieval

  • Song, Wei-Tao;Hu, Bin;Zhao, Xiu-Feng
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.12
    • /
    • pp.6260-6276
    • /
    • 2019
  • With the rapid development of cloud computing, it raises real questions on privacy protection, which greatly limits the use of cloud computing. However, fully homomorphic encryption (FHE) can make cloud computing consistent with privacy. In this paper, we propose a simpler FHE scheme based on ring LWE problem, with a smaller size of ciphertext and a lower noise-expansion factor for homomorphic multiplication. Then based on our optimized RLWE-based FHE scheme, we propose a fast single-database private information retrieval protocol, combining with batching and number theoretic transform technology.

A Study of Public Library Patrons' Understanding of Library Records and Data Privacy

  • Kim, Dong-Seok;Noh, Younghee
    • International Journal of Knowledge Content Development & Technology
    • /
    • v.4 no.1
    • /
    • pp.53-78
    • /
    • 2014
  • As instances of private information leak increase, taking steps to protect such information becomes a necessity. In this study of public library patrons, we strove for a comprehensive understanding of library usage records to suggest viable solutions for private information safety in public libraries. To this end, we investigated the patrons' understanding of library usage records and determined the relationship between different user characteristics and privacy knowledge or leaks. The results show that a high number of patrons perceived these records as their own private information, but that there was no necessity for legal procedures or consent for the use of these records. Also, even though the understanding of these usage records showed that there was a relationship between the frequency of library visits and leaks of personal information, the correlation was not particularly strong.