• Title/Summary/Keyword: Provision of Individual Information

Search Result 98, Processing Time 0.032 seconds

The Effect of Real-Time Individual Process Performance Feedback on Computer-based Group Idea Generation

  • Jung, J.H.
    • The Journal of Information Systems
    • /
    • v.23 no.2
    • /
    • pp.91-107
    • /
    • 2014
  • In computer-mediated idea generation where contributions can be anonymous, the ability to accurately monitor performances is limited, inducing social loafing. Prior research has suggested that social loafing is likely an important factor in reducing task performance. Researchers have theorized that loafing could be minimized if clear performance feedback is provided. Our prior study evidences a substantial performance gain by the provision of real time performance information about who is contributing and who is not. However, our prior study incorporated the quantity feedback only to create a larger pool of ideas based on the long-standing assumption (i.e., quantity breeds quality), not considering the quality feedback. As a result, taking advantage of anonymity in the form of pseudonymity, individuals in almost all groups exhibited a tendency of self-presentation by capitalizing on ideas of which quality was low and even frivolous (i.e., junk comments) toward the later stages of the session. Thus, we have learned that the quantity performance feedback alone does not have enough restrictiveness to consistently control the performance behavior throughout the session. Since a process chart allows participants to monitor process variation by comparing new performance data to past performance data, we incorporated real-time visual process performance feedback to reveal performance histories by connecting the sequence of idea quality scores in a time-series format. Using this environment, a laboratory experiment was conducted with five-member groups that examined the influence of both identifiability (i.e., anonymity versus pseudonymity) and process performance feedback (i.e., yes or no) in a $2{\times}2$ factorial design. The result showed that groups in the process performance feedback treatment outperformed groups in the no feedback treatment. Additionally, process performance feedback and identifiability interacted such that groups in the process performance feedback/pseudonymity treatment had the highest performance. The implications of these findings for future research, as well as the implications for the design of group idea generation procedures are discussed.

Designing A V2V based Traffic Surveillance System and Its Functional Requirements (V2V기반 교통정보수집체계 설계 및 요구사항분석)

  • Hong, Seung-Pyo;Oh, Cheol;Kim, Won-Kyu;Kim, Hyun-Mi;Kim, Tae-Hyung
    • Journal of Korean Society of Transportation
    • /
    • v.26 no.4
    • /
    • pp.251-264
    • /
    • 2008
  • One of the crucial elements to fully facilitate the various benefits of intelligent transportation systems (ITS) is to obtain more reliable traffic monitoring in real time. To date, point and section-based traffic measurements have been available through existing surveillance technologies, such as loops and automatic vehicle identification (AVI) systems. However, seamless and more reliable traffic data are required for more effective traffic information provision and operations. Technology advancements including vehicle tracking and wireless communication enable the acceleration of the availability of individual vehicle travel information. This study presents a UBIquitous PRObe vehicle Surveillance System (UBIPROSS) using vehicle-to-vehicle (V2V) wireless communications. Seamless vehicle travel information, including origin-destination information, speed, travel times, and other data, can be obtained by the proposed UBIPROSS. A set of parameters associated with functional requirements of the UBIPROSS, which include the market penetration rate (MPR) of equipped vehicles, V2V communication range, and travel time update interval, are investigated by a Monte Carlo simulation- (MCS) based evaluation framework. In addition, this paper describes prototypical implementation. Field test results and identified technical issues are also discussed. It is expected that the proposed system would be an invaluable precursor to develop a next-generation traffic surveillance system.

Extraction of the Tree Regions in Forest Areas Using LIDAR Data and Ortho-image (라이다 자료와 정사영상을 이용한 산림지역의 수목영역추출)

  • Kim, Eui Myoung
    • Journal of Korean Society for Geospatial Information Science
    • /
    • v.21 no.2
    • /
    • pp.27-34
    • /
    • 2013
  • Due to the increased interest in global warming, interest in forest resources aimed towards reducing greenhouse gases have subsequently increased. Thus far, data related to forest resources have been obtained, through the employment of aerial photographs or satellite images, by means of plotting. However, the use of imaging data is disadvantageous; merely, due to the fact that recorded measurements such as the height of trees, in dense forest areas, lack accuracy. Within such context, the authors of this study have presented a method of data processing in which an individual tree is isolated within forested areas through the use of LIDAR data and ortho-images. Such isolation resulted in the provision of more efficient and accurate data in regards to the height of trees. As for the data processing of LIDAR, the authors have generated a normalized digital surface model to extract tree points via local maxima filtering, and have additionally, with motives to extract forest areas, applied object oriented image classifications to the processing of data using ortho-images. The final tree point was then given a figure derived from the combination of LIDAR and ortho-images results. Based from an experiment conducted in the Yongin area, the authors have analyzed the merits and demerits of methods that either employ LIDAR data or ortho-images and have thereby obtained information of individual trees within forested areas by combining the two data; thus verifying the efficiency of the above presented method.

Effects of Spouse-Participated Health Coaching for Male Office Workers with Cardiocerebrovascular Risk Factors (심뇌혈관질환 위험요인을 가진 남성 사무직근로자를 위한 배우자참여 건강 코칭의 효과)

  • Kang, So Hee;Hwang, Seon Young
    • Journal of Korean Academy of Nursing
    • /
    • v.49 no.6
    • /
    • pp.748-759
    • /
    • 2019
  • Purpose: This study aimed to examine the effect of spouses participating in health coaching on stage of the change, health behaviors, and physiological indicators among male office workers with cardiocerebrovascular disease (CVD) risk factors and compare the findings with trainers who provided health coaching only to workers. Methods: A quasi-experimental pretest-posttest design was used. Convenience sampling was used to recruit participants from a manufacturing research and development company in the city of Gyeonggi province. The health coaching program for the experimental group (n=26) included individual counseling sessions according to workers' stage of change, and provision of customized health information materials on CVD prevention to workers and their spouses for 12 weeks through mobile phone and email. Results: After 12 weeks of intervention, the total score for health behavior, and scores on the sub-areas of exercise and health checkups significantly improved in the experimental group, but there were no significant differences in the scores of stage of the change and physical indicators. The results of a paired t-test showed a significant decrease in the body mass index, abdominal circumference, systolic blood pressure, diastolic blood pressure, total cholesterol and triglyceride values, and a significant increase in the high-density lipoprotein cholesterol value in the experimental group after the intervention. Conclusion: To improve the health of male workers with CVD risk factors in the workplace, sharing health information with their spouses has proven to be more effective than health coaching for only workers. Therefore, it is important to develop strategies to encourage spousal participation when planning workplace health education for changing health-related behaviors.

The Status of Personal Information Protection for Original Text Information Disclosure Service (원문정보공개 서비스에서의 개인정보 보호 실태)

  • Ahn, Hye-mi
    • Journal of Korean Society of Archives and Records Management
    • /
    • v.19 no.2
    • /
    • pp.147-172
    • /
    • 2019
  • With the provision of the original text information disclosure service, the time spent on determining the disclosure of the original text information decreased, and the number of original text information disclosure significantly increased. In public institutions, the risk of the exposure of personal information also increased. In this study, the status of personal information protection in the original text information disclosure service was investigated. Moreover, the causes of the exposure of personal information were analyzed, and improvements were proposed. The survey presented the following results. First, 13% of the original text information collected contains personal information, which is the nondisclosure information. Second, among the original text information that includes personal information, the original text information, including the personal information of the public official, was the most important. In particular, many records about vacation and medical leaves were found. Third, there were many cases in which information about the individual of the representative was exposed in the agency that deals mainly with the contract work. Fourth, a large volume of personal information was not detected by filtering personal information. Upon analyzing the cause of the exposure of personal information, the following improvements are suggested. First, privacy guidelines should be redesigned. Second, the person in charge of the task of deciding whether or not to disclose original text information should be trained further. Third, the excessive disclosure of information based on the government's quantitative performance should be eased. Fourth, the filtering function of the personal information of the original text information disclosure system should be improved.

Reading Education at School Libraries: New Considerations Based on the Analysis of Students' Attitudes Toward Reading and their Reading Achievements (독서 태도와 읽기 성취도 분석이 시사하는 학교도서관 독서 교육의 방향 - 중학교를 중심으로 -)

  • Kwon, Eun-Kyung
    • Journal of Korean Library and Information Science Society
    • /
    • v.43 no.4
    • /
    • pp.249-269
    • /
    • 2012
  • In an attempt to promote reading among middle school students which has been declining sharply, this study suggests new directions for reading education in school libraries. The study examined the following: correlation between students' attitudes toward reading and their reading achievements as revealed in PISA 2009, nationwide survey results on reading, and studies on attitudes and motives for reading. Korean students' reading achievement is very high among the OECD countries but their reading attitude is not positive enough. The strong positive relationship between pleasure reading and reading achievement indicates the importance of the provision of ample collections at school libraries as well as library programs fostering independent, free-will reading. Reading programs at school libraries should cater to students' individual characteristics and needs, such as their sex, abilities, affective and cognitive attitudes, experiences, as well as the quantity, the formats, and the time of their reading, etc.

A Study on the Building Self-Publishing Repository for the Personal Digital Records (개인기록 전자출판 리포지토리 구축 방안에 관한 연구)

  • Chu, Ki Sook;Nam, Young Joon
    • Journal of Korean Library and Information Science Society
    • /
    • v.48 no.4
    • /
    • pp.351-374
    • /
    • 2017
  • In this study, we propose a model for constructing a producer-centered self-publishing repository for the personal digital records and three operational process for practical application of the operational model. 1) As essential requirements for constructing a DSpace-based self-publishing repository, we propose producer-centered service provision, management subject, operation and management plan, how to activate the repository of digital personal records producers, copyright issues, development and dissemination process. 2) The repository model constructs a producer-centered circular structure considering these requirements. 3) Through a repository model with multiple agencies, it provides various services such as content distribution, keyword search, usage statistics, recommendation system, and open access to portal users and electronic publishers as well as individual users.

Criminal Law Issues in Epidemiological Investigations Under the INFECTIOUS DISEASE CONTROL AND PREVENTION ACT (감염병의 예방 및 관리에 관한 법률상 역학조사와 관련된 형사법적 쟁점)

  • Jang, Junhyuk
    • The Korean Society of Law and Medicine
    • /
    • v.23 no.3
    • /
    • pp.3-44
    • /
    • 2022
  • As a result of a close review focusing on the case of obstruction of epidemiological investigation by a religious group A in Daegu, which was a problem when the pandemic of Covid-19 infection began in Korea around February 2, 2020, when an epidemiological investigator requested a specific group to submit a list, While there have been cases where an act of not responding or submitting an edited omission list was sentenced to the effect that the act did not fall under an epidemiological investigation, in the case of non-submission of the visitor list for the B Center, even though a 'list of visitors' was requested. Regarding the fact of refusal without a justifiable reason, 'providing a list of persons entering the building is a key factual act that forms a link between epidemiological investigations accompanying an epidemiological investigation, and refusing to do so is also an act of refusal and obstruction of an epidemiological investigation. There are cases where it is possible to demand criminal punishment. Regardless of whether the request for submission of the membership list falls under the epidemiological investigation, there are cases in which the someones' actions correspond to the refusal or obstruction of the epidemiological investigation. A lower court ruling that if an epidemiological investigation is rejected or obstructed as a result of interfering with factual acts accompanying an epidemiological investigation, comprehensively considering whether or not the list has been diverted for purposes other than epidemiological investigation, the logic is persuasive. Epidemiological investigations such as surveys and human specimen collection and testing are conducted for each infectious disease patient or contact confirmed as a result of the epidemiological investigation, but epidemiological investigations conducted on individual individuals cannot exist independently of each other, and the This is because the process of identification and tracking is essential to an epidemiological investigation, and if someone intentionally interferes with or rejects the process of confirming this link, it will result in direct, realistic, and widespread interference with the epidemiological investigation. In this article, ① there are differences between an epidemiological investigation and a request for information provision under the Infectious Disease Control and Prevention Act, but there are areas that fall under the epidemiological investigation even in the case of a request for information, ② Considering the medical characteristics of COVID-19 and the continuity of the epidemiological investigation, the epidemiological investigator the fact that the act of requesting a list may fall under the epidemiological investigation, ③ that the offense of obstructing the epidemiological investigation in certain cases may constitute 'obstruction of Performance of Official Duties by Fraudulent Means', and ④ rejecting the request for information provision under the Infectious Disease Control and Prevention Act from September 29, 2020 In this case, it is intended to be helpful in the application of the Infectious Disease control and Prevention Act and the practical operation of epidemiological investigations in the future by pointing out the fact that a new punishment regulation of imprisonment or fine is being implemented.

Factors Affecting the Intention to Adopt Self-Determination Rights of Personal Medical Information (개인의료정보 자기결정권 행사 의도에 영향을 미치는 요인)

  • Yunmo Koo;Sungwoo Hong;Beomsoo Kim
    • Information Systems Review
    • /
    • v.20 no.1
    • /
    • pp.159-177
    • /
    • 2018
  • With an extensive proliferation of information and communication technology, the volume and amount of digital information collected and utilized on the Internet have been increasing rapidly. Also on the rapid rise are side effects such as unintended breach of accumulated personal information and consequent invasion of personal privacy. Informational self-determination is rarely practiced, despite various states' legal efforts to redress data subjects' damage. Personal health information, in particular, is a subcategory of personal information where informational self-determination is hardly practiced enough. The observation is contrasted with the socio-economic inconvenience that may follow due to its sensitive nature containing individuals' physical and health conditions. This research, therefore, reviews factors of self-determination on personal health information while referring to the protection motivation theory (PMT), the long-time framework to understand personal information protection. Empirical analysis of 200 data surveyed reveals threat-appraisal (perceived vulnerability and perceived severity of threats) and coping-appraisal (perceived response effectiveness), in addition to individual levels of concern regarding provided personal health information, influence self-determination to protect personal health information. The research proposes theoretical findings and practical suggestions along with reference for future research topics.

A Conjoint Analysis of Online Information Privacy Concerns: A case in Korea (온라인 프라이버시 침해 우려에 관한 컨조인트 분석 : 한국에서의 사례)

  • Choi, Mi-Young;Lee, Sang-Yong Tom
    • Asia pacific journal of information systems
    • /
    • v.18 no.3
    • /
    • pp.45-65
    • /
    • 2008
  • The rapid growth of the Internet has increased the amount of transmission of personally identifiable information. At the same time, with new Internet related technologies, organizations are trying to collect and access more personal information than before, which in turn makes individuals concern more about their information privacy. For their successful businesses, organizations have tried to alleviate these concerns in two ways: (1) by offering privacy policies that promise certain level of privacy protection; (2) by offering benefits such as financial gains or convenience. In this paper, we interpret these actions in the context of the information processing theory of motivation. This paper follows Hann et al.(2007)'s methods to analyze Internet users privacy concerns in Korea and tries to compare the findings. Our research objectives are as follows: First, we analyze privacy concern mitigation strategies in the framework of the expectancy theory of motivation. Subsequently, we show how the expectancy theory based framework is linked o the conjoint analysis. We empirically validate the predictions that the means to mitigate privacy concerns are associated with positive valences resulting in an increase in motivational score. In order to accommodate real-life contexts, we investigate these means in trade-off situation, where an organization may only be able to offer partially complete privacy protection and/or promotions and/or convenience, While privacy protection (secondary use, improper access) are associated with positive valences, we also find that financial gains can significantly increase the individuals' motivational score of a website in Korea. One important implication of this empirical analysis is that organizations may possess means to actively manage the privacy concerns of Internet users. Our findings show that privacy policies are valued by users in Korea just as in the US or Singapore. Hence, organizations can capitalize on this, by stating their privacy policy more prominently. Also organizations would better think of strategies or means that may increase online users' willingness to provide personal information. Since financial incentives also significantly increase the individuals' motivational score of website participation, we can quantify the value of website privacy protection in terms of monetary gains. We find that Korean Internet users value the total privacy protection (protection against errors, improper access, and secondary use of personal information) as worthy as KW 25,550, which is about US 28. Having done this conjoint analysis, we next adopt cluster analysis methodology. We identify two distinct segments of Korea's internet users-privacy guardians and information sellers, and convenience seekers. The immediate implication of our study is that firms with online presence must differentiate their services to serve these distinct segments to best meet the needs of segments with differing trade-offs between money and privacy concerns. Information sellers are distinguished from privacy guardians by prior experience of information provision, To the extent that businesses cannot observe an individual's prior experience, they must use indirect methods to induce segmentation by self-selection as suggested in classic economics literature of price discrimination, Businesses could use monetary rewards to attract information sellers to provide personal information. One step forward from the societal trends that emphasize the need of legal protection of information privacy, our study wants to encourage organizations and related authorities to have the viewpoints to consider both importance of privacy protection and the necessity of information trade for the growth of e-commerce.