• 제목/요약/키워드: Types of personal data

검색결과 460건 처리시간 0.036초

공간구문론을 이용한 농어촌 뉴타운 시범사업 지구내의 주택 평면 공간 분석 (A Study on the Space Analysis of Residential House Plans in Rural New-Town Development Area Using the Space Syntax)

  • 황용운
    • 한국실내디자인학회논문집
    • /
    • 제22권5호
    • /
    • pp.241-249
    • /
    • 2013
  • The remarkable growth of city population and rate of urbanization are increasing every year rapidly in Korea. On the other hand young people are decreasing and old people are increasing in rural areas. So in 2009, the five Rural New-Town Development Areas were selected by the Ministry for Food, Agriculture Forestry and Fisheries. To provide data necessary for housing types and floor planning and development suitable for rural new-town development to be implemented constantly in rural areas all over the country later, this study used a space syntax program to analyze housing types and space structures within houses in five new-town development areas. After analyzing 33 floor plans for the five areas, there were few houses with separation of communal (integration space) and personal living spaces (segregation space). In particular, 82% had personal living spaces requiring protection of privacy, such as bedrooms and the toilet, classified into communal living spaces. Residential houses for rural new-town development targeting the young population valuing personal life and privacy, which failed to reflect city people's life properly, were expected to decrease residential satisfaction after occupancy.

크롤러와 형태소 분석기를 활용한 웹상 개인정보 유출 판별 시스템 (Crawlers and Morphological Analyzers Utilize to Identify Personal Information Leaks on the Web System)

  • 이형선;박재희;나철훈;정회경
    • 한국정보통신학회:학술대회논문집
    • /
    • 한국정보통신학회 2017년도 추계학술대회
    • /
    • pp.559-560
    • /
    • 2017
  • 최근 개인정보 유출 문제가 대두됨에 따라 데이터 수집과 웹 문서 분류에 관한 연구들이 이루어지고 있다. 기존 시스템은 개인정보의 유무 여부만 판단하고 동명이인이나 사용자가 게시한 문서에 대한 분류는 이루어지지 않기 때문에 불필요한 데이터가 필터링 되지 않는 문제점이 있다. 본 논문에서는 이를 해결하기 위해 크롤러와 형태소 분석기를 활용하여 유출된 데이터의 유형이나 동음이의어를 식별할 수 있는 시스템을 제안한다. 사용자는 크롤러를 통해 웹상의 개인정보를 수집한다. 수집된 데이터는 형태소 분석기를 통해 분류한 후 유출된 데이터를 확인할 수 있다. 또한 시스템을 재사용 할 경우 정확도가 더 높은 결과를 얻을 수 있다. 이를 통해 사용자는 맞춤형 데이터를 제공 받을 수 있을 것으로 사료된다.

  • PDF

망원급수를 이용한 암호화 알고리즘 (A Cryptography Algorithm using Telescoping Series)

  • 최은정;사공융;박왕근
    • 디지털산업정보학회논문지
    • /
    • 제9권4호
    • /
    • pp.103-110
    • /
    • 2013
  • In Information Technology era, various amazing IT technologies, for example Big Data, are appearing and are available as the amount of information increase. The number of counselling for violation of personal data protection is also increasing every year that it amounts to over 160,000 in 2012. According to Korean Privacy Act, in the case of treating unique personal identification information, appropriate measures like encipherment should be taken. The technologies of encipherment are the most basic countermeasures for personal data invasion and the base elements in information technology. So various cryptography algorithms exist and are used for encipherment technology. Therefore studies on safer new cryptography algorithms are executed. Cryptography algorithms started from classical replacement enciphering and developed to computationally secure code to increase complexity. Nowadays, various mathematic theories such as 'factorization into prime factor', 'extracting square root', 'discrete lognormal distribution', 'elliptical interaction curve' are adapted to cryptography algorithms. RSA public key cryptography algorithm which was based on 'factorization into prime factor' is the most representative one. This paper suggests algorithm utilizing telescoping series as a safer cryptography algorithm which can maximize the complexity. Telescoping series is a type of infinite series which can generate various types of function for given value-the plain text. Among these generated functions, one can be selected as a original equation. Some part of this equation can be defined as a key. And then the original equation can be transformed into final equation by improving the complexity of original equation through the command of "FullSimplify" of "Mathematica" software.

개인정보 국외이전 관련 규범 국제 동향 분석 및 한국에의 시사점 (Analysis of Global Trends in the Cross-border Transfer of Personal Data and Its Implications for Korea)

  • 고보민
    • 무역학회지
    • /
    • 제46권6호
    • /
    • pp.239-255
    • /
    • 2021
  • To review the theoretical background of regulatory approaches to cross-border transfer of personal data, this paper divides major digital trade participating countries into four types according to the OECD - non-regulatory, post-intervention, pre-supervision, and national control. It then analyzes the US, Japan, the EU, and China respectively that belong to each type. South Korea, which is currently about to pass the amendment by the National Assembly, has identified that it is in the middle of post-intervention and pre-supervision, and needs to evolve into pre-supervision norms like the EU while it has to participate more actively in the process of establishing international digital trade rules. Korea first needs to sign digital trade agreements and promote mutual certification projects more actively from the standpoint of a medium-sized open country with growing digital companies and digitally-open consumers. Second, the government should fully consider the interests of not only companies but also various trade stakeholders including domestic consumers, when drafting and implementing trade policies. To this end, 'a single window approach' is needed not only at the Ministry of Trade, Industry, and Energy, but also at the level of the entire government which require an integrated form of digital trade policy governance.

User Modeling Using User Preference and User Life Pattern Based on Personal Bio Data and SNS Data

  • Song, Hyejin;Lee, Kihoon;Moon, Nammee
    • Journal of Information Processing Systems
    • /
    • 제15권3호
    • /
    • pp.645-654
    • /
    • 2019
  • The purpose of this study was to collect and analyze personal bio data and social network services (SNS) data, derive user preference and user life pattern, and propose intuitive and precise user modeling. This study not only tried to conduct eye tracking experiments using various smart devices to be the ground of the recommendation system considering the attribute of smart devices, but also derived classification preference by analyzing eye tracking data of collected bio data and SNS data. In addition, this study intended to combine and analyze preference of the common classification of the two types of data, derive final preference by each smart device, and based on user life pattern extracted from final preference and collected bio data (amount of activity, sleep), draw the similarity between users using Pearson correlation coefficient. Through derivation of preference considering the attribute of smart devices, it could be found that users would be influenced by smart devices. With user modeling using user behavior pattern, eye tracking, and user preference, this study tried to contribute to the research on the recommendation system that should precisely reflect user tendency.

웹 2.0 시대 패션에 나타난 남성의 자아이미지 - 퍼스널 패션블로그를 중심으로 - (Men's ego-images represented on the fashion blogs in web 2.0 era)

  • 서성은
    • 복식문화연구
    • /
    • 제22권5호
    • /
    • pp.760-775
    • /
    • 2014
  • In the era of 2.0 web, blog has become the media that men can express themselves with fashion more actively and independently, as paying much attention to their personal appearance and cultivating an upscale lifestyle. They often create their fashion images in the virtual space where enables a free and creative operations of self-expression. The study aims to identify the types of men's ego-images represented on the personal fashion blogs based on the framework of analysis from the previous research (Suh, 2014), to build the base data for analyzing men's fashion style in $21^{st}$21st century that reflects changes in men's sexual images, and to verify the framework as comparing with the previous case study about the women blogs (Suh, 2014). The case studies conducted 5 men's personal blogs such as bryanboy, iamgala, little fashionisto, katelovesme, and stylentonic. The study results almost same types of women's ego-images as following. The imaginary ego-image is classified as narcissism, regression, identification, and virtuality, the social ego-image as symbolism of roles and others'desire, the real ego as primary instinct, practical reality, object a, jouissance and sexual perversion. The personal style of men shown on the fashion blogs appears as a significant factor to analyze male customers in the growing men's beauty and fashion market.

The Personal Information Management Practices of the Graduates of the Department of Information Studies at Kuwait University

  • AlRukaibani, Bashaer;Chaudhry, Abdus Sattar
    • International Journal of Knowledge Content Development & Technology
    • /
    • 제9권1호
    • /
    • pp.19-42
    • /
    • 2019
  • This study examined activities involving the finding, organizing, managing, and re-finding of information by knowledge workers in Kuwait. This research also conducted a review of the tools needed for effective personal information management (PIM) and assessed perceptions about improving PIM through Internet use. Data were collected through semi-structured interviews conducted among 26 graduates of the Department of Information Studies at Kuwait University. These participants are currently employed in different sectors engaged in a variety of information-related activities. This study's findings indicated that participants gathered different types of information from a variety of sources. This information was stored using several devices and services, including desktop computers, shared drives, clouds, bookmarked websites, e-mail correspondence, and favorites lists. Participants organized information in personal folders according to categories such as subject/topic, time, project, document type, and geographical region. Preferred methods for information re-finding included searching by keyword and browsing through folders. Interviewees reported problems of information overload, fragmentation, and anxiety. Most were active in social media via mobile device, while some of them used Siri or Ask Google to retrieve information. Tools used for PIM included calendars, tasks, schedules, e-mail management tools, clouds, and social networking tools. Participants reported that the Internet helped with personal information management practices, but that some privacy issues arose in this context.

초등학생들의 과학적 논증활동에서 증거의 유형 및 수준 분석 (Analysis of the Types and Levels of Evidence in Elementary Students' Scientific Argumentation)

  • 유혜경;임희준
    • 한국초등과학교육학회지:초등과학교육
    • /
    • 제33권1호
    • /
    • pp.162-171
    • /
    • 2014
  • The use of evidence is very important in scientific argumentation. This study investigated the types and levels of evidence in scientific argumentation in an elementary science class. 34 fourth graders in a class were selected as subjects, and argumentation was performed in seven lessons on 'Heat transfer and our lives' unit. Small group argumentation was recorded, transcribed and used as data for analyses. The analyses found the following results. First, in regard of the types of evidence, personal evidence dominated over authority-based evidence. Second, in the analysis of the levels of evidence, using inappropriate evidence was found to account for the highest percentage, followed by using appropriate evidence and just arguments without evidence. There were quite a lot of cases of arguments without evidence. It was found that the types and levels of evidence that students used could change depending on the relevance between experiments and argument tasks.

노인의 시간배분 유형에 따른 시간사용만족도의 차이 (Differences in Time Use Satisfaction by Time Allocation Types of the Elderly)

  • 김외숙
    • 가족자원경영과 정책
    • /
    • 제19권1호
    • /
    • pp.163-180
    • /
    • 2015
  • The purpose of this study was to explore a typology of time allocation, investigate determinants of time allocation types, and analyze differences in time use satisfaction by the types of time use of the elderly. The data source for this research was the 2009 Time Use Survey conducted by the Korea National Statistical office (KNSO). The 4,699 time diaries (3,552 for weekday, 1,147 for Sunday) completed by the elderly over the age of 60 were analyzed using mean, standard deviation, chi-square, cluster analysis, ANOVA analysis, Duncan test, and multinomial logistic regression analysis. Time allocation of the elderly was classified into four types: personal care oriented, work oriented, leisure oriented, and balanced type. Gender, age, education, employment status, income, and the presence of spouse were identified as determinants for each type. According to the types of time allocation, time use satisfaction was different on week days.

인터넷 게임동기 유형에 따른 대학적응과 인터넷 게임중독 (College Adaptation and Internet Game Addiction by Internet Game Motivation Types)

  • 백지숙
    • 아동학회지
    • /
    • 제26권1호
    • /
    • pp.31-46
    • /
    • 2005
  • This study examined internet game addiction and college adaptation(academic, social, personal-emotional, institutional attachment) by Internet game motivation types. The 475 subjects (235 male and 240 female college students) responded to the newly developed self-report measure, Internet Game Motivation Scale (IGMS). Cluster analyses of IGMS data identified 5 types of Internet game motivation: Active I, Active II, Moderate I, Moderate II, Passive. Active (I, II) types had the highest scores in Internet game addiction while the Passive type yielded the lowest. Except for academic adaptation, all aspects of college adaptation varied as a function of Internet game motivation types. Overall, Moderate II showed highest whereas Active I showed lowest academic adaptation scores.

  • PDF