• Title/Summary/Keyword: Types of personal data

Search Result 460, Processing Time 0.033 seconds

Exploring Types of Verbal Violence Through Speech Analysis on Non-facing Channels (비대면 채널에서의 음성분석을 통한 언어폭력 유형 탐색)

  • Kim, Jongseon;Ahn, Seongjin
    • The Journal of Korean Association of Computer Education
    • /
    • v.23 no.3
    • /
    • pp.71-79
    • /
    • 2020
  • This study investigates the rising issue of verbal violence at non-facing channels. Focus Group Interview(FGI) was conducted to examine verbal violence occurred during emotional labors in real-life cases. In addition, the distribution of verbal violence in the conversation was confirmed through a new big data technology called Speech Analysis(SA). The result findings highlighted the two perspectives as below. First, verbal violence occurred through calls, is classified into personal insult, swearing/verbal abuse, unreasonable demand, (sexual) harassment and intimidation/threat. Second, Speech Analysis result exhibited the most frequently appeared verbal violence were personal insult and swearing/verbal abuse. Informal language use and speaking in disrespectable manner was the highest rate in personal insult category. Moreover general cursing was the highest rate in swearing/verbal abuse category. In particular, the rate of using curse language was the highest in overall cases of verbal violence. This study summarizes the types of verbal violence that occur in non-facing channels and suggests a need for further investigation on how verbal stress affects working environment for emotional labor.

A Study on Strengthening Personal Information Protection in Smart City (스마트시티 속 개인정보보호 강화 방안 연구)

  • Cheong, Hwan-suk;Lee, Sang-joon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.4
    • /
    • pp.705-717
    • /
    • 2020
  • Cities in the world are rushing to develop smart cities to create a sustainable and happy city by solving many problems in cities using information and communication technologies such as big data and IoT. However, in Korea's smart cities and smart city certification systems, the focus is on platform-oriented hardware infrastructure, and the information security aspect is first considered to build and authenticate. It is a situation in which a response system for the risk of leakage of big data containing personal information is needed through policy research on the aspect of personal information protection for smart city operation. This paper analyzes the types of personal information in smart cities, problems associated with the construction and operation of smart cities, and the limitations of the current smart city law and personal information protection management system. As a solution, I would like to present a model of a personal information protection management system in the smart city field and propose a plan to strengthen personal information protection through this. Since the management system model of this paper is applied and operated in the national smart city pilot cities, demonstration cities, and CCTV integrated control centers, it is expected that citizens' personal information can be safely managed.

The New Recreational Transportation on the Street: Personal Mobility, Is It Safe?

  • Kim, Young Woo;Park, Won Bin;Cho, Jin Seong;Hyun, Sung Youl;Lee, Geun
    • Journal of Trauma and Injury
    • /
    • v.31 no.3
    • /
    • pp.125-134
    • /
    • 2018
  • Purpose: The interest in the personal mobility started to grow and as the interest increases, there are growing concerns about the safety of it. The purpose of the study is to look at the types and dynamics of patients injured by the personal mobilities. Methods: This was a retrospective 2-year observational study, from January 2016 to December 2017, on the patients who visited the emergency center and the trauma center, with an injury related to driving the personal mobility. Cases of the personal mobility-related accident were collected based on electronic medical records and hospital emergency department-based injury in-depth surveillance data. Results: A total of 65 patients visited the emergency center and the trauma center, during this study period. Six patients of 50 adults admitted the alcohol consumption (12%) and two adult patients wore the helmet as the protection gear (3.1%). The number of the patients in 2017 rises three times more than the number of patients in 2016 (51 vs. 14). Injuries to the head and neck region (67.7%) was the most common, followed by the upper extremity (46.2%). Eleven patients (16.9%) were admitted to the hospital, of whom three were admitted to the intensive care unit due to intracranial hemorrhage. Nine patients underwent surgery. Conclusions: The use of the personal mobility will continue to grow and the accidents, caused by the vehicle, will increase along with it. The study showed the damage is worse than expected. Personal mobility currently has a limited safety laws and the riders are not yet fully aware of its danger. The improvement of the regulation of the personal mobility, safety education is needed.

Adaptive Recommendation System for Tourism by Personality Type Using Deep Learning

  • Jeong, Chi-Seo;Lee, Jong-Yong;Jung, Kye-Dong
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.12 no.1
    • /
    • pp.55-60
    • /
    • 2020
  • Adaptive recommendation systems have been developed with big data processing as a system that provides services tailored to users based on user information and usage patterns. Deep learning can be used in these adaptive recommendation systems to handle big data, providing more efficient user-friendly recommendation services. In this paper, we propose a system that uses deep learning to categorize and recommend tourism types to suit the user's personality. The system was divided into three layers according to its core role to increase efficiency and facilitate maintenance. Each layer consists of the Service Provisioning Layer that real users encounter, the Recommendation Service Layer, which provides recommended services based on user information entered, and the Adaptive Definition Layer, which learns the types of tourism suitable for personality types. The proposed system is highly scalable because it provides services using deep learning, and the adaptive recommendation system connects the user's personality type and tourism type to deliver the data to the user in a flexible manner.

Privacy Analysis and Comparison of Pandemic Contact Tracing Apps

  • Piao, Yanji;Cui, Dongyue
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.11
    • /
    • pp.4145-4162
    • /
    • 2021
  • During the period of epidemic prevention and control, contact tracing systems are developed in many countries, to stop or slow down the progression of COVID-19 contamination. However, the privacy issues involved in the use of contact tracing apps have also attracted people's attention. First, we divide contact tracing techniques into two types: Bluetooth Low Energy (BLE) based and Global Positioning System (GPS) based techniques. In order to clear understand the system structure and its elements, we create data flow diagram (DFD) of each types. Second, we analyze the possible privacy threats contained in various types of contact tracing apps by applying LINDDUN, which is a threat modeling technique for personal information protection. Third, we make a comparison and analysis of various contact tracing techniques from privacy point of view. These studies can facilitate improve tracing and security performance to contact tracing apps through comparisons between different types.

A Personal Memex System Using Uniform Representation of the Data from Various Devices (다양한 기기로부터의 데이터 단일 표현을 통한 개인 미멕스 시스템)

  • Min, Young-Kun;Lee, Bog-Ju
    • The KIPS Transactions:PartB
    • /
    • v.16B no.4
    • /
    • pp.309-318
    • /
    • 2009
  • The researches on the system that automatically records and retrieves one's everyday life is relatively actively worked recently. These systems, called personal memex or life log, usually entail dedicated devices such as SenseCam in MyLifeBits project. This research paid attention to the digital devices such as mobile phones, credit cards, and digital camera that people use everyday. The system enables a person to store everyday life systematically that are saved in the devices or the deviced-related web pages (e.g., phone records in the cellular phone company) and to refer this quickly later. The data collection agent in the proposed system, called MyMemex, collects the personal life log "web data" using the web services that the web sites provide and stores the web data into the server. The "file data" stored in the off-line digital devices are also loaded into the server. Each of the file data or web data is viewed as a memex event that can be described by 4W1H form. The different types of data in different services are transformed into the memex event data in 4W1H form. The memex event ontology is used in this transform. Users can sign in to the web server of this service to view their life logs in the chronological manner. Users can also search the life logs using keywords. Moreover, the life logs can be viewed as a diary or story style by converting the memex events to sentences. The related memex events are grouped to be displayed as an "episode" by a heuristic identification method. A result with high accuracy has been obtained by the experiment for the episode identification using the real life log data of one of the authors.

A Blocking Algorithm of a Target Object with Exposed Privacy Information (개인 정보가 노출된 목표 객체의 블로킹 알고리즘)

  • Jang, Seok-Woo
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.20 no.4
    • /
    • pp.43-49
    • /
    • 2019
  • The wired and wireless Internet is a useful window to easily acquire various types of media data. On the other hand, the public can easily get the media data including the object to which the personal information is exposed, which is a social problem. In this paper, we propose a method to robustly detect a target object that has exposed personal information using a learning algorithm and effectively block the detected target object area. In the proposed method, only the target object containing the personal information is detected using a neural network-based learning algorithm. Then, a grid-like mosaic is created and overlapped on the target object area detected in the previous step, thereby effectively blocking the object area containing the personal information. Experimental results show that the proposed algorithm robustly detects the object area in which personal information is exposed and effectively blocks the detected area through mosaic processing. The object blocking method presented in this paper is expected to be useful in many applications related to computer vision.

Analysis Scheme on Backup Files of Samsung Smartphone available in Forensic (포렌식에서 활용 가능한 삼성 스마트폰 백업 파일 분석 기법)

  • Lee, Gyuwon;Hwang, Hyunuk;Kim, Kibom;Chang, Taejoo
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.2 no.8
    • /
    • pp.349-356
    • /
    • 2013
  • As various features of the smartphone have been used, a lot of information have been stored in the smartphone, including the user's personal information. However, a frequent update of the operating system and applications may cause a loss of data and a risk of missing important personal data. Thus, the importance of data backup is significantly increasing. Many users employ the backup feature to store their data securely. However, in the point of forensic view these backup files are considered as important objects for investigation when issued hiding of smartphone or intentional deletion on data of smartphone. Therefore, in this paper we propose a scheme that analyze structure and restore data for Kies backup files of Samsung smartphone which has the highest share of the smartphone in the world. As the experimental results, the suggested scheme shows that the various types of files are analyzed and extracted from those backup files compared to other tools.

Typology of Weekend Time Use and Time Use Satisfaction of Married Working Men with a Preschool Child in Korea (미취학 자녀를 둔 기혼 취업 남성의 주말 시간사용 유형화와 유형별 시간사용만족도)

  • Kim, Soyoung;Chin, Meejung
    • Journal of Families and Better Life
    • /
    • v.33 no.2
    • /
    • pp.71-88
    • /
    • 2015
  • The purpose of this study was to look into how married working men with a child younger than six years old spent their weekend time either alone or with their wives on housework, family care, and leisure activities, and to find out whether different types of time use brought about different levels of satisfaction to their use of time on weekends. Factors associated with each type were also explored. We analyzed 857 weekend time diaries of married men with a preschooler and men who worked more than 40 hours a week. This data came from the 2009 Time Use Survey conducted by Statistics Korea. Descriptive statistics and cluster analysis results showed that weekend time distribution to those three activities was classified into four different types, namely, 'nonparticipation', 'personal leisure centered', 'couple leisure centered', and 'family centered'. Time use satisfaction for 'couple leisure centered' and 'family centered' types which involved wife and child was significantly higher than the other two types. Age and traditional gender role attitude were associated with the personal leisure and couple leisure centered types, while work related factors such as work hours, regular day off, employment status, and occupation functioned as determinants of the nonparticipation type. Findings from this study suggest that weekend time spent together with family could be the source of satisfaction, but almost half of the respondents were deprived of their weekend family time due to work schedules on weekends. This study supports the need for organizational and policy efforts to ensure non-working weekends for fathers and husbands.

The Operation of Domestic Women's Apparel Fashion Designer - Focusing on Brand type and Fashion Merchandising Process -

  • Lee, Eun-A;Kwon, Hae-Sook
    • Journal of Fashion Business
    • /
    • v.10 no.3
    • /
    • pp.87-99
    • /
    • 2006
  • For comprehending the duties of fashion designer, Sharon(1989) has suggested to look at the procedure how the goods are being produced. The purpose of this research is to identify the task of domestic fashion designer by comparing and analyzing one's work range and performing level in the fashion merchandising process according to the brand types which one is involved in. The preliminary research for the questionnaire was conducted with 5 chief designers of woman's apparel manufactures in Seoul. They were asked to judge if designer's tasks fit to their carry-out operations in the pre-fixed questionnaire which had been done based on preliminary researches and literatures related with fashion merchandising process. The contents of research questionnaire are 11 questions to understand the general characteristics of companies and the participated subjects, and 42 questions to understand the designers' operations. For the selection of NB, among 503 domestic female apparel brands that were in 'Korean Textile Fashion yearbook (2002-2003), the companies that were located in Seoul and possible for cooperation by researcher's personal relationship were selected. For DB, cooperation was requested for brands that were located in Seoul among the 137 brands that participates on Domestic Collection. For GB, 50 stores were selected at random or by personal relationship among 32 GB shops such as Freya Town, Doosan Tower, New Zone, and so on. Total 300 questionnaire distributed to the designers, 192 copies were used for final data analysis. For data analysis, descriptive statistics and ANOVA, Sceffe test were used using SPSS V. 11 1. The participated fashion designers operated 41 categories of suggested 42 categories in the fashion merchandising process. 2. The ranges and contents of tasks in the fashion merchandising process that fashion designers mainly carry-out are very different according to the brand types and showed much different level of task carry-out. Only in the categories of 'fashion trend information' and 'design ideation', all three brand type showed the highest level of task performance. And the design related tasks presented common higher level of performance than the other tasks in all brand types. In order to comprehend the operation of fashion designer, various approaching methods are required according to various apparel manufactures' characteristics.