• Title/Summary/Keyword: electronic management

Search Result 3,565, Processing Time 0.043 seconds

Adaptive RFID anti-collision scheme using collision information and m-bit identification (충돌 정보와 m-bit인식을 이용한 적응형 RFID 충돌 방지 기법)

  • Lee, Je-Yul;Shin, Jongmin;Yang, Dongmin
    • Journal of Internet Computing and Services
    • /
    • v.14 no.5
    • /
    • pp.1-10
    • /
    • 2013
  • RFID(Radio Frequency Identification) system is non-contact identification technology. A basic RFID system consists of a reader, and a set of tags. RFID tags can be divided into active and passive tags. Active tags with power source allows their own operation execution and passive tags are small and low-cost. So passive tags are more suitable for distribution industry than active tags. A reader processes the information receiving from tags. RFID system achieves a fast identification of multiple tags using radio frequency. RFID systems has been applied into a variety of fields such as distribution, logistics, transportation, inventory management, access control, finance and etc. To encourage the introduction of RFID systems, several problems (price, size, power consumption, security) should be resolved. In this paper, we proposed an algorithm to significantly alleviate the collision problem caused by simultaneous responses of multiple tags. In the RFID systems, in anti-collision schemes, there are three methods: probabilistic, deterministic, and hybrid. In this paper, we introduce ALOHA-based protocol as a probabilistic method, and Tree-based protocol as a deterministic one. In Aloha-based protocols, time is divided into multiple slots. Tags randomly select their own IDs and transmit it. But Aloha-based protocol cannot guarantee that all tags are identified because they are probabilistic methods. In contrast, Tree-based protocols guarantee that a reader identifies all tags within the transmission range of the reader. In Tree-based protocols, a reader sends a query, and tags respond it with their own IDs. When a reader sends a query and two or more tags respond, a collision occurs. Then the reader makes and sends a new query. Frequent collisions make the identification performance degrade. Therefore, to identify tags quickly, it is necessary to reduce collisions efficiently. Each RFID tag has an ID of 96bit EPC(Electronic Product Code). The tags in a company or manufacturer have similar tag IDs with the same prefix. Unnecessary collisions occur while identifying multiple tags using Query Tree protocol. It results in growth of query-responses and idle time, which the identification time significantly increases. To solve this problem, Collision Tree protocol and M-ary Query Tree protocol have been proposed. However, in Collision Tree protocol and Query Tree protocol, only one bit is identified during one query-response. And, when similar tag IDs exist, M-ary Query Tree Protocol generates unnecessary query-responses. In this paper, we propose Adaptive M-ary Query Tree protocol that improves the identification performance using m-bit recognition, collision information of tag IDs, and prediction technique. We compare our proposed scheme with other Tree-based protocols under the same conditions. We show that our proposed scheme outperforms others in terms of identification time and identification efficiency.

An Analysis on the Priority of Educational Needs of Teachers in Charge of Educational Contents of Invention Intellectual Property in Secondary Vocational Education (중등단계 직업교육에서의 발명·지식재산 교육내용에 대한 담당 교사의 교육요구도 우선 순위 분석)

  • Lee, Sang-hyun;Lee, Chan-joo;Lee, Byung-Wook
    • 대한공업교육학회지
    • /
    • v.40 no.2
    • /
    • pp.155-174
    • /
    • 2015
  • The purposes of this study were to analyze the property of educational needs of teachers for educational contents of invention and intellectual property in secondary vocational education and provide fundamental data for the development of job training programs so as to develop the capabilities of teachers, the base for effective education of invention intellectual property in secondary vocational education. To achieve them, educational needs for the educational contents of invention intellectual property and the priority of the educational needs in secondary vocational education based on the recognition of the teachers were analyzed and suggested. Concrete results of this study can be suggested as follows. First, the average of educational needs of the teachers for the educational contents of invention intellectual property in secondary vocational education was 5.02. There were 23 items of the educational contents whose educational needs were higher than the average of the whole items and for those items and the average of each item, there were F4(The average of patent applications) 6.72, F5(Modification and supplementation of specification sheets) 6.46, F2(Writing of patent floor plans) 6.39, F3(Writing of patent specification sheets and abstraction) 6.31, A5(Invention method and activity) 6.27, E6(Invention design project) 6.15, H3(Invention commercialization) 5.97, F1(Patent information and application) 5.90, E5(Design obligation) 5.78, E3(Designing process of inventional design) 5.77, A4(Invention and problem solving) 5.57, G2(Patent investigation and classification) 5.47, C2(Thinking method of inventional problem solution) 5.45, E4(Production of inventional design product) 5.45, B5(Inventional patent project) 5.42, A2(Creativity development) 5.26, C4(Inventional problem solving project) 5.26, H4(Invention marketing) 5.26, H2(Analysis on invention commercialization) 5.20, D4(Invention and management) 5.16, C3(Problem solving activity) 5.14, E2(Inventional design devise and expression) 5.11, B3(Actuality of inventional method) 5.08 in order. Second, for the priority of educational needs of the teachers for the educational contents of invention intellectual property in secondary vocational education, there were 13 items of the educational contents for the first rank, 10 for the second rank and 17 for the third rank. The items of the educational contents for the first rank were A4(invention and problem solving), A5(inventional method and activity), B5(Invention patent project), C2(Thinking method of inventional problem solution), C4(Inventional problem solving project), E3(Inventional design process), E4(Production of inventional design product), E5(Design obligation), E6(Invention design project), F1(Patent information and application), F2(Writing of patent floor plan), F3(Writing of patent specification sheet and abstract), and H3(Invention commercialization. The items of the educational contents for the second rank were A2(Creativity development), B3(Actuality of inventional method), C3(Problem solving activity), D4(Invention and management), E2(Invention design devise and expression), F4(Range of patent demand), F5(Modification and supplementation of specification sheet), G2(Patent investigation and classification), H2(Analysis on invention commercialization), and H4(Invention marketing). The items for the third rank were the educational contents except the ones of the first rank and the second rank.

The effect of rearing, health and nutrition intervention services on grandparents-grandchildren families in a rural Korean area (농촌 조손가정의 양육, 건강 및 영양중재서비스의 효과)

  • Cho, Young-Hyang;Park, Yoon-Chang
    • Journal of agricultural medicine and community health
    • /
    • v.35 no.3
    • /
    • pp.274-286
    • /
    • 2010
  • Objectives: The purpose of this study was to examine the effects of the rearing, health and nutrition services through intervention in GP-GC (grandparents-grandchildren) families. Methods: A structured questionnaire was administered in January 2008 and January 2009 to 55(70) grandparents of GP-GC families who received intervention services also GP-GC families that did not receive services. The study area was the city of Chunnam Province, South Korea. The intervention services were provided by electronic voucher one day per week. The questionnaire assessed the general characteristics of the grandparents, childcare stress and burden, health status (ADL, IADL, depression, subjective health status and fall index) and mini nutritional assessment(MNA). The data were analyzed using SPSS software and an F-test, Chi-squared test and t-test. Results: The stress of grandparents resulting from childcare was high, but depression in grandparents perceived by grandchildren was significantly lower in served GP-GC families than in non-served GP-GC families. Differences in scores of affection (t=2.12, df=116, p<.05), automatics (t=2.92, df=116, p<.01), realistic(t=2.24, df=116, p<.05), and level of depression(t=2.90, df=116, p<.01) were significant. Incidences of acute disease, IADL cognitive fuction and depression of grandparents were slightly higher. Intervention services for GP-GC families had an impact on the childcare attitude and health status of grandparents. The intervention services of nutrition for grandparents were not promoted, but the scoring for subjective nutrition status were statistically higher for the served group (t=18.230, p<.0001). Conclusions: This study found that intervention programs of childcare services and health and nutrition management are effective for grandparents of GP-GC families. Intervention services for GP-GC family should establish the political issue.

Evaluate the implementation of Volumetric Modulated Arc Therapy QA in the radiation therapy treatment according to Various factors by using the Portal Dosimetry (용적변조회전 방사선치료에서 Portal Dosimetry를 이용한 선량평가의 재현성 분석)

  • Kim, Se Hyeon;Bae, Sun Myung;Seo, Dong Rin;Kang, Tae Young;Baek, Geum Mun
    • The Journal of Korean Society for Radiation Therapy
    • /
    • v.27 no.2
    • /
    • pp.167-174
    • /
    • 2015
  • Purpose : The pre-treatment QA using Portal dosimetry for Volumetric Arc Therapy To analyze whether maintaining the reproducibility depending on various factors. Materials and Methods : Test was used for TrueBeam STx$^{TM}$ (Ver.1.5, Varian, USA). Varian Eclipse Treatment planning system(TPS) was used for planning with total of seven patients include head and neck cancer, lung cancer, prostate cancer, and cervical cancer was established for a Portal dosimetry QA plan. In order to measure these plans, Portal Dosimetry application (Ver.10) (Varian) and Portal Vision aS1000 Imager was used. Each Points of QA was determined by dividing, before and after morning treatment, and the after afternoon treatment ended (after 4 hours). Calibration of EPID(Dark field correction, Flood field correction, Dose normalization) was implemented before Every QA measure points. MLC initialize was implemented after each QA points and QA was retried. Also before QA measurements, Beam Ouput at the each of QA points was measured using the Water Phantom and Ionization chamber(IBA dosimetry, Germany). Results : The mean values of the Gamma pass rate(GPR, 3%, 3mm) for every patients between morning, afternoon and evening was 97.3%, 96.1%, 95.4% and the patient's showing maximum difference was 95.7%, 94.2% 93.7%. The mean value of GPR before and after EPID calibration were 95.94%, 96.01%. The mean value of Beam Output were 100.45%, 100.46%, 100.59% at each QA points. The mean value of GPR before and after MLC initialization were 95.83%, 96.40%. Conclusion : Maintain the reproducibility of the Portal Dosimetry as a VMAT QA tool required management of the various factors that can affect the dosimetry.

  • PDF

The effect of nutritional supply on clinical outcomes and nutritional status in critically ill patients receiving continuous renal replacement therapy (지속적 신대체요법을 받은 중환자에서 영양공급이 임상결과와 영양상태에 미치는 영향)

  • Kim, Ju Yeun;Kim, Ji-Myung;Kim, Yuri
    • Journal of Nutrition and Health
    • /
    • v.48 no.3
    • /
    • pp.211-220
    • /
    • 2015
  • Purpose: This study was designed to investigate whether nutritional supply influences biochemical markers and clinical outcomes in patients who received continuous renal replacement therapy (CRRT) by evaluating adequacy of nutritional supply for patients. Methods: From January 2012 to December 2013, 239 adult patients who received CRRT in the intensive care unit for more than 3 days were included. General information from electronic medical records and nutritional status related biochemical data and clinical outcomes on the first day of CRRT and 2 weeks after CRRT were collected. Results: The rate of delivered energy and protein was 68.06% and 43.13% which was much lower than energy and protein supply based on their requirement. When the patients were divided into two groups according to 70% of energy received rate and 50% of protein received rate, the group with more than 70% of energy received rate showed significant decrease of length of hospital stay (p = 0.007), length of stay in intensive care unit (ICU) (p = 0.008), duration of CRRT (p < 0.001), and APACHE II score (p < 0.001) compared to less than 70% of energy received rate after adjusting for age. In addition, the group with more than 50% of protein received rate showed decreased mortality (p = 0.031), length of hospital stay (p = 0.008), length of ICU stay (p = 0.035), duration of CRRT (p < 0.001), and APACHE II score (p < 0.001) after adjusting for age. We found that the level of hematocrit (p = 0.006) was significantly improved in the group with more than 70% of energy received rate, and the level of TLC (p = 0.049), hematocrit (p = 0.041) was significantly improved in the group with more than 50% of protein received rate. We also found that energy delivery was negatively correlated with length of stay in ICU (p = 0.049) and positively correlated with level of calcium (p = 0.037). In addition, protein delivery was correlated with the levels of serum total protein (p = 0.021), serum albumin (p = 0.048), hematocrit (p = 0.009), and total cholesterol (p = 0.021) when dead patients were included, but was correlated with the levels of hematocrit (p = 0.034) and calcium (p = 0.024) when dead patients were excluded. Conclusion: Proper nutritional delivery may help patients' clinical outcomes for patients receiving CRRT. However, their actual intakes of energy and protein were not adequate for their requirements. Identification of patients with malnutrition is necessary and a multidisciplinary approach for systemic management is also required.

A Study on EC Acceptance of Virtual Community Users (가상 공동체 사용자의 전자상거래 수용에 대한 연구)

  • Lee, Hyoung-Yong;Ahn, Hyun-Chul
    • Asia pacific journal of information systems
    • /
    • v.19 no.1
    • /
    • pp.147-165
    • /
    • 2009
  • Virtual community(VC) will increasingly be organized as commercial enterprises, with the objective of earning an attractive financial return by providing members with valuable resources and environment. For example, Cyworld.com in Korea uses several community services to enable customers of Cyworld to take control of their own value as potential purchasers of products and services. Although initial adoption is important for online network service success, it does not necessarily result in the desired managerial performance unless the initial usage is continuously related to the continuous usage and purchase. Particularly, the customer who receives relevant online services and is well equipped with online network services, will trust the online service provider and perceive less risk and experience more activities such as continuous usage and purchase. Thus, how to promote continued online service usage or, alternatively, how to prevent discontinuance is a critical issue for VC service providers to consider. By aggregating a wide range of information and online environments for customers and providing trust to its members, the service providers of virtual communities help to reduce the perceived risk of continuous usage and purchase. Drill down, online service managers realize that achieving strong and sustained customers who continuously use online service and purchase on it is crucial. Therefore, the research into this online service continuance will identify the relationship between the initial usage and the continuous usage and purchase. The research of continuous usage or post adoption has recently emerged as an important issue in the IS literature. Individuals' information systems(IS) continuous usage decisions are congruent with consumers' repeat purchase decisions. The TAM(Technology Acceptance Model) paradigm has been strongly confirmed across a wide range from product purchase on EC to online service usage contexts. The analysis of IS usage based on TAM has proven to be successful across almost online service contexts. However, most of previous studies have focused on only an area (i.e., VC or EC). Just little research has tried to analyze the relationship between VC and EC. The effect of some factors on user intention, captured through several theories such as TAM, has been demonstrated. Yet, few studies have explored the salient relationships of VC users' EC acceptance. To fill this gap between VC and EC research, this paper attempts to develop a research model that extends the TAM perspective in view of the additional contributions of trust in the service provider and trust in members on some factors that affect EC and VC adoption. In this extension, we applied the TAM-to-TAM(T2T) model, and analyzed the transfer effect of trust between these two TAMs. The research model was empirically tested on the context of a social network service. The model was to extend TAM with the trust concept for the virtual community environment from the perspective of tasks. By building an extended model of TAM and examining the relationships between trust and the existing variables of TAM, it is aimed to explain a user's continuous intention to use VC and purchase on EC. The unit of analysis in this paper is an individual user of a virtual community. The population of interest is the individual with the experiences in virtual community. The data for this paper was made available via a Web survey of VC users. In total, 281 cases were gathered for about one week, but there were some missing values in the sample and there were some inappropriate cases. Thus, only 248 cases were finally analyzed. We chose the structural equation analysis to test the hypotheses and it is better suited for explaining complex relationships than the other methods. In this test, AMOS was used to test the Structural Equation Model (SEM). Noticeable results have been found in the T2T model regarding the factors affecting the intention to use of virtual community and loyalty. Our result showed that trust transfer plays a key role in forming the two adoption beliefs. Overall, this study preliminarily confirms the salience of trust transfer in online service.

A study on the developing and implementation of the Cyber University (가상대학 구현에 관한 연구)

  • Choi, Sung;Yoo, Gab-Sang
    • Proceedings of the Technology Innovation Conference
    • /
    • 1998.06a
    • /
    • pp.116-127
    • /
    • 1998
  • The Necessity of Cyber University. Within the rapidly changing environment of global economics, the environment of higher education in the universities, also, has been, encountering various changes. Popularization on higher education related to 1lifetime education system, putting emphasis on the productivity of education services and the acquisition of competitiveness through the market of open education, the breakdown of the ivory tower and the Multiversitization of universities, importance of obtaining information in the universities, and cooperation between domestic and oversea universities, industry and educational system must be acquired. Therefore, in order to adequately cope wi th these kinds of rapid changes in the education environment, operating Cyber University by utilizing various information technologies and its fixations such as Internet, E-mail, CD-ROMs, Interact ive Video Networks (Video Conferencing, Video on Demand), TV, Cable etc., which has no time or location limitation, is needed. Using informal ion and telecommunication technologies, especially the Internet is expected to Or ing about many changes in the social, economics and educational area. Among the many changes scholars have predicted, the development and fixations of Distant Learning or Cyber University was the most dominant factor. In the case of U. S. A., Cyber University has already been established and in under operation by the Federate Governments of 13 states. Any other universities (around 500 universities has been opened until1 now), with the help of the government and private citizens have been able to partly operate the Cyber University and is planning on enlarging step-by-step in the future. It could be seen not only as U. S. A. trying to elevate its higher education through their leading information technologies, but also could be seen as their objective in putting efforts on subordinating the culture of the education worldwide. UTRA University in U. S. A., for example, is already exporting its class lectures to China, and Indonesia regions. Influenced by the Cyber University current in the U.S., the Universities in Korea is willing .to arrange various forms of Cyber Universities. In line with this, at JUNAM National University, internet based Cyber University, which has set about its work on July of 1997, is in the state of operating about 100 Cyber Universities. Also, in the case of Hanam University, the Distant Learning classes are at its final stage of being established; this is a link in the rapid speed project of setting an example by the Korean Government. In addition, the department of education has selected 5 universities, including Seoul Cyber Design University for experimentation and is in the stage of strategic operation. Over 100 universities in Korea are speeding up its preparation for operating Cyber University. This form of Distant Learning goes beyond the walls of universities and is in the trend of being diffused in business areas or in various training programs of financial organizations and more. Here, in the hope that this material would some what be of help to other Universities which are preparing for Cyber University, I would 1ike to introduce some general concepts of the components forming Cyber University and Open Education System which has been established by JUNAM University. System of Cyber University could be seen as a general solution offered by tile computer technologies for the management on the students, Lectures On Demand, real hour based and satellite classes, media product ion lab for the production of the multimedia Contents, electronic library, the Groupware enabling exchange of information between students and professors. Arranging general concepts of components in the aspect of Cyber University and Open Education, it would be expressed in the form of the establishment of Cyber University and the service of Open Education as can be seen in the diagram below.

  • PDF

A Study on the Effects of the Institutional Pressure on the Process of Implementation and Appropriation of System: M-EMRS in Hospital Organization (시스템의 도입과 전유 과정에 영향을 미치는 제도적 압력에 관한 연구: 병원조직의 모바일 전자의무기록 시스템을 대상으로)

  • Lee, Zoon-Ky;Shin, Ho-Kyoung;Choi, Hee-Jae
    • Asia pacific journal of information systems
    • /
    • v.19 no.2
    • /
    • pp.95-116
    • /
    • 2009
  • Increasingly the institutional theory has been an important theoretical view of decision making process and IT adoption in many academic researches. This study used the institutional theory as a lens through which we can understand the factors that enable the effective appropriation of advanced information technology. It posits that mimetic, coercive, and normative pressures existing in an institutionalized environment could influence the participation of top managers or decision makers and the involvement of users toward an effective use of IT in their tasks. Since the introduction of IT, organizational members have been using IT in their daily tasks, creating and recreating rules and resources according to their own methods and needs. That is to say, the adaptation process of the IT and outcomes are different among organizations. The previous studies on a diverse use of IT refer to the appropriation of technology from the social technology view. Users appropriate IT through not only technology itself, but also in terms of how they use it or how they make the social practice in their use of it. In this study, the concepts of institutional pressure, appropriation, participation of decision makers, and involvement of users toward the appropriation are explored in the context of the appropriation of the mobile electronic medical record system (M-EMRS) in particularly a hospital setting. Based on the conceptual definition of institutional pressure, participation and involvement, operational measures are reconstructed. Furthermore, the concept of appropriation is measured in the aspect of three sub-constructs-consensus on appropriation, faithful appropriation, and attitude of use. Grounded in the relevant theories to appropriation of IT, we developed a research framework in which the effects of institutional pressure, participation and involvement on the appropriation of IT are analyzed. Within this theoretical framework, we formulated several hypotheses. We developed a second order institutional pressure and appropriation construct. After establishing its validity and reliability, we tested the hypotheses with empirical data from 101 users in 3 hospitals which had adopted and used the M-EMRS. We examined the mediating effect of the participation of decision makers and the involvement of users on the appropriation and empirically validated their relationships. The results show that the mimetic, coercive, and normative institutional pressure has an effect on the participation of decision makers and the involvement of users in the appropriation of IT while the participation of decision makers and the involvement of users have an effect on the appropriation of IT. The results also suggest that the institutional pressure and the participation of decision makers influence the involvement of users toward an appropriation of IT. Our results emphasize the mediating effect of the institutional pressure on the appropriation of IT. Namely, the higher degree of the participation of decision makers and the involvement of users, the more effective appropriation users will represent. These results provide strong support for institutional-based variables as predictors of appropriation. These findings also indicate that organizations should focus on the role of participation of decision makers and the involvement of users for the purpose of effective appropriation, and these are the practical implications of our study. The theoretical contribution of this study is lies in the integrated model of the effect of institutional pressure on the appropriation of IT. The results are consistent with the institutional theory and support previous studies on adaptive structuration theory.

Semantic Process Retrieval with Similarity Algorithms (유사도 알고리즘을 활용한 시맨틱 프로세스 검색방안)

  • Lee, Hong-Joo;Klein, Mark
    • Asia pacific journal of information systems
    • /
    • v.18 no.1
    • /
    • pp.79-96
    • /
    • 2008
  • One of the roles of the Semantic Web services is to execute dynamic intra-organizational services including the integration and interoperation of business processes. Since different organizations design their processes differently, the retrieval of similar semantic business processes is necessary in order to support inter-organizational collaborations. Most approaches for finding services that have certain features and support certain business processes have relied on some type of logical reasoning and exact matching. This paper presents our approach of using imprecise matching for expanding results from an exact matching engine to query the OWL(Web Ontology Language) MIT Process Handbook. MIT Process Handbook is an electronic repository of best-practice business processes. The Handbook is intended to help people: (1) redesigning organizational processes, (2) inventing new processes, and (3) sharing ideas about organizational practices. In order to use the MIT Process Handbook for process retrieval experiments, we had to export it into an OWL-based format. We model the Process Handbook meta-model in OWL and export the processes in the Handbook as instances of the meta-model. Next, we need to find a sizable number of queries and their corresponding correct answers in the Process Handbook. Many previous studies devised artificial dataset composed of randomly generated numbers without real meaning and used subjective ratings for correct answers and similarity values between processes. To generate a semantic-preserving test data set, we create 20 variants for each target process that are syntactically different but semantically equivalent using mutation operators. These variants represent the correct answers of the target process. We devise diverse similarity algorithms based on values of process attributes and structures of business processes. We use simple similarity algorithms for text retrieval such as TF-IDF and Levenshtein edit distance to devise our approaches, and utilize tree edit distance measure because semantic processes are appeared to have a graph structure. Also, we design similarity algorithms considering similarity of process structure such as part process, goal, and exception. Since we can identify relationships between semantic process and its subcomponents, this information can be utilized for calculating similarities between processes. Dice's coefficient and Jaccard similarity measures are utilized to calculate portion of overlaps between processes in diverse ways. We perform retrieval experiments to compare the performance of the devised similarity algorithms. We measure the retrieval performance in terms of precision, recall and F measure? the harmonic mean of precision and recall. The tree edit distance shows the poorest performance in terms of all measures. TF-IDF and the method incorporating TF-IDF measure and Levenshtein edit distance show better performances than other devised methods. These two measures are focused on similarity between name and descriptions of process. In addition, we calculate rank correlation coefficient, Kendall's tau b, between the number of process mutations and ranking of similarity values among the mutation sets. In this experiment, similarity measures based on process structure, such as Dice's, Jaccard, and derivatives of these measures, show greater coefficient than measures based on values of process attributes. However, the Lev-TFIDF-JaccardAll measure considering process structure and attributes' values together shows reasonably better performances in these two experiments. For retrieving semantic process, we can think that it's better to consider diverse aspects of process similarity such as process structure and values of process attributes. We generate semantic process data and its dataset for retrieval experiment from MIT Process Handbook repository. We suggest imprecise query algorithms that expand retrieval results from exact matching engine such as SPARQL, and compare the retrieval performances of the similarity algorithms. For the limitations and future work, we need to perform experiments with other dataset from other domain. And, since there are many similarity values from diverse measures, we may find better ways to identify relevant processes by applying these values simultaneously.

A Mutual P3P Methodology for Privacy Preserving Context-Aware Systems Development (프라이버시 보호 상황인식 시스템 개발을 위한 쌍방향 P3P 방법론)

  • Kwon, Oh-Byung
    • Asia pacific journal of information systems
    • /
    • v.18 no.1
    • /
    • pp.145-162
    • /
    • 2008
  • One of the big concerns in e-society is privacy issue. In special, in developing robust ubiquitous smart space and corresponding services, user profile and preference are collected by the service providers. Privacy issue would be more critical in context-aware services simply because most of the context data themselves are private information: user's current location, current schedule, friends nearby and even her/his health data. To realize the potential of ubiquitous smart space, the systems embedded in the space should corporate personal privacy preferences. When the users invoke a set of services, they are asked to allow the service providers or smart space to make use of personal information which is related to privacy concerns. For this reason, the users unhappily provide the personal information or even deny to get served. On the other side, service provider needs personal information as rich as possible with minimal personal information to discern royal and trustworthy customers and those who are not. It would be desirable to enlarge the allowable personal information complying with the service provider's request, whereas minimizing service provider's requiring personal information which is not allowed to be submitted and user's submitting information which is of no value to the service provider. In special, if any personal information required by the service provider is not allowed, service will not be provided to the user. P3P (Platform for Privacy Preferences) has been regarded as one of the promising alternatives to preserve the personal information in the course of electronic transactions. However, P3P mainly focuses on preserving the buyers' personal information. From time to time, the service provider's business data should be protected from the unintended usage from the buyers. Moreover, even though the user's privacy preference could depend on the context happened to the user, legacy P3P does not handle the contextual change of privacy preferences. Hence, the purpose of this paper is to propose a mutual P3P-based negotiation mechanism. To do so, service provider's privacy concern is considered as well as the users'. User's privacy policy on the service provider's information also should be informed to the service providers before the service begins. Second, privacy policy is contextually designed according to the user's current context because the nomadic user's privacy concern structure may be altered contextually. Hence, the methodology includes mutual privacy policy and personalization. Overall framework of the mechanism and new code of ethics is described in section 2. Pervasive platform for mutual P3P considers user type and context field, which involves current activity, location, social context, objects nearby and physical environments. Our mutual P3P includes the privacy preference not only for the buyers but also the sellers, that is, service providers. Negotiation methodology for mutual P3P is proposed in section 3. Based on the fact that privacy concern occurs when there are needs for information access and at the same time those for information hiding. Our mechanism was implemented based on an actual shopping mall to increase the feasibility of the idea proposed in this paper. A shopping service is assumed as a context-aware service, and data groups for the service are enumerated. The privacy policy for each data group is represented as APPEL format. To examine the performance of the example service, in section 4, simulation approach is adopted in this paper. For the simulation, five data elements are considered: $\cdot$ UserID $\cdot$ User preference $\cdot$ Phone number $\cdot$ Home address $\cdot$ Product information $\cdot$ Service profile. For the negotiation, reputation is selected as a strategic value. Then the following cases are compared: $\cdot$ Legacy P3P is considered $\cdot$ Mutual P3P is considered without strategic value $\cdot$ Mutual P3P is considered with strategic value. The simulation results show that mutual P3P outperforms legacy P3P. Moreover, we could conclude that when mutual P3P is considered with strategic value, performance was better than that of mutual P3P is considered without strategic value in terms of service safety.