• Title/Summary/Keyword: process sequence

Search Result 1,774, Processing Time 0.024 seconds

Information Privacy Concern in Context-Aware Personalized Services: Results of a Delphi Study

  • Lee, Yon-Nim;Kwon, Oh-Byung
    • Asia pacific journal of information systems
    • /
    • v.20 no.2
    • /
    • pp.63-86
    • /
    • 2010
  • Personalized services directly and indirectly acquire personal data, in part, to provide customers with higher-value services that are specifically context-relevant (such as place and time). Information technologies continue to mature and develop, providing greatly improved performance. Sensory networks and intelligent software can now obtain context data, and that is the cornerstone for providing personalized, context-specific services. Yet, the danger of overflowing personal information is increasing because the data retrieved by the sensors usually contains privacy information. Various technical characteristics of context-aware applications have more troubling implications for information privacy. In parallel with increasing use of context for service personalization, information privacy concerns have also increased such as an unrestricted availability of context information. Those privacy concerns are consistently regarded as a critical issue facing context-aware personalized service success. The entire field of information privacy is growing as an important area of research, with many new definitions and terminologies, because of a need for a better understanding of information privacy concepts. Especially, it requires that the factors of information privacy should be revised according to the characteristics of new technologies. However, previous information privacy factors of context-aware applications have at least two shortcomings. First, there has been little overview of the technology characteristics of context-aware computing. Existing studies have only focused on a small subset of the technical characteristics of context-aware computing. Therefore, there has not been a mutually exclusive set of factors that uniquely and completely describe information privacy on context-aware applications. Second, user survey has been widely used to identify factors of information privacy in most studies despite the limitation of users' knowledge and experiences about context-aware computing technology. To date, since context-aware services have not been widely deployed on a commercial scale yet, only very few people have prior experiences with context-aware personalized services. It is difficult to build users' knowledge about context-aware technology even by increasing their understanding in various ways: scenarios, pictures, flash animation, etc. Nevertheless, conducting a survey, assuming that the participants have sufficient experience or understanding about the technologies shown in the survey, may not be absolutely valid. Moreover, some surveys are based solely on simplifying and hence unrealistic assumptions (e.g., they only consider location information as a context data). A better understanding of information privacy concern in context-aware personalized services is highly needed. Hence, the purpose of this paper is to identify a generic set of factors for elemental information privacy concern in context-aware personalized services and to develop a rank-order list of information privacy concern factors. We consider overall technology characteristics to establish a mutually exclusive set of factors. A Delphi survey, a rigorous data collection method, was deployed to obtain a reliable opinion from the experts and to produce a rank-order list. It, therefore, lends itself well to obtaining a set of universal factors of information privacy concern and its priority. An international panel of researchers and practitioners who have the expertise in privacy and context-aware system fields were involved in our research. Delphi rounds formatting will faithfully follow the procedure for the Delphi study proposed by Okoli and Pawlowski. This will involve three general rounds: (1) brainstorming for important factors; (2) narrowing down the original list to the most important ones; and (3) ranking the list of important factors. For this round only, experts were treated as individuals, not panels. Adapted from Okoli and Pawlowski, we outlined the process of administrating the study. We performed three rounds. In the first and second rounds of the Delphi questionnaire, we gathered a set of exclusive factors for information privacy concern in context-aware personalized services. The respondents were asked to provide at least five main factors for the most appropriate understanding of the information privacy concern in the first round. To do so, some of the main factors found in the literature were presented to the participants. The second round of the questionnaire discussed the main factor provided in the first round, fleshed out with relevant sub-factors. Respondents were then requested to evaluate each sub factor's suitability against the corresponding main factors to determine the final sub-factors from the candidate factors. The sub-factors were found from the literature survey. Final factors selected by over 50% of experts. In the third round, a list of factors with corresponding questions was provided, and the respondents were requested to assess the importance of each main factor and its corresponding sub factors. Finally, we calculated the mean rank of each item to make a final result. While analyzing the data, we focused on group consensus rather than individual insistence. To do so, a concordance analysis, which measures the consistency of the experts' responses over successive rounds of the Delphi, was adopted during the survey process. As a result, experts reported that context data collection and high identifiable level of identical data are the most important factor in the main factors and sub factors, respectively. Additional important sub-factors included diverse types of context data collected, tracking and recording functionalities, and embedded and disappeared sensor devices. The average score of each factor is very useful for future context-aware personalized service development in the view of the information privacy. The final factors have the following differences comparing to those proposed in other studies. First, the concern factors differ from existing studies, which are based on privacy issues that may occur during the lifecycle of acquired user information. However, our study helped to clarify these sometimes vague issues by determining which privacy concern issues are viable based on specific technical characteristics in context-aware personalized services. Since a context-aware service differs in its technical characteristics compared to other services, we selected specific characteristics that had a higher potential to increase user's privacy concerns. Secondly, this study considered privacy issues in terms of service delivery and display that were almost overlooked in existing studies by introducing IPOS as the factor division. Lastly, in each factor, it correlated the level of importance with professionals' opinions as to what extent users have privacy concerns. The reason that it did not select the traditional method questionnaire at that time is that context-aware personalized service considered the absolute lack in understanding and experience of users with new technology. For understanding users' privacy concerns, professionals in the Delphi questionnaire process selected context data collection, tracking and recording, and sensory network as the most important factors among technological characteristics of context-aware personalized services. In the creation of a context-aware personalized services, this study demonstrates the importance and relevance of determining an optimal methodology, and which technologies and in what sequence are needed, to acquire what types of users' context information. Most studies focus on which services and systems should be provided and developed by utilizing context information on the supposition, along with the development of context-aware technology. However, the results in this study show that, in terms of users' privacy, it is necessary to pay greater attention to the activities that acquire context information. To inspect the results in the evaluation of sub factor, additional studies would be necessary for approaches on reducing users' privacy concerns toward technological characteristics such as highly identifiable level of identical data, diverse types of context data collected, tracking and recording functionality, embedded and disappearing sensor devices. The factor ranked the next highest level of importance after input is a context-aware service delivery that is related to output. The results show that delivery and display showing services to users in a context-aware personalized services toward the anywhere-anytime-any device concept have been regarded as even more important than in previous computing environment. Considering the concern factors to develop context aware personalized services will help to increase service success rate and hopefully user acceptance for those services. Our future work will be to adopt these factors for qualifying context aware service development projects such as u-city development projects in terms of service quality and hence user acceptance.

Genetic Environments of the High-purity Limestone in the Upper Zone of the Daegi Formation at the Jeongseon-Samcheok Area (정선-삼척 일대 대기층 상부 고품위 석회석의 생성환경)

  • Kim, Chang Seong;Choi, Seon-Gyu;Kim, Gyu-Bo;Kang, Jeonggeuk;Kim, Kyeong Bae;Kim, Hagsoo;Lee, Jeongsang;Ryu, In-Chang
    • Economic and Environmental Geology
    • /
    • v.50 no.4
    • /
    • pp.287-302
    • /
    • 2017
  • The carbonate rocks of the Daegi Formation are composed of the limestone at the upper and lower zones, and the dolomite at the middle zone, in which the upper zone has higher CaO content than others. The colors of carbonate rock in the Daegi Formation can be divided into five types; white, light brown, light gray, gray, and dark gray. The white to light gray colored rocks correspond to the high purity limestone with 53.15 ~ 55.64 wt. % CaO, and the light brown colored rocks contain 20.71 ~ 21.67 wt. % MgO. The bleaching of carbonate rocks are not related to CaO composition of the rocks, as light gray rocks tend to be higher in CaO content than those of the white rocks at the lower zone. The pelitic components are also occasionally increased in white limestone than light grey one. $Al_2O_3$ is one of the most difficult content to remove during hydrothermal processes, so the interpretation that the limestone is purified together with hydrothemral bleaching, has little merit. The wide range (over 16 ‰) of ${\delta}^{18}O_{SMOW}$, smaller variation (within 2 ‰) of ${\delta}^{13}C_{PDB}$ are apparent in both the upper and lower zones, which indicate the Daegi Formation had been affected overall by hydrothermal fluids. The K-Ar isotopic age of hydrothermal alteration in the GMI limestone mine is $85.1{\pm}1.7Ma$. Gradual change from grey through light grey to white limestone is accompaned by lower oxygen stable isotope values, which is major evidence that the hydrothermal effect is the main process of the bleaching. Although the Daegi Formation has suffered from hydrothermal activity and increase in whiteness, there is no clear evidence demonstrating the relationship between bleaching and high purity of limestone. The purification of limestone has nothing to do with the hydrothermal activity in this area. Instead, it should be considered that the change of sedimentary environment related to see-level fluctuation which can prevent deposition of pelitic components especially $Al_2O_3$ contrbuted to the formation of the high purity limestone in the upper zone of the Daegi Formation. Considering the evidences such as increase in CaO content of limestone by depth, gradual change from calcite to dolomite at the lower zones, and occurring the high purity limestone at the upper zone, the interpretation of sequence stratigraphic aspect to the formation of the high purity Daegi limestone appears to be more suitable than that of hydrothermal alteration origin.

Development of Information Extraction System from Multi Source Unstructured Documents for Knowledge Base Expansion (지식베이스 확장을 위한 멀티소스 비정형 문서에서의 정보 추출 시스템의 개발)

  • Choi, Hyunseung;Kim, Mintae;Kim, Wooju;Shin, Dongwook;Lee, Yong Hun
    • Journal of Intelligence and Information Systems
    • /
    • v.24 no.4
    • /
    • pp.111-136
    • /
    • 2018
  • In this paper, we propose a methodology to extract answer information about queries from various types of unstructured documents collected from multi-sources existing on web in order to expand knowledge base. The proposed methodology is divided into the following steps. 1) Collect relevant documents from Wikipedia, Naver encyclopedia, and Naver news sources for "subject-predicate" separated queries and classify the proper documents. 2) Determine whether the sentence is suitable for extracting information and derive the confidence. 3) Based on the predicate feature, extract the information in the proper sentence and derive the overall confidence of the information extraction result. In order to evaluate the performance of the information extraction system, we selected 400 queries from the artificial intelligence speaker of SK-Telecom. Compared with the baseline model, it is confirmed that it shows higher performance index than the existing model. The contribution of this study is that we develop a sequence tagging model based on bi-directional LSTM-CRF using the predicate feature of the query, with this we developed a robust model that can maintain high recall performance even in various types of unstructured documents collected from multiple sources. The problem of information extraction for knowledge base extension should take into account heterogeneous characteristics of source-specific document types. The proposed methodology proved to extract information effectively from various types of unstructured documents compared to the baseline model. There is a limitation in previous research that the performance is poor when extracting information about the document type that is different from the training data. In addition, this study can prevent unnecessary information extraction attempts from the documents that do not include the answer information through the process for predicting the suitability of information extraction of documents and sentences before the information extraction step. It is meaningful that we provided a method that precision performance can be maintained even in actual web environment. The information extraction problem for the knowledge base expansion has the characteristic that it can not guarantee whether the document includes the correct answer because it is aimed at the unstructured document existing in the real web. When the question answering is performed on a real web, previous machine reading comprehension studies has a limitation that it shows a low level of precision because it frequently attempts to extract an answer even in a document in which there is no correct answer. The policy that predicts the suitability of document and sentence information extraction is meaningful in that it contributes to maintaining the performance of information extraction even in real web environment. The limitations of this study and future research directions are as follows. First, it is a problem related to data preprocessing. In this study, the unit of knowledge extraction is classified through the morphological analysis based on the open source Konlpy python package, and the information extraction result can be improperly performed because morphological analysis is not performed properly. To enhance the performance of information extraction results, it is necessary to develop an advanced morpheme analyzer. Second, it is a problem of entity ambiguity. The information extraction system of this study can not distinguish the same name that has different intention. If several people with the same name appear in the news, the system may not extract information about the intended query. In future research, it is necessary to take measures to identify the person with the same name. Third, it is a problem of evaluation query data. In this study, we selected 400 of user queries collected from SK Telecom 's interactive artificial intelligent speaker to evaluate the performance of the information extraction system. n this study, we developed evaluation data set using 800 documents (400 questions * 7 articles per question (1 Wikipedia, 3 Naver encyclopedia, 3 Naver news) by judging whether a correct answer is included or not. To ensure the external validity of the study, it is desirable to use more queries to determine the performance of the system. This is a costly activity that must be done manually. Future research needs to evaluate the system for more queries. It is also necessary to develop a Korean benchmark data set of information extraction system for queries from multi-source web documents to build an environment that can evaluate the results more objectively.

Time Course Change of Phagocytes and Proinflammatory Activities in BALF in Endotoxin-induced Acute Lung Injury (시간별 내독소 정맥주입으로 유발된 급성폐손상의 변화양상에 대한 고찰)

  • Moon, Seung-Hyug;Oh, Je-Ho;Park, Sung-Woo;NamGung, Eun-Kyung;Ki, Shin-Young;Im, Gun-Il;Jung, Sung-Whan;Kim, Hyeon-Tae;Uh, Soo-Tack;Kim, Yong-Hoon;Park, Choon-Sik;Jin, Byeng-Weon
    • Tuberculosis and Respiratory Diseases
    • /
    • v.44 no.2
    • /
    • pp.360-378
    • /
    • 1997
  • Background : Severe acute lung injury(ALI), also known as the adult respiratory distress syndrome(ARDS), is a heterogenous nature of dynamic and explosive clinical synrome that exacts a mortality of approximately 50%. Endotoxin(ETX) is an abundant component of the outer membrane of gram-negative bacteria capable of inducing severe lung injury in gram-negative sepsis and gram-negative bacterial pneumonia, which are among the most common predisposing causes of ARDS. The influx of PMNs into airway tissue is a pathological hallmark of LPS-induced lung injury. And there is a substantial evidence suggesting that cytokines are important mediators of lung injury in gram-negative sepsis. However, the kinetics of phagocytes and cytokines by an exact time sequence and their respective pathogenic importance remain to be elucidated. This study was performed to investigate the role of phagocytes and proinflammatory cytokines in ETX-induced ALI through a time course of changes in the concentration of protein, $TNF{\alpha}$ and IL-6, and counts of total and its differential cells in BALF. The consecutive histologic findings were also evaluated. Method : The experimental animals, healthy male Sprague-Dawley, weighted $200{\pm}50g$, were divided into control- and ALI- group. ALI was induced by an intravenous administration of ETX, 5mg/kg. Above mentioned all parameters were examined at 0(control), 3, 6, 24, 72 h after administration of ETX. $TNF{\alpha}$ and IL-6 cone. in BALF were measured by a bioassay. Results : The protein concentration and total leukocyte count(TC) in BALF was significantly increased at 3h compared to controls(p < 0.05). The protein conc. was significantly elavated during observation period, but TC was significantly decreased at 72h(p < 0.05 vs. 24h). There was a close relationship between TC and protein cone. in BALF(r = 0.65, p < 0.001). The PMN and monocyte count was well correlated with TC in BALF, and the correlation of PMN(r = 0.97, p < 0.001) appeared to be more meaningful than that of monocyte(r = 0.61, p < 0.001). There was also a significant correlation between protein cone. and PMN or monocyte count in BALF(PMN vs. monocyte : r = 0.55, p < 0.005 vs. r = 0.64, p < 0.001). The count of monocyte was significantly elavated during observation period though a meaningful reduction of PMN count in BALF at 72h, this observation suggested that monocyte may, at least, partipate in the process of lung injury steadly. In this study, there was no relationship between IL-6 and $TNF{\alpha}$ cone., and $TNF{\alpha}$ but not IL-6 was correlated with TC(r = 0.61, p < 0.05) and monocyte(r = 0.67, p < 0.05) in BALF only at 3, 6h after ETX introduced. In particular, the IL-6 cone. increased earlier and rapidly peaked than $TNF{\alpha}$ cone. in BALF. In histologic findings, the cell counts of lung slices were increased from 3 to 72h(p < 0.001 vs. NC). Alveolar wall-thickness was increased from 6 to 24h(p < 0.001 vs. NC). There was a significant correlation between the cell counts of lung slices and alveolar wall-thickness(r= 0.61, p < 0.001). This result suggested that the cellular infiltrations might be followed by the alterations of interstitium, and the edematous change of alveolar wall might be most rapidly recovered to its normal condition in the process of repair. Conclusion : We concluded that although the role of PMN is partly certain in ETX-induced ALI, it is somewhat inadequate to its known major impact on ALL Alveolar macrophage and/or non-immune cells such as pulmonary endothelial or epithelial cells, may be more importantly contributed to the initiation and perpetual progression of ETX-induced ALI. The IL-6 in ETX-induced ALI was independent to $TNF{\alpha}$, measured by a bioassay in BALF. The early rise in IL-6 in BALF implies multiple origins of the IL-6.

  • PDF