Big data refers to the data that cannot be processes with conventional contemporary data technologies. As smart devices and social network services produces vast amount of data, big data attracts much attention from researchers. There are strong demands form governments and industries for bib data as it can create new values by drawing business insights from data. Since various new technologies to process big data introduced, academic communities also show much interest to the big data domain. A notable advance related to the big data technology has been in various fields. Big data technology makes it possible to access, collect, and save individual's personal data. These technologies enable the analysis of huge amounts of data with lower cost and less time, which is impossible to achieve with traditional methods. It even detects personal information that people do not want to open. Therefore, people using information technology such as the Internet or online services have some level of privacy concerns, and such feelings can hinder continued use of information systems. For example, SNS offers various benefits, but users are sometimes highly exposed to privacy intrusions because they write too much personal information on it. Even though users post their personal information on the Internet by themselves, the data sometimes is not under control of the users. Once the private data is posed on the Internet, it can be transferred to anywhere by a few clicks, and can be abused to create fake identity. In this way, privacy intrusion happens. This study aims to investigate how perceived personal information overload in SNS affects user's risk perception and information privacy concerns. Also, it examines the relationship between the concerns and user resistance behavior. A survey approach and structural equation modeling method are employed for data collection and analysis. This study contributes meaningful insights for academic researchers and policy makers who are planning to develop guidelines for privacy protection. The study shows that information overload on the social network services can bring the significant increase of users' perceived level of privacy risks. In turn, the perceived privacy risks leads to the increased level of privacy concerns. IF privacy concerns increase, it can affect users to from a negative or resistant attitude toward system use. The resistance attitude may lead users to discontinue the use of social network services. Furthermore, information overload is mediated by perceived risks to affect privacy concerns rather than has direct influence on perceived risk. It implies that resistance to the system use can be diminished by reducing perceived risks of users. Given that users' resistant behavior become salient when they have high privacy concerns, the measures to alleviate users' privacy concerns should be conceived. This study makes academic contribution of integrating traditional information overload theory and user resistance theory to investigate perceived privacy concerns in current IS contexts. There is little big data research which examined the technology with empirical and behavioral approach, as the research topic has just emerged. It also makes practical contributions. Information overload connects to the increased level of perceived privacy risks, and discontinued use of the information system. To keep users from departing the system, organizations should develop a system in which private data is controlled and managed with ease. This study suggests that actions to lower the level of perceived risks and privacy concerns should be taken for information systems continuance.
Sesame seed oil cakes are classified as the animal or plant origin among the flammable liquids, and the fire occurs due to the spontaneous ignition through the accumulation of heat during the storage of residues after the extraction of sesame oil. In order to elucidate the cause of the spontaneous ignition of sesame seed oil cakes, the thickness (3 cm, 5 cm, 7 cm and 14 cm) of the sample container was varied, and the spontaneous ignition temperature was measured depending on the storage volume. Thus, the spontaneous ignition temperature was measured to be 180 ℃ at the thickness of 3 cm, 160 ℃ at 5 cm, 145 ℃ at 7 cm and 130 ℃ at 14 cm. As the thickness of the sample container increased, the critical ignition temperature decreased, and the induction time to spontaneous ignition and the time to reach the maximum temperature became longer. Furthermore, the apparent activation energy by the critical ignition temperature, which is the average temperature of ignition and non-ignition, was 97.10 [kJ/mol]. With these data, ignition characteristics of sesame seed oil cakes were determined.
Choi, Yong-Sung;Lee, Sun Ju;Yim, Hyeon Woo;Choe, Byung-in;Lee, Jae Won;Oh, Sang-cheul;Shin, Im Hee;Huh, Jung-Sik;Kwon, Ivo;Kim, Jin Seok;Yoo, Soyoung;Cho, Hyunin;Lee, Mi-Kyung;Shin, Hee-Young;Kim, Duck-An
The Journal of KAIRB
/
v.1
no.1
/
pp.5-21
/
2019
Purpose: Institutional review board (IRB) classifies risks of clinical trials into less than minimal risk, minor increase over minimal risk, and more than minimal risk. Based on classification and evaluation for risk, IRB decides whether permitting consent exemption or asking additional protection for clinical research subject or not. The purpose of this study is to analyze how IRB members evaluate minimal risk by sending questionnaire survey with 12 predetermined scenarios. Methods: IRB members and researchers (pediatrician, gastroenterologist, neurologist, and neurosurgeon) in 11 different hospitals were asked to answer survey questions via email or online. We analyzed the differences of answers among several subgroups in each predetermined scenarios. Result: Responders were 212 personnel(110 researchers and 102 IRB members) from 11 centers. There were significant differences between IRB members and researchers in response such as blood sampling, skin prick test, one time catheterization in a girl, spinal tapping in child, non-enhance MRI in child, non-enhance MRI with chrolal hydrate in a child, spinal tapping without anesthesia in adult, bioequivalence test, gastric endoscopy, and non-enhance CT. significant differences between medical IRB members and non-medical members were also revealed in one time catheterization in a girl, spinal tapping in a child, non-enhance MRI in a child, bioequivalence test. Depending on researchers' department, they responded differently in several questionnaires as well. Conclusions: We have found that IRB members and researchers evaluate the risks differently. Researchers compared to IRB members, medical IRB members compared to non-medical members answered less than minimal risk in many cases. In assessing and evaluating the risks associated with the study, medical IRB members answered predetermined scenarios as less dangerous compared to non-medical IRB members. Difference among researchers where also revealed significantly. Researchers answered predetermined scenarios as less dangerous compare to other department researchers, especially in predetermined scenarios containing procedures they are familiar with.
This paper attempts to incorporate three important factors-perceptions, behavior and valuation-in analysing consumers' responses to health risks from environmental pollutants. Using a survey sample of 500 consumers in the Chonbuk province area, this paper empirically investigated determinants of risk perceptions from using tap water as drinking water. Most consumers were considerably concerned about health risks from drinking tap water. Moreover, those subjective concerns were not random, but were systematically related to individuals' demographic variables such as age, gender, and family size. Those subjective beliefs also influenced respondents' purchase intentions on safer water bottles, in response to a contingent behavior question of presenting two types of water bottles. The technical risk information provided in the survey had significant effects on purchase intentions only when it was interacted with respondents' actual averting practice. In addition, the sample selection effects were present by eliminating respondents who decided not to purchase either of two types of water bottles. The potential selection bias had impacts on the coefficients of the price difference variable, and subsequently the estimates of the price increments for health risk reductions.
The objective of this study is investigation of contamination levels and transfer rate of heavy metals and assessment of health risk effects in animal medicines. A total of sixteen items with 148 samples were obtained for this investigation from major herbal medicine producing areas and herbal markets from 2011 to 2012. Inductively coupled plasma mass spectrometer method was conducted for the quantitative analysis of Pb, Cd and As. In addition, the mercury analyzer system was conducted for that of Hg without sample digestion. The average contents of heavy metals in animal medicines were as follows : 1.55 mg/kg for Pb, 0.28 mg/kg for Cd, 0.70 mg/kg for As and 0.047 mg/kg for Hg respectively. The average contents of heavy metals in decoctions were as follows : 0.03 mg/kg for Pb, 0.01 mg/kg for Cd, 0.17 mg/kg for As and 0.003 mg/kg for Hg respectively. The average transfer rates of heavy metals from animal medicines to decoctions were 1.9% for Pb, 3.6% for Cd, 24.2% for As and 6.0% for Hg respectively. Cancer risks of animal medicines and decoctions through slope factor by ministry of environment republic korea and environmental protection agency was $1.36{\times}10^{-6}$ and $2.50{\times}10^{-8}$ for Pb and $7.46{\times}10^{-5}$ and $1.98{\times}10^{-5}$ for As (assuming that the total arsenic content was equal to the inorganic arsenic) respectively. The hazard index of heavy metals in animal medicines and decoctions was below recommended hazard index as 0.52 and 0.05 respectively. Taken together, cancer risks about Pb and hazard indexes of animal medicines and decoctions indicate that the majority of samples except for some samples with relative high contents of heavy metals were safe. But cancer risks about As of animal medicines indicate that the majority of samples were not relatively safe.
Printed circuit boards (PCBs) are a basic component in the electronics industry and are widely used in nearly all electronic products, such as mobile phones, tablet computers, and digital cameras, as well as in electric equipment. PCB manufacturing involves the use of many chemicals and chemical processes and therefore has more risks than other manufacturing sectors. This study aims to identify the causes of possible accidents during PCB manufacturing through risk assessment, develop and implement safety measures, and evaluate the effectiveness of these measures. Note that the safety measures developed to mitigate the risks of a certain process were also implemented for other similar processes. The risk assessments conducted over seven years, from 2015 to 2021, at a PCB manufacturing company identified 361 hazardous processes. Between 2016 and 2019, 41-56 hazardous processes were identified per year; such processes decreased to fewer than 20 per year after 2020. Application of the risk assessment results to the improvement of the hazardous processes with the similar characteristics seems to be effective in decreasing the risks. Equipment-related factors such as lack of appropriate maintenance, low work standards, and defective protection devices were responsible for 59.8% of all possible accidents. Because PCB manufacturing involves many chemicals, skin contact with hazardous substances, electric shock, fire, and explosion were the most common types of possible accidents (81.7%). In total, 505 safety measures were implemented, including 157 related to purchase and improvement of equipment and devices for safety (31.1%), 147 related to the installation/modification of fire prevention facilities (29.1%), and 69 related to the use of standard electrical appliances (13.7%). Risk assessment conducted after implementing the safety measures showed that these measures significantly decreased risk; 247 processes (68.4%) had a risk level of 3, corresponding to "very low," and 114 processes (31.6%) showed a risk level of 4, corresponding to "low." In particular, risk assessment of 104 processes with risk scores of 12 and 10 other processes with risk score of 16 showed that the risk decreased to 4 after implementing the safety measures. Thus, implementing these measures in similar manufacturing sectors that involve chemical processes can mitigate risk.
Became large a problem we were productive movement of information became large and occurring to diffusions of development of public media and Internet use. While the Internet became a generalization, public media had more influences and risks, and a crime to abuse anonymity became large in cyber space. In addition, damage is becoming expanded reproduction that infringe of ' crime victim's rights of portrait'. The point that is most important in order to improve these points is recognition regarding the special situation of crime victim, and the ethic consciousness and independent operation regulation and regulation system that these point was taken into consideration in the public media and Internet operation that are an information producer is necessary, and Internet portal shall be included like Internet newspapers to the arbitration object of the Press Arbitration Commission. Also, a legal system regarding personal responsibility shall have for protection of a crime victim's rights of portrait by personal information activity for protection in cyber space. Suggest to a portrait of a crime victim, and an individual and social rights security effort are required for activation regarding an infringement relief system.
Schmitz-Feuerhake, Inge;Busby, Christopher;Pflugbeil, Sebastian
Environmental Analysis Health and Toxicology
/
v.31
/
pp.1.1-1.13
/
2016
Objectives To investigate the accuracy and scientific validity of the current very low risk factor for hereditary diseases in humans following exposures to ionizing radiation adopted by the United Nations Scientific Committee on the Effects of Atomic Radiation and the International Commission on Radiological Protection. The value is based on experiments on mice due to reportedly absent effects in the Japanese atomic bomb (A-bomb) survivors. Methods To review the published evidence for heritable effects after ionising radiation exposures particularly, but not restricted to, populations exposed to contamination from the Chernobyl accident and from atmospheric nuclear test fallout. To make a compilation of findings about early deaths, congenital malformations, Down's syndrome, cancer and other genetic effects observed in humans after the exposure of the parents. To also examine more closely the evidence from the Japanese A-bomb epidemiology and discuss its scientific validity. Results Nearly all types of hereditary defects were found at doses as low as one to 10 mSv. We discuss the clash between the current risk model and these observations on the basis of biological mechanism and assumptions about linear relationships between dose and effect in neonatal and foetal epidemiology. The evidence supports a dose response relationship which is non-linear and is either biphasic or supralinear (hogs-back) and largely either saturates or falls above 10 mSv. Conclusions We conclude that the current risk model for heritable effects of radiation is unsafe. The dose response relationship is non-linear with the greatest effects at the lowest doses. Using Chernobyl data we derive an excess relative risk for all malformations of 1.0 per 10 mSv cumulative dose. The safety of the Japanese A-bomb epidemiology is argued to be both scientifically and philosophically questionable owing to errors in the choice of control groups, omission of internal exposure effects and assumptions about linear dose response.
Industrial facilities are becoming bigger and more up to date, And a kind of the hazardous material used in the industrial filed is diversified. Therefore, serious accidents such as leakage of toxic materials, fire and explosion, is continuously occurred. There is Process Safety Management (PSM) system of the several preventive systems, but it is supposed to be a limitation to ensure safety or huge PSM industrial sites where have potential to catastrophically invisible and unexpected risks because it is still being managed by instruction and inspection of authority having jurisdiction other than self-regulating management differing from the primarily aim of PSM system. To verify safety management system of work-place, supplementation of existing system is urgently required. In this study, it suggests that PSM self-audit be emphasized significantly analyzing problems of the current systems for enhancing self-audit be emphasized significantly analyzing problems of the current systems for enhancing self-control safety through efficient self-audit management and improving the existing system and improving the existing as verifying the system there of, as well as studying methods which can support institutionally.
Providing trading partners with personal information to establish an e-commerce financial transaction is inevitable. Most e-commerce companies keep personal information and transaction data for user's convenience and develop additional services as their applications. However, keeping personal information increases the likelihood of identity theft causing direct or indirect damage while it may simplify repetitive financial transactions. This study introduces risk management methods based on quantitative and qualitative analysis including demand-supply curve model and Gordon & Loeb model to analyze the risks for security management. The empirical analysis with survey results from KISA (Korea Information Security Agency) shows that the root cause of different statistics of personal information leakage incidents according to core business of internet companies is the difference in their Loss Expectancy caused by them. Also we suggest disciplinary compensation and higher standard for personal information protection as a solution to prevent the variation of investment on it between individual companies.
본 웹사이트에 게시된 이메일 주소가 전자우편 수집 프로그램이나
그 밖의 기술적 장치를 이용하여 무단으로 수집되는 것을 거부하며,
이를 위반시 정보통신망법에 의해 형사 처벌됨을 유념하시기 바랍니다.
[게시일 2004년 10월 1일]
이용약관
제 1 장 총칙
제 1 조 (목적)
이 이용약관은 KoreaScience 홈페이지(이하 “당 사이트”)에서 제공하는 인터넷 서비스(이하 '서비스')의 가입조건 및 이용에 관한 제반 사항과 기타 필요한 사항을 구체적으로 규정함을 목적으로 합니다.
제 2 조 (용어의 정의)
① "이용자"라 함은 당 사이트에 접속하여 이 약관에 따라 당 사이트가 제공하는 서비스를 받는 회원 및 비회원을
말합니다.
② "회원"이라 함은 서비스를 이용하기 위하여 당 사이트에 개인정보를 제공하여 아이디(ID)와 비밀번호를 부여
받은 자를 말합니다.
③ "회원 아이디(ID)"라 함은 회원의 식별 및 서비스 이용을 위하여 자신이 선정한 문자 및 숫자의 조합을
말합니다.
④ "비밀번호(패스워드)"라 함은 회원이 자신의 비밀보호를 위하여 선정한 문자 및 숫자의 조합을 말합니다.
제 3 조 (이용약관의 효력 및 변경)
① 이 약관은 당 사이트에 게시하거나 기타의 방법으로 회원에게 공지함으로써 효력이 발생합니다.
② 당 사이트는 이 약관을 개정할 경우에 적용일자 및 개정사유를 명시하여 현행 약관과 함께 당 사이트의
초기화면에 그 적용일자 7일 이전부터 적용일자 전일까지 공지합니다. 다만, 회원에게 불리하게 약관내용을
변경하는 경우에는 최소한 30일 이상의 사전 유예기간을 두고 공지합니다. 이 경우 당 사이트는 개정 전
내용과 개정 후 내용을 명확하게 비교하여 이용자가 알기 쉽도록 표시합니다.
제 4 조(약관 외 준칙)
① 이 약관은 당 사이트가 제공하는 서비스에 관한 이용안내와 함께 적용됩니다.
② 이 약관에 명시되지 아니한 사항은 관계법령의 규정이 적용됩니다.
제 2 장 이용계약의 체결
제 5 조 (이용계약의 성립 등)
① 이용계약은 이용고객이 당 사이트가 정한 약관에 「동의합니다」를 선택하고, 당 사이트가 정한
온라인신청양식을 작성하여 서비스 이용을 신청한 후, 당 사이트가 이를 승낙함으로써 성립합니다.
② 제1항의 승낙은 당 사이트가 제공하는 과학기술정보검색, 맞춤정보, 서지정보 등 다른 서비스의 이용승낙을
포함합니다.
제 6 조 (회원가입)
서비스를 이용하고자 하는 고객은 당 사이트에서 정한 회원가입양식에 개인정보를 기재하여 가입을 하여야 합니다.
제 7 조 (개인정보의 보호 및 사용)
당 사이트는 관계법령이 정하는 바에 따라 회원 등록정보를 포함한 회원의 개인정보를 보호하기 위해 노력합니다. 회원 개인정보의 보호 및 사용에 대해서는 관련법령 및 당 사이트의 개인정보 보호정책이 적용됩니다.
제 8 조 (이용 신청의 승낙과 제한)
① 당 사이트는 제6조의 규정에 의한 이용신청고객에 대하여 서비스 이용을 승낙합니다.
② 당 사이트는 아래사항에 해당하는 경우에 대해서 승낙하지 아니 합니다.
- 이용계약 신청서의 내용을 허위로 기재한 경우
- 기타 규정한 제반사항을 위반하며 신청하는 경우
제 9 조 (회원 ID 부여 및 변경 등)
① 당 사이트는 이용고객에 대하여 약관에 정하는 바에 따라 자신이 선정한 회원 ID를 부여합니다.
② 회원 ID는 원칙적으로 변경이 불가하며 부득이한 사유로 인하여 변경 하고자 하는 경우에는 해당 ID를
해지하고 재가입해야 합니다.
③ 기타 회원 개인정보 관리 및 변경 등에 관한 사항은 서비스별 안내에 정하는 바에 의합니다.
제 3 장 계약 당사자의 의무
제 10 조 (KISTI의 의무)
① 당 사이트는 이용고객이 희망한 서비스 제공 개시일에 특별한 사정이 없는 한 서비스를 이용할 수 있도록
하여야 합니다.
② 당 사이트는 개인정보 보호를 위해 보안시스템을 구축하며 개인정보 보호정책을 공시하고 준수합니다.
③ 당 사이트는 회원으로부터 제기되는 의견이나 불만이 정당하다고 객관적으로 인정될 경우에는 적절한 절차를
거쳐 즉시 처리하여야 합니다. 다만, 즉시 처리가 곤란한 경우는 회원에게 그 사유와 처리일정을 통보하여야
합니다.
제 11 조 (회원의 의무)
① 이용자는 회원가입 신청 또는 회원정보 변경 시 실명으로 모든 사항을 사실에 근거하여 작성하여야 하며,
허위 또는 타인의 정보를 등록할 경우 일체의 권리를 주장할 수 없습니다.
② 당 사이트가 관계법령 및 개인정보 보호정책에 의거하여 그 책임을 지는 경우를 제외하고 회원에게 부여된
ID의 비밀번호 관리소홀, 부정사용에 의하여 발생하는 모든 결과에 대한 책임은 회원에게 있습니다.
③ 회원은 당 사이트 및 제 3자의 지적 재산권을 침해해서는 안 됩니다.
제 4 장 서비스의 이용
제 12 조 (서비스 이용 시간)
① 서비스 이용은 당 사이트의 업무상 또는 기술상 특별한 지장이 없는 한 연중무휴, 1일 24시간 운영을
원칙으로 합니다. 단, 당 사이트는 시스템 정기점검, 증설 및 교체를 위해 당 사이트가 정한 날이나 시간에
서비스를 일시 중단할 수 있으며, 예정되어 있는 작업으로 인한 서비스 일시중단은 당 사이트 홈페이지를
통해 사전에 공지합니다.
② 당 사이트는 서비스를 특정범위로 분할하여 각 범위별로 이용가능시간을 별도로 지정할 수 있습니다. 다만
이 경우 그 내용을 공지합니다.
제 13 조 (홈페이지 저작권)
① NDSL에서 제공하는 모든 저작물의 저작권은 원저작자에게 있으며, KISTI는 복제/배포/전송권을 확보하고
있습니다.
② NDSL에서 제공하는 콘텐츠를 상업적 및 기타 영리목적으로 복제/배포/전송할 경우 사전에 KISTI의 허락을
받아야 합니다.
③ NDSL에서 제공하는 콘텐츠를 보도, 비평, 교육, 연구 등을 위하여 정당한 범위 안에서 공정한 관행에
합치되게 인용할 수 있습니다.
④ NDSL에서 제공하는 콘텐츠를 무단 복제, 전송, 배포 기타 저작권법에 위반되는 방법으로 이용할 경우
저작권법 제136조에 따라 5년 이하의 징역 또는 5천만 원 이하의 벌금에 처해질 수 있습니다.
제 14 조 (유료서비스)
① 당 사이트 및 협력기관이 정한 유료서비스(원문복사 등)는 별도로 정해진 바에 따르며, 변경사항은 시행 전에
당 사이트 홈페이지를 통하여 회원에게 공지합니다.
② 유료서비스를 이용하려는 회원은 정해진 요금체계에 따라 요금을 납부해야 합니다.
제 5 장 계약 해지 및 이용 제한
제 15 조 (계약 해지)
회원이 이용계약을 해지하고자 하는 때에는 [가입해지] 메뉴를 이용해 직접 해지해야 합니다.
제 16 조 (서비스 이용제한)
① 당 사이트는 회원이 서비스 이용내용에 있어서 본 약관 제 11조 내용을 위반하거나, 다음 각 호에 해당하는
경우 서비스 이용을 제한할 수 있습니다.
- 2년 이상 서비스를 이용한 적이 없는 경우
- 기타 정상적인 서비스 운영에 방해가 될 경우
② 상기 이용제한 규정에 따라 서비스를 이용하는 회원에게 서비스 이용에 대하여 별도 공지 없이 서비스 이용의
일시정지, 이용계약 해지 할 수 있습니다.
제 17 조 (전자우편주소 수집 금지)
회원은 전자우편주소 추출기 등을 이용하여 전자우편주소를 수집 또는 제3자에게 제공할 수 없습니다.
제 6 장 손해배상 및 기타사항
제 18 조 (손해배상)
당 사이트는 무료로 제공되는 서비스와 관련하여 회원에게 어떠한 손해가 발생하더라도 당 사이트가 고의 또는 과실로 인한 손해발생을 제외하고는 이에 대하여 책임을 부담하지 아니합니다.
제 19 조 (관할 법원)
서비스 이용으로 발생한 분쟁에 대해 소송이 제기되는 경우 민사 소송법상의 관할 법원에 제기합니다.
[부 칙]
1. (시행일) 이 약관은 2016년 9월 5일부터 적용되며, 종전 약관은 본 약관으로 대체되며, 개정된 약관의 적용일 이전 가입자도 개정된 약관의 적용을 받습니다.