• Title/Summary/Keyword: Knowledge and Information Protection

Search Result 207, Processing Time 0.033 seconds

A Preliminary Study to Develop a Parent Education Program Concerning Young Child Sexual Abuse Self-Protection (유아기 자녀 성학대 자기보호 교육을 위한 부모 교육프로그램 개발 기초 연구)

  • Chun, Hui-Young;Lee, Gui-Sook
    • Journal of Families and Better Life
    • /
    • v.27 no.2
    • /
    • pp.213-226
    • /
    • 2009
  • For the purpuse of gathering basic information to develop the education program for parent to become educators of young child for sexual abuse(YCSA) self-protection, 298 mothers of 4- to 6-years old children responded to a questionnaire to measure their needs for YCSA self-protection education and knowledge of characteristics related to YCSA. Results related to the needs of mothers showed that 30.4% of them were educated for YCSA protection and 64.6% had provided YCSA self-protection education to their children. However, it was also found that even mothers who had frequently been educated on protection skills regarding YCSA encountered problems as a result of insufficient information and materials concerning YCSA protection education. The mothers in the study subsequently recommended that from age 4 years young children should be educated about YCSA by parents and teachers together. And most of them expected young children to learn some skills to cope with YCSA, with parent education programs for YCSA also recommended by the mothers. Mothers' characteristics such as knowledge about YCSA, myths and stereotypes toward YCSA showed meaningful correlations with mother's demographic variables, not with children's variables. The study concludes that developing the requested parent education program should be done in consideration of parent's needs and characteristics related to the YCSA self-protection.

Fuzzy Petri-net Approach to Fault Diagnosis in Power Systems Using the Time Sequence Information of Protection System

  • Roh, Myong-Gyun;Hong, Sang-Eun
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2003.10a
    • /
    • pp.1727-1731
    • /
    • 2003
  • In this paper we proposed backward fuzzy Petri-net to diagnoses faults in power systems by using the time sequence information of protection system. As the complexity of power systems increases, especially in the case of multiple faults or incorrect operation of protective devices, fault diagnosis requires new and systematic methods to the reasoning process, which improves both its accuracy and its efficiency. The fuzzy Petri-net models of protection system are composed of the operating process of protective devices and the fault diagnosis process. Fault diagnosis model, which makes use of the nature of fuzzy Petri-net, is developed to overcome the drawbacks of methods that depend on operator knowledge. The proposed method can reduce processing time and increase accuracy when compared with the traditional methods. And also this method covers online processing of real-time data from SCADA (Supervisory Control and Data Acquisition)

  • PDF

A New Direction and Its Challenges for Linkage of Agricultural Research and Extension As a Traditional Knowledge Development in Rural Korea: Agricultural Knowledge Systems (농업지식체계 구축에 의한 전통지식개발 방법으로서의 농업연구지도 연계의 방향)

  • Park, Duk-Byeong;Kang, Kyeong-Ha;Lee, Min-Soo
    • Journal of Agricultural Extension & Community Development
    • /
    • v.10 no.1
    • /
    • pp.15-29
    • /
    • 2003
  • The study uses agricultural knowledge system theory to explore how traditional knowledge applies to the linkage system of agricultural research and extension in rural Korea. By agricultural knowledge system we emphasize the dynamic networks of actors, processes of negotiation, and the diverse ways in which knowledge is constructed and performed. The knowledge systems reflect the idea that the boundaries between knowledge groups are not closed and that there could be considerable overlap between knowledge system. The results of this study are the following : First, we should know that some extension agents clearly value farmer knowledge and try to facilitate farmer-to-farmer communication. Extension plays a significant role in the knowledge-creation process and shaping communities because knowledge processes are embedded in social processes that involve aspects of power, authority, and legitimization. Third, the constructions of agricultural knowledge systems thus include social interactions, communication, and the diverse processes individuals employ create, use, and evaluate multiple types and sources of information through the linkage between agricultural colleges and Rural Development Administration (RDA), establishing the research institution of research and extension linkage, exchange research agent with extension agent, and bottom-up approach. Second, we should know that the focus of traditional knowledge development is rural community development as a community process. Nowadays the sessions of the Intergovernmental Committee of World Intellectual Property Organization (WIPO) cover two lines of inquiry, which are the use of existing standards of intellectual property for the protection of traditional knowledge and that of new legal standards, eventually in the from of sui generis mechanisms of protection.

  • PDF

An Empirical Study of B2C Logistics Services Users' Privacy Risk, Privacy Trust, Privacy Concern, and Willingness to Comply with Information Protection Policy: Cognitive Valence Theory Approach (B2C 물류서비스 이용자의 프라이버시 위험, 프라이버시 신뢰, 프라이버시 우려, 정보보호정책 준수의지에 대한 실증연구: 인지밸런스이론 접근)

  • Se Hun Lim;Dan J. Kim
    • Information Systems Review
    • /
    • v.22 no.2
    • /
    • pp.101-120
    • /
    • 2020
  • This study investigates the effects of privacy psychological characteristics of B2C logistics services users on their willingness to comply with their logistics companies' information protection policy. Using cognitive valence theory as a theoretical framework, this study proposes a research model to examine the relationships between users' logistics security knowledge, privacy trust, privacy risk, privacy concern, and their willingness of information protection policy compliance. To test the proposed model, we conducted a survey from actual users of logistics services and collected valid 151 samples. We analyzed the data using a structural equation modeling software. The empirical results show that logistics security knowledge positively affects privacy trust; privacy concern positively influences privacy risk; privacy trust, privacy risk, and privacy concern positively influence behavioral willingness of compliance. However, logistics security knowledge does not affect behavioral willingness of compliance. The results of the study provide several contributions to the literature of B2C logistics services domain and managerial implications to logistics services companies.

A Study on the Countermeasure to Deal with Cyber Terrorism (사이버테러리즘의 대응방안에 관한 연구)

  • Oh Tae-Kon
    • The Journal of the Korea Contents Association
    • /
    • v.5 no.3
    • /
    • pp.93-101
    • /
    • 2005
  • These days, modern society is facing a 'turning point of paradigm' from industrial society to knowledge and information society. It indicates an entry to the high-speed network society centering on knowledge. Specifically, Korea has invested enormously to If Industry and finally other advanced countries are eager to export technologies of our country through benchmarking. However, because of our growth-oriented policy, Korea is not very good at dealing with the dysfunctions of information-centered society, and one of the representative problems is cyber-terrorism. Cyber terrorism which anonymous actors do to the uncertain number of people is one of the new types of terrorism. This study aims at political and legal speculations on cyber terrorism for protection of contents and find its countermeasures.

  • PDF

A Study of Relationship between Dataveillance and Online Privacy Protection Behavior under the Advent of Big Data Environment (빅데이터 환경 형성에 따른 데이터 감시 위협과 온라인 프라이버시 보호 활동의 관계에 대한 연구)

  • Park, Min-Jeong;Chae, Sang-Mi
    • Knowledge Management Research
    • /
    • v.18 no.3
    • /
    • pp.63-80
    • /
    • 2017
  • Big Data environment is established by accumulating vast amounts of data as users continuously share and provide personal information in online environment. Accordingly, the more data is accumulated in online environment, the more data is accessible easily by third parties without users' permissions compared to the past. By utilizing strategies based on data-driven, firms recently make it possible to predict customers' preferences and consuming propensity relatively exactly. This Big Data environment, on the other hand, establishes 'Dataveillance' which means anybody can watch or control users' behaviors by using data itself which is stored online. Main objective of this study is to identify the relationship between Dataveillance and users' online privacy protection behaviors. To achieve it, we first investigate perceived online service efficiency; loss of control on privacy; offline surveillance; necessity of regulation influences on users' perceived threats which is generated by Dataveillance.

Protecting Copyright Owners in Nigeria: A Panacea for Intellectual Development

  • Owushi, Emmanuel
    • International Journal of Knowledge Content Development & Technology
    • /
    • v.10 no.1
    • /
    • pp.21-34
    • /
    • 2020
  • The paper looks at protecting copyright owners in Nigeria: a panacea for intellectual development. A descriptive survey design was adopted in carrying out the study. The sample size for the study was 112. Three research objectives guided the study. The study utilized a self-developed questionnaire for data collection. A total of 112 copies of the questionnaire were distributed to librarian and lecturers, out of which 108 copies were duly filled and returned, representing 96.4%. The collected data was arranged in frequency and analyzed using percentage and mean score. The findings revealed that protection of copyright will encourage creators of intellectual works, and that if authors are well remunerated there is likelihood of adequate availability of various publications to meet information needs of Nigerians. The result showed that the right to intellectual properties is one of the ways to encourage intellectual development. The finding revealed that copyright protection provides security for intellectual product and does not negatively affect the availability of intellectual materials. Based on the research findings, it was recommended that owners of intellectual property deserve good earnings for their intellectual works in order to promote Knowledge proliferation and availability so as to meet the reading needs of the citizens at the various levels. The study also recommended that all cases relating to copyright violation in our courts should be summarily dealt with. The study advocated that the provision on the punishment should be reviewed such that it could deter people from infringing on authors rights.

A Framework for measuring query privacy in Location-based Service

  • Zhang, Xuejun;Gui, Xiaolin;Tian, Feng
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.5
    • /
    • pp.1717-1732
    • /
    • 2015
  • The widespread use of location-based services (LBSs), which allows untrusted service provider to collect large number of user request records, leads to serious privacy concerns. In response to these issues, a number of LBS privacy protection mechanisms (LPPMs) have been recently proposed. However, the evaluation of these LPPMs usually disregards the background knowledge that the adversary may possess about users' contextual information, which runs the risk of wrongly evaluating users' query privacy. In this paper, we address these issues by proposing a generic formal quantification framework,which comprehensively contemplate the various elements that influence the query privacy of users and explicitly states the knowledge that an adversary might have in the context of query privacy. Moreover, a way to model the adversary's attack on query privacy is proposed, which allows us to show the insufficiency of the existing query privacy metrics, e.g., k-anonymity. Thus we propose two new metrics: entropy anonymity and mutual information anonymity. Lastly, we run a set of experiments on datasets generated by network based generator of moving objects proposed by Thomas Brinkhoff. The results show the effectiveness and efficient of our framework to measure the LPPM.

Hybrid Recommendation Algorithm for User Satisfaction-oriented Privacy Model

  • Sun, Yinggang;Zhang, Hongguo;Zhang, Luogang;Ma, Chao;Huang, Hai;Zhan, Dongyang;Qu, Jiaxing
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.16 no.10
    • /
    • pp.3419-3437
    • /
    • 2022
  • Anonymization technology is an important technology for privacy protection in the process of data release. Usually, before publishing data, the data publisher needs to use anonymization technology to anonymize the original data, and then publish the anonymized data. However, for data publishers who do not have or have less anonymized technical knowledge background, how to configure appropriate parameters for data with different characteristics has become a more difficult problem. In response to this problem, this paper adds a historical configuration scheme resource pool on the basis of the traditional anonymization process, and configuration parameters can be automatically recommended through the historical configuration scheme resource pool. On this basis, a privacy model hybrid recommendation algorithm for user satisfaction is formed. The algorithm includes a forward recommendation process and a reverse recommendation process, which can respectively perform data anonymization processing for users with different anonymization technical knowledge backgrounds. The privacy model hybrid recommendation algorithm for user satisfaction described in this paper is suitable for a wider population, providing a simpler, more efficient and automated solution for data anonymization, reducing data processing time and improving the quality of anonymized data, which enhances data protection capabilities.

Knowledge, Awareness and Health Risk Concerns on Occupational Exposure to Radiation among Firefighters in Korea (소방공무원의 직업적 방사선노출에 대한 지식, 자각 및 건강피해 우려)

  • Lee, Hyeongyeong;Yoon, Hyeongwan;Park, Jeongim
    • Journal of Korean Society of Occupational and Environmental Hygiene
    • /
    • v.25 no.4
    • /
    • pp.516-524
    • /
    • 2015
  • Objectives: This study aims to investigate the current status of knowledge, awareness and health risk concerns on occupational radiation exposures among firefighters in Korea. The results will provide basic information for developing a prevention program to minimize adverse health effects relating to radiation exposure among firefighters. Methods: A questionnaire was composed of general characteristics of participants, and their knowledge, awareness, health risk concerns relating to occupational radiation exposure. It was distributed by email to all of 307 firefighters in Jeollabukdo in April 2014 and 259 of them (response rate 84.3%) were responded. Answers were analyzed for descriptive statistics including frequencies and percentages. SPSS/WIN 18.0 program was utilized for statistical analysis of t-test, ANOVA and Pearson's correlation. Results: The average score of radiation protection knowledge was $5.83{\pm}1.77$ ($average{\pm}SD$) out of 10. The score of awareness and health risk concerns on radiation exposure were 4.27, 3.94 out of 5, respectively. The results indicated that the knowledge on the characteristics of radiation was marginal among the firefighters, while the awareness and health risk concerns relating to radiation exposures were relatively higher comparing to other professions. Conclusions: Knowing the characteristics of potential risks is the first step for minimizing the adverse health effects relating to the risks. Therefore, it is necessary to provide adequate training and information on radiation and exposure protection methods for firefighters.