• Title/Summary/Keyword: Personal Use

Search Result 2,694, Processing Time 0.034 seconds

The effect of personal characteristic factors on the usage of SNS (SNS의 개인행위 특성요인이 사용의도에 미치는 영향)

  • Son, Dal-Ho
    • The Journal of Information Systems
    • /
    • v.22 no.3
    • /
    • pp.1-24
    • /
    • 2013
  • SNS(Social Network Services) is being recognized as an important part in our society, individual lives and corporate business aspects, and the influence of SNS is growing explosively as expansion and supply of infrastructures that support mobile environments increase. Previous studies related to SNS were focused on user acceptance of new technology, based on Technology Acceptance Model(TAM). However, they had a limitation to focus on technology acceptance, without the consideration of personal and behavioral factors in SNS use. However, above all, successful SNS requires the understanding of users who are active on the network. Therefore, from the user's perspective, this study attempted a multi-dimensional approach by reflecting characteristics that come from SNS usage. This study considered user innovation, virtual skill, self-efficacy, social pressure and network effect as independent variables, and perceived ease-of-use, perceived usefulness and perceived value as mediating variables, and intention-to-use as dependent variable. The result showed that user innovation, self-efficacy, social pressure and network effect had a significant effect on the mediating variables. The practical contribution of this study is to suggest useful decision alternatives concerned to marketing strategy for acquiring and retaining lone-term customers related to SNS business.

A Study on the Assessment of the Index for Sustainable Development of On-line Fashion Advertising (온라인 패션광고의 지속가능발전 지표 평가 연구)

  • Son, Mi Young
    • Journal of Fashion Business
    • /
    • v.20 no.1
    • /
    • pp.53-68
    • /
    • 2016
  • The purpose of this research was to evaluate the possibility of sustainable development of online advertisements conducted by fashion companies. Factors composed of sustainable development indexes of online advertisement that had been developed in previous studies were identified, and then the relevance between purchase intention and advertisement experience was evaluated. An online survey of 573 persons in the 20 to 40 age range who own mobile phone and have experienced online advertisements of a fashion brand or a fashion company was conducted. The data collected from the survey and the results are as follows. First, the validity and reliability from confirmatory factor analysis of six factors (namely, personal information protection, web use infringement, advertisement expression harmfulness, advertisement expression objectivity, emotional responsibility, and environment-friendly) and 21 questions was confirmed. Second, it confirmed that consumers gave low points to the evaluation of sustainable development indexes of online advertisement of fashion companies. In particular, that consumers gave low points with regard to both environmental friendliness and web use infringement. Third, it was identified that personal indexes such as personal information protection, web use infringement, and indexes relating to advertisement expressions do not directly influence the consumer's purchase intention. However, social indexes like emotional responsibility and environmental friendliness do have an influence on the consumer's positive action intention.

Study on the Association between Personal Information Protection Legislation and Information Security Product (개인정보보호 관련 법령의 내용과 보안제품 분포간의 연관성 분석)

  • Kim, Min-Jeong;Lee, Jung Won;Yoo, Jinho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.6
    • /
    • pp.1549-1560
    • /
    • 2015
  • For the past few years, personal information breach incidents, great and small, occurred constantly. Accordingly, the Personal Information Protection related Ordinances are enacted and amended persistently, and the information security products also keep advancing and developing in the same way. There are the certification systems such as Common Criteria Evaluation and Validation(CC) and Korea Cryptographic Module Validation Program(KCMVP) for the information security products. These are also strictly carried out. This paper analyzes and categorizes the 5 Personal Information Protection related Ordinances in the aspects of technical protection measures by using key words. Here are the 5 related ordinances; 'the Personal Information Protection Act', 'the Act on Promotion of Information and Communications Network Utilization and Information Protection, etc', 'the Act on the Protection, Use, Etc, of Location Information', 'the Use and Protection of Credit Information Act', and 'the Electronic Financial Transactions Act.' Moreover, this study analyzes the association between the technical protection measures in the 5 relevant laws and the information security products that are obtaining the CC Evaluation & Validation(CC) and the products that are now produced at KISIA's member companies.

Classification for a Standardization System for the Elderly's Necessities (고령친화용품 표준화를 위한 분류)

  • Kim, Yi-Soon;Kwon, Ja-Youn;Shin, Soon-Shik;Moon, In-Hyuk;Hwang, Lee-Cheol;Kim, Gyeong-Cheol
    • Journal of Physiology & Pathology in Korean Medicine
    • /
    • v.20 no.2
    • /
    • pp.328-332
    • /
    • 2006
  • This study aims to provide definitions and standardization for necessities that elderly people can use conveniently and properly in their daily lives and classify necessities for different purposes. First, standard terminologies were defined by reviewing the literature and the relevant laws related to daily necessities for the elders. Secondly, a concept for necessities for the elders was also defined through consultation with experts. Lastly, the elderly's necessities were selected and classified. The elderly's necessities are defined as aids that ordinary elderly people in normal aging process need for the purpose of the convenience of life and aids they wear or use to maintain or improve their health. In this study, the elderly's necessities are divided into three categories: necessities of health, necessities of Oriental medical aids and necessities of daily living. Each category is further classified as follows: Necessities of health include aids for personal medical treatment, aids for personal care and protection and aids for recreation. Necessities of Oriental medical aids include aids for personal medical treatment, aids for personal care and protection and others. Necessities of daily living include aids for personal care and protection, aids for personal mobility, aids for housekeeping, furnishings, aids for communication, information and signalling, aids for handling products and goods and aids for recreation. The classification of the elderly's necessities in this study can be used as basic information for further studies of demand for necessities for the elderly. The results will lay the foundation for a standardization system for the elderly's necessities and the development of silver industry.

Improvement Method of Education for Personal Information Protection through Survey on Perception in College Students (대학생 개인정보보호 인식조사를 통한 교육 개선방안 연구)

  • Kim, Ju-yeon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.23 no.3
    • /
    • pp.349-355
    • /
    • 2019
  • In the trend of continuously increasing collection and use of personal information, there are legal grounds for protecting personal information and various policies and systems are implemented, but there is insufficient analysis about education and its effect of personal information protection. In this study, we surveyed and analyzed the degree of awareness and actual perception level in the protection of personal information of college students, and investigated the satisfaction of personal information protection education. The results of the analysis showed that students' interest in privacy protection and concern about personal information exposure was very high, but the efforts to protect personal information and the perception level of rights and systems for protecting personal information was very low. In addition, the experience and satisfaction of education for personal information protection were found to be very low. Students felt that the necessity of education for personal information protection was strongly agreed and preferred regular and continuous education rather than one-time education.

The Personal Data Protection Mechanism in the European Union

  • Syroid, Tetiana L.;Kaganovska, Tetiana Y.;Shamraieva, Valentyna M.;Perederiі, Оlexander S.;Titov, Ievgen B.;Varunts, Larysa D.
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.5
    • /
    • pp.113-120
    • /
    • 2021
  • The adoption of the General Data Protection Regulation (EU) 2016/679 transformed approaches and concepts to the implementation of the personal data protection mechanism in the European Union. Within the EU, almost all countries have adapted a new protection mechanism, which requires a study of the specifics of its use. The article intends to assess the legal provisions of the current mechanism of personal data protection in the EU. The author studied the mechanism of personal data protection under the General Data Protection Regulation (EU) 2016/679 (GDPR) based on the concept of contextual integrity and analysis of EU legislation on personal data protection. The scientific publications for 2016-2020 were reviewed for the formation of ideas of a new personal data protection mechanism in the EU, informative and transparent analysis of legal provisions. The article notes that the personal data privacy and protection is increasing, there is an ongoing unification of the legal status of personal data protection and the formation of a digital market for dissemination, exchange, control, and supervision of data. Cross-border cooperation is part of the personal data protection mechanism. The author proved that the GDPR has changed approach to personal data protection: the emphasis is now shifting to the formation of a digital market, where the EU's role in ensuring regulation is crucial. The article identifies the emergence of a new protectionist legal system and strengthening of legal provisions regarding privacy. This legal system needs unification and harmonization in accordance with national legislation, is territorially fragmented and differentiated within the EU.

Strategy Design to Protect Personal Information on Fake News based on Bigdata and Artificial Intelligence

  • Kang, Jangmook;Lee, Sangwon
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.11 no.2
    • /
    • pp.59-66
    • /
    • 2019
  • The emergence of new IT technologies and convergence industries, such as artificial intelligence, bigdata and the Internet of Things, is another chance for South Korea, which has established itself as one of the world's top IT powerhouses. On the other hand, however, privacy concerns that may arise in the process of using such technologies raise the task of harmonizing the development of new industries and the protection of personal information at the same time. In response, the government clearly presented the criteria for deidentifiable measures of personal information and the scope of use of deidentifiable information needed to ensure that bigdata can be safely utilized within the framework of the current Personal Information Protection Act. It strives to promote corporate investment and industrial development by removing them and to ensure that the protection of the people's personal information and human rights is not neglected. This study discusses the strategy of deidentifying personal information protection based on the analysis of fake news. Using the strategies derived from this study, it is assumed that deidentification information that is appropriate for deidentification measures is not personal information and can therefore be used for analysis of big data. By doing so, deidentification information can be safely utilized and managed through administrative and technical safeguards to prevent re-identification, considering the possibility of re-identification due to technology development and data growth.

A Study on the Steering System of Electric Scooter

  • Park, Sung Cheon
    • International journal of advanced smart convergence
    • /
    • v.11 no.2
    • /
    • pp.219-225
    • /
    • 2022
  • Recently, the popularization of personal mobility(PM) has made it possible to see many electric scooters. The energy source of personal transportation used by the general public and the disabled can be seen as environmentally friendly as electricity. Personal transportation means are divided into small electric vehicles because they use electric energy, and they are being treated as new models by automobile manufacturers in each country and spurring development. On the other hand, personal transportation means may cause various types of traffic accidents as they travel between roads and a human walk. In order to prevent such accidents, it is judged that the enactment of laws on the establishment of specifications for electric scooters, which are personal transportation means, and the method of restricting road operation should be given priority. The electric scooter is basically different from the conventional vehicle. The steering shaft of the steering system applied to the electric scooter one to two is possible. 1 to 2 the front-wheel under the steering column is used. It is classified according to the number of wheel installed at the electric scooter is the vehicle body into 2 wheel - electric scooter, and 3 wheel - electric scooter and 4 wheel - electric scooter. In this study, we propose a steering shaft design model that can be applied to an electric scooter, one of personal transportation means. A design model for 1-shaft steering and 2-shafts steering that can be applied to electric scooters is proposed. In addition, we have produced the prototypes for the commercialization of the proposed models, and reviewed the pros and cons of the manufactured prototypes and models.

Personal Information life Cycle Model Considering the Learning Cha racteristics of Artificial Intelligence (인공지능의 학습 특성을 고려한 개인정보 라이프 사이클 모델)

  • Jaeyoung Jang;Jong-Min Kim
    • Convergence Security Journal
    • /
    • v.24 no.2
    • /
    • pp.47-53
    • /
    • 2024
  • The traditional personal information life cycle model, primarily tailored to conventional systems, is inherently unsuitable for comprehending the nuances of personal information flow within artificial intelligence frameworks and for formulating effective protective measures. Therefore, this study endeavors to introduce a personal information life cycle model specifically designed for artificial intelligence (AI). This paper presents a personal information life cycle model suitable for artificial intelligence, which includes the stages of collection, retention, learning, use, and destruction/suspension, along with the re-learning process for destruction/suspension. Subsequently, we compare the performance of these existing models (such aspersonal information impact assessment and the ISMS-P model) with the newly proposed model. This underscores the superiority of our proposed model in comprehensively understanding the personal information flow in AI and establishing robust protective measures.

Path Analysis of Credit Card Use Patterns among College Students : Examination of Cash Advances and Deferred Payments (대학생소비자의 신용카드 사용행동에 대한 인과분석 : 현금서비스 사용행동과 연체행동을 중심으로)

  • Kim Chang-Mi;Kim Young-Seen
    • Journal of Families and Better Life
    • /
    • v.23 no.2 s.74
    • /
    • pp.77-91
    • /
    • 2005
  • The purpose of this study is to investigate general tendencies in credit card use, and determine the causes of the use of cash advance service and deferred payment among college students. Socio-demographic variables(gender, year in college, allowance, family income, parents' education and occupation, having taken a personal financial management course), knowledge and attitudes toward credit card, and financial management practices were incorporated as antecedent variables. Logistic regression analysis and multiple regression analysis were conducted to test the hypotheses. The results were as follows ; First, $32\%$ of the college students with no regular income experienced deferred payment, and $60.4\%$ of them had used a cash advance service. Second, the frequency and amount of cash advance service use were affected by family income, financial practices, and allowance. The financial practice as a parameter was affected by their completion of a personal finance course and their allowance. Third, deferred payment of credit was affected by their knowledge on credit cards and their financial practices. The financial practices as a parameter were affected by the family income and their completion of a personal finance course, and the knowledge on credit cards was affected by gender. Lastly, implications and suggestions for credit card use behavior research and consumer credit education are discussed in this article.