• Title/Summary/Keyword: User Private Information

Search Result 363, Processing Time 0.02 seconds

Factors Influencing Students' Choice of Learning Space: Recommendations of Effective Space Arrangement for University Libraries (대학생의 학습공간 선택에 영향을 미치는 요인에 관한 연구: 대학도서관의 효과적인 공간 구성을 위한 제언)

  • Lee, Nari;Park, Ji-Hong
    • Journal of the Korean Society for information Management
    • /
    • v.39 no.2
    • /
    • pp.61-86
    • /
    • 2022
  • The purpose of this study is to investigate the effect of learning space Servicescape on the user satisfaction level and continuance intention and to identify moderating effect of the learning activity. The six Servicescape factors are selected after literature review and in-depth interviews; cleanliness, comfort, convenience, aesthetics, accessibility, and flexibility. The online survey is given to the university students at four-year private universities in Seoul metropolitan area. The result shows that among the learning space Servicescape factors, cleanliness, comfort, convenience, and accessibility have a significant impact on the user's satisfaction and the user's satisfaction response determines the continuance intention to the learning space. It is also found that the factors of cleanliness and comfort have a negative moderating effect on user satisfaction. This study implies that the result provides methods to develop the space arrangement for university libraries that provide the better-support to students' learning experience.

Progress and Special Features in User Instruction of Korean Academic Libraries (국내 대학도서관 이용자교육의 추이와 특징)

  • Kim, Ryoung-Eun;Lee, Jae-Whoan
    • Journal of Korean Library and Information Science Society
    • /
    • v.48 no.4
    • /
    • pp.153-179
    • /
    • 2017
  • The purpose of this article is to discuss about both historical progress and current situation of user instruction in Korean academic libraries. Emphasis was on identifying and analyzing the special features and limitations of user instruction from the viewpoints of library users as well as those of librarians. To the end, data were collected from three methods: the first tool was such major statistical sources as 'KERIS university library statistics system' and 'Research Reports' by the Korean Private University Library Association. The second was from the results of surveys and interviews with librarians from 20 university libraries. And the third was from the results of surveys with library users in two sample university libraries.

Relaying Rogue AP detection scheme using SVM (SVM을 이용한 중계 로그 AP 탐지 기법)

  • Kang, Sung-Bae;Nyang, Dae-Hun;Choi, Jin-Chun;Lee, Sok-Joon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.23 no.3
    • /
    • pp.431-444
    • /
    • 2013
  • Widespread use of smartphones and wireless LAN accompany a threat called rogue AP. When a user connects to a rogue AP, the rogue AP can mount the man-in-the-middle attack against the user, so it can easily acquire user's private information. Many researches have been conducted on how to detect a various kinds of rogue APs, and in this paper, we are going to propose an algorithm to identify and detect a rogue AP that impersonates a regular AP by showing a regular AP's SSID and connecting to a regular AP. User is deceived easily because the rogue AP's SSID looks the same as that of a regular AP. To detect this type of rogue APs, we use a machine learning algorithm called SVM(Support Vector Machine). Our algorithm detects rogue APs with more than 90% accuracy, and also adjusts automatically detection criteria. We show the performance of our algorithm by experiments.

Identifying Social Relationships using Text Analysis for Social Chatbots (소셜챗봇 구축에 필요한 관계성 추론을 위한 텍스트마이닝 방법)

  • Kim, Jeonghun;Kwon, Ohbyung
    • Journal of Intelligence and Information Systems
    • /
    • v.24 no.4
    • /
    • pp.85-110
    • /
    • 2018
  • A chatbot is an interactive assistant that utilizes many communication modes: voice, images, video, or text. It is an artificial intelligence-based application that responds to users' needs or solves problems during user-friendly conversation. However, the current version of the chatbot is focused on understanding and performing tasks requested by the user; its ability to generate personalized conversation suitable for relationship-building is limited. Recognizing the need to build a relationship and making suitable conversation is more important for social chatbots who require social skills similar to those of problem-solving chatbots like the intelligent personal assistant. The purpose of this study is to propose a text analysis method that evaluates relationships between chatbots and users based on content input by the user and adapted to the communication situation, enabling the chatbot to conduct suitable conversations. To evaluate the performance of this method, we examined learning and verified the results using actual SNS conversation records. The results of the analysis will aid in implementation of the social chatbot, as this method yields excellent results even when the private profile information of the user is excluded for privacy reasons.

Awareness of Personal Information Protection for Service Users among Small and Mid-Sized Security Companies (중.소민간경비업체의 서비스 이용자 개인정보보호에 관한 인식)

  • Kim, Il Gon;Choi, Kee Nam
    • Convergence Security Journal
    • /
    • v.14 no.3_2
    • /
    • pp.3-12
    • /
    • 2014
  • The government was fully aware of the gravity of a recent massive leak of personal information of credit card users. Meanwhile, the government just took a light disciplinary action by imposing a fine, but it showed its intention to strengthen the regulations by taking the severest disciplinary action. The tightened regulations against personal information leak will be applied to the private security industry without exception to protect individual people's property and lives if such an incident occurs in that industry that deals with a wide variety of personal information such as CCTV data or privacy information all the time. The purpose of this study was to examine the state of the protection and management of personal information for service users among private security firms in an effort to suggest some reform measures. The findings of the study were as follows: First, administrators or managers who are involved with personal information protection should make a full-fledged effort to gather information. Second, counseling or related programs should be provided for small and mid-sized security firms to guarantee thorough personal information protection. Third, Korea Security Association should improve the educational system related to personal information protection to resolve problems with this education currently provided for managers and employees of these companies.

The Characteristics of commercialization process in government-sponsored information technology: Korean Case (정보통신 국책개발 기술의 상용화과정 특성에 관한 연구)

  • 이영덕
    • Journal of Korea Technology Innovation Society
    • /
    • v.5 no.1
    • /
    • pp.26-43
    • /
    • 2002
  • Korean government has been putting efforts to promote development of technologies by government sponsored labs and to transfer, diffuse, and commercialize these technologies in private sector since mid 1980s. In spite of these efforts, utilization of government-sponsored technology remains in the very low level. According to the survey conducted by Korea Intellectual and Patent Office (1999), the ratio of unused industrial property rights including patents was above 70% of total industrial property rights. Survey on the information and telecommunication industry done by the Institute of Information Technology Assessment (IITA) in 1999 shows that the utilization ratio of government-sponsored technologies is about 55.8%. This is especially true where government is not the primary or end-user of technologies. The purposes of this paper are to (1) identify a process model of technology commercialization, (2) develop the related variables of each step in the six-step continuous process model of government-sponsored technology commercialization, (3) empirically investigate the data gathered through questionnaire survey, and (4) suggest policy alternatives for promoting technology commercialization in Information and Telecommunication industries.

  • PDF

Authentication Scheme based on NTRU for the Protection of Payment Information in NFC Mobile Environment (NFC 모바일 환경에서 결제정보보호를 위한 NTRU 기반 인증 기법)

  • Park, Sung Wook;Lee, Im Yeong
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.2 no.3
    • /
    • pp.133-142
    • /
    • 2013
  • Recently, smart devices for various services have been developed using converged telecommunications, and the markets for near field communication (NFC) mobile services is expected to grow rapidly. In particular, the realization of mobile NFC payment services is expected to go commercial, and it is widely attracting attention both on a domestic and global level. However, this realization would increase privacy infringement, as personal information is extensively used in the NFC technology. One example of such privacy infringement would be the case of the Google wallet service. In this paper, we propose an mutual authentication scheme based on NTRU for secure channel in OTA and an zero-knowledge proof scheme NTRU based on for protecting user information in NFC mobile payment systems without directly using private financial information of the user.

Portal's Liability for User Reply to News Article, Provided by the News Media -A Critical Analysis on 2005 GaHap64571 of Seoul Central District Court- (언론사로부터 전재 받은 뉴스기사의 댓글에 대한 포털의 작위의무 -서울중앙지법 2005가합64571 판결에 대한 비판적 고찰-)

  • Kim, Gyong-Ho
    • Korean journal of communication and information
    • /
    • v.42
    • /
    • pp.140-167
    • /
    • 2008
  • This study analyzes the legal reasoning of Seoul Central District Court, which imposed legal liability on portals for posting defamatory user replies to news articles, written and provided by the news media, onto their 'News Windows'. Saddling portals with the burden of verifying the facts associated in news articles and imposing the legal obligation as a publisher entail a grave risk of impairment of free flow of information and freedom of expression. Of course, it would ultimately result in tightening up private censorship of information which the Constitution does not allow, and funker keep portals from posting even news articles in which expressed views and opinions are lawful. When judging whether portals should assume liability fur libelous user replies to news articles, it is necessary to distinguish the territory under the direct authority of portals from cafes and bulletin boards managed by third parties. In addition, imposing legal liability above the level of common carrier should be limited to the cases; when portals arbitrarily change the contents of news articles or when the articles portals changed contain libelous contents. Even if those conditions are met, the altered contents should obviously constitute libel. Only in the presence of proof that portals knew the illegality of news articles and did not take proper steps including deleting those replies, should portals not be considered as an accomplice. Nor should portals take responsibility for users' defamatory replies for those reasons.

  • PDF

U.S. Forest Service Research : Its Administration and Management

  • Krugman, Stanley L.
    • Journal of Korean Society of Forest Science
    • /
    • v.76 no.3
    • /
    • pp.243-248
    • /
    • 1987
  • The U.S. Forest Service administers the world's largest forestry research organization. From its modest beginning in 1876, some 30 years before the United States national forest system was established, the research branch has devoted its effort to meet current and future information needs of the forestry community of the United States, not just for the U.S. Forest Service. The research branch is one of three major administrative units of the U.S. Forest Service. The others being the National Forest System and State and Private Forestry. Currently the National Forest System comprises 155 national forests, 19 national grasslands, and 18 utilization projects located in 44 states. Puerto Rico, and the Virgin Islands. The National Forest System manages these areas for a large array of uses and benefits including timber, water, forage, wildlife, recreation, minerals, and wilderness. It is through the State and Private Forestry branch that the U.S. Forest Service cooperates and coordinates forestry activities and programs with state and local governments, forest industries, and private landowners. These activities include financial and technical assistance in disease, insect, and fire protection ; plan forestry programs ; improve harvesting and marketing practices ; and transfer forestry research results to user groups. Forestry research is carried out through eight regional Forest Experiment Stations and the Forest Product Laboratory. Studies are maintained at 70 administrative sites, and at 115 experimental forest and grasslands. All of the current sciences that composed modern forestry are included in the research program. These range from forest biology (i. e. silviculture, ecology, physiology, and genetics) to the physical, mathematical, engineering, managerial, and social sciences. The levels of research range from application, developmental, and basic research. Research planning and priority identification is an ongoing process with elements of the research program changing to meet short-term critical information needs(i. e. protection research) to long-term opportunities(i. e. biotechnology). Research planning and priority setting is done in cooperation with National Forest Systems, forest industries, universities, and individual groups such as environmental, wilderness, or wildlife organizations. There is an ongoing review process of research administration, organization, and science content to maintain quality of research. In the U.S. Forest Service the research responsibility is not completed until the new information is being applied by the various user group : I. e. technology transfer program. Research planning and development in the U.S. Forest Service is a dynamic activity. Porgrams for the year 2000 and beyond are now in the planning stage.

  • PDF

An Authentication Model based Fingerprint Recognition for Electronic Medical Records System (지문인식 기반의 전자의무기록 시스템 인증 모델)

  • Lee, Yong-Joon
    • The KIPS Transactions:PartC
    • /
    • v.18C no.6
    • /
    • pp.379-388
    • /
    • 2011
  • Ensuring the security of medical records is becoming an increasingly important problem as modern technology is integrated into existing medical services. As a consequence of the adoption of EMR(Electronic Medical Records) in the health care sector, it is becoming more and more common for a health professional to edit and view a patient's record. In order to protect the patient's privacy, a secure authentication model to access the electronic medical records system must be used. A traditional identity based digital certificate for the authenticity of EMR has private key management and key escrow of a user's private key. In order to protect the EMR, The traditional authentication system is based on the digital certificate. The identity based digital certificate has many disadvantages, for example, the private key can be forgotten or stolen, and can be easily escrow of the private key. Nowadays, authentication model using fingerprint recognition technology for EMR has become more prevalent because of the advantages over digital certificate -based authentication model. Because identity-based fingerprint recognition can eliminate disadvantages of identity-based digital certificate, the proposed authentication model provide high security for access control in EMR.