• Title/Summary/Keyword: personal Information

Search Result 6,006, Processing Time 0.035 seconds

Personal Informatics as an Information Ecology: Activity Trackers and Relational Affordances

  • Jarrahi, Mohammad Hossein
    • International Journal of Knowledge Content Development & Technology
    • /
    • v.12 no.1
    • /
    • pp.7-16
    • /
    • 2022
  • With the proliferation of activity-tracking devices and other smart tools, more users leverage these personal informatics technologies to track their physical and fitness-related activities. The research on the benefits (and limitations) of these devices tends to focus on the use of a single tool, leaving out the interactions among multiple technologies, and how these interactions influence the way users perceive their affordances. Building from an ecological perspective, I extend this research by providing insight into the competitive and complementary relationships among activity tracking devices and other fitness-related and personal informatics technologies within the device ecology of technologies around the user. The affordances of these devices are therefore not enacted in isolation but are relational to understanding of other technological options and differing personal preferences and goals of the user.

Personal Information System risk analysis standard supporting tool development (개인정보시스템 위험도 분석 기준 지원 도구 개발 연구)

  • Han, Kyung-Su;Jung, Hyun-Mi;Lee, Gang-Soo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2012.05a
    • /
    • pp.663-666
    • /
    • 2012
  • Since September 30 2011, depending on Personal Information Protection Act article 29 and Act standard securing personal information safety the fifth clause of article 7, in case personal information manager of public and private enterprise saves unique indentifying information to internal network, the manager can enforce that decide checking of cryptographic application and a range of application following risk analysis criteria result. Until December 31 2012, enterprises complete the application of cryptographic technology or the equivalent. The paper is research and development on supporting tool that suggest risk analysis criteria based on personal information risk analysis criteria that be provided by MOPAS(Ministry Of Public Administration and Security) and KISA(Korea Internet Security Agency) for personal information processing.

  • PDF

Analyzing the Privacy Leakage Prevention Behavior of Internet Users Based on Risk Perception and Efficacy Beliefs : Using Risk Perception Attitude Framework (위험지각과 효능감에 따른 인터넷 사용자의 개인정보 유출 예방행위 분석 : 위험지각태도 프레임웍을 기반으로)

  • Jang, Ickjin;Choi, Byounggu
    • The Journal of Society for e-Business Studies
    • /
    • v.19 no.3
    • /
    • pp.65-89
    • /
    • 2014
  • Although many studies have focused on the influences and outcomes of personal information leakage, few studies have investigated how the personal information leakage prevention behavior differs depending on internet user. This study attempts to supplement the existing studies' limitations with the use of risk perception attitude (RPA) framework. More specifically, this study tries to show internet user can be classified into four groups based on perceived risk of personal information leakage and efficacy beliefs of personal information protection, and to identify how the groups differ in terms of motivation, information seeking, and behaviors for privacy leakage prevention. Analysis on survey data from 276 internet users reveals that the users can be classified into responsive, avoidance, proactive, indifference groups. Furthermore, there are differences between groups in terms of motivation, information seeking, and behaviors for personal information leakage prevention. This study contributes to expand existing literature by providing tailored guidelines for implementation of personal information protection strategies and policy.

Personal Strengths Knowledge Is the Key to Employability: Implications for Library and Information Science and Career Development Education for Its Students (취업력 제고의 관건으로서 개인강점 지식 - 문헌정보학과와 사서의 경력개발교육에 주는 의미 -)

  • Cho, Byung-Ju;Choi, Jung-Hee;Oh, Dong-Geun
    • Journal of Korean Library and Information Science Society
    • /
    • v.40 no.4
    • /
    • pp.243-259
    • /
    • 2009
  • This study introduces strengths theory, a core subject of career development and job-getting, and discusses about the factors of strengths(namely talents, knowledge and skills), the processes of strengths personalization, and generating employability. It searches for opportunities to apply the concept of employability to the field of Library and Information Science now thrown under hard pressure from information and communication technology. Employability is defined here as competence to make oneself employable as needed by discovering or creating work opportunities using one's own tested personalized strengths. Employability is a package of systematically organized information about the essential abilities and productive personalities of a person, and it is essential to be duly cognitive of one's employability if one seriously intends to succeed in jobs and career. Since generation of employability heavily involves complex processes of information and knowledge-making, expertise from LIS, particularly from areas of personal information management(PIM) and personal knowledge management(PKM), is expected to help for process facilitation.

  • PDF

Study for Guideline of CD copy Issue to Secure Personal Information (개인정보 보호를 위한 의료영상 복사발급 지침에 대한 고찰)

  • Lee, Jong-Woong;Kang, Ji-Yeon;Kim, Eun-Jeong
    • Korean Journal of Digital Imaging in Medicine
    • /
    • v.10 no.2
    • /
    • pp.11-16
    • /
    • 2008
  • Images of medical treatment on PACS environment are digitized and they make saving and transmission of patient's information easy with CD format causing increase of patients transfer rate between hospital and data transmission as well. Figuring out the configuration of confining status of copied images of medical treatment with CD format and present the appropriate way of identification for personal information. 20 general hospital over 500 beds which are utilizing PACS currently. Questionnaire investigation focusing on PACS operation center and it's management people. In accordance with the law of securing personal information of public organizations, it says "Anyone who wants to see his or her information via representative he or she needs to make a letter of attorney and turn in this to the president of it's possessing facility" in the article 16. Based on the investigation of general hospital for CD copy issue status near metropolitan area, 8 out of 20, were issuing CD copy through personal identification process(the person oneself and representative) and 10 general hospital were doing by getting signature of receiptor only without identification of the person oneself and 2 general hospital confirmation process is not at all. By the law of securing personal information of public organization, article 16, confirmation process is supposed to mandate lawfully with a letter of attorney when there is any request of reading and/or copies of one's information. But in reality, there were no consistent rules on reading, the process and coverage of copy issue, rejection coverage of copy issue of CD copy in each general hospital PACS operation center. Therefore there is a big need for consolidated format which is applicable by law when the representative requests to issue of CD copy that is storing medical treatment images. By issue through this consolidated format, securing medical information of individual and systemic operation and management will be valid and effective.

  • PDF

A Study on the Trend Analysis Based on Personal Information Threats Using Text Mining (텍스트 마이닝을 활용한 개인정보 위협기반의 트렌드 분석 연구)

  • Kim, Young-Hee;Lee, Taek-Hyun;Kim, Jong-Myoung;Park, Won-Hyung;Koo, Kwang-Ho
    • Convergence Security Journal
    • /
    • v.19 no.2
    • /
    • pp.29-38
    • /
    • 2019
  • For that reason, trend research has been actively conducted to identify and analyze the key topics in large amounts of data and information. Also personal information protection field is increasing activities in order to identify prospects and trends in advance for preemptive response. However, only research based on technology such as trends in information security field and personal information protection solution is broadly taking place. In this study, threat-based trends in personal information protection field is analyzed through text mining method. This will be the key to deduct undiscovered issues and provide visibility of current and future trends. Policy formulation is possible for companies handling personal information and for that reason, it is expected to be used for searching direction of strategy establishment for effective response.

COVID-19 Related Personal Information Issues and Countermeasures from the Perspective of Record Management (기록관리 관점에서 본 코로나 19 관련 개인정보 이슈와 대응방안)

  • Jeong, Ji-Hye;Na, Jeong-Ho;Jang, Ji-Hye;Oh, Hyo-Jung
    • Journal of the Korean Society for information Management
    • /
    • v.37 no.4
    • /
    • pp.81-107
    • /
    • 2020
  • At a time when Korea and the rest of the world recently faced the unprecedented situation of "COVID-19," the view of actively "disclosure" of information to prevent the spread of infectious diseases is at odds with the view of "protecting" personal information as these social measures are coupled with the infringement of individuals' basic rights. In order to see the nation's response to the infectious disease crisis, we examined the current status and characteristics of public records according to crisis alert levels based on the manual for responding to infectious disease. Especially we analyzed the types and disclosure status of records containing personal information. For detecting personal information-related issues on news media, we collected online news articles and performed text anlaysis. Through this, we reviewed the problems of record management including personal information and suggested improvement points from the perspective of the life cycle of records: collect, manage, and dispose of them.

Exploring the contents of personal information protection education in the pre-director education

  • Choi, Dea-Hun
    • Journal of the Korea Society of Computer and Information
    • /
    • v.26 no.2
    • /
    • pp.177-182
    • /
    • 2021
  • This study was carried out for the purpose of selecting and structuring educational content for personal information protection education in supplementary education for childcare workers. Prior research and literature data were collected and analyzed to select educational content, and a preliminary survey was conducted for 125 applicants for education. Based on the surveyed data, the educational content was structured through focus group interview. In the focus group interview analysis, the person in charge of personal information of the institution and those who have completed education participated. Group interviews and individual interviews through e-mail, etc. were conducted, and the final contents were selected after reviewing the appropriateness of the derived opinions by two educational experts. It was found that the direction of the search for personal information protection education contents should be added to the contents of practical work in each stage of information management and practice such as document writing.

An Empirical Study on the Relationship between Role Stress and Personal Creativity: The Mediating Roles of Creative Self-Efficacy and Personal Initiative (역할스트레스와 개인 창의성 간의 관계에 대한 실증연구: 창의적 자아효능감과 자기주도성의 매개역할)

  • Heo, Myung Sook;Cheon, Myun Joong
    • The Journal of Information Systems
    • /
    • v.22 no.2
    • /
    • pp.51-83
    • /
    • 2013
  • Personal creativity is critically important for organizations seeking to survive and thrive in today's highly turbulent business environments. Organizations must effectively identify and mobilize the creative resources of their members. When organizational members perceive a work environment that restricts or fails to encourage individual creative expression, a gap may exist between the level of individual creative potential and the actual amount of individual creativity practiced within the organization. In this situation, this paper will examine the impact of role conflict, role ambiguity, creative self-efficacy, and personal initiative on personal creativity. Creative self-efficacy is the subjective belief in one's personal ability to be creative, that is, a personal assessment of one's own creative potential. A strong internal belief in one's ability to successfully engage in creative behaviors is generally considered an important part of the creative process. Personal Initiative refers to behaviors, mainly directed toward work and organizational issues, that are characterized by the following aspects: self-starting, proactive, and persistent in overcoming barriers. Creativity-related creative self-efficacy and personal initiative are critical components to understand motivation that coordinates the relationship between perception and behavior of individual employees. Based on role theory, researchers have focused on role conflict and role ambiguity as the two key ingredients of role stress. Role ambiguity is defined as an evaluation about the lack of salient information needed to perform a role effectively. Role conflict results from two or more sets of incompatible demands involving work-related issues. Employees are usually pursued work-roles more than one in work-focused organization. Too many work-roles and perceived uncertainties at employee's work can be obstacles to personal creativity. In an analysis of results, while role conflict is not negatively related significantly to creative self-efficacy, role ambiguity is negatively related significantly to creative self-efficacy. While role conflict is significantly related to personal creativity, role ambiguity is negatively related significantly to personal creativity. Creative self-efficacy mediates the relationship among role conflict, role ambiguity, and employee creativity. Personal initiative mediates the relationship between creative self-efficacy and employee creativity. This paper shows that creative self-efficacy and personal initiative are the driving force behind personal creativity. Organizations can get some implications of creative-related role conflict and role ambiguity that employees have experienced. As a result, organizations must not only encourage creativity of employees by greater involvement but also encourage their input towards their-focused own works and tasks. And employees should be developed to pace with the organizational needs and development. Management must enable employees to think of new ideas and practices that promotes personal creativity.

Personal Information Extraction Using A Microphone Array (마이크로폰어레이를 이용한 사용자 정보추출)

  • Kim, Hye-Jin;Yoon, Ho-Sub
    • The Journal of Korea Robotics Society
    • /
    • v.3 no.2
    • /
    • pp.131-136
    • /
    • 2008
  • This paper proposes a method to extract the personal information using a microphone array. Useful personal information, particularly customers, is age and gender. On the basis of this information, service applications for robots can satisfy users by offering services adaptive to the special needs of specific user groups that may include adults and children as well as females and males. We applied Gaussian Mixture Model (GMM) as a classifier and Mel Frequency Cepstral coefficients (MFCCs) as a voice feature. The major aim of this paper is to discover the voice source parameters of age and gender and to classify these two characteristics simultaneously. For the ubiquitous environment, voices obtained by the selected channels in a microphone array are useful to reduce background noise.

  • PDF