• Title/Summary/Keyword: personal approach

Search Result 868, Processing Time 0.028 seconds

Promoting research integrity in sport and leisure studies: From the perspectives of academia (체육학 연구에서의 연구부정행위 방지를 위한 근거이론적 접근)

  • Lee, Weon-il;Jin, Yeon-Kyung;Yi, Kyoung June
    • 한국체육학회지인문사회과학편
    • /
    • v.55 no.4
    • /
    • pp.227-240
    • /
    • 2016
  • Research misconduct has been a strong societal concern in sport and leisure studies. However, little is known about the complex mechanisms and ways of promoting research integrity. This study aimed at exploring the ways in which research integrity in sport and leisure studies could be established from the perspectives of academia. Employing a grounded theory approach, 13 academics and graduate students were invited to the study. Data were collected primarily through focus group and one-on-one follow-up interviews. Perceived negative factors contributing to research misconduct within socio-political/socio-environmental, socio-cultural, and personal contexts were identified. Three approaches, (a) top-down approach, (b) bottom-up approach, and (c) continuous education, as well as subsequent practical strategies were also suggested for the enhancement of research integrity within the field. This paper provided empirical knowledge regarding barriers to and opportunities for improving research integrity in sport and leisure studies.

Development of Personal Robot Platform : Designed Approach for Modularization

  • Roh, Se-gon;S. M Baek;Lee, D. H;Park, K. H;T. K Moon;S. W Ryew;T. Y Kuc;Kim, H. S;Lee, H. G H
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2002.10a
    • /
    • pp.117.3-117
    • /
    • 2002
  • In this paper a new framework is presented for developing the personal robot being used in home environments. We mainly focus on the system engineering technology such as the modularization and standardization. Effective ways for interfacing among modules are addressed regarding compatibility in hardware and software, and as a result a personal robot platform named DHR I is built. The robot is composed of five modules such as brain, mobile, sensor, vision, and user interface modules. Each module can be easily plugged in the system in a mechanical as well as electrical sense by sharing the communication protocol with IEEE1394 FireWire. &n...

  • PDF

Wealth Management Framework Experienced in Korean Financial Enterprises

  • Kim, Hak-Min
    • International Commerce and Information Review
    • /
    • v.8 no.1
    • /
    • pp.417-435
    • /
    • 2006
  • A Systematic Wealth Management Framework (SWMF) was developed as a private banking management tool to enable more integrative personal finance management of personal wealth. It is a reference model that provides an unified framework for development, operation, and management and makes provision for personal financial services in today's complex financial environment. This study suggested some practical results from banks and insurance companies that have established SWMF as the differentiation business strategy for wealthy customers. The focus of this manuscript is on capturing the methodological approach most financial institutions in Korea adopted to execute new e-finance planning and implementation based on the SWMF. The alignment between the wealth management business goals and information system architecture at an organization constitutes the main theoretical basis of the study. Relevant discussions are made on the wealth management framework as a general business model for financial industry, on the functional relationship between new information systems and business organizations. Finally, lessons learned from the SWMF implementation are discussed.

  • PDF

A study on frame transition of personal information leakage, 1984-2014: social network analysis approach (사회연결망 분석을 활용한 개인정보 유출 프레임 변화에 관한 연구: 1984년-2014년을 중심으로)

  • Jeong, Seo Hwa;Cho, Hyun Suk
    • Journal of Digital Convergence
    • /
    • v.12 no.5
    • /
    • pp.57-68
    • /
    • 2014
  • This article analyses frame transition of personal information leakage in Korea from 1984 to 2014. In order to investigate the transition, we have collected newspaper article's titles. This study adopts classification, text network analysis(by co-occurrence symmetric matrix), and clustering techniques as part of social network analysis. Moreover, we apply definition of centrality in network in order to reveal the main frame formed in each of four periods. As a result, accessibility of personal information is extended from public sector to private sector. The boundary of personal information leakage is expanded to overseas. Therefore it is urgent to institutionalize the protection of personal information from a global perspective.

A pilot study of an automated personal identification process: Applying machine learning to panoramic radiographs

  • Ortiz, Adrielly Garcia;Soares, Gustavo Hermes;da Rosa, Gabriela Cauduro;Biazevic, Maria Gabriela Haye;Michel-Crosato, Edgard
    • Imaging Science in Dentistry
    • /
    • v.51 no.2
    • /
    • pp.187-193
    • /
    • 2021
  • Purpose: This study aimed to assess the usefulness of machine learning and automation techniques to match pairs of panoramic radiographs for personal identification. Materials and Methods: Two hundred panoramic radiographs from 100 patients (50 males and 50 females) were randomly selected from a private radiological service database. Initially, 14 linear and angular measurements of the radiographs were made by an expert. Eight ratio indices derived from the original measurements were applied to a statistical algorithm to match radiographs from the same patients, simulating a semi-automated personal identification process. Subsequently, measurements were automatically generated using a deep neural network for image recognition, simulating a fully automated personal identification process. Results: Approximately 85% of the radiographs were correctly matched by the automated personal identification process. In a limited number of cases, the image recognition algorithm identified 2 potential matches for the same individual. No statistically significant differences were found between measurements performed by the expert on panoramic radiographs from the same patients. Conclusion: Personal identification might be performed with the aid of image recognition algorithms and machine learning techniques. This approach will likely facilitate the complex task of personal identification by performing an initial screening of radiographs and matching ante-mortem and post-mortem images from the same individuals.

Evaluating the Efficiency of Personal Information Protection Activities in a Private Company: Using Stochastic Frontier Analysis (개인정보처리자의 개인정보보호 활동 효율성 분석: 확률변경분석을 활용하여)

  • Jang, Chul-Ho;Cha, Yun-Ho;Yang, Hyo-Jin
    • Informatization Policy
    • /
    • v.28 no.4
    • /
    • pp.76-92
    • /
    • 2021
  • The value of personal information is increasing with the digital transformation of the 4th Industrial Revolution. The purpose of this study is to analyze the efficiency of personal information protection efforts of 2,000 private companies. It uses a stochastic frontier approach (SFA), a parametric estimation method that measures the absolute efficiency of protective activities. In particular, the personal information activity index is used as an output variable for efficiency analysis, with the personal information protection budget and number of personnel utilized as input variables. As a result of the analysis, efficiency is found to range from a minimum of 0.466 to a maximum of 0.949, and overall average efficiency is 0.818 (81.8%). The main causes of inefficiency include non-fulfillment of personal information management measures, lack of system for promoting personal information protection education, and non-fulfillment of obligations related to CCTV. Policy support is needed to implement safety measures and perform personal information encryption, especially customized support for small and medium-sized enterprises.

A Study on the Internet User's Economic Behavior of Provision of Personal Information: Focused on the Privacy Calculus, CPM Theory (개인정보 제공에 대한 인터넷 사용자의 경제적 행동에 관한 연구: Privacy Calculus, CPM 이론을 중심으로)

  • Kim, Jinsung;Kim, Jongki
    • The Journal of Information Systems
    • /
    • v.26 no.1
    • /
    • pp.93-123
    • /
    • 2017
  • Purpose The purpose of this study is to deduct the factors for explaining the economic behavior of an Internet user who provides personal information notwithstanding the concern about an invasion of privacy based on the Information Privacy Calculus Theory and Communication Privacy Management Theory. Design/methodology/approach This study made a design of the research model by integrating the factors deducted from the computation theory of information privacy with the factors deducted from the management theory of communication privacy on the basis of the Dual-Process Theory. In addition, this study, did empirical analysis of the path difference between groups by dividing Internet users into a group having experience in personal information spill and another group having no experience. Findings According to the empirical analysis result, this study confirmed that the Privacy Concern about forms through the Perceived Privacy Risk derived from the Disposition to value Privacy. In addition, this study confirmed that the behavior of an Internet user involved in personal information offering occurs due to the Perceived Benefits contradicting the Privacy Concern.

Management of Interactive Contents for Digital Broadcasting: Proper Use of Personal Video Recorder (디지털 방송의 양방향 콘텐츠 관리: 개인형 비디오 레코더를 중심으로)

  • Oh, Jong-Sir
    • The Journal of the Korea Contents Association
    • /
    • v.7 no.3
    • /
    • pp.87-92
    • /
    • 2007
  • This paper describes the personal video recorder-based approach to realise enhanced services for interactive programmes on digital television. So far it is very difficult that most of interactive programmes included the vast quantities of contents, whatsoever it is data-broadcasting or HD-ready, are broadcasted on digital television via the current set-top box. Furthermore it was not possible to envisage until IPTV has been appeared. Even though IPTV makes possible for streaming the interactive services via high-speed broadband, it is not easy to receive the tremendous contents with interactivity through the current set-top box in a single effort. In this paper it suggests the effective solution to resolve the download dilemma for providing the interactive services on digital television by employing the set-top box fitted with the personal video recorder.

A Personal Credit Rating Using Convolutional Neural Networks with Transformation of Credit Data to Imaged Data and eXplainable Artificial Intelligence(XAI) (신용 데이터의 이미지 변환을 활용한 합성곱 신경망과 설명 가능한 인공지능(XAI)을 이용한 개인신용평가)

  • Won, Jong Gwan;Hong, Tae Ho;Bae, Kyoung Il
    • The Journal of Information Systems
    • /
    • v.30 no.4
    • /
    • pp.203-226
    • /
    • 2021
  • Purpose The purpose of this study is to enhance the accuracy score of personal credit scoring using the convolutional neural networks and secure the transparency of the deep learning model using eXplainalbe Artifical Inteligence(XAI) technique. Design/methodology/approach This study built a classification model by using the convolutional neural networks(CNN) and applied a methodology that is transformation of numerical data to imaged data to apply CNN on personal credit data. Then layer-wise relevance propagation(LRP) was applied to model we constructed to find what variables are more influenced to the output value. Findings According to the empirical analysis result, this study confirmed that accuracy score by model using CNN is highest among other models using logistic regression, neural networks, and support vector machines. In addition, With the LRP that is one of the technique of XAI, variables that have a great influence on calculating the output value for each observation could be found.

The Effects of Personal Media and Influencer Attributes on User's Trust, Viewing Commitment, and Purchase Intention (1인 미디어 콘텐츠 및 인플루언서의 속성이 이용자들의 신뢰, 시청몰입, 구매의도에 미치는 영향)

  • Jun-Seop Lee;Ji-Young Kim
    • Asia-Pacific Journal of Business
    • /
    • v.14 no.2
    • /
    • pp.17-31
    • /
    • 2023
  • Purpose - The purpose of this study is to verify the effects of attributes of personal media content and influencers on the cognitive and emotional trust of platform users. In addition, the structural relationships among cognitive trust, emotional trust, viewing commitment, and purchase intention were examined. Design/methodology/approach - For the empirical analysis of the study, a survey was conducted on 192 consumers who have recently experienced using personal media content. The Confirmatory Factor Analysis (CFA) and the Structure Equation Model (SEM) were hired in order to analyze the survey data. Findings - Findings of this study are 1) informativeness and expertise had a significant effect on cognitive and emotional trust. However, entertainment had no significant effect on both cognitive and emotional trust; 2) interactivity had a significant effect on emotional trust, but not on cognitive trust; 3) cognitive and emotional trust had a positive effect on the viewing commitment of the content; 4)content users' viewing commitment had a positive effect on their intention to purchase recommended products. Research implications or Originality - The theoretical and practical implications were discussed through the above empirical research results, and the limitations of the study and the direction of follow-up studies were presented.