• Title/Summary/Keyword: personal background

Search Result 636, Processing Time 0.03 seconds

Unintentional and Involuntary Personal Information Leakage on Facebook from User Interactions

  • Lin, Po-Ching;Lin, Pei-Ying
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.7
    • /
    • pp.3301-3318
    • /
    • 2016
  • Online social networks (OSNs) have changed the way people communicate with each other. An OSN usually encourages the participants to provide personal information such as real names, birthdays and educational background to look for and establish friendships among them. Some users are unwilling to reveal personal information on their personal pages due to potential privacy concerns, but their friends may inadvertently reveal that. In this work, we investigate the possibility of leaking personal information on Facebook in an unintentional and involuntary manner. The revealed information may be useful to malicious users for social engineering and spear phishing. We design the inference methods to find birthdays and educational background of Facebook users based on the interactions among friends on Facebook pages and groups, and also leverage J-measure to find the inference rules. The inference improves the finding rate of birthdays from 71.2% to 87.0% with the accuracy of 92.0%, and that of educational background from 75.2% to 91.7% with the accuracy of 86.3%. We also suggest the sanitization strategies to avoid the private information leakage.

A Study of Personal and Environmental Background of Gifted Students in Arts (예술영재의 개인 및 환경적 특성 탐색 : 음악, 미술, 무용영재를 중심으로)

  • Lee, Hyun-Joo;Lee, Mi-Na;Lee, Hwa-Sun
    • Journal of Gifted/Talented Education
    • /
    • v.20 no.2
    • /
    • pp.547-570
    • /
    • 2010
  • The purpose of this study was to find the personal and environmental background variables that influence to the gifted students in arts. 59 gifted students and their parents in Korean National Institute for the Gifted in Arts completed the questionnaire. The results were as follows: This study showed that the characteristic of gifted students, the developmental process of talent, and contributing factors to the growth of arts. Personal characteristics of gifted students in arts showed significantly difference in three fields of arts. As the environmental background, parents of gifted have offered them the extensive support financially and emotionally and also had high interest in Arts. The reliance on private education versus public education in arts was high. Expecially, gifted students of music and dancing fields was relying more on private education than artistically gifted students. This study was examined for the empirical study of the gifted in arts. The limitations of the study and the suggestion for further study for the gifted were discussed.

The Impact of CPO Characteristics on Organizational Privacy Performance (개인정보보호책임자의 특성이 개인정보보호 성과에 미치는 영향)

  • Wee, Jiyoung;Jang, Jaeyoung;Kim, Beomsoo
    • Asia pacific journal of information systems
    • /
    • v.24 no.1
    • /
    • pp.93-112
    • /
    • 2014
  • As personal data breach reared up as a problem domestically and globally, organizations appointing chief privacy officers (CPOs) are increasing. Related Korean laws, 'Personal Data Protection Act' and 'the Act on Promotion of Information and Communication Network Utilization and Information Protection, etc.' require personal data processing organizations to appoint CPOs. Research on the characteristics and role of CPO is called for because of the importance of CPO being emphasized. There are many researches on top management's role and their impact on organizational performance using the Upper Echelon theory. This study investigates what influence the characteristics of CPO gives on the organizational privacy performance. CPO's definition varies depending on industry, organization size, required responsibility and power. This study defines CPO as 'a person who takes responsibility for all the duties on handling the organization's privacy,' This research assumes that CPO characteristics such as role, personality and background knowledge have an influence on the organizational privacy performance. This study applies the part relevant to the upper echelon's characteristics and performance of the executives (CEOs, CIOs etc.) for CPO. First, following Mintzberg and other managerial role classification, information, strategic, and diplomacy roles are defined as the role of CPO. Second, the "Big Five" taxonomy on individual's personality was suggested in 1990. Among these five personalities, extraversion and conscientiousness are drawn as the personality characteristics of CPO. Third, advance study suggests complex knowledge of technology, law and business is necessary for CPO. Technical, legal, and business background knowledge are drawn as the background knowledge of CPO. To test this model empirically, 120 samples of data collected from CPOs of domestic organizations are used. Factor analysis is carried out and convergent validity and discriminant validity were verified using SPSS and Smart PLS, and the causal relationships between the CPO's role, personality, background knowledge and the organizational privacy performance are analyzed as well. The result of the analysis shows that CPO's diplomacy role and strategic role have significant impacts on organizational privacy performance. This reveals that CPO's active communication with other organizations is needed. Differentiated privacy policy or strategy of organizations is also important. Legal background knowledge and technical background knowledge were also found to be significant determinants to organizational privacy performance. In addition, CPOs conscientiousness has a positive impact on organizational privacy performance. The practical implication of this study is as follows: First, the research can be a yardstick for judgment when companies select CPOs and vest authority in them. Second, not only companies but also CPOs can judge what ability they should concentrate on for development of their career relevant to their job through results of this research. Cultural social value, citizen's consensus on the right to privacy, expected CPO's role will change in process of time. In future study, long-term time-series analysis based research can reveal these changes and can also offer practical implications for government and private organization's policy making on information privacy.

Relationships among Self-Directed Learning Ability, Science Teaching Efficacy Beliefs, and Other Background Variables of Elementary School Teachers (초등학교 교사의 자기주도 학습력과 과학 교수 효능감 및 기타 배경 변인들의 관계)

  • 강석진;김보경;노태희
    • Journal of Korean Elementary Science Education
    • /
    • v.23 no.4
    • /
    • pp.326-331
    • /
    • 2004
  • In this study, the relationships among self-directed learning ability, science teaching efficacy beliefs (personal science teaching efficacy and science teaching outcome expectation), life satisfaction, job satisfaction, and other background variables of elementary school teachers were investigated. A survey was administered to 234 teachers from 25 elementary schools in Jeonju. It was found that self-directed learning ability of the teachers was significantly correlated with their personal science teaching efficacy, science teaching outcome expectation, life satisfaction, job satisfaction, and age. A stepwise multiple regression analysis revealed that personal science teaching efficacy, life satisfaction, science teaching outcome expectation, and age were the significant predictors on their self-directed learning ability.

  • PDF

온라인열람목록의 탐색유형과 탐색성과에 관한 분석-국립중앙도서관 이용자를 대상으로 -

  • 장혜란;석경임
    • Journal of Korean Library and Information Science Society
    • /
    • v.22
    • /
    • pp.139-169
    • /
    • 1995
  • The purpose of this study is to analyze the search pattern and search outcome of the National Central Library OPAC users by measuring their success rates and identifying the factors of failure and the personal background which bring about the differences of the search outcome. Various methods have been used for the study. Personal interview was used to find the pattern of the search, observation method was used to investigate the search process and the failure factors, and a questionnaire was used to survey personal background of searchers. The data were collected during the period of 7 days from April 17, 1995 through April 23, 1995. The search of 1, 217 cases, sampling systematically 25% out of the whole users, were collected and analyzed for the study. The findings of the study can be summarized as follows : First, in regard to the pattern, known-item search(72.6%) was preferred to the subject search(27.4%) and in case of known-item search the access point used were in the order of title, author, title and author. Second, the overall success rate of known-item search was 50.3% and the success rates were in order of author and date, title, and author. The failure factors of known-item search were divided into users factor of 67% and the database factor of 33%, respectively. Third, in case of subject search, its overall success rate was 44.1% and the keyword was the major access point, and the average of precision ratio was very low. Fourth, the analysis of the personal background related to the search outcome has shown significant differences by sex, the experience of using OPAC, education level, and the frequency of using other information retrieval systems. Based on the results the following suggestions can be made to improve the search outcome : First, the system should be su n.0, pplemented online help function to assist users to overcome the failure during search. Second, user instruction in group or individual should be implemented for the users to understand the system.

  • PDF

Empirical Validation of Personal Information Violation Risk for Cryptocurrency with Use Intention

  • Kim, Jeong-Wook;Choi, Chul-Yong
    • Journal of the Korea Society of Computer and Information
    • /
    • v.23 no.9
    • /
    • pp.141-156
    • /
    • 2018
  • The purpose of this study is how personal information violation risks affect the intention to use domestic cryptocurrency services. VAM(Value based Adoption Model) model is validated as a theoretical background, selecting perceived ease of use, perceived usefulness and perceived security as a benefit factors, and considers perceived cost, technical complexity, and risk of personal information violation risks as sacrifice factors. The method of this study used questionnaire survey to collect 150 data on user's perception on cryptocurrency services, and also performed a structural equation modeling method using by AMOS 23. The result of this paper shows that all hypotheses are accepted statistically significant except 2 hypothesis. This research is concluded that perceived value is affected on statistically positive impact on perceived ease of use, perceived usefulness and perceived security, and negative impact on risk of personal information violation risk, not statistically perceived fee and technical complexity.

A Study on 3D Background Image Construction using TIP (TIP기술을 이용한 3차원 배경 영상 구축에 관한 연구)

  • Roh, Chang-Hyun;Jung, Kwang-Ho
    • Journal of Korea Game Society
    • /
    • v.2 no.1
    • /
    • pp.49-54
    • /
    • 2002
  • In this paper we propose the methodology for 3D background image construction in computer games. This methodology was developed based on TIP (Tour Into the Picture) using a vanishing line Proposed by Kang et at. The methodology Proposed in this study can simply implement a 3D background for a computer game with a background model which is very complex or based on a real picture. Compared to the graphics technologies generally used, the proposed methodology does not need the process of modeling elaborate 3D information of a background, and hence can display the background even on a low grade personal computer using a small reference image. TIP technology was successfully applied to the implementation of a background model for a computer game and was found to be appropriate especially for real time games.

  • PDF

A Flexible Protection Technique of an Object Region Using Image Blurring (영상 블러링을 사용한 물체 영역의 유연한 보호 기법)

  • Jang, Seok-Woo
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.21 no.6
    • /
    • pp.84-90
    • /
    • 2020
  • As the uploading and downloading of data through the Internet is becoming more common, data including personal information are easily exposed to unauthorized users. In this study, we detect a target area in images that contain personal information, except for the background, and we protect the detected target area by using a blocking method suitable for the surrounding situation. In this method, only the target area from color image input containing personal information is segmented based on skin color. Subsequently, blurring of the corresponding area is performed in multiple stages based on the surrounding situation to effectively block the detected area, thereby protecting the personal information from being exposed. Experimental results show that the proposed method blocks the object region containing personal information 2.3% more accurately than an existing method. The proposed method is expected to be utilized in fields related to image processing, such as video security, target surveillance, and object covering.

Job Satisfaction Influenced Personal Traits among Officers and Noncommissioned Officers Working in Army Hospital (군병원 간부들의 개인적 성향에 따른 직무 만족도)

  • OH Jung Yi;Jung Moon Sook
    • Journal of Korean Public Health Nursing
    • /
    • v.9 no.1
    • /
    • pp.1-16
    • /
    • 1995
  • The purpose of this study was to find out and analyze the satisfaction degree related to job by general characteristics, satisfaction factors. This survey was based on the questionnaire method. The sample consisted of 51 noncommissioned officers, 72 administrative officers and 160 nurse officers from army hospitals. The data were collected from March 14 to April 18, 1994 and statistically analysed by percentage, mean and $x^2$ test. Factors of job satisfaction consist of 6 categories; job pristige, interaction, autonomy, task requirements, pay, and organizational requirements. The overall job satisfaction degree was $62.8\%$ in NCOs, $54.2\%$ in administrative officers and $33.3\%$ in nurse officers. The job satisfaction of NCCs increased in factors of job prestige (p<0.01), autonomy (p<0.05), task requirement (p<0.05), and was higher as age. There were statistically significant in the factors of pay in school background, Job prestige in rank (p<0.05). 'I'm OK and You're OK' type was $76.5\%$ which was the highest rate and A major personal traits also showed the highest job satisfaction $(63.7\%)$. There were significant difference between major personal traits and interaction (p<0.01), autonomy (p<0.05), organizational requirement (p<0.01), pay (p<0.05) and task requirement. The job satisfaction of administrative Officers was represented significant differences in factors of pay (p<0.05), task requirements (p<0.05) by school background. Long term Workers showed the highest job satisfaction and significant difference in factors of job prestige and organizational requirement (p<0.01). Job satisfaction in 'I'm OK but you're not OK' type was slightly high, and CP major personal traits also showed the highest job satisfaction. The job satisfaction of nurse officers was represented significant difference in factors of autonomy (p<0.01), job prestige (p<0.05), organizational requirement (p<0.05), and pay by age. In CP major personal traits. job satisfaction showed the highest rate (75.0)

  • PDF