• Title/Summary/Keyword: use for information

Search Result 27,364, Processing Time 0.052 seconds

A User Privacy Protection Scheme based on Password through User Information Virtuality in Cloud Computing (클라우드 컴퓨팅에서 패스워드기반의 사용자 정보 가상화를 통한 사용자 프라이버시 보장 기법)

  • Jeong, Yoon-Su;Lee, Sang-Ho
    • Journal of Convergence Society for SMB
    • /
    • v.1 no.1
    • /
    • pp.29-37
    • /
    • 2011
  • As the area of informatization has been expanding followed by the development of information communication technology, cloud computing which can use infra sources like server, storage, and network in IT area as an efficient service whenever and wherever skyrockets. But users who use cloud computing technology may have some problems like exposure personal data, surveillance on person, and process on commercial purpose on their personal data. This paper proposes a security technique which protect user's privacy by creating imaginary user information not to be used by other people. The proposed technique virtualizes user's information as an anonymity value not to let other people know user's identity by combining PIN code with it and guarantees user's anonymity. Also it can manage and certificate personal information that is important in cloud computing, so that it can solve security problem of cloud computing which centers all informations. Therefore this paper can assist upgrading of the level of information of poor SMBs through safe use of cloud computing.

  • PDF

An Access Control using Reputation Information in P2P File Sharing System (P2P 파일 공유 시스템에서 평판 정보를 이용한 접근 제어)

  • Shin Jung-Hwa;Shin Weon;Rhee Kyung-Hyune
    • The KIPS Transactions:PartA
    • /
    • v.12A no.6 s.96
    • /
    • pp.493-498
    • /
    • 2005
  • P2P service is a method that can share various information through direct connection between computer of a person who have information and a Person who have information without server in the Internet and it is getting a lot of popularity by method for free ex change of file. P2P file sharing systems have become popular as a new paradigm for information exchange. Because all users who use service in P2P file sharing system can use shared files of several users freely by equal access privilege, it is happening the 'free rider' that only download shared file of other users without share own files. Although a user share a malicious file including virus, worm or file that have title differing with actuality contents, can use file sharing service without limitation. In this paper, we propose a method that restrict access of 'free rider' that only download using reputation information that indicate reliability of user. Also, we restrict usage ons hared file of other users about users who share harmful file.

A Study on the Information Use Behaviors through Citation Analysis (인용문헌 분석을 통한 정보 이용 행태 연구 - 화학분야 박사학위논문을 중심으로 -)

  • Lee, Seung-Won
    • Journal of Information Management
    • /
    • v.39 no.2
    • /
    • pp.185-209
    • /
    • 2008
  • This study was carried out on the citations within the chemistry field Ph.D. dissertations to ascertain what types of documents are the most frequently used in the research process, the most frequently consulted journals and obsolescence rate of the journals. The analysis covered 42 doctoral theses presented at 'K' university in Seoul from 2000 to 2008. The results obtained from the 3,258 citations revealed that the most frequently used documents were Academic Journal, which accounted for 91 percent of the total; 27 journals met 50 percent of the information needs; and the age of 50 percent of the citations was no older than 9 years. Finally, the results can be used as a tool for the collection management of the library. and Researcher with the chemistry field Ph.D. dissertation.

A Study on the Use of Art Information Based on Digital Media - Focusing on Art Appreciation Mobile Application - (디지털미디어 기반 미술 정보 활용 방안 연구 - 미술 감상 모바일 애플리케이션을 중심으로 -)

  • Hur, Yukyoung;Park, Seung Ho
    • Design Convergence Study
    • /
    • v.15 no.5
    • /
    • pp.1-19
    • /
    • 2016
  • The emergence of digital media has enabled visitors' active intervention based on the existing art information archiving. Accordingly, this study was conducted to analyze how archiving data that art museums have developed so farcan be provided significantly to visitors and generate a contemporary appreciation code. This study intended to solve the problems in case study analysis through the restructuralization of information that reflected visitors' appreciation activities as the principal agent. The structure of information, which was reframed for multilayered information approach and use by keyword, is meaningful as it has developed an information structure to mainly enhance visitors' understanding. It is expected that the use of art information proposed in this study will be helpful for setting the specific direction of actual transmedia storytelling service by art museums based on web later on.

A Study on the Information Privacy Concerns in Social Log-in Service

  • Kim, Yujin;Lee, Hyung-Seok
    • Journal of the Korea Society of Computer and Information
    • /
    • v.27 no.1
    • /
    • pp.193-200
    • /
    • 2022
  • In this paper, we examined the causes of privacy concerns and related factors in social log-in services. On the basis of the 'principal-agent theory,' we established factors such as perceived information asymmetry and fear of seller opportunism affecting information privacy concern of social log-in services users. In addition, we analyzed the relationship between the information privacy concern and intention to use on the basis of the 'privacy calculus theory'. The results of the study showed that (1) fear of seller opportunism had the significant effect on information privacy concerns, (2) information privacy concerns had the significant effect on perceived risk, (3) in accordance with the privacy calculus theory, perceived risk had the negative effect on intention to use, while perceived benefit had the positive effect on intention to use. The findings of the study are expected to help to improve the social log-in service firms' understanding for customers' information privacy protection behaviors.

Building Bridges: Eurocentric to Intercultural Information Ethics

  • Gautam, Ayesha;Singh, Deepa
    • Journal of Contemporary Eastern Asia
    • /
    • v.20 no.1
    • /
    • pp.151-168
    • /
    • 2021
  • Misguided use, manipulation, misappropriation, disruption and mismanagement of Information deeply affects the infosphere as well as the social and moral fabric of a society. Information ethics is an attempt to bring the creation, organization, dissemination, and use of information within the ambit of ethical standards and moral codes. The diverse and inherently pluralistic nature of societies however puts forth an additional demand on us - to come up with an intercultural information ethics. An intercultural ethics which is other-centric, context sensitive and workable without being homogenizing, patronizing and colonizing. An endeavor in that direction has already been made by proponents of intercultural information ethics like: Charles M. Ess, Fay Sudweeks, Rafael Capurro, Pak-Hang Wong, Soraj Hongladarom et al. In our paper, we propose that the kind of ethical pluralism being sought in the domain of information ethics can be attained by having a reappraisal of the current methodological strategies, by casting a critical relook at the Eurocentric ethical model. This paper analyses the current framework of Intercultural Information Ethics. And in an endeavour to move towards an all-encompassing, other-centric, workable, intercultural, harmonious and compassionate model of 'Pluralistic Information Ethics', it proposes the Indian / Asian philosophical method of 'Samvāda' to the current inventory which includes methods like: 'parrhesia/free speech' and 'interpretive phronēsis.

Continuous Roll-to-Roll(R2R) sputtering system for growing flexible and transparent conducting oxide electrode at room temperature

  • Park, Yong-Seok;Jeong, Jin-A;Park, Ho-Kyun;Kim, Han-Ki
    • 한국정보디스플레이학회:학술대회논문집
    • /
    • 2009.10a
    • /
    • pp.1575-1577
    • /
    • 2009
  • We have investigated the characteristics of transparent indium zinc oxide(IZO)/Ag/IZO multilayer electrode grown on polyethylene terephthalate (PET) substrates using a specially designed roll-to-roll sputtering system for use in flexible device are described. By the continuous R2R sputtering of the bottom IZO, Ag, and top IZO layers at room temperature, we were able to fabricate an IZO-Ag-IZO multilayer electrode with a sheet resistance of 6.15 ${\Omega}$/square, optical transmittance of 87.4 %, and figure of merit value of 42.03 10-3 ${\Omega}$-1. In addition, the IZO-Ag-IZO multilayer electrode exhibited superior flexibility to the RTR sputter grown single ITO electrode, due to the existence a ductile Ag layer between the IZO layers. This indicates that the RTR sputtered IZO-Ag-IZO multilayer is a promising flexible electrode that can substitute for the conventional single ITO electrode grown by bath type sputtering for use in low cost flexible device, due to its low resistance, high transparency, superior flexibility and fast preparation by the R2R process.

  • PDF

A Study on the Practical Use of UCC Tourism Information (UCC 관광정보의 활용방안 연구)

  • Yang, Sung-Soo;Choi, Byoung-Kil;Hong, Sung-Hwa;Jo, Sung-Jin
    • The Journal of the Korea Contents Association
    • /
    • v.9 no.11
    • /
    • pp.416-423
    • /
    • 2009
  • From marketing perspectives, WOM(Word-of-Mouth) is one of the communication methods for travelers. It can be an instrument of the effect on tourist decision. The growing predominance of internet use has further highlighted the need for understanding of UCC(User-created contents) tourism information such as travel experience and travel recommendation. This paper was to examine usage patterns of UCC tourism information using experimental design and contents analysis. The result indicated that there were qualities of UCC tourism information. That is useful implication to tourism information-related marketers in destination marketing.

Breast Cancer Prevention Information Seeking Behavior and Interest on Cell Phone and Text Use: a Cross-sectional Study in Malaysia

  • Akhtari-Zavare, Mehrnoosh;Ghanbari-Baghestan, Abbas;Latiff, Latiffah A.;Khaniki, Hadi
    • Asian Pacific Journal of Cancer Prevention
    • /
    • v.16 no.4
    • /
    • pp.1337-1341
    • /
    • 2015
  • Background: Breast cancer is the most common cancer and the second principal cause of cancer deaths among women worldwide, including Malaysia. This study focused on media choice and attempted to determine the communication channels mostly used and preferred by women in seeking information and knowledge about breast cancer. Materials and Methods: A cross sectional study was carried out to examine the breast cancer prevention information seeking behavior among 450 students at one private university in Malaysia. Results: The mean age of respondents was $25{\pm}4.3years$. Common interpersonal information sources were doctors, friends, and nurses and common channel information sources were television, brochure, and internet. Overall, 89.9% used cell phones, 46.1% had an interest in receiving cell phone breast cancer prevention messages, 73.9% used text messaging, and 36.7% had an interest in receiving text breast cancer prevention messages. Bivariate analysis revealed significant differences among age, eduation, nationality and use of cell phones. Conclusions: Assessment of health information seeking behavior is important for community health educators to target populations for program development.

Anonymous and Non-anonymous User Behavior on Social Media: A Case Study of Jodel and Instagram

  • Kasakowskij, Regina;Friedrich, Natalie;Fietkiewicz, Kaja J.;Stock, Wolfgang G.
    • Journal of Information Science Theory and Practice
    • /
    • v.6 no.3
    • /
    • pp.25-36
    • /
    • 2018
  • Anonymity plays an increasingly important role on social media. This is reflected by more and more applications enabling anonymous interactions. However, do social media users behave different when they are anonymous? In our research, we investigated social media services meant for solely anonymous use (Jodel) and for widely spread non-anonymous sharing of pictures and videos (Instagram). This study examines the impact of anonymity on the behavior of users on Jodel compared to their non-anonymous use of Instagram as well as the differences between the user types: producer, consumer, and participant. Our approach is based on the uses and gratifications theory (U>) by E. Katz, specifically on the sought gratifications (motivations) of self-presentation, information, socialization, and entertainment. Since Jodel is mostly used in Germany, we developed an online survey in German. The questions addressed the three different user types and were subdivided according to the four motivation categories of the U>. In total 664 test persons completed the questionnaire. The results show that anonymity indeed influences users' usage behavior depending on user types and different U> categories.