http://chineseinput.net/에서 pinyin(병음)방식으로 중국어를 변환할 수 있습니다.
변환된 중국어를 복사하여 사용하시면 됩니다.
Personal Data Disclosure in Blockchain Networks
Youngin Koh(고영인),Sung. H. Han(한성호) 대한인간공학회 2021 대한인간공학회 학술대회논문집 Vol.2021 No.11
Objective: This study investigates the properties of blockchain networks that can influence users’ intention to disclose personal data. Background: Blockchain technology gives rise to new ways of managing personal data. It enables individual-centric data management with such characteristics as safe data storage and easy data sharing. Nevertheless, individuals have to disclose their data to others in peer-to-peer networks in blockchain, and accordingly privacy concerns could occur. In other words, blockchain technology can be a double-edged sword by simultaneously providing the privacy concern of personal data disclosure with the benefit of delivering network participants with a new way to manage their data. From the perspective of blockchain network users, there is still a lack of research on the impact on personal data disclosureThis study investigated the properties of blockchain networks. Method: This study consists of two phases, literature survey and user studyA literature survey was conducted to find the properties of blockchain networks related to personal data disclosure. It considered not only blockchain types—public/private, permission/permissionless blockchain—but also technologies that complement the limitations of blockchain technology, such as off-chain or inter-chain. Twenty-two properties of blockchain networks were obtained as a result. It also conducted user research to select the blockchain network properties influencing personal data disclosure intentions. Sixteen participants who have experiences participated in the experiment individually. They received 22 cards displaying the properties. They selected and ranked the cards they considered appropriate by using the following criteria: a) encouraging to disclose personal data to others within the network or b) making reluctant to disclose personal data to others within the network. And then this study conducted an interview on how they thought each blockchain network property influences the intention to disclose personal data. Results: As a result of the user research, the participants responded that ten properties could encourage disclosure, and five properties could influence disclosure reluctance. The participants responded that the security status of their data disclosed on the blockchain network—how personal data is exposed to others, how it is managed or stored—or trust in the network affects the disclosure intention of personal data. Although the participants responded that the ’financial reward from data disclosure’ can induce the disclosure intention, its rank is low because they do not think they can receive a large amount of money as a reward by disclosing data. They also responded that the properties of the public blockchain network—‘everyone could read the data in the network’, ’know whom the personal data came from’, ’all users, including myself, own all data’—particularly influence in their reluctance to disclose data. Conclusion: This study investigated whether blockchain technology can be used for individual-centric data management systems from the point of view of network users. Blockchain network properties usually influence a positive effect on data disclosure intention. On the other hand, the properties that may make people reluctant to disclose personal data are the fundamental characteristic of the public blockchain. It is necessary to design individual-centric data management systems using blockchain technologies with private blockchain or other technologies that can overcome this limitations.
( Youngin You ),( Junhyoung Oh ),( Sooheon Kim ),( Kyungho Lee ) 한국인터넷정보학회 2018 KSII Transactions on Internet and Information Syst Vol.12 No.10
As the area covered by the CPS grows wider, agencies such as public institutions and critical infrastructure are collectively measuring and evaluating information security capabilities. Currently, these methods of measuring information security are a concrete method of recommendation in related standards. However, the security controls used in these methods are lacking in connectivity, causing silo effect. In order to solve this problem, there has been an attempt to study the information security management system in terms of maturity. However, to the best of our knowledge, no research has considered the specific definitions of each level that measures organizational security maturity or specific methods and criteria for constructing such levels. This study developed an information security maturity model that can measure and manage the information security capability of critical infrastructure based on information provided by an expert critical infrastructure information protection group. The proposed model is simulated using the thermal power sector in critical infrastructure of the Republic of Korea to confirm the possibility of its application to the field and derive core security processes and goals that constitute infrastructure security maturity. The findings will be useful for future research or practical application of infrastructure ISMSs.
Design Strategies for Learnability in Voice User Interface: Literature Survey
Youngin Koh,Sung. H. Han 대한인간공학회 2018 대한인간공학회 학술대회논문집 Vol.2018 No.5
Human and machine can interact each other in spoken language through Voice User Interface. VUI, however, has challenges, such as technical challenge and audio inherent challenge. Audio inherent challenge, especially the invisible nature of VUI can challenge users’ ability to discover its capabilities and limitations. When discoverability is challenging, learnability can be compromised. This study conducted literature survey focusing on learnability issues in VUI. The survey showed several design strategies to improve learnability in VUI; a) Design graphic, b) Design output speech, c) Design universal interface, d) Design sound cues, and e) Design lifelike character. The definition of each design strategy, ways to deliver, and positive aspect of the strategies are described in this paper. This study can be used to enhance the learnability of the VUI.
Filtering of Spatially Invariant Image Sequences with One Desired Process
Youngin Oh 대한전자공학회 1992 대한전자공학회 학술대회 Vol.1992 No.10
This paper reports several mathematical properties of the filter vector developed for processing linearly-additive spatially-invariant image sequences. In this filtering of an image sequence into a single filtered image, the information about the image components originally distributed over the entire sequence is compressed into the one new image in a way that the desired component is enhanced and the undesired (interfering) components and noise are suppressed.
Flexible Nano-Floating-Gate Memory With Channels of Enhancement-Mode Si Nanowires
Youngin Jeon,Myeongwon Lee,Taeho Moon,Sangsig Kim IEEE 2012 IEEE transactions on electron devices Vol.59 No.11
<P>The electrical characteristics of a flexible nano-floating-gate memory (NFGM) device with a channel made of an enhancement-mode n<SUP>+</SUP>-p-n<SUP>+</SUP> Si nanowire (Si-NW) are investigated in this work. The NFGM based on the enhancement-mode Si-NW field-effect transistor is constructed on a plastic substrate with a Pt-nanocrystal floating-gate layer; it exhibits an on-current/off-current ratio of ~10<SUP>7</SUP> and a subthreshold swing of 88 mV/dec. The NFGM shows good memory characteristics and mechanical flexibility, such as a threshold voltage shift of 1.85 V, a retention time of up to ~10<SUP>4</SUP>s, and a stability for up to 1000 bending cycles. The present study demonstrates the promising potential of flexible Si-NW-based nonvolatile memories for future electronics.</P>