• Title/Summary/Keyword: Misused Data

Search Result 26, Processing Time 0.023 seconds

Investigation of multiple imputation variance estimation

  • Kim, Jae-Kwang
    • Proceedings of the Korean Statistical Society Conference
    • /
    • 2002.05a
    • /
    • pp.183-188
    • /
    • 2002
  • Multiple imputation, proposed by Rubin, is a procedure for handling missing data. One of the attractive parts of multiple imputation is the simplicity of the variance estimation formula. Because of the simplicity, it has been often abused and misused beyond its original prescription. This paper provides the bias of the multiple imputation variance estimator for a linear point estimator and discusses when the bias can be safely neglected.

  • PDF

Enhanced Hybrid Privacy Preserving Data Mining Technique

  • Kundeti Naga Prasanthi;M V P Chandra Sekhara Rao;Ch Sudha Sree;P Seshu Babu
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.6
    • /
    • pp.99-106
    • /
    • 2023
  • Now a days, large volumes of data is accumulating in every field due to increase in capacity of storage devices. These large volumes of data can be applied with data mining for finding useful patterns which can be used for business growth, improving services, improving health conditions etc. Data from different sources can be combined before applying data mining. The data thus gathered can be misused for identity theft, fake credit/debit card transactions, etc. To overcome this, data mining techniques which provide privacy are required. There are several privacy preserving data mining techniques available in literature like randomization, perturbation, anonymization etc. This paper proposes an Enhanced Hybrid Privacy Preserving Data Mining(EHPPDM) technique. The proposed technique provides more privacy of data than existing techniques while providing better classification accuracy. The experimental results show that classification accuracies have increased using EHPPDM technique.

The Structural Equation Model with Ordinal Data (순서형 자료로 측정된 구조방정식모형 분석)

  • 윤상운;박정선;이태섭
    • Journal of Korean Society for Quality Management
    • /
    • v.30 no.3
    • /
    • pp.38-52
    • /
    • 2002
  • This paper is concerned with the analysis of structural equation model(SEM) with the ordinal data such as Likert scale. The SEM is misused when the arbitrary scores allocated to the Likert scale are treated as quantitative data. The underlying distribution approaches have been studied to solve this problem, and the partial least squares(PLS) Is also tried. In this paper the quantification methods for the Likert scale are proposed to analyze the SEM. We assume that the Likert scale is an observation of the interval of the continuous underlying distribution, and the respondents have their own patterns in the response of some questions. Normal and beta distributions as the response patterns are considered to quantify the Likert scale. To compare the efficiency of the proposed method the bootstrap simulations are tried.

A Study on the Internet and Teenagers' Culture

  • Jang, Jung-Min;Cho, Hyun-Soo;Jung, Hye-Jung
    • Journal of the Korean Data and Information Science Society
    • /
    • v.14 no.3
    • /
    • pp.511-523
    • /
    • 2003
  • Internet has become an important part of teenagers' life and has changed the life style of teenagers. Internet can be an useful tool for educating teenagers and also can be misused as a cyberspace for social problems. Recognizing that teenagers spend most of their free time enjoying internet and they form their own new life culture, it is needed to develop practical strategies for maximizing the positive effect of internet on the teenagers' culture. The purpose of this research is to suggest a desirable way for forming teenagers' healthy internet-based culture. The research was conducted by the survey of teenagers in the city of Pyongtaek on their use of internet and their problems The survey shows that most of teenagers are using internet in order to release the stress and most of them are hooked on it. It also indicates that cyber police and volunteer groups should be formed to help the desirable teenagers' internet-based culture.

  • PDF

A Study on the Contents Security Management Model for Multi-platform Users

  • Joo, Hansol;Shin, Seung-Jung
    • International journal of advanced smart convergence
    • /
    • v.10 no.2
    • /
    • pp.10-14
    • /
    • 2021
  • Today people adopt various contents from their mobile devices which lead to numerous platforms. As technology of 5G, IOT, and smart phone develops, the number of people who create, edit, collect, and share their own videos, photos, and articles continues to increase. As more contents are shared online, the numbers of data being stolen continue to increase too. To prevent these cases, an authentication method is needed to encrypt the content and prove it as its own content. In the report, we propose a few methods to secure various misused content with secondary security. A unique private key is designed when people create new contents through sending photos or videos to platforms. The primary security is to encrypt the "Private Key" with a public key algorithm, making its data-specific "Timeset" that doesn't allow third-party users to enter. For the secondary security, we propose to use Message Authentication Codes(MACs) to certify that we have produced the content.

Secure Biometric Data Utilization and Protection (바이오인식 정보의 안전한 활용 및 보호방안)

  • Song, Chang-kyu;Kim, Young-jin;Chun, Myung-geun
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.31 no.4
    • /
    • pp.841-852
    • /
    • 2021
  • Biometric recognition refers to a technology that identifies or verifies an individual after registering each individual's physical, physiological, and behavioral characteristics with an automated device. However, the biometric data used here corresponds to personal information since it can identify an individual. Therefore, when it is compromised or misused, it negatively affects the privacy of the data subject. In this paper, we review the current status of domestic laws related to biometric information and the status of infringements related to this. And then, some biometric application models are derived and vulnerabilities and countermeasures for each model are discussed. Finally, for the developer and service provider of the biometric system, protection guidance is presented.

An analysis of errors in problem solving of the function unit in the first grade highschool (고등학교 1학년 함수단원 문제해결에서의 오류에 대한 분석)

  • Mun, Hye-Young;Kim, Yung-Hwan
    • Journal of the Korean School Mathematics Society
    • /
    • v.14 no.3
    • /
    • pp.277-293
    • /
    • 2011
  • The purpose of mathematics education is to develop the ability of transforming various problems in general situations into mathematics problems and then solving the problem mathematically. Various teaching-learning methods for improving the ability of the mathematics problem-solving can be tried. However, it is necessary to choose an appropriate teaching-learning method after figuring out students' level of understanding the mathematics learning or their problem-solving strategies. The error analysis is helpful for mathematics learning by providing teachers more efficient teaching strategies and by letting students know the cause of failure and then find a correct way. The following subjects were set up and analyzed. First, the error classification pattern was set up. Second, the errors in the solving process of the function problems were analyzed according to the error classification pattern. For this study, the survey was conducted to 90 first grade students of ${\bigcirc}{\bigcirc}$high school in Chung-nam. They were asked to solve 8 problems in the function part. The following error classification patterns were set up by referring to the preceding studies about the error and the error patterns shown in the survey. (1)Misused Data, (2)Misinterpreted Language, (3)Logically Invalid Inference, (4)Distorted Theorem or Definition, (5)Unverified Solution, (6)Technical Errors, (7)Discontinuance of solving process The results of the analysis of errors due to the above error classification pattern were given below First, students don't understand the concept of the function completely. Even if they do, they lack in the application ability. Second, students make many mistakes when they interpret the mathematics problem into different types of languages such as equations, signals, graphs, and figures. Third, students misuse or ignore the data given in the problem. Fourth, students often give up or never try the solving process. The research on the error analysis should be done further because it provides the useful information for the teaching-learning process.

  • PDF

An Analysis of Errors in the Mathematics Level Assessment Focused on the Level of the College Scholastic Ability Test (대학수학능력시험 등급 수준별 수학진단평가 오류 분석)

  • Son, Min Ji;Pyo, Yong-Soo
    • East Asian mathematical journal
    • /
    • v.30 no.4
    • /
    • pp.527-544
    • /
    • 2014
  • The purpose of this thesis is to analyze mathematical errors in descriptive problems of the Mathematics Level Assessment(MLA) which is conducted in P University. We classified mathematical errors, which are easily made in solving the descriptive problems of the MLA, into nine types as misused data, misinterpreted language, logically invalid inference, misunderstood theorem or definition, unmatched solution, technical errors, omission of solving process, ambiguous errors, and unattempted errors. With classifying the errors in nine types, we analyzed the errors of students, who are in intermediate and low level grades, by descriptive problems. On the basis of these analysis results, we suggest plans for improving the implementation of the MLA and the teaching-learning methods about College General Mathematics.

A Study on the Performance and Utilization of Results of Self-monitoring of Blood Glucose in Type Ⅱ Diabetes (일 병원 제2형 당뇨병환자의 자가혈당검사 수행 및 활용 실태)

  • Ha, Jung-Mi;Kim, Dong-Hee
    • The Journal of Korean Academic Society of Nursing Education
    • /
    • v.16 no.2
    • /
    • pp.330-338
    • /
    • 2010
  • Purpose: This study was conducted to investigate performance of self-monitoring of blood glucose and the utilization of results for people with type II diabetes. Method: Data was collected from 177 patients with type II diabetes using a questionnaire from August to September, 2009. Result: Most participants performed self-monitoring of blood glucose in the correct way while some misused the lancet or test strips. In the utilization of results for self-monitoring blood glucose data, 62% of participants always recorded the data, 46% always understood the cause for hyperglycemia or hypoglycemia, 25% changed their diet, 23% regulated their exercise-amount, and 11% of participants adjusted the drug dosage. There were significant differences in the performance of self-monitoring of blood glucose and the utilization of results according to the characteristics in the self-monitoring subjects such as awareness of HbA1c, target fasting glucose level, target fasting glucose level 2 hours after meal etc. Conclusion: Systemic self-monitoring of blood glucose education which includes the utilization of self-monitoring of blood glucose needs to be developed for type II diabetic patients.

가족배경이 자녀의 성격형성에 미치는 영향에 관한 연구 -자녀의 수 및 성 구성을 중심으로-

  • Choe, Jeong
    • Korea journal of population studies
    • /
    • v.7 no.1
    • /
    • pp.78-123
    • /
    • 1984
  • This study is attempting to examine the possible determinants of the rise of the sex ratio at birth from 106 to 110 in past decade in Taiwan. The basic hypothesis for the sudden rise of the sex ratio at birth is due to a combination of prenatal sex determination and abortion. The reasoning for this hypothesis involves three types of considerations - motivation, norm, and access. The theory is evaluated by analyzing data from birth registration and a large and representative sampie of Taiwanese wives of childbearing age. The empirical data seem to support the theoretical preposition and the basic hypothesis that the rise of the sex ratio at birth in Taiwan is due to a combination of prenatal sex determination and abortion. There is striking evidence of son-preference in the rise of the sex ratio at birth in higher birth order. In 1990 the sex ratio was 119 for third births and 128 for fourth and fifth births compared to the expected 106. Also, the 1991 KAP data indicated that women who have only daughters but no any son are more likely to make prenatal sex screening and terminate their pregnancies in male live births at higher birth order. Obviously, genetic diagnosis through chorionic villus sampling which was available in recent years was misused for prenatal sex determination and sex selective abortion.

  • PDF