• 제목/요약/키워드: 개인정보침해

Search Result 611, Processing Time 0.027 seconds

A Home Management System Using Smart Devices in an IoT Environment (IoT 환경에서의 스마트디바이스를 활용한 주택관리시스템)

  • Ryu, Chang-Su
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2016.10a
    • /
    • pp.807-808
    • /
    • 2016
  • With the recent rise in nuclear families and single-member families, there is a need for the kind of home management unaffected by neither space nor time. Moreover, electronic devices in and around the home need to be managed efficiently and prevented from overheating, and there is an increasing risk of fire, theft, and leak of personal data with these devices, which is leading to an increase in the economic costs. Accordingly, there is a growing need for an efficient and secure smart home management system. This paper proposes a home management system that uses smart devices. This system has addressed the shortcomings of a conventional Internet-based home network. Furthermore, it communicates with IoT-enabled devices and features intelligent information home appliances that are isolated from personally identifiable information and which are secure against advanced persistent threats, a type of cyber-attack.

  • PDF

A study on UI/UX Navigating Method for Effective Privacy Guidance for Online Behavioral Advertising(OBA) (온라인 맞춤형 광고 안내에 대한 프라이버시 안내를 위한 UI/UX 제공 방안 연구)

  • Kim, Ga-Yun;Kim, Ho-Joon;Kim, Da-Yeong;Yang, Jin-Hong
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.14 no.3
    • /
    • pp.175-183
    • /
    • 2021
  • As concerns about users' privacy infringement on Online Behavioral Advertising(OBA) increase, regulators are taking measures such as drawing up guidelines for OBAs, and websites provide OBA guidance in compliance with such guidelines. As a result of reviewing the status of providing OBA guidance on websites, access to OBA guidance pages was rather complicated. In order to analyze the issue from the UI/UX perspective, following the "Guidelines for Privacy in Online Behavioral Advertising" applied to all types of OBA transmitted on websites, this study aims to structuralize a navigation of page movement from two starting points, 1) Main Page, 2) The page where OBA is delivered, to OBA guidance pages. Also, with understanding the problems found in the access and navigation of OBA guidance pages by analyzing features found during the page navigation, such as hyperlinks containing keywords, and movement pages.

Cyber Risk Management of SMEs to Prevent Personal Information Leakage Accidents (개인정보유출 사고 방지를 위한 중소기업의 사이버 위험관리)

  • So, Byoung-Ki;Cheung, Chong-Soo
    • Journal of the Society of Disaster Information
    • /
    • v.17 no.2
    • /
    • pp.375-390
    • /
    • 2021
  • Purpose: Most of cybersecurity breaches occur in SMEs. As the existing cybersecurity framework and certification system are mainly focused on financial and large companies, it is difficult for SMEs to utilize it due to lack of cybersecurity budget and manpower. So it is necessary to come up with measures to allow SMEs to voluntarily manage cyber risks. Method: After reviewing Cybersecurity market, cybersecurity items of financial institutions, cybersecurity framework comparison and cybersecurity incidents reported in the media, the criticality of cybersecurity items was analyzed through AHP analysis. And cybersecurity items of non-life insurers were also investigated and made a comparison between them. Result: Cyber risk management methods for SMEs were proposed for 20 major causes of cyber accidents. Conclusion: We hope that the cybersecurity risk assessment measures of SMEs in Korea will help them assess their risks when they sign up for cyber insurance, and that cyber risk assessment also needs to be linked to ERM standardization.

Smart-phone Malicious Code Countermeasure System (스마트폰 악성코드 대응 시스템)

  • Song, Jong-Gun;Lee, HoonJae;Kim, TaeYong;Jang, WonTae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2013.05a
    • /
    • pp.223-226
    • /
    • 2013
  • Information security breaches caused by malicious code is arising in various forms with exponential growth. The latest information security threats on computers are increasing, especially on smartphone, which has enabled malicious code to quickly surge. As a result, the leakage of personal information, such as billing information, is under threat. Meanwhile the attack vector o smartphone malware is difficult to detect. In this paper, we propose a smartphone security system to respond to the spread of malicious code by iPhone and Android OS-based malware analysis.

  • PDF

Research Trends and Considerations for u-Healthcare Security in Wellness Services (웰니스 서비스의 u-Healthcare 보안 연구동향 및 고찰)

  • Oh, Hyun Seok;Joo, Jae Woong;Kang, Won Min;Yi, Gangman;Jeong, Hwa Young;Park, Jong Hyuk
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2014.11a
    • /
    • pp.457-459
    • /
    • 2014
  • 최근 Wellness 산업과 스마트 디바이스가 융합되면서 기존의 질병관리 체계보다 앞서 예방하는 건강관리 u-Healthcare 가 개발되고 있다. 하지만 u-Healthcare 에서 취급되는 개인정보 및 의료정보는 메시지 탈취/변조로 인해 공격자에게 악용되어 의료사고를 유발하고 환자의 생명까지 앗아갈 수 있으며 또한 프라이버시 침해로 인해 사용자의 신변을 보장 받을 수 없다. 본 논문에서는 웰니스 서비스의 u-Healthcare 보안의 고려사항과 연구동향에 대해 살펴보고 현재 u-Healthcare 분야에서 보안이 적용된 시스템에 대해 분석하고 취급되는 정보보호의 중요성에 대해 고찰한다.

Improving Scalability using Parallelism in RFID Privacy Protection (RFID 프라이버시 보호에서 병행성을 이용한 확장성 개선)

  • Shin Myeong-Sook;Lee Joon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.10 no.8
    • /
    • pp.1428-1434
    • /
    • 2006
  • In this paper, we propose the scheme solving privacy infringement in RFID systems with improving the scalability of back-end server. With RFID/USN becoming important subject, many approaches have been proposed and applied. However, limits of RFID, low computation power and storage, make the protection of privacy difficult. The Hash Chain scheme has been known as one guaranteeing forward security, confidentiality and indistinguishability. In spite of that, it is a problem that requires much of computation to identify tags in Back-End server. In this paper, we introduce an efficient key search method, the Hellman Method, to reduce computing complexity in Back-End server. Hellman Method algorism progresses pre-computation and (re)search. In this paper, after applying Hellman Method to Hash chain theory, We compared Preservation and key reference to analyze and apply to parallel With guaranteeing requistes of security for existing privacy protecting Comparing key reference reduced computation time of server to reduce computation complex from O(m) to $O(\frac{m{^2/3}}{w})$ than the existing form.

An Effect of Technostress After-Work Hours on Turnover Intention

  • Lee, Sae Bom;Tang, Min-Yan;Suh, Yung Ho
    • Journal of the Korea Society of Computer and Information
    • /
    • v.26 no.12
    • /
    • pp.169-177
    • /
    • 2021
  • Based on the technostress theory, this study aims to explore the effect of technostress caused by the use of social media during or after work hours on job turnover intention. This study conducted an online survey targeting 341 Chinese WeChat users. According to the results of the structural model analysis, role overload, role conflict, and work invasion that occur during work affect technostress, and social interaction overload, invasion of private life, and Fear of Missing Out (FoMO) that occur after work have a effect on technostress as well. Technostress occurring during work did not appear to have an effect on turnover intention, but technostress occurring after work was found to have a positive effect on turnover intention. It is expected that this study will be used as a basic data for the correct use of social media within an organization.

A Study on Awareness Levels of Personal Information Protection in Health Care Workers (개인정보 보호에 대한 의료기관 종사자들의 인식수준에 관한 연구)

  • Hong, Ju-Youn;Kim, Hwan-Hui
    • Journal of Korea Entertainment Industry Association
    • /
    • v.13 no.8
    • /
    • pp.647-659
    • /
    • 2019
  • The purpose of this study was to examine the relationship between the awareness of health care workers on the protection of patient health information and their practice of it in an attempt to provide some information on the policy setting of health care institutions about medical information protection. As a result, the awareness of the health care workers on the protection of patient health information and their practice of it were both the best in the communication area, followed by the patient health information management area and the area of direct contact with health information. As for the variables linked to their awareness and practice of patient health information protection, the type of the health care institutions, job satisfaction, religion and the departments in which they worked were significantly related. To determine what factors affected the patient health information management area, a multiple regression analysis was carried out by selecting the area of direct contact with patient health information and the communication area as independent variables and by selecting the patient health information management area as a dependent variable. And it's found that the patient health information management area became better when the area of direct contact with the information and the communication area were better.

A Development of WWW-based Electronic Payment Protocol using PGP (PGP를 이용한 WWW기반에서의 전자지불 프로토콜 개발)

  • Park, Hyeon-Dong;Gang, Sin-Gak;Park, Seong-Yeol;Ryu, Jae-Cheol
    • The Transactions of the Korea Information Processing Society
    • /
    • v.4 no.4
    • /
    • pp.1046-1058
    • /
    • 1997
  • WWW has taken root in Internet as a means of future shopping.But paymetn systems using tpdays show us several security vnlnerabilities.The problem that plain shpter's credit card details are transferred in Internet is included.Thnese risks can break out not only an infringement of pribate information but also economic crime.To solve these risks,we introduce the techique which implrment the encrypted WWW communication using PGP.And we propose SCCP which is new electronic payment protocol.As a result of testing with criteria from IBM,we can find that SCCP is safe and secure electronic payment protocol.As a result of testing with criteria from IBM,we can find that SCCP is safe and secure elctronic payment protocol.

  • PDF

Mechanism of RFID Authentication for u-Vehicle (u-Vehicle 환경에 적합한 RFID 인증 메커니즘)

  • Rhee, Yoon-Jung;Kim, Do-Hyeon
    • The Journal of the Korea Contents Association
    • /
    • v.8 no.6
    • /
    • pp.66-73
    • /
    • 2008
  • The concept of u-Vehicle is a technological model that people try to build the ubiquitous world in the car which moves, by using the RFID technology as well as the telematics service based on the location. RFID is weak on the point of information security because RFID has possibility for being abused such as chasing, counterfeiting, and invading personal privacy. RFID's tags use a weak cryptographic algorithm. This paper presents the vulnerabilities of information security under u-Vehicle environments. To solve that, we propose a mechanism enhancing RFID tag's security but with low cost by reducing the number of mutual authentication stages and using the hash function.