• Title/Summary/Keyword: 개인정보침해

Search Result 611, Processing Time 0.028 seconds

Implementation and Design of Artificial Intelligence Face Recognition in Distributed Environment (분산형 인공지능 얼굴인증 시스템의 설계 및 구현)

  • 배경율
    • Journal of Intelligence and Information Systems
    • /
    • v.10 no.1
    • /
    • pp.65-75
    • /
    • 2004
  • It is notorious that PIN(Personal Identification Number) is used widely for user verification and authentication in networked environment. But, when the user Identification and password are exposed by hacking, we can be damaged monetary damage as well as invasion of privacy. In this paper, we adopt face recognition-based authentication which have nothing to worry what the ID and password will be exposed. Also, we suggest the remote authentication and verification system by considering not only 2-Tier system but also 3-Tier system getting be distributed. In this research, we analyze the face feature data using the SVM(Support Vector Machine) and PCA(Principle Component Analysis), and implement artificial intelligence face recognition module in distributed environment which increase the authentication speed and heightens accuracy by utilizing artificial intelligence techniques.

  • PDF

Analysis for Digital Evidences using the Features of Digital Pictures on Mobile Phone (디지털 사진 특성을 이용한 휴대전화 증거 분석 방안)

  • Shin, Weon
    • Journal of Korea Multimedia Society
    • /
    • v.12 no.10
    • /
    • pp.1450-1456
    • /
    • 2009
  • By the explosive growth of IT technologies, mobile phones have embedded a lot of functions and everyone can use them with facility. But there are various cybercrimes as invasions of one's privacy or thefts of company's sensitive information using a built-in digital camera function in a mobile phone. In this paper, we propose a scheme for analyzing evidences by digital pictures on mobile phones. Therefore we analyze the features of digital pictures on mobile phones and make databases of characteristic patterns based on the vendor and the model of mobile phone. The proposed scheme will help to acquire digital evidences by providing a better decision of the vendor and/or the model of mobile phone by cybercrime suspects.

  • PDF

Problems and Improvements of Matrimonial Property Contract (부부재산계약의 문제점과 개선방안)

  • Park, Jong-Ryeol
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2015.07a
    • /
    • pp.111-114
    • /
    • 2015
  • 민법상 인정하고 있는 부부재산제도는 부부별산제의 원칙 아래 부부재산계약을 따로 두고 있는 형태이다. 부부재산계약은 혼인신고를 하기 전 두 당사자가 재산관계에 대해 합의한 사항을 등기하면 제3자에 대해서도 효력이 있도록 하는 제도로, 부부별산제의 예외가 된다. 부부별산제(민법제830조)는 부부의 일방이 결혼 전부터 갖고 있던 재산과, 결혼 생활 도중 자신의 명의로 취득한 재산을 그 개인의 것으로 보고, 소유가 불분명한 경우만 공유로 추정하고 있다. 따라서 재산의 관리, 사용, 수익은 소유자가 하게 된다. 결국 부부의 공동으로 형성된 재산이라도 소유자가 모든 권리를 행사할 수 밖에 없어 명의를 갖지 못한 부부일방은 재산적인 침해를 받을 수 있는 등 형식적 평등에 불과하고 실질적인 부부의 경제적 평등을 보장받지 못하고 있는 실정이므로 양성평등과 가족법적 이념에도 어긋나는 제도라 볼 수 있다. 그리고 부부별산제가 제3자와 관계에 있어서 법적안정성을 확보할 수 있다는 장점은 있으나, 법적분쟁 시 일방배우자의 소유재산이더라도 상대방 배우자의 숨어있는 가사노동 지분에 대한 보호규정 등이 없어 문제가 제기되고 있다. 따라서 본 연구에서는 부부재산제도의 문제점을 파악해보고 이를 근거로 합리적인 개선방안을 제시하고자 한다.

  • PDF

A Study on Development of Evaluation Indicators for the Human Competency and Management In Managed Security Service (MSS) (보안관제 업무의 인적 역량 및 관리에 대한 평가지표 개발 연구)

  • Yang, Sung Ho;Lee, Sang Jin
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.5 no.6
    • /
    • pp.143-152
    • /
    • 2016
  • Currently many central administrative agencies, municipalities and public and private institutions operate Managed security services to cope with cyber security incidents. These entities exert efforts in operating efficiencies rather than introduction of services as they used to. Accordingly, quite a few policies, directions and guidelines have been established for stable operation of Managed security services. Still, Managed security is operated by individuals, whose competencies influence the quality of Managed security services to a great extent. In this respect, the present article examines Managed security technology and methods and describes evaluation methods and examples relevant to human competencies, so as to seek for some potential courses for further development as well as more efficient approaches to human resource management in terms of institutional Managed security services.

Confliction Resolution among Users in Smart Home Environment (스마트 홈에서의 사용자간 의도충돌 해결)

  • Shin Choonsung;Woo Woontack
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2004.11a
    • /
    • pp.937-940
    • /
    • 2004
  • 본 논문은 유비쿼터스 컴퓨팅 환경에서 사용자 간의 의도충돌 해결을 위한 컨텍스트 관리기를 제안한다. 사용자 간의 의도충돌이란 여러 사용자들이 환경 내의 디바이스를 공유하며 사용함으로 인해 서비스가 적절하게 제공되지 못하는 상황이다. 이러한 사용자 간의 의도충돌은 한 순간에 여러 명의 사용자가 컨텍스트 인식 응용서비스를 이용하는 경우 발생하며 컨텍스트를 단순히 이용하는 것만으로는 해결하기 쉽지 않다. 제안된 컨텍스트 관리기는 이러한 사용자간 의도충돌을 해결하기 위해 사용자의 컨텍스트를 반영하여 상황에 적합한 사용자 컨텍스트를 선택하도록 한다. 또한 현재 서비스를 받고 있는 사용자의 의도를 침해하지 않도록 하기 위해 실행되고 있는 서비스의 컨텍스트와 선택된 사용자의 컨텍스트를 반영하여 서비스 실행을 결정한다. 그리고 사용자가 서비스에 대한 사용철회를 명시적으로 하지 않아도 서비스의 컨텍스트 전환이 가능하도록 환경내의 사용자 컨텍스트를 관리한다. 실험 결과, 제안된 컨텍스트 관리기가 다중사용자 환경에서 기존의 단일 사용자를 위한 컨텍스트 관리기 보다 상황에 적절하게 반응함을 보였다. 따라서 제안된 컨텍스트 관리기는 유비쿼터스 컴퓨팅 환경에서 다중 사용자들이 서비스를 공유하며 사용함에 따라 발생되는 사용자 간의 의도충돌을 감지하고 이를 해결하여 개인화된 서비스가 적절하게 제공되는데 중요한 역할을 수행할 것으로 기대된다.

  • PDF

Design of Image Processing System Additional into Automatic Access Control Door (안면인식 시스템을 탑재한 출입문 자동제어 시스템 설계)

  • Lee, Jae-ung;Jang, Jong-wook
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2017.10a
    • /
    • pp.261-263
    • /
    • 2017
  • Future science fiction science film science fiction film can easily see the appearance of the futuristic inquiry. Even if a person does not open the door by force, the door is opened and closed by the system. Even now, such a door can be found easily. However, in the past, people who have not been able to perceive people have been used only in public places such as department stores and marts, where there are many people who are inundated. However, a lot of researches are being done now, and we are pursuing convenience in everyday life by integrating the image processing technology that has been developed and developed many times, by implementing the automatic door which is not infringed by the personal life and is impossible for anyone to access.

  • PDF

Personal Information Overload and User Resistance in the Big Data Age (빅데이터 시대의 개인정보 과잉이 사용자 저항에 미치는 영향)

  • Lee, Hwansoo;Lim, Dongwon;Zo, Hangjung
    • Journal of Intelligence and Information Systems
    • /
    • v.19 no.1
    • /
    • pp.125-139
    • /
    • 2013
  • Big data refers to the data that cannot be processes with conventional contemporary data technologies. As smart devices and social network services produces vast amount of data, big data attracts much attention from researchers. There are strong demands form governments and industries for bib data as it can create new values by drawing business insights from data. Since various new technologies to process big data introduced, academic communities also show much interest to the big data domain. A notable advance related to the big data technology has been in various fields. Big data technology makes it possible to access, collect, and save individual's personal data. These technologies enable the analysis of huge amounts of data with lower cost and less time, which is impossible to achieve with traditional methods. It even detects personal information that people do not want to open. Therefore, people using information technology such as the Internet or online services have some level of privacy concerns, and such feelings can hinder continued use of information systems. For example, SNS offers various benefits, but users are sometimes highly exposed to privacy intrusions because they write too much personal information on it. Even though users post their personal information on the Internet by themselves, the data sometimes is not under control of the users. Once the private data is posed on the Internet, it can be transferred to anywhere by a few clicks, and can be abused to create fake identity. In this way, privacy intrusion happens. This study aims to investigate how perceived personal information overload in SNS affects user's risk perception and information privacy concerns. Also, it examines the relationship between the concerns and user resistance behavior. A survey approach and structural equation modeling method are employed for data collection and analysis. This study contributes meaningful insights for academic researchers and policy makers who are planning to develop guidelines for privacy protection. The study shows that information overload on the social network services can bring the significant increase of users' perceived level of privacy risks. In turn, the perceived privacy risks leads to the increased level of privacy concerns. IF privacy concerns increase, it can affect users to from a negative or resistant attitude toward system use. The resistance attitude may lead users to discontinue the use of social network services. Furthermore, information overload is mediated by perceived risks to affect privacy concerns rather than has direct influence on perceived risk. It implies that resistance to the system use can be diminished by reducing perceived risks of users. Given that users' resistant behavior become salient when they have high privacy concerns, the measures to alleviate users' privacy concerns should be conceived. This study makes academic contribution of integrating traditional information overload theory and user resistance theory to investigate perceived privacy concerns in current IS contexts. There is little big data research which examined the technology with empirical and behavioral approach, as the research topic has just emerged. It also makes practical contributions. Information overload connects to the increased level of perceived privacy risks, and discontinued use of the information system. To keep users from departing the system, organizations should develop a system in which private data is controlled and managed with ease. This study suggests that actions to lower the level of perceived risks and privacy concerns should be taken for information systems continuance.

Detection of Forgery of Mobile App and Study on Countermeasure (모바일 단말기 앱의 위·변조 탐지 및 대응방안 연구)

  • Jung, Hyun Soo;Chae, Gyoo-Soo
    • Journal of Convergence Society for SMB
    • /
    • v.5 no.3
    • /
    • pp.27-31
    • /
    • 2015
  • As the number of smartphone users is increasing with the development of mobile devices, the range of monetary transaction from the individual use is increasing. Therefore, hacking methods are diversified and the information forgery of mobile devices has been a current issue. The forgery via apps in mobile devices is a hacking method that creates an app similar to well-known apps to deceive the users. The forgery attack corresponds to the violation of integrity, one of three elements of security. Due to the forgery, the value and credibility of an app decreases with the risk increased. With the forgery in app, private information and data can be stolen and the financial losses can occur. This paper examined the forgery, and suggested a way to detect it, and sought the countermeasure to the forgery.

  • PDF

Legal examination of personal information disclosure system of administrative (행정상 인적사항공개제도에 대한 법률적 검토)

  • Ryu, Gi Hwan;Shin, Mi Ae
    • Convergence Security Journal
    • /
    • v.16 no.6_2
    • /
    • pp.89-97
    • /
    • 2016
  • Disclosure of personal information to be carried out in one of the Administrative Publicity, Administrative agency as specific information about the person who has violated the obligation imposed by the law is an unspecified number people know is through the direct or Internet media it is to be disclosed in an unspecified number of people. This is, indirect sanctions so as to fulfill its obligations by the addition of psychological pressure that exposes the personal information of the fact that in breach of his obligations to the breach of duty and it has been an unspecified number of people know it is a means. However, publication of these personal information, infringement of the moral rights of the Constitution guarantees an individual, of course, not only a matter of law that the right to self-determination of the personal information, has continued also doubts for the effectiveness of the system. As a result, in this paper, to discuss legal issues with the disclosure of management personal information and its improvement measures, and expected to be able to take advantage of the efficient development of the future of personal information disclosure system.

Session Key Agreement Protocol for IoT Home Devices using Shadow Passwords (그림자 패스워드를 사용한 IoT 홈 디바이스 사이의 세션키 공유 프로토콜)

  • Jung, Seok Won
    • Journal of Internet of Things and Convergence
    • /
    • v.6 no.2
    • /
    • pp.93-100
    • /
    • 2020
  • Although various home services are developed as increasing the number of home devices with wire and wireless connection, privacy infringement and private information leakage are occurred by unauthorized remote connection. It is almost caused by without of device authentication and protection of transmission data. In this paper, the devices' secret value are stored in a safe memory of a smartphone. A smartphone processes device authentication. In order to prevent leakage of a device's password, a shadow password multiplied a password by the private key is stored in a device. It is proposed mutual authentication between a smartphone and a device, and session key agreement for devices using recovered passwords on SRP. The proposed protocol is resistant to eavesdropping, a reply attack, impersonation attack.