• Title/Summary/Keyword: 개인정보침해

Search Result 611, Processing Time 0.023 seconds

Analysis on the Operation Status of National Education Information System (교육행정정보시스템의 운영실태분석)

  • Lee Dae-Sik;Jeong Ju-Young
    • Journal of Internet Computing and Services
    • /
    • v.7 no.4
    • /
    • pp.115-122
    • /
    • 2006
  • The purpose of this paper is to suggest the improving plans about the system as searching an effective managing devices for NEIS with analysis of managing condition. For the plans, questionnaire was performed in the five sections to primary and secondary school teachers. Those were recognition about C/S, Introduction and conductive processing of NEIS, Satisfaction of specific task on school affairs and educational matters, its function, efficiency and security as well as technical problem. Those were recognition about C/S, Introduction and conductive processing of NEIS, Satisfaction of specific task on school affairs and educational matters, its function, efficiency and security as well as technical problem. The results are following: First. in spite of satisfaction with function of C/S, it have been some problems such as frequent patch and down of server. Secondly, although the introduction of NEIS was done in hurry without gathering teachers' opinions and sufficient research of system, it has been expected to settle down normally with correction and security. Thirdly, positive reaction was generally showed in research on satisfaction of specific task for school affairs and educational matters. Fourthly, most of teachers have known the functions of NEIS and recognized its convenience. Although they has not thought it reduced their work, they have realized it's convenient for dealing with statistics. Lastly, they think of NEIS as the essential system for the age of information, in spite of problems such as reveal of personal data and security. Therefore, we should keep eyes to problem of an invasion of human right. In addition, study deep into NEIS should be conducted with consistent security for the system. In order to it. technical and legal system should be carried out side by side.

  • PDF

An Empirical Analysis on the Operating System Update Decision Factors according to Age and Gender (연령과 성별에 따른 운영체제 업데이트 실시여부 실증분석)

  • Kim, Sunok;Lee, Mina
    • Journal of the Korean Data Analysis Society
    • /
    • v.20 no.6
    • /
    • pp.3117-3126
    • /
    • 2018
  • The operating system update is a basic step to maintain a safe internet use environment. This study analyzed whether the implementation of the operating system update was related to gender and age group during the violation accident prevention act in relation to information protection on the internet, and tried to verify the validity of these factors by analyzing the influence of gender and age group. In this study, logistic regression analysis was conducted based on the information security survey data surveyed by the Korea Internet & Security Agency in 2016. As a result, gender and age were surveyed as factors related to the implementation of operating system updates. As a result of analyzing the impact on the implementation of operating system updates by gender, it is estimated that the odds are 0.419 times higher for women than for men. According to the analysis of the operating system update by age group based on the 50s, which is a vulnerable group of information, the result is that the odds are 13.266 times higher in the 20s than the 50s.

Motivational Factors Affecting Intention to Use Mobile Health Apps: Focusing on Regulatory Focus Tendency and Privacy Calculus Theory (모바일 헬스 앱 사용의도 동기요인: 조절초점성향과 프라이버시계산이론을 중심으로)

  • So, Hyeon-jeong;Kwahk, Kee-Young
    • Knowledge Management Research
    • /
    • v.22 no.2
    • /
    • pp.33-53
    • /
    • 2021
  • Use of mobile apps being extended, privacy concern on the side of the users is increased while they are willing to provide the private information to use the apps. In this study, we tried to identify the motivating elements that influence the users' intention to use the apps, based on the tendency towards regulatory focus and the privacy calculus theory. To verify the study model, we collected data from 151 adults who use health apps throughout the country, and analyzed the data using the PLS-SEM method. According to the result of the study, it was turned out that tendency towards promotion focus had negative impact on privacy concern and privacy danger, and tendency towards prevention focus had positive impact on privacy concern. Privacy concern had negative impact on the intention to use the mobile apps, and privacy benefit and privacy knowledge had positive impact on the intention to use the mobile apps. Finally, the intention to use the mobile apps had positive impact on the intention to continue to use the mobile apps. In this study, we identified different impacts of two types of tendency towards regulatory focus on privacy concern, and identified different influences on the intention to use the mobile apps accordingly.

A Study on the Research Trends for Smart City using Topic Modeling (토픽 모델링을 활용한 스마트시티 연구동향 분석)

  • Park, Keon Chul;Lee, Chi Hyung
    • Journal of Internet Computing and Services
    • /
    • v.20 no.3
    • /
    • pp.119-128
    • /
    • 2019
  • This study aims to analyze the research trends on Smart City and to present implications to policy maker, industry professional, and researcher. Cities around globe have undergone the rapid progress in urbanization and the consequent dramatic increase in urban dwellings over the past few decades, and faced many urban problems in such areas as transportation, environment and housing. Cities around the globe are in a hurry to introduce Smart City to pursue a common goal of solving these urban problems and improving the quality of their lives. However, various conceptual approaches to smart city are causing uncertainty in setting policy goals and establishing direction for implementation. The study collected 11,527 papers titled "Smart City(cities)" from the Scopus DB and Springer DB, and then analyze research status, topic, trends based on abstracts and publication date(year) information using the LDA based Topic Modeling approaches. Research topics are classified into three categories(Services, Technologies, and User Perspective) and eight regarding topics. Out of eight topics, citizen-driven innovation is the most frequently referred. Additional topic network analysis reveals that data and privacy/security are the most prevailing topics affecting others. This study is expected to helps understand the trends of Smart City researches and predict the future researches.

Design of Device Authentication Protocol Based on C-PBFT in a Smart Home Environment (스마트 홈 환경에서 C-PBFT 기반의 디바이스 인증 프로토콜 설계)

  • Kim, Jeong-Ho;Heo, Jae-Wook;Jun, Moon-Seog
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.20 no.5
    • /
    • pp.550-558
    • /
    • 2019
  • As the scale of the Internet of Things (IoT) environment grows and develops day by day, the information collected and shared through IoT devices becomes increasingly diverse and more common. However, because IoT devices have limitations on computing power and a low power capacity due to their miniaturized size, it is difficult to apply security technologies like encryption and authentication that have been directly applied in the previous Internet environment, making the IoT vulnerable to security threats. Because of this weakness, important information that needs to be delivered safely and accurately is exposed to the threat of malicious exploitation, such as data forgery, data leakage, and infringement of personal information. In order to overcome this threat, various security studies are being actively conducted to compensate for the weaknesses in IoT environment devices. In particular, since various devices interact, and share and communicate information collected in the IoT environment, each device should be able to communicate with reliability. With regard to this, various studies have been carried out on techniques for device authentication. This study examines the limitations and problems of the authentication techniques that have been studied thus far, and proposes technologies that can certify IoT devices for safe communication between reliable devices in the Internet environment.

Efficient Mutual Authentication Protocol Suitable to Passive RFID System (수동형 RFID 시스템에 적합한 효율적인 상호 인증 프로토콜 설계)

  • Won, Tae-Youn;Chun, Ji-Young;Park, Choon-Sik;Lee, Dong-Hoon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.18 no.6A
    • /
    • pp.63-73
    • /
    • 2008
  • RFID(Radio Frequency IDentification) system is an automated identification system that basically consists of tags and readers and Back-End-Databases. Tags and Readers communicate with each other by RF signal. As a reader can identify many tags in contactless manner using RF signal, RFID system is expected to do a new technology to replace a bar-code system in supply-chain management and payment system and access control and medical record and so on. However, RFID system creates new threats to the security of systems and privacy of individuals, Because tags and readers communicate with each other in insecure channel using RF signal. So many people are trying to study various manners to solve these problems against attacks, But they are difficult to apply to RFID system based on EPCglobal UHF Class-1 Generation-2 tags. Recently, Chien and Chen proposed a mutual Authentication protocol for RFID conforming to EPCglobal UHF Class-1 Generation-2 tags. we discover vulnerabilities of security and inefficiency about their protocol. Therefore, We analyze vulnerabilities of their protocol and propose an efficient mutual authentication protocol that improves security and efficiency.

A Comparative Analysis of Cognitive Change about Big Data Using Social Media Data Analysis (소셜 미디어 데이터 분석을 활용한 빅데이터에 대한 인식 변화 비교 분석)

  • Yun, Youdong;Jo, Jaechoon;Hur, Yuna;Lim, Heuiseok
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.6 no.7
    • /
    • pp.371-378
    • /
    • 2017
  • Recently, with the spread of smart device and the introduction of web services, the data is rapidly increasing online, and it is utilized in various fields. In particular, the emergence of social media in the big data field has led to a rapid increase in the amount of unstructured data. In order to extract meaningful information from such unstructured data, interest in big data technology has increased in various fields. Big data is becoming a key resource in many areas. Big data's prospects for the future are positive, but concerns about data breaches and privacy are constantly being addressed. On this subject of big data, where positive and negative views coexist, the research of analyzing people's opinions currently lack. In this study, we compared the changes in peoples perception on big data based on unstructured data collected from the social media using a text mining. As a results, yearly keywords for domestic big data, declining positive opinions, and increasing negative opinions were observed. Based on these results, we could predict the flow of domestic big data.

A research paper for e-government's role for public Big Data application (공공의 빅데이터 활용을 위한 전자정부 역할 연구)

  • Bae, Yong-guen;Cho, Young-Ju;Choung, Young-chul
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.21 no.11
    • /
    • pp.2176-2183
    • /
    • 2017
  • The value of Big-Data which is a main factor of the fourth Industrial Revolution enhances industrial productivity in private sector and provides administrative services for nations and corporates in public sector. ICT-developed countries are coming up with Big-Data application in public sector rapidly. Especially, when it comes to social crisis management, they are equipped with pre-forcasting system. Korean Government also emphasizes Big-Data application in public sector for the social crisis management. But the reality where the overall infrastructure vulnerability reveals requires preparation and operation of measurement for social problems. Accordingly, we need to analyze Big-Data application problem and benchmark the precedented cases, thereby, direct policy diversity. Hence, this paper proposes the roles and rules of E-government analyzing problems from Big-Data application. The following policy proposes open Information and legal&institutional improvement, Big-Data service considerations threatening privacy issues in Big-Data ecosystem, necessity of operational and analytical technology for Big-Data and related technology in technical implication of Big-Data.

A Study on Artificial Intelligence Ethics Perceptions of University Students by Text Mining (텍스트 마이닝으로 살펴본 대학생들의 인공지능 윤리 인식 연구)

  • Yoo, Sujin;Jang, YunJae
    • Journal of The Korean Association of Information Education
    • /
    • v.25 no.6
    • /
    • pp.947-960
    • /
    • 2021
  • In this study, we examine the AI ethics perception of university students to explore the direction of AI ethics education. For this, 83 students wrote their thoughts about 5 discussion topics on online bulletin board. We analyzed it using language networks, one of the text mining techniques. As a result, 62.5% of students spoke the future of the AI society positively. Second, if there is a self-driving car accident, 39.2% of students thought it is the vehicle owner's responsibility at the current level of autonomous driving. Third, invasion of privacy, abuse of technology, and unbalanced information acquisition were cited as dysfunctions of the development of AI. It was mentioned that ethical education for both AI users and developers is required as a way to minimize malfunctions, and institutional preparations should be carried out in parallel. Fourth, only 19.2% of students showed a positive opinion about a society where face recognition technology is universal. Finally, there was a common opinion that when collecting data including personal information, only the part with the consent should be used. Regarding the use of AI without moral standards, they emphasized the ethical literacy of both users and developers. This study is meaningful in that it provides information necessary to design the contents of artificial intelligence ethics education in liberal arts education.

A Study on the Improvement of Flexible Working Hours (유연근로시간제 개선에 대한 연구)

  • Kwon, Yong-man;Seo, Ei-seok
    • Journal of Venture Innovation
    • /
    • v.4 no.2
    • /
    • pp.97-108
    • /
    • 2021
  • Labor contracts appear in form as an exchange relationship between labor products and wages, but since they transcend the level of simple barter, they can be economically identified as "trading" and can be identified as "rental." From a legal point of view, a legal device that legally supports and imposes binding force on commodity exchange relations is a contract. Such a labor contract led to a relationship in which wages were received and a certain amount of time was placed under the direction and supervision of the employer as a counter benefit to the receipt of wages. Since working hours are subordinate hours with one's labor under the disposition authority of the employer, long hours of work can be done for the health and safety of workers and furthermore, it can be an act that violates the value to enjoy as a human being. The reduction of working hours needs to be shortened in terms of productivity and enjoyment of workers' culture so that they can expand and reproduce, but users' corporate management labor and production activities should also be compatible compared to those pursued by capitalist countries. Working hours can be seen as individual time and time in society as a whole, and long hours of work at the individual level are reduced, which is undesirable at the individual level, but an increase in products due to an increase in production time at the social level can help social development. It is necessary to consider working hours in terms of finding the balance between these individual and social levels. If the regulation method of working hours was to regulate the total amount of working hours, flexibility and elasticity of working hours are a qualitative regulation method that allows companies to flexibly allocate and organize working hours within a certain range of up to 52 hours per week. Accordingly, it is necessary to shorten working hours, but expand and implement the flexible working hours system according to the situation of the company. To this end, it is necessary to flexibly operate the flexible working hours system, which is currently limited to six months, handle the selective working hours by agreement between employers and workers, and expand the target work of discretionary working hours according to the development of information and communication technology and new types based on the 4th industrial revolution.