• Title/Summary/Keyword: 개인 정보 노출 위험

Search Result 150, Processing Time 0.026 seconds

A Study on Information Security Consulting Method according to Type of Company (기업 업종에 따른 정보보안컨설팅 방법 연구)

  • Lee, Su-youn
    • Convergence Security Journal
    • /
    • v.15 no.4
    • /
    • pp.121-126
    • /
    • 2015
  • Exposure of personal information that is held by hacking accident near the company has led to severe water level. And, it has changed security threat elements generated according to businessenterprise. Therefore, in this paper, I looked at security threat elements and proposed the way of appropriate information security consulting according type of company. First, In the financial and insurance industries, and should not have been compromised by a worm virus infection due to lack of awareness inside of members, by collectively apply in the same way the internal security standards of the organization to members, the risk of customer information. It shall be provided in advance that the security accident occurs due to a higher job group. Therefore, information security consulting method based on people and information is applied. Secondly, in industry of company, to perform consulting information security based on the attributes of the case industry groups.

Consumer shopping perceptions of an Internet of Things environment (사물인터넷 환경에서의 소비자 쇼핑 인식)

  • Lee, Minsun;Lee, Hyun-Hwa
    • The Research Journal of the Costume Culture
    • /
    • v.29 no.1
    • /
    • pp.1-15
    • /
    • 2021
  • The Internet of Things (IoT) has gained enormous popularity in various fields of industry. An IoT shopping environment is considered an effective tool for convenient use by consumers. Perceived values (including convenience and privacy risks) of IoT shopping can be the main factors that influence consumers' shopping intentions. The current study proposed a research model based on a value-based adoption model, which integrated perceived benefit and sacrifice, shopping attitude, and shopping intention in an IoT shopping environment. As potential customers, participants in their 20s and 30s were recruited through a marketing research firm. Responses collected via an online questionnaire validated the proposed research model and hypothesis. The results confirmed significant, positive relationships between perceived benefit, including both remote control and access convenience, and consumers' positive attitudes toward IoT shopping. The association between perceived privacy risk and consumers' shopping attitudes was not significant. The indirect effects of two benefits of IoT shopping on shopping intention were also significant and positive. From a practical perspective, this study can help marketers and service providers manage their IoT shopping platforms or applications more effectively to attract consumers. The implications and limitations of this study are discussed. Directions for future research and development of IoT shopping environment are suggested.

A Study on COP-Transformation Based Metadata Security Scheme for Privacy Protection in Intelligent Video Surveillance (지능형 영상 감시 환경에서의 개인정보보호를 위한 COP-변환 기반 메타데이터 보안 기법 연구)

  • Lee, Donghyeok;Park, Namje
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.2
    • /
    • pp.417-428
    • /
    • 2018
  • The intelligent video surveillance environment is a system that extracts various information about a video object and enables automated processing through the analysis of video data collected in CCTV. However, since the privacy exposure problem may occur in the process of intelligent video surveillance, it is necessary to take a security measure. Especially, video metadata has high vulnerability because it can include various personal information analyzed based on big data. In this paper, we propose a COP-Transformation scheme to protect video metadata. The proposed scheme is advantageous in that it greatly enhances the security and efficiency in processing the video metadata.

Medical prescription design using QR Codes (QR코드를 적용한 진료 처방전 설계)

  • Lim, Myung-Jae;Jung, Dong-Keun;Kim, Myung-Gwon
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.13 no.6
    • /
    • pp.161-166
    • /
    • 2013
  • With recent development in information technology, IT convergence has been achieved ubiquitously in all areas of industry. In particular, there have been a lot of changes in medical IT conversion sector in terms of user service. In this regard, this paper attempts to propose an environment in which the existing paper prescription can be transferred in the form of QR codes using mobile handsets as one of practices from the perspective of user service. QR codes can minimize the burden resulting from the process of the output, delivery and storage of paper prescriptions. In addition, they can utilize the representation of the information in a wide variety of ways, and they are considered to be media that can minimize the risk of personal information exposure and falsification due to the restoration and encryption of the information. Accordingly, the application of QR codes to the medical field is expected to improve confidentiality ad storage capability of the information, along with users' convenience.

A Home Management System Using Smart Devices in an IoT Environment (IoT 환경에서의 스마트디바이스를 활용한 주택관리시스템)

  • Ryu, Chang-Su
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2016.10a
    • /
    • pp.807-808
    • /
    • 2016
  • With the recent rise in nuclear families and single-member families, there is a need for the kind of home management unaffected by neither space nor time. Moreover, electronic devices in and around the home need to be managed efficiently and prevented from overheating, and there is an increasing risk of fire, theft, and leak of personal data with these devices, which is leading to an increase in the economic costs. Accordingly, there is a growing need for an efficient and secure smart home management system. This paper proposes a home management system that uses smart devices. This system has addressed the shortcomings of a conventional Internet-based home network. Furthermore, it communicates with IoT-enabled devices and features intelligent information home appliances that are isolated from personally identifiable information and which are secure against advanced persistent threats, a type of cyber-attack.

  • PDF

Individual and familial factors associated with youth sexual experience based on national sample survey (국가표본조사자료 기반 청소년 성경험의 개인 및 가족 요인 분석)

  • Hwang, Jinseub;Ryu, Jiin;Kim, Jiwon;Kim, Seokjoo
    • Journal of the Korean Data and Information Science Society
    • /
    • v.28 no.1
    • /
    • pp.21-28
    • /
    • 2017
  • This study aims to identify individual and familial factors associated with youth sexual experience by using the nationally representative sample data in South Korea. Specifically, we select 68,043 students in middle and high schools participating in the 2015 Korea Youth Risk Behavior Web-based Survey. Considering the complex survey design, we conduct a descriptive analysis and multiple logistic regression for sexual experience. The main results identify factors on sexual experience such as age, type of school, stress level, drinking, smoking, economic status, and cohabiting parents. In particular, the drinking and smoking behaviors are positively associated with sexual experience and the youth living with neither parent is more likely to have a sexual experience than those who lived two parents. In conclusion, the plan of sex education should consider the risk factors and the quality of sex education should be enhanced in order to build more appropriate sexual culture and behaviors among the youth.

Securing COSPAS-SARSAT Search-and-Rescue Signal with Galileo System (갈릴레오 시스템과 연동한 COSPAS-SARSAT 탐색구조 신호 보안)

  • Cho, Taenam;Baek, Yoojin;Kim, Jaehyun;Lee, Sanguk;Ahn, Woo-Geun
    • Journal of Satellite, Information and Communications
    • /
    • v.9 no.4
    • /
    • pp.117-126
    • /
    • 2014
  • The COSPAS-SARSAT Search-and-Rescue System detects and locates emergency beacons activated by aircraft, ships and individuals. In particular, when this system is used in wartime and the signal is leaked to the enemy, it can cause the loss of the rescuers and the survivors. This paper proposes an improved method which protects the COSPAS-SARSAT search-and-rescue signal itself from being disclosed during its operation. In addition, there is presented a new protocol which maintains the stabilized security status between survivors and rescuers, using the Galileo/SAR return link.

LBS/GPS based Bicycle Safety Application with Arduino (아두이노를 이용한 위치정보 기반 안전한 자전거 애플리케이션)

  • Kim, Dong-Gun;Lee, Ho-Se;Kim, So-Young;Kim, Tae-Woo;Lee, Hyung-Woo
    • Journal of Internet of Things and Convergence
    • /
    • v.2 no.1
    • /
    • pp.7-15
    • /
    • 2016
  • Bicycle users were surpassed a million recently as bicycle riding will be a key element of daily life. As users increase, we can expect that the user is more exposed to the risk of an unexpected accident. Therefore, we need to establish several preventive measures for a safe riding environment. In this paper, we developed mobile application by using the acquired GPS-based location information that provide safety services for the bike riding as a LBS service. In detail, we have been able to provide a bicycle safety navigation service by using the bluetooth transmission and reception method between Android and Arduino-based devices. As a future work, the safety could be improved if we expand various forms of Arduino sensors. As a result, a service developed in this study will be able to converge ahead to connect into several personalized mobile IoT services.

Detection and Blocking Techniques of Security Vulnerability in Android Intents (안드로이드 인텐트의 보안 취약성 탐지 및 차단 기법)

  • Yoon, Chang-Pyo;Moon, Seok-jae;Hwang, Chi-Gon
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2013.05a
    • /
    • pp.666-668
    • /
    • 2013
  • Recently, the kind and number of malicious code, which operates in Operation System of smart devices, are rapidly increasing along with the fast supplement of smart devices. Especially, smart devices based on Android OS have high potential of danger to expose to malicious code as it has an easy access to system authority. When using intent, the global message system provided from Android, inter approach between applications is available, and possible to access to created data by the device. Intent provides convenience to application development in the aspect of reusability of component however, it could be appointed as a risk element in security-wise. Therefore, if intent is used in malicious purpose, it is easy to lead the condition where is weak on security. That is, it is possible to control as accessing to resources which application is carrying to operate by receiving intents as making smart device uncontrollable or consuming system resources. Especially, in case of system authority is achieved, the risks such as smart device control or personal information exposure become bigger when misusing broadcast intent through malicious code. This paper proposes a corresponding method of security vulnerability of Android intent that monitors the appearance of intent with intent pattern inspection, detects and blocks unidentified pattern intent.

  • PDF

Abnormal Step Recognition for Pedestrian Danger Recognition (보행자의 위험인지를 위한 비정상 걸음인식)

  • Ryu, Chang-Keun
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.12 no.6
    • /
    • pp.1233-1242
    • /
    • 2017
  • Various attempts have been made to prevent crime risk. One of the cases where outdoor pedestrians are attacked by criminals is the abnormal health condition. When a mental or mental condition that can not sustain normal walking due to drunkenness is exposed, the case of being a crime is revealed through crime case analysis. In this study, we propose a method for estimating the state of an individual that can be detected in outdoor activities. In order to avoid the inconvenience of installing a separate terminal for event information transmission of sensors and sensors, it is possible to estimate an abnormal state by using a 3-axis acceleration sensor built in a smart phone. The state of the user can be estimated by analyzing the momentum of the user and analyzing it with the passage of time. It is possible to distinguish the flow of time at regular intervals, to recognize the activity patterns in each time band, and to distinguish between normal and abnormal. In this study, we have evaluated the total amount of kinetic energy and kinetic energy in each direction of the acceleration sensor and the Fourier transformed value of the total energy amount to distinguish the abnormal state.