• 제목/요약/키워드: 디지털 프라이버시

Search Result 165, Processing Time 0.024 seconds

Special Theme_사물지능통신 - ICT Expert Interview 김형중 TTA사물지능통신 PG 의장

  • 한국정보통신기술협회
    • TTA Journal
    • /
    • s.134
    • /
    • pp.24-29
    • /
    • 2011
  • 지난 1990년대에는 월드와이드웹 (WWW)이 화투였고, 2000년대에는 모바일 인터넷이 화두였다면, 2010년대는 모든 사물이 네트워크에 연결되는 Internet of Things(이하 IoT)의 세상이 될 것으로 전망되고 있다. 지난 2005년에 발간된 ITU 보고서에 따르면, IoT가 식별자(부착하는 사물)와 센서 및 무선 센서 네크워크(감지하는 사물), 임베디드 시스템(생각하는 사물), 나노공학(수축하는 사물) 분야의 기술 발전을 통하여 감각뿐 아니라 지능적 형태로 전 세계의 모든 사물 및 객체가 상호 연결될 것이라 주장하며, 이에 대한 준비와 대비가 필요하다고 언급한 바 있다. 또한, 본 보고서는 IoT 실현을 위한 가장 중요한 도전으로 표준화와 협력, 프라이버시, 사회 도덕적 이슈에 대한 철저한 대응이 될 것이라 직시한 바 있다. 이제 우리가 살아가는 세상은 또 다른 새로운 변화에 직면하고 있는 것이다. 현재 전 세계에는 15억 대의 PC와 10억 대의 휴대폰이 인터넷에 연결되어 있으며, 향후 2020년까지 약 500억 대에서 1,000억 대의 장치가 인터넷에 접속하는 IoT 세상으로 전환될 것으로 예측하고 있다. 더욱이, M2M 통신뿐만 아니라 객체 사이 통신까지 포함한다면 인터넷에 연결되는 잠재적 객체의 수는 100조 개에 달할 것이라고 한다. 최근 우리나라에서도 사물지능통신이란 용어가 자주 회자되고 있다. 사물지능통신을 광의의 의미에서 해석하면 IoT로 일컬을 수 있을 것이며, 다만, 협의의 의미로 해석한다면, M2M 통신을 지칭하는 것이 맞는 해석이라고 생각된다. 이에 본 특집에서는 사물지능통신 기술에 대한 현황 및 정책, 앞으로의 서비스 전망, 나아가 표준화 추진 동향 등에 대해 살펴보고 앞으로 다가올 미래 디지털 ICT 사회 변화를 조명해 보고자 한다.

  • PDF

A Study on the Divisible Electronic Cash System Functioning Electronic License (전자면허의 기능을 갖는 분할 가능한 전자화폐시스템에 관한 연구)

  • 이애리;이지영
    • The Journal of Information Technology
    • /
    • v.3 no.1
    • /
    • pp.89-97
    • /
    • 2000
  • Electronic commerce on the network requires a new payment system, electronic cash that carries digitalized information of cash. The new system, however, demands the security and privacy because electronic cash is different from real cash in that it can be easily duplicated, forged, or traced. Therefore, electronic cash system should be guaranteed security and privacy to be used as a new payment mechanism with assurance. First, this paper analyzes the existing electronic cash system involving electronic coins, divisible electronic bills, and electronic license. Then the paper proposes a new electronic cash system which claims to be more efficient in the amount of communication and computation. Finally, this study attempts to solve the problem of electronic license.

  • PDF

A Platform Providing Interactive Signage Based on Edge-cloud Cooperation (엣지-클라우드 협업 기반 인터랙티브 사이니지 제공 플랫폼)

  • Moon, Jaewon;Kum, Seungwoo;Lee, Sangwon
    • Journal of Internet Computing and Services
    • /
    • v.20 no.2
    • /
    • pp.39-49
    • /
    • 2019
  • Advances in IoT data analysis technology have made it easier to analyze situation and provide interactive services based on the context. Most of digital signage application have been used to provide information uni-directionally, but in the future it will evolve to provide personalized content according to the individual user situation and responses. However, it is not easy to modify or apply the existing interactive digital signage platforms due to their hardware dependency. The proposed platform is modularized by dividing main functions into two, the cloud and the edge, so that advertisement resources can be easily generated and registered. Thus, interactive advertisement can be rendered in a timely manner based on sensor analysis results. At the edge, personal data can be processed to minimize privacy issues, and real-time IoT sensor data can be analyzed for quick response to the signage player. The cloud is easier to access and manage by multiple users than edge. Therefore, the signage content generation module improves accessibility and flexibility by handling advertisement contents in the cloud so that multiple users can work together on the cloud platform. The proposed platform was developed and simulated in two aspects. First is the provider who provides the signage service, and second is the viewer who uses the content of the signage. Simulation results show that the proposed platform enables providers to quickly construct interactive signage contents and responses appropriately to the context changes in real-time.

Impacts of Perceived Value and Trust on Intention to Continue Use of Individuals' Cloud Computing: The Perception of Value-based Adoption Model (클라우드 컴퓨팅의 지각된 가치와 신뢰가 지속적 사용의도에 미치는 영향: 가치기반수용모델을 기반으로)

  • Kim, Sanghyun;Park, Hyunsun;Kim, Bora
    • Journal of Digital Convergence
    • /
    • v.19 no.1
    • /
    • pp.77-88
    • /
    • 2021
  • Cloud computing is getting a lot of attention by many people and businesses due to IT environmental changes such as the proliferation of smart devices, the increase of digital data, and the cost of IT resources. More individuals use personal cloud computing services for storing and managing information and data. Therefore, this study proposed determinants that are expected to have an influence on evaluating the value of cloud computing based on the value-based adoption model, examining the relationship between the continuous use intention of cloud computing. Results of the study show that usefulness, convenience of information access, extensibility had a positive impact on perceived value while privacy concerns and costs had a negative impact on perceived value. In addition, perceived value was found to have a significant effect on the intention to continue use of cloud computing. Finally, trust was found to have a significant effect on the perceived value and the intention to continue use of cloud computing. The findings are expected to provide useful information for understanding the factors that individual users consider important in the steadily growing cloud computing market.

The Fourth Industrial Revolution and Labor Relations : Labor-management Conflict Issues and Union Strategies in Western Advanced Countries (4차 산업혁명과 노사관계 : 노사갈등 이슈와 서구 노조들의 대응전략을 중심으로)

  • Lee, Byoung-Hoon
    • 한국사회정책
    • /
    • v.25 no.2
    • /
    • pp.429-446
    • /
    • 2018
  • The $4^{th}$ Industrial Revolution, symbolizing the explosive innovation of digital technologies, is expected to have a great impact on labor relations and produce a lot of contested issues. The labor-management issues, created by the $4^{th}$ Industrial Revolution, are as follows: (1) employment restructuring, job re-allocation, and skill-reformation, driven by the technological displacement, resetting of worker-machine relationship, and negotiation on labor intensity and autonomy, (2) the legislation of institutional protection for the digital dependent self-employed, derived from the proliferation of platform-mediated labor, and the statutory recognition of their 'workerness', (3) unemployment safety net, income guarantee, and skill formation assistance for precarious workeforce, (4) the protection of worker privacy from workplace surveillance, (5) protecting labor rights of the digital dependent self-employed and prcarious workers and guaranteeing their unionization and collective bargaining. In comparing how labor unions in Western countries have responded to the $4^{th}$ Industrial Revolution, German unions have showed a strategic approach of policy formation toward digital technological innovations by effectively building and utilizing diverse channel of social dialogue and collective bargaining, while those in the US and UK have adopted the traditional approach of organizing and protesting in attempting to protect the interest of platform-mediated workers (i.e. Uber drivers). In light of the best practice demonstrated by German unions, it is necessary to build the process of productive policy consultation among three parties- the government, employers, and labor unions - at multi levels (i.e. workplace, sectoral and national levels), in order to prevent the destructive damage as well as labor-management confrotation, caused by digital technological innovations. In such policy consultation procesess, moreover, the inclusive and integrated approach is required to tackle with diverse problems, derived from the $4^{th}$ Industrial Revolution, in a holistic manner.

The Biometric Authentication Scheme Capable of Multilevel Security Control (보안레벨 조절이 가능한 바이오메트릭 인증 기법)

  • Yun, Sunghyun
    • Journal of the Korea Convergence Society
    • /
    • v.8 no.2
    • /
    • pp.9-14
    • /
    • 2017
  • A fingerprint is unique to each person and can be represented as a digital form. As the fingerprint is the part of human body, fingerprint recognition is much more easy to use and secure rather than using password or resident card for user authentication. In addition, as the newly released smart phones have built-in camera and fingerprint sensors, the demand for biometric authentication is increasing rapidly. But, the drawback is that the fingerprint can be counterfeited easily and if it's exposed to the hacker, it cannot be reused. Thus, the original fingerprint template should be transformed for registration and authentication purposes. Existing transformation functions use passcode to transform the original template to the cancelable form. Additional module is needed to input the passcode, so it requires more cost and lowers the usability. In this paper, we propose biometric authentication scheme that is economic and easy to use. The proposed scheme is consisted of cancelable biometric template creation, registration and user authentication protocols, and can control several security levels by configuring the number of fingerprints and scan times. We also analyzed that our scheme is secure against the brute-force attack and the active attacks.

Effects of Online Engagement on Uses of Digital Paid Contents (온라인 관여가 디지털 유료 콘텐츠 이용에 미치는 영향)

  • Yang, JungAe;Song, Indeok
    • The Journal of the Korea Contents Association
    • /
    • v.18 no.9
    • /
    • pp.468-481
    • /
    • 2018
  • This study aims to empirically investigate how users' online engagement behaviors predict their uses of paid contents. To this end, the data from the 2016 Korean Media Panel Survey, which has been conducted annually by the Korea Information Society Development Institute(KISDI), were analyzed. Major findings(N=8.313) were as follows. First, the active type of online engagement(e.g., posting, commenting), which contributes to direct creation of online contents, was the most powerful predictor to explain the DV. On the other hand, relatively passive actions of user engagement(e.g., sharing, endorsing, voting) turned out to have no significant effects on the uses of paid contents, just as personality traits and online privacy concerns did. Based on these results, it is recommended that online contents or platform service providers should try to establish clearly-targeted marketing strategies, after thoroughly collecting and analyzing the data of users' various online behaviors.

An Enhanced Ultralightweight RFID Authentication Protocol Providing Strong Authentication and Privacy (강한 인증과 프라이버시를 보장하는 개선된 초경량 RFID 인증 프로토콜)

  • Jeon, Dong-Ho;Kim, Young-Jae;Kwon, Hye-Jin;Jeong, Seon-Yeong;Kim, Soon-Ja
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.19 no.5
    • /
    • pp.81-91
    • /
    • 2009
  • Recently, Chein et al proposed the ultralightweight strong authentication and strong integrity (SASI)protocol, where the tag requrires only simple bitwise operations. Since the tag does not support random number generator to generate a challenge nonce, an attacker can replay old messages and impersonate reader. However, all of the previous ultralightweight authentication schemes are vlunerable to various attacks: de-synk, eavesdropping, impersonating, tracking, DoS, disclosure etc. we analyze the problems of previous proposed ultrlightweight protocols, to overcome these security problems by using PRNG on the tag. Therefore, in this paper we propose a new lightweight RFID mutual authentication protocol that provides random number generator and bitwise operations, a security and an efficiency of the proposed schme analyze.

An Efficiency Management Scheme using Big Data of Healthcare Patients using Puzzy AHP (퍼지 AHP를 이용한 헬스케어 환자의 빅 데이터 사용의 효율적 관리 기법)

  • Jeong, Yoon-Su
    • Journal of Digital Convergence
    • /
    • v.13 no.4
    • /
    • pp.227-233
    • /
    • 2015
  • The recent health care is growing rapidly want to receive offers users a variety of medical services, can be exploited easily exposed to a third party information on the role of the patient's hospital staff (doctors, nurses, pharmacists, etc.) depending on the patient clearly may have to be classified. In this paper, in order to ensure safe use by third parties in the health care environment, classify the attributes of patient information and patient privacy protection technique using hierarchical multi-property rights proposed to classify information according to the role of patient hospital officials The. Hospital patients and to prevent the proposed method is represented by a mathematical model, the information (the data consumer, time, sensor, an object, duty, and the delegation circumstances, and so on) the privacy attribute of a patient from being exploited illegally patient information from a third party the prevention of the leakage of the privacy information of the patient in synchronization with the attribute information between the parties.

A Thought on the Right to Be Forgotten Articulated in the European Commission's Proposal for General Data Protection Regulation (유럽연합(EU) 정보보호법(General Data Protection Regulation)개정안상의 잊혀질 권리와 현행 우리 법의 규율 체계 및 앞으로의 입법방향에 관한 소고)

  • Hah, Jung Chul
    • Journal of Digital Convergence
    • /
    • v.10 no.11
    • /
    • pp.87-92
    • /
    • 2012
  • In the early 2012, European Union proposed new legal framework, including the right to be forgotten, for the protection of personal data. The new Proposal articulates kind of sweeping new privacy right and there has been debates on its potential threat to free speech in the digital age. While the situation is similar in Korea, I want to introduce the right to be forgotten in the Proposal. Then, I will analyze current legal system in Korea regarding the new privacy right and suggest some guidelines in searching direction for the coming legislation with respect to the right to be forgotten. The right to be forgotten should not have been promulgated without considering fully its effect on the free speech, especially in the society where the voice toward direct democracy or movement toward participation of the citizen, mainly through cyber space or Social Network Services, has risen much higher in Korea. Especially, the new right seems not to cover the control of data subject on a third party where the third party expressing his opinion by posting himself other's personal data on his blog or others.