• Title/Summary/Keyword: 사생활

Search Result 347, Processing Time 0.025 seconds

Implementation of Secure I-Mail System based on lava (타원곡선 알고리즘을 이용한 안전한 자바 메일 시스템의 설계 및 구현)

  • 이원구;조한진;이재광
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2001.10a
    • /
    • pp.700-702
    • /
    • 2001
  • As computers and networks become popular, distributing information on the Interment is common in our daily life. Also, the explosion of the Internet, of wireless digital communication and data exchange on Internet has rapidly changed the way we connect with other people. But secure mall is gamins popularity abroad and domestically because of their nature of prodding security. That is. it has been used a variety of fields such as general mail and e-mail for advertisement But, As the data transmitted on network can be easily opened or forged with simple operations. Most of existing e-mall system don't have any security on the transmitted information. Thus, security mail system need to provide security including message encryption, content integrity, message origin authentication, and non-repudiation. In this paper, we design implement secure mall system with non-repudiation service and encryption capability to provide services for certification of delivery and certification of content as well as the basic security services.

  • PDF

Smart City Security Management in Three Tier Smart City Management System (쓰리 티어 방식의 스마트시티 관리시스템에서의 보안 관리)

  • Hwang, Eui-Dong;Lee, Yong-Woo
    • Journal of the Korea Convergence Society
    • /
    • v.10 no.1
    • /
    • pp.25-33
    • /
    • 2019
  • The security of the data dealt by the smart city system is important because they have many privacy and public information. Therefore, it is necessary to study security in the smart city system. In this paper, we define the security factors for the smart city system composed of three tiers and describe the technologies for each. In addition, the design and implementation of the security layer in the Smart City middleware for the security management of the urban component in the Smart City Infrastructure and middleware, which is one of the most important issues in the Smart City system, is introduced.

Improvement Proposals for Biometric Information Protection Guideline based on the Analysis of Global Bio Information Privacy Issues (글로벌 바이오정보 프라이버시 논점 분석을 기반으로 한 바이오정보 보호 가이드라인 개선 방안)

  • Jung, Boo-geum;Kwon, Hun-yeong;Park, Hea-sook;Lim, Jong-in
    • Convergence Security Journal
    • /
    • v.18 no.3
    • /
    • pp.87-94
    • /
    • 2018
  • Privacy means the right not to interfere with the private life of an individual. Bio data is the most private personal information about the person itself, and according to advancement of technology, it is possible to analyze and judge individual as well as identify individual. The Personal Information Protection Act is based on global privacy principles, but the legislation for the protection of bio information has yet to be enacted. Therefore, it is time to protect biometric data as more sensitive information than general personal information. We will review the global privacy discussions for protecting biometric information and propose additional privacy principles and measures for utilization that should be defined in the biometric information protection guideline.

  • PDF

A Study on the Present & Future for the One man Media UCC (1인 미디어 UCC의 현재와 미래 - UCC의 전반적인 통계를 중심으로 -)

  • Seo, Jungwoo;Choe, Bokhee;Kim, Cheeyong
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2009.10a
    • /
    • pp.643-646
    • /
    • 2009
  • The reality is that forms and roles of media is changing as our society goes forward fast. There aren't any other noticeable media forms than one man media UCC(User Created Contents). Not only almost all of the house hold a camera at least one, but people can take a picture by using their mobile phone. Furthermore, people can produce a movie through taken pictures in this time. That is the beginning of UCC. It is possible to make use of private life, company, society, advertisement, shopping mall, and so on.

  • PDF

The Reliable Communication Method for Self-Sovereign Identity Ecosystems (자기주권 신원 생태계를 위한 신뢰할 수 있는 통신 방법)

  • Chio, Gyu Hyun;Kim, Geun-Hyung
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.11 no.3
    • /
    • pp.91-98
    • /
    • 2022
  • With the recent increase in interest in metaverse in which virtual and physical spaces are digitally fused, many activities in physical spaces are expected to take place in web-based virtual spaces. Therefore, there is a need for research on a self-sovereign identity system that can secure privacy and mutual trust in a DID(decentralized identifier)-based virtual space environment. We, in this paper, developed and validated a reliable communication method consisting of DIDComm messages, a procedure for generating distributed identifiers, asymmetric keys, and DID documents based on Hyperledger Indy and DIDComm open sources. The developed communication method can be applied to verify each other by exchanging additional information and verifiable credentials for trust among communication participants.

Detecting Fake Job Recruitment with a Machine Learning Approach (머신 러닝 접근 방식을 통한 가짜 채용 탐지)

  • Taghiyev Ilkin;Jae Heung Lee
    • Smart Media Journal
    • /
    • v.12 no.2
    • /
    • pp.36-41
    • /
    • 2023
  • With the advent of applicant tracking systems, online recruitment has become more popular, and recruitment fraud has become a serious problem. This research aims to develop a reliable model to detect recruitment fraud in online recruitment environments to reduce cost losses and enhance privacy. The main contribution of this paper is to provide an automated methodology that leverages insights gained from exploratory analysis of data to distinguish which job postings are fraudulent and which are legitimate. Using EMSCAD, a recruitment fraud dataset provided by Kaggle, we trained and evaluated various single-classifier and ensemble-classifier-based machine learning models, and found that the ensemble classifier, the random forest classifier, performed best with an accuracy of 98.67% and an F1 score of 0.81.

Implementation of the Electronic Prescription Security System Using by an If Card (IC 카드에 의한 원외 전자처방전 보안을 위한 시스템 구축)

  • Kang, Se-Na;Lee, Ki-Han
    • The KIPS Transactions:PartC
    • /
    • v.10C no.3
    • /
    • pp.281-286
    • /
    • 2003
  • Nowadays, a patient's private medical data which is exposed to the outside world has a severe effect on not only the patient's private life but also his/her social activities and environment. So, it is important to securely protect the patient's private medical data from the illegal manipulation. This paper studies the method to store the electronic prescription information in an IC card. For that, an access control for users, such as a doctor, a nurse, a medical institute member, a pharmacy, a pharmacist, or a patient, is proposed to access the data stored in an IC card. The certificate is issued using the Crypto API of a certificate management model supported by Windows 2000. The public/private key is created by the Cryptographic Service Provider program, and the electronic prescription is signed using the digital signature. The proposed system, therefore, can improve the quality of medical services by securing the safety and integrity of the electronic prescription, stored in an IC card.

A Study on the Issues on the Right of Portrait for Performing Arts Archives (공연예술기록의 초상권에 관한 연구)

  • Lee, Ho-Sin
    • Journal of Korean Library and Information Science Society
    • /
    • v.44 no.1
    • /
    • pp.333-355
    • /
    • 2013
  • This paper is to examine the issues of the right of portrait and to suppose practical guideline for performing arts archives. The right of portrait protects external looks of the human beings based on the constitutional human dignity, privacy of a secret and freedom. But sometimes these rights are limited in case of the right to know of the public shall have precedence to the interests of the privacy of individuals. It is hard to regard Performing Arts as a private life in two respects: first, Performing Arts is just one of societal expressions, two, performers are conducting a given role as a performing character. Producing database with the photos and videos under the reasonable agreement from the performers and making it available as a service can be disclaimers of the right of portrait. It is hard to be acknowledged, however, as disclaimers in case of being undermined sameness in the course of using the portraits of the performers.

The Analysis of Robot Education Unit in the Practical Arts Textbooks According to 2015 Revised Curriculum (2015 개정 실과교과서의 로봇교육 체제 분석)

  • Park, SunJu
    • Journal of The Korean Association of Information Education
    • /
    • v.24 no.1
    • /
    • pp.99-106
    • /
    • 2020
  • In this paper, we analyzed the units related to robot education in the Practical Arts textbooks according to the 2015 revised curriculum. As a result, all textbooks had a common system of introduction, development, and organization, and all of them showed a similar flow. Learning objectives were presented in all textbooks, but no affective goals were presented except cognitive and functional goals. The contents of robot learning suggest the meaning and type of robots, the structure and sensors of robots, and the activities of making robots, but the contents of robot ethics, the production and activities of various robot works, and the use of robots in the problem solving process are not presented. The assembly robot and the infrared sensor are used in common, and it consists of presenting robot production and control training materials in experience activities and arranging units through evaluation, and the A, C, and F textbooks also provide the unit auxiliary data. In the future, it will be necessary to include the contents of robot ethics education centered on the design/manufacturer and user-oriented robot ethics such as the recognition of the limits of robots, the principles of using robots correctly, safety education, personal information and privacy protection.

The Secret SMS using MVLS (MVLS를 이용한 시크릿 SMS)

  • Kim, Young-Jong
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.16 no.7
    • /
    • pp.4891-4896
    • /
    • 2015
  • In this paper planed Secret Single Message Service using MVLS(Multipurpose Visual Language System) for conceal contents to other persons that based on national institutions and private organizations report. This system is not persue to important contents like national or company's secret, but merely just decode to general and conceal SMS that using peoples at real life. This system is have an advantage that encoding to message like between lover's conversations or dislike contents to view the other persons, only can see own users that is to keep private life. Also, this system offers convenience to users that using general SMS service and only activate On-Off function for secret mode to user's needs.