• Title/Summary/Keyword: 익명성 인식

Search Result 31, Processing Time 0.027 seconds

Exploratory Study on Perceptions and Relationships Among Dominants of Deviant Behavior in Cyber Space (사이버 일탈행위에 영향을 미치는 요인에 관한 탐색적 연구)

  • Kim, Mi-Ryang;Um, Myoung-Yong;Kim, Tae-Ung
    • The Journal of the Korea Contents Association
    • /
    • v.7 no.5
    • /
    • pp.27-35
    • /
    • 2007
  • The purpose of this research is to explore gender differences in perceptions and relationships among dominants affecting deviant behavior of adolescent in cyber space. This study developed a research model to analyze the factors explaining the intensity level of cyber deviant behavior, employing internet usage, awareness of anonymity, fear of cyber crime, and perceived seriousness as major research variables, and collected 478 survey responses from college students in Seoul.

성인용품 자판기 특수, 지속될 수 있을 것인가

  • 한국자동판매기공업협회
    • Vending industry
    • /
    • v.2 no.6 s.7
    • /
    • pp.102-107
    • /
    • 2003
  • 성이 넘쳐 나는 시대, 성의식 개방과 더불어 이를 모티브로 한 사업은 그다지 경기영향을 받지 않는 특성을 가지고 있다. 최근 이러한 성관련산업이 크게 발전하고 있는 가운데 성인용품자판기 시장 역시 지난 한해 큰 시장성공을 일구어 냈다. 성인용품에 대한 인식확대와 수요확산과 더불어 익명성이 보장이 되는 유통수단이라는 제품성격이 모텔 등의 숙박업소의 니즈와 절묘하게 맞아 떨어진 점이 인기의 비결이다. 그러나 이러한 시장 인기가 지속력을 보이지 못한다는 데 문제가 있다. 최근 들어 성인용품 자판기 시장은 설치 로케이션의 제약성, 기대만치 높지 않은 운영수익성 등의 문제로 시장이 위축되어 가는 양상을 보이고 있다. 금호 테마기획에서는 성인용품자판기 시장의 현황을 살펴보고, 지속적인 유망시장으로 자리매김하기 위해서는 어떠한 선결과제들이 있는 지를 살펴봤다.

  • PDF

네트웍 기반 그룹의사결정지원시스템의 정보공유와 사용자관리를 위한 설계

  • 이동호
    • Proceedings of the Korea Association of Information Systems Conference
    • /
    • 1997.10a
    • /
    • pp.165-181
    • /
    • 1997
  • 경영환경과 조직의 분사화의 정도가 증가함에 따라서 의사결정지원시스템 (Decision Support System)에 있어서도 분산화 된 시스템의 요구가 증가되고 있다. 이러한 관점에서 본 연구는 분산화 된 환경인 네트웍을 기반으로 하는 의사결정지원시스템을 대상 으로 사용자간의 정보공유와 사용자의 참여의 효과적인 관리를 위한 기능적 설계를 제시한 다. 정보의 공유는 의사결정지원시스템과 그룹의사결정지원시스템을 차별화 하는 가장 큰 특징이다. 이러한 정보의 공유는 과업을 수행하는 그룹단위(WorkGroup)로 이루어지는 것이 바람직하며, 그룹의 구성원들간의 의사소통과 정보를 저장하는 자료저장소(Data Warehouse)와 서버(Server)의 구축, 보다 사용하기 쉬운 그래픽 사용자 인터페이스 (Graphic User Interface)를 포함하는 전자우편(Electronic Mail), 의사결정에 참여한 사용자 에게 의사결정결과에 대한 구체적인 피드백(Feedback)을 제공할 수 있는 시스템의 구축과 같은 방법을 통해서 보다 효과적인 관리가 이루어질 수 있게 된다. 사용자의 관리는 의사결 정지원시스템이 효과를 결정하는데 중요한 요소의 하나로써 보다 많은 참여는 그륩시너지효 과(Group Synergy Effect)를 가능하게 한다. 또한 완전한 익명성(Anonymity)의 확보는 기존 의 물리적인 제한을 가진 의사결정실 GDSS의 불완전한 익명성을 충분히 대체할 수 있을 것이다. 의사결정과정의 지원에 있어서도 사용자에게 회의의 기록을 자동적으로 제공하는 것과 병행하여 회의 중에 자신이 기록해야 할 사항을 추가적으로 기록할 수 있는 모듈 (Module)을 제공하는 것이 보다 효과적일 것이다. 물론 이러한 모듈은 앞서 언급한 정보의 공유의 관점에서 본다면 참여자 자신의 피드백에 도움을 주며, 또한 유사한 수준의 다른 참 여자에게 있어서 문제에 대한 인식을 다른 사용자와의 비교를 통하여 일정수준으로 동질화 시킬 수 있게 된다.

  • PDF

A License Administration Protocol Providing User Privacy in Digital Rights Management (디지털 저작권 관리에서 사용자의 프라이버시 보호를 제공하는 라이센스 관리 프로토콜)

  • 박복녕;김태윤
    • Journal of KIISE:Information Networking
    • /
    • v.30 no.2
    • /
    • pp.189-198
    • /
    • 2003
  • As people are damaged increasingly by personal information leakage, awareness about user privacy infringement is increasing. However, the existing DRM system does not support the protection of user's personal information because it is not necessary for the protection of copyrights. This paper is suggesting a license administration protocol which is more powerful to protect personal information in DRM. To protect the exposure of users identifier, this protocol uses temporary ID and token to guarantee anonymity and it uses a session key by ECDH to cryptography and Public-Key Cryptosystem for a message so that it can protect the exposure of personal information and user's privacy.

Contents Error and Security Analysis of 'Security Analysis and Improvements of a Biometrics-based User Authentication Scheme Using Smart Cards' ('스마트카드를 이용한 생체인식기반 사용자 인증스킴의 분석 및 개선'의 내용 오류와 안전성 분석)

  • Park, Mi-Og;Oh, Gi-Oug
    • Journal of the Korea Society of Computer and Information
    • /
    • v.19 no.10
    • /
    • pp.99-106
    • /
    • 2014
  • In this paper, we analyze weaknesses of the biometrics-based user authentication scheme proposed by An. The result of analysis An's authentication scheme by the login success scenario proposed in this paper, if the attacker successes to get user's random number, he/she can pass user authentication phase of the legal server. Also the biometrics guessing scenario proposed in this paper shows the legal user's the biometric information is revealed in lost smart card. Since An's authentication scheme submit user ID and biometrics in plain text to the server, it is very vulnerable to inner attack and it is not provide the user anonymity to the server as well as the one to the third by user ID in plain text. Besides An's authentication scheme is contextual error too, due to this, it has weakness and so on that it did not check the validity of the smart card holder.

Design of the Autogenous Context Service and Middleware for Ubiquitous Environments (유비쿼터스 환경을 위한 자생적 컨텍스트 서비스와 미들웨어의 설계)

  • Oh Hae-Seok;Oh Dong-Yeol
    • Journal of Korea Multimedia Society
    • /
    • v.8 no.8
    • /
    • pp.1088-1098
    • /
    • 2005
  • Context-Aware is a one of the important researches in ubiquitous computing for providing optimal service to users by acquiring user's intentions and environmental information. Diverse researches are focused on the users and its environment facts for Context-Aware base and introduce a sensing based middleware which engages sever/sensor that operates identifier information to provide services. Context-Aware service which is limited by users and environment facts has the problem of overlapping sensing, unnecessary searching and anonymity of users. Also Server-Centric Context-Aware system requires very high cost to manage and operate the services. On this paper, We introduce Autogenous Context service model to simplify the Context-Aware process and design the middleware which performs decentralize management for Context-Aware information of user's portable devices to minimize problems which is occurred during the management and operation of existing Context-Aware system.

  • PDF

Design of the Context Autogenesis Model and Service for Context-Aware in Ubiquitous Environments (유비쿼터스 환경에서의 컨텍스트-인식을 위한 자생적 컨텍스트 모델과 서비스의 설계)

  • Oh Dong yeol;Oh Hae seok
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.30 no.4B
    • /
    • pp.226-234
    • /
    • 2005
  • Context-Aware is the most important facts to reason a personalized and optimized service and to provide it to user. In the previous researches, user and surrounding environment were main facts of Context-Aware and middleware or center server has been proposed to support Context-Aware. In the daily space(for example, home, office, Car, etc), interactions between user and service can be a important facts of Context-Aware. In this paper, Context Autogenesis service model is introduced, simplified the Context-Aware process and designed the middleware which performs decentralize management for Context-Aware information of user's portable devices, so that problems occurred during the management and operation of existing Context-Aware system can be minimized and supporting user anonymity

An Analysis of Cyber Deviant Behaviors for the Practical Education of Information Ethics (실천적 정보통신윤리 교육을 위한 사이버 일탈행위 분석)

  • Yoo, Sang-Mi;Kim, Mi-Ryang
    • The Journal of Korean Association of Computer Education
    • /
    • v.13 no.5
    • /
    • pp.51-70
    • /
    • 2010
  • The purpose of this article is twofold; first, investigates the relations between the cyber deviant behaviors and the reasons it causes in details and second discuss the measure to prevent cyber deviant behaviors and its recurrence. The findings of the study are; First, the factors which influence more to the cyber deviant behaviors are subjective norm, social identity, and self-control in a row. Second, identified such factors, anonymity (+), consciousness on public order (+), learning experience on information norms (-), and social identity have influences on the subjective norm that both factors of internet addiction (+) and anonymity (+) have significant impacts on self-control in negative perspectives. In conclusion, to prevent cyber deviant behaviors will provide a lot of opportunities to develop self-reflections and critical thinking and the ethics of accountability, and ability of sympathy. This study suggests the so-called reflexive practice-oriented process of education on Information as a strategic teaching-learning procedure. The process framework consists of four stages including problem identification, risk analysis, self-reflexive, and practice & evaluation that have a spiral structure, repeats a life-cycle.

  • PDF

Internet based Communication and Relationship (인터넷 기반 커뮤니케이션과 인간관계)

  • Hoon Jang
    • Korean Journal of Culture and Social Issue
    • /
    • v.19 no.2
    • /
    • pp.259-283
    • /
    • 2013
  • It seems that Internet based communication has been settled down in everyday life. Internet based communication studies also have been done and they proposed that internet based communication modal differs from other communications modal. One of the major themes about internet based communication was the effect of internet based communication on relationships. Early studies suggested that internet has negative effect on life and relationships, although it has positive effect on economics and information distribution. Because there is relative anonymity, People and Researchers thought that people easily could be exposed to negative situations like pornography, instant relationship, negative reply and soon. However,Recently there have been on going un-solving arguments about effect of internet based communication.From the negative perspective, Internet based communication is negative to relationship, because internet based communication could displace face to fact communication and old off-line relationships. However, from the positive perspective, researchers focused on the motivation and purpose of internet users. In this paradigm, people could expand their life and relationships using internet because internet could remove the various restrictions for relationship. Moreover they also suggested that people could enlarge their relationships because they could easily disclose theirselves in anonymity. However, No conclusion has been drawn yet and there needs some organization of two standpoints. Accordingly, This study is integrating the two perspectives and proposing future direction of internet based communication and relationship.

  • PDF