• Title/Summary/Keyword: Awareness of Anonymity

Search Result 7, Processing Time 0.022 seconds

Exploratory Study on Perceptions and Relationships Among Dominants of Deviant Behavior in Cyber Space (사이버 일탈행위에 영향을 미치는 요인에 관한 탐색적 연구)

  • Kim, Mi-Ryang;Um, Myoung-Yong;Kim, Tae-Ung
    • The Journal of the Korea Contents Association
    • /
    • v.7 no.5
    • /
    • pp.27-35
    • /
    • 2007
  • The purpose of this research is to explore gender differences in perceptions and relationships among dominants affecting deviant behavior of adolescent in cyber space. This study developed a research model to analyze the factors explaining the intensity level of cyber deviant behavior, employing internet usage, awareness of anonymity, fear of cyber crime, and perceived seriousness as major research variables, and collected 478 survey responses from college students in Seoul.

The Relationship between Anonymity, Personal and Group Identities, and Discussion Quality in Online Discussion Communities (온라인 토론 커뮤니티에서의 익명성과 개인 및 집단 정체성, 토론의 질 간의 영향 연구)

  • Ae Ri Lee
    • Information Systems Review
    • /
    • v.21 no.3
    • /
    • pp.63-86
    • /
    • 2019
  • As the use of ICT became a part of daily social life, online community has emerged as a new type of social organization. Online community is a virtual space which enables many people to participate and contribute together to collective knowledge. Anonymity in online communities can encourage active social participation by people with various social constraints, however, anonymity can also lead to serious social pathology. As a result, it is necessary to study on what is fundamentally influencing human behavior and how people's behavior is controlled in anonymous online community. This study focuses on human identity and investigate the factors affecting human behavior control in anonymous online environment by examining various aspects of identity in online discussion community. This study empirically verifies the causal relationship between factors, including social & technical anonymities, various identity dimensions, intrinsic motivation to participate in the community, group norm conformity, and quality of discussion. It also analyzes the difference between groups by the level of anonymity, gender, age, community usage period, and discussion topic. Based on the findings, this research provides theoretical and practical implications for online community management strategies and a better culture on Internet discussion.

A License Administration Protocol Providing User Privacy in Digital Rights Management (디지털 저작권 관리에서 사용자의 프라이버시 보호를 제공하는 라이센스 관리 프로토콜)

  • 박복녕;김태윤
    • Journal of KIISE:Information Networking
    • /
    • v.30 no.2
    • /
    • pp.189-198
    • /
    • 2003
  • As people are damaged increasingly by personal information leakage, awareness about user privacy infringement is increasing. However, the existing DRM system does not support the protection of user's personal information because it is not necessary for the protection of copyrights. This paper is suggesting a license administration protocol which is more powerful to protect personal information in DRM. To protect the exposure of users identifier, this protocol uses temporary ID and token to guarantee anonymity and it uses a session key by ECDH to cryptography and Public-Key Cryptosystem for a message so that it can protect the exposure of personal information and user's privacy.

A Study On Malicious Mail Training Model (악성메일 훈련 모델에 관한 연구)

  • Kang, Young-Mook;Lee, Sang-Jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.2
    • /
    • pp.197-212
    • /
    • 2020
  • With the advent of virtual currency and electronic wallets creating a way to make financial gains based on anonymity, malicious code dissemination using malicious mail has continued to increase. In order to minimize the damage, the human factors, security awareness and the ability to respond, which are technical factors, should be improved evenly, which can be improved through malicious mail training. This study presented a model considering the performance of malicious mail training, such as practice. It was classified as a training for enhancing awareness of security for employees and detection and response to improve their ability to respond to malicious mail. A training system suitable for the purpose, the core functions of malware training, implementation and camouflage skills, and bypass techniques were described. Based on the above model, the training data conducted over three years were collected and the effectiveness of the training was studied through analysis of the results according to the number of training sessions, training themes and camouflage techniques.

Effects of Information Overload on Hostile Behaviors Online (온라인 상의 적대적 행동에 정보과부하가 미치는 영향)

  • Jin, Sanghyung;Rhee, Cheul;Jang, Youngbin
    • The Journal of Society for e-Business Studies
    • /
    • v.24 no.2
    • /
    • pp.179-197
    • /
    • 2019
  • Although there have been lots of studies about users' behaviors online, few have explored the mechanism of hostile behaviors. In this sense, this study aims at discovering what may elevate users' hostile behaviors. More specifically, we tried to find the relationship between flaming behavior and perception factors such as perceived risk, anonymity and expected emotional reaction. A survey was conducted to investigate the relationship of the above variables. As a result, all these variables show significant effects on flaming, and information overload are found to act as a moderator. We carefully conclude that flaming in online community can be reduced by preventing information overload each user perceives.

한국상사중재의 국제화와 경쟁력

  • Jo, Jeong-Gon
    • Journal of Arbitration Studies
    • /
    • v.7 no.1
    • /
    • pp.411-446
    • /
    • 1997
  • This paper reports the results of an experimental companson of the winning rates in arbitral awards between the Korean Commercial Arbitration Board and the Japan Commercial Arbitration Association, and analyzed the comparative advantages of KCAB in international arbitration compared with ICC. There are so many factors to analyze the level of internationalizaton and competitiveness in the arbitration. From the recent lituratures, arbitration experts reported and debated tremendous elements which is vital to have a competition in the international arbitration market. Arbitration factors such as fairness, reliability, awareness, extension, enforcement, inexpensiveness, closed and expedited proceedings, arbitrators, expert knowledge, service, arbitral award, etc. are very important to appraise the level of the globalization and competitiveness of arbitration organizations Using these factors, I appraised current level of the globalization and competitiveness of the Korean Commercial Arbitration Board, unique arbitration organization in South Korea. Next, we are able to compare the level of fairness using the concept of 'winning rate' All over the world, only several arbitration organizations published and opened their own arbitral awards even In anonymity. The Japanese arbitration institutions published it regularly as well as the Korean When compared with these two institutions' "winning rates". there is similiar tendency in favor of domestic corporations That is to say, the winning rates in domestic arbitration cases are greater than those in international arbitration cases. This embarks an implication of unequality, a part of unfairness, in these two countries' arbitration. Finally, an analysis was conducted between the statistics of KCAB and ICC, especially to the focus on the number of arbitration cases, arbitration tribunals, arbitration places, parties' nationalities. the types of contents, the amount of arbitration, arbitration costs. There are two meanings to keep in mind for advancement of Korean arbitration. One is to establish new strategy specializing in small amount arbitration less than US$200,000. The other is to rearrange the panel of arbitration, especially in increasing field of arbitration cases such as the disputes of license, technology transfer, patent, etc.

  • PDF

Service Management Scheme using Security Identification Information adopt to Big Data Environment (빅데이터 환경에 적합한 보안 인식 정보를 이용한 서비스 관리 기법)

  • Jeong, Yoon-Su;Han, Kun-Hee
    • Journal of Digital Convergence
    • /
    • v.11 no.12
    • /
    • pp.393-399
    • /
    • 2013
  • Recently, the quantity and type of data that is being processed in cloud environment are varied. A method for easy access in different network in a heterogeneous environment of big data stored in the device is required. This paper propose security management method for smoothly access to big data in other network environment conjunction with attribute information between big data and user. The proposed method has a high level of safety even if user-generated random bit signal is modulated. The proposed method is sufficient to deliver any number of bits the user to share information used to secure recognition. Also, the security awareness information bit sequence generated by a third party to avoid unnecessary exposure value by passing a hash chain of the user anonymity is to be guaranteed to receive.