• Title/Summary/Keyword: Data Leaks

Search Result 128, Processing Time 0.028 seconds

Exploratory Study on the Media Coverage Trends of Personal Information Issues for Corporate Sustainable Management

  • Dabin Lee;Yeji Choi;Jaewook Byun;Hangbae Chang
    • Journal of Internet Computing and Services
    • /
    • v.25 no.4
    • /
    • pp.87-96
    • /
    • 2024
  • Information power has been a major criterion for wealth disparity in human history, and since the advent of the Fourth Industrial Revolution, referred to as the data economy era, personal information has also gained economic value. Additionally, companies collect and analyze customer information to use as a marketing tool, providing personalized services, making the collection of quality customer information crucial to a company's success. However, as the amount of data held by companies increases, crimes of stealing personal information for financial gain have surged, making corporate customer information a target for criminals. The leakage of personal information and its circumstances lead to a decline in corporate trust from the customer's perspective, threatening corporate sustainability with falling stock prices and decreased sales. Therefore, companies find themselves in a paradoxical situation where the utilization of personal information is increasing while the risk of personal information leakage is also growing. This study used the news big data analysis system, BIG KINDS, to analyze major keywords before and after media coverage on personal information leaks, examining domestic media coverage trends. Through this, we identified the impact of personal information leakage on corporate sustainability and analyzed the connection between personal information protection and sustainable corporate management. The results derived from this study are expected to serve as foundational data for companies seeking ways to enhance sustainable management while increasing the utilization of personal information.

Threatening privacy by identifying appliances and the pattern of the usage from electric signal data (스마트 기기 환경에서 전력 신호 분석을 통한 프라이버시 침해 위협)

  • Cho, Jae yeon;Yoon, Ji Won
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.5
    • /
    • pp.1001-1009
    • /
    • 2015
  • In Smart Grid, smart meter sends our electric signal data to the main server of power supply in real-time. However, the more efficient the management of power loads become, the more likely the user's pattern of usage leaks. This paper points out the threat of privacy and the need of security measures in smart device environment by showing that it's possible to identify the appliances and the specific usage patterns of users from the smart meter's data. Learning algorithm PCA is used to reduce the dimension of the feature space and k-NN Classifier to infer appliances and states of them. Accuracy is validated with 10-fold Cross Validation.

A Study on the Development of Safety Standard through the Risk Assessment for Fuel Cell System Applied to UAV (무인 비행체용 연료전지 시스템 위험요소 분석을 통한 안전기준 개발 연구)

  • TAEHEON KIM;JAEUK CHOI;INROK CHO;JUNGWOON LEE
    • Transactions of the Korean hydrogen and new energy society
    • /
    • v.35 no.1
    • /
    • pp.56-65
    • /
    • 2024
  • Fuel cell powered unmanned aerial vehicles (UAV) are globally being developed for various application according to hydrogen roadmap. However, safety standards for hydrogen fuel cell for UAV have not been established. Therefore, in this study, we derive safety data based on risk assessment to develop safety standards for fuel cells for UAV. We use fault tree analysis method which is broadly used in hydrogen facilities as a risk assessment tool. We set hydrogen leaks and fires as top events and derived the basic events. Safety data for the basic events were derived by quoting overseas safety standards related to fuel cells. The safety data will be used for developing fuel cell inspection standard according to Act on Hydrogen Economy Promotion and Hydrogen Safety Management.

A Study on Disposal Method of Non-Point Pollutant of the Rolling Stock Depot (철도 차량기지내 비점오염물 처리방안 연구)

  • Jung, Jae-Hyoung;Shin, Min-Ho;Cho, Kook-Hwan
    • Proceedings of the KSR Conference
    • /
    • 2011.10a
    • /
    • pp.2910-2916
    • /
    • 2011
  • Environmental conservation is becoming the major conversation topic in the 21st century, the era of environment. In the Law for the Preservation of Water Quality, article 53 states "A business unit which is doing business causing pollution caused by non-point pollutant or builds waste water discharge facilities, should report the installation of the non-point pollutant and install the required pollution control facilities". Environmental pollution caused by oil leaks during operation or maintenance has been found in the railway sector. Especially, rolling stock depot is most likely to be affected by environmental pollution. Therefore, in this paper We have investigated non-point pollutant in the rolling stock depot area and have studied adequate disposal method to minimize the effect of the non-point pollutant, hoping to supply the preliminary data for building an environment-friendly rolling stock depot.

  • PDF

Semantics-aware Obfuscation for Location Privacy

  • Damiani, Maria Luisa;Silvestri, Claudio;Bertino, Elisa
    • Journal of Computing Science and Engineering
    • /
    • v.2 no.2
    • /
    • pp.137-160
    • /
    • 2008
  • The increasing availability of personal location data pushed by the widespread use of location-sensing technologies raises concerns with respect to the safeguard of location privacy. To address such concerns location privacy-preserving techniques are being investigated. An important area of application for such techniques is represented by Location Based Services (LBS). Many privacy-preserving techniques designed for LBS are based on the idea of forwarding to the LBS provider obfuscated locations, namely position information at low spatial resolution, in place of actual users' positions. Obfuscation techniques are generally based on the use of geometric methods. In this paper, we argue that such methods can lead to the disclosure of sensitive location information and thus to privacy leaks. We thus propose a novel method which takes into account the semantic context in which users are located. The original contribution of the paper is the introduction of a comprehensive framework consisting of a semantic-aware obfuscation model, a novel algorithm for the generation of obfuscated spaces for which we report results from an experimental evaluation and reference architecture.

A Study on Implementation Method of ECM-based Electronic Document Leakage Prevention System through Security Area Location Information Management (보안구역 위치정보 관리를 통한 ECM기반 전자문서유출방지 시스템 구현방안 연구)

  • Yoo, Gab-Sang;Cho, Seung-Yeon;Hwang, In-Tae
    • Journal of Information Technology Services
    • /
    • v.19 no.2
    • /
    • pp.83-92
    • /
    • 2020
  • The current technology drain at small and medium-sized enterprises in Korea is very serious. According to the National Intelligence Service's survey data, 69 percent of technology leaks are made through employees of small and medium-sized enterprises. A document security system was introduced to compensate for the problem. However, small and medium-sized enterprises are not doing well due to their poor environment. Therefore, it proposes a document security system suitable for small businesses by developing a location information machine learning system that automatically creates a document security Green Zone through learning, and an ECM-based electronic document leakage prevention system that manages generated Green Zone information by reflecting it into the document authority system. And step by step, propose a universal solution through cloud services..

Urinary Incontinence: Prevalence and Knowledge Among Community-Dwelling Korean Women Aged 55 and Over

  • Kim, Jin-Sun;Lee, Eun-Hyun;Park, Hyung-Cheol
    • Journal of Korean Academy of Nursing
    • /
    • v.34 no.4
    • /
    • pp.609-616
    • /
    • 2004
  • Purpose. The prevalence of urinary incontinence (UI) among community-dwelling older women in Korea is not well known. This study examined the prevalence of UI and UI-related knowledge among community-dwelling Korean women aged 55 and over. Method. A cross-sectional descriptive-correlational study was conducted. Data were collected from 276 women aged 55 and over in a metropolitan city using a structured questionnaire. Result. Of 276 respondents, 28.3% (n=78) reported experiencing UI. More than 50% of respondents incorrectly agreed with the statement that UI is the result of normal aging, with only 20.9% realizing that there is an exercise that can control urine leaks when one coughs, sneezes, or laughs. Older women who had sought treatment had higher mean score for UI-related knowledge. Conclusion. This study revealed substantial misconception about UI among community dwelling older women, demonstrating that comprehensive educational programs need to be developed to increase knowledge of UI.

Study on Dielectric Characteristics of the Environmental-friendly Pole Transformer using Vegetable Oil (식물성절연유를 사용한 친환경 주상변압기의 절연 특성 연구)

  • Kwag, Dong-Soon;Choi, Jae-Hyeong;Min, Chi-Hyun;Park, Tae-Soo;Kim, Sang-Hyun
    • Proceedings of the KIEE Conference
    • /
    • 2007.07a
    • /
    • pp.921-922
    • /
    • 2007
  • In recent years, environmental concerns have been raised on the use of poorly biodegradable fluids in electrical apparatus in regions where spills from leaks and equipment failure could contaminate the surroundings. For development of the environmental-friendly pole transformer using vegetable oil, we discussed the insulation construction of the transformer and the dielectric characteristics of the Nomex insulation paper in vegetable oil. Based on the experimental data, the insulation of the transformer is designed.

  • PDF

A Study on Retraining for Career Development of Information Security Workforce (정보보호 업무인력의 경력개발을 위한 재교육 방향)

  • Jun, Hyo-Jung;Kim, Tae-Sung
    • Journal of Information Technology Applications and Management
    • /
    • v.25 no.4
    • /
    • pp.67-77
    • /
    • 2018
  • With the types and targets of cyber attacks expanding and with personal information leaks increasing, the quantitative demand for information security specialists has increased. The base for training the workforce has expanded accordingly, but joblessness and job-seeking still coexist. To resolve the gap between labor demand and supply, education and training systems that can supply demand quickly are needed. It takes a considerable amount of time for information security education and new manpower supply through universities and graduate schools to be reflected in the market. However, if information security retraining is carried out in terms of career development of information security and related workforce, the problem of lack of experts could be solved in a relatively short period. This paper investigates and analyzes the information security work of the information security workforce, the degree of skill level, the need for retraining, and the workplace migration experience; it also discusses the direction of career development retraining.

Concept of the Cloud Type Virtual Policy Based Network Management Scheme for the Whole Internet

  • Kazuya, Odagiri;Shogo, Shimizu;Naohiro, Ishii
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.1
    • /
    • pp.71-77
    • /
    • 2023
  • In the current Internet system, there are many problems using anonymity of the network communication such as personal information leaks and crimes using the Internet system. This is why TCP/IP protocol used in Internet system does not have the user identification information on the communication data, and it is difficult to supervise the user performing the above acts immediately. As a study for solving the above problem, there is the study of Policy Based Network Management (PBNM). This is the scheme for managing a whole Local Area Network (LAN) through communication control for every user. In this PBNM, two types of schemes exist. As one scheme, we have studied theoretically about the Destination Addressing Control System (DACS) Scheme with affinity with existing internet. By applying this DACS Scheme to Internet system management, we will realize the policy-based Internet system management. In this paper, to realize it, concept of the Internet PBNM Scheme is proposed as the final step.