• Title/Summary/Keyword: Exposure of personal information

Search Result 195, Processing Time 0.022 seconds

A Study on the Security Evaluations and Countermeasure of Exposure Notification Technology for Privacy-Preserving COVID-19 Contact Tracing (COVID-19 동선 추적에서의 프라이버시 보호를 위한 Exposure Notification 기술에 대한 보안성 평가 및 대응 방안 연구)

  • Lee, Hojun;Lee, Sangjin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.5
    • /
    • pp.929-943
    • /
    • 2020
  • Various methods are being presented to identify the movements of COVID-19 infected persons and to protect personal privacy at the same time. Among them, 'Exposure Notification' released by Apple and Google follows a decentralized approach using Bluetooth. However, the technology must always turn on Bluetooth for use, which can create a variety of security threats. Thus, in this paper, the security assessment of 'Exposure Notification' was performed by applying 'STRIDE' and 'LINDDUN' among the security threat modeling techniques to derive all possible threats. It also presented a new Dell that derived response measures with security assessment results and improved security based on them.

A Study on the Privacy Policy of Behavioral Advertising (행태 광고의 개인정보 조치사항에 관한 연구)

  • Kong, Hee-Kyung;Jun, Hyo-Jung;Yoon, Seokung
    • Journal of the Korea Convergence Society
    • /
    • v.9 no.3
    • /
    • pp.231-240
    • /
    • 2018
  • Recently, personal information processing are becoming more important in the behavioral advertising based on online and mobile platform. The behavioral advertising analyzes and utilizes individual's search & purchase history, hobbies, and tendency based on the personal behavior information collected using the automatic collection device. Therefore, it collects and stores other types of personal information which did't defined in Privacy Act and can analyze personal behavior. This characteristics may cause disclosure of personal information and exposure to intrusion. In this paper, we investigate and analyze the privacy policy of the advertising agencies, and discussded the measures to be taken in collecting, storing and using personal information suitable for behavior information.

A Coordinated Ciphertext Policy Attribute-based PHR Access Control with User Accountability

  • Lin, Guofeng;You, Lirong;Hu, Bing;Hong, Hanshu;Sun, Zhixin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.4
    • /
    • pp.1832-1853
    • /
    • 2018
  • The personal health record (PHR) system is a promising application that provides precise information and customized services for health care. To flexibly protect sensitive data, attribute-based encryption has been widely applied for PHR access control. However, escrow, exposure and abuse of private keys still hinder its practical application in the PHR system. In this paper, we propose a coordinated ciphertext policy attribute-based access control with user accountability (CCP-ABAC-UA) for the PHR system. Its coordinated mechanism not only effectively prevents the escrow and exposure of private keys but also accurately detects whether key abuse is taking place and identifies the traitor. We claim that CCP-ABAC-UA is a user-side lightweight scheme. Especially for PHR receivers, no bilinear pairing computation is needed to access health records, so the practical mobile PHR system can be realized. By introducing a novel provably secure construction, we prove that it is secure against selectively chosen plaintext attacks. The analysis indicates that CCP-ABAC-UA achieves better performance in terms of security and user-side computational efficiency for a PHR system.

The Secure Algorithm on the Sensitive data using Bloom filter and bucket method (버킷과 블룸필터를 혼합한 민감한 데이터 보안)

  • Yu, Choun-Young;Kim, Ji-Hong
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.16 no.5
    • /
    • pp.939-946
    • /
    • 2012
  • Recently privacy breaches has been an social issues. If we should encrypt the sensitive information in order to protect the database, the leakage of the personal sensitive data will be reduced for sure. In this paper, we analyzed the existing protection algorithms to protect the personal sensitive data and proposed the combined method using the bucket index method and the bloom filters. Bucket index method applied on tuples data encryption method is the most widely used algorithm. But this method has the disadvantages of the data exposure because of the bucket index value presented. So we proposed the combined data encryption method using bucket index and the bloom filter. Features of the proposed scheme are the improved search performance of data as well as the protection of the data exposure.

Information Literacy: Identification of Factors Affecting Undergraduate Students (대학생의 정보리터러시에 영향을 미치는 요인 분석)

  • Oh, Eui-Kyung;Chang, Hye-Rhan
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.39 no.4
    • /
    • pp.207-231
    • /
    • 2005
  • The study Is attempted to identify the factors affecting information literacy among undergraduate students. Through literature review, exposure to related education, use experiences in information resources, advice of the faculty, individual background are considered as variables affecting information literacy attitudes and performance. A questionnaire was devised and collected data from 628 students. Then 24 hypotheses were tested statistically. Descriptive analysis shows differences in information literacy, lower exposure to library instruction, and lack of the faculty advice. Results of the hypotheses testing shows computer and internet education, use experience of the various information resources, gender and major areas of study as factors affecting information literacy. Based on the results, recommendations are suggested to improve the information literacy.

Secure Storage and Management of Vaccination Records Allowing Restrictive Access upon Users' Consent (사용자 동의로 제한적 접근을 허용하는 백신 접종 기록의 안전한 보관 및 관리)

  • Park, Jun-Cheol
    • Smart Media Journal
    • /
    • v.10 no.2
    • /
    • pp.100-109
    • /
    • 2021
  • As the COVID-19 vaccination begins, it is necessary to safely store and manage the vaccination history for vaccinated people, as well as provide only the minimal information for the requested purpose, not in the form of all or nothing, to the institution requesting vaccination personal information. This paper proposes a scheme to safely store and manage the people's vaccination records in a non-forgeable blockchain, and to ensure that users provide only the minimal information necessary to the verifier from their vaccination personal information. A user authorizes the verifier to access the information he has consented with by entering the fingerprint on his smartphone, and in this process, no personal information or secrets can be exposed to an attacker. In addition, it is guaranteed that it is neither possible to impersonate the user nor to steal user personal information even in the case of theft or loss of the smartphone, or leakage of information from the vaccination history management institution. Using the scheme, users have no fear on external exposure of personal information and follow-up damage due to excessive information provision by giving out only the minimal information suited to the verifier.

Occupational Hazards in Firefighting: Systematic Literature Review

  • Maria F. Cuenca-Lozano;Cesar O. Ramirez-Garcia
    • Safety and Health at Work
    • /
    • v.14 no.1
    • /
    • pp.1-9
    • /
    • 2023
  • Background: Firefighting involves exposure of firefighters to risks related to this activity, serious injuries, and occupational diseases are recorded. There are other consequences such as thermal and emotional stress. This systematic review is proposed in order to analyze the risks and consequences faced by these workers and thus provide elements to improve safety management systems in institutions. Method: A descriptive observational study of systematic literature review on the risks and consequences of exposure to firefighters' activity was proposed, and the information was analyzed and described based on the available data and according to the variables determined. Results: The studies showed data on mechanical, physical, chemical, psychosocial risks, workers' perception and resilience, and epidemiological data. Information related to firefighters' activity on falls and slips, exposure to noise, and high concentrations of carbon monoxide is detailed. In addition, the relationship between burnout, cognitive, and physical fatigue as adverse effects on health and performance is mentioned. Conclusions: Among the preventive measures, the use of personal protective equipment is suggested, incorporation in prevention programs of information on exposure to risk factors, as well as the implementation of models that can predict the perception of workers, additionally, the generation of management systems with safety climate models for fire departments.

A Study on Features Analysis for Retrieving Image Containing Personal Information on the Web (인터넷상에서 개인식별정보가 포함된 영상 검색을 위한 특징정보 분석에 관한 연구)

  • Kim, Jong-Bae
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.48 no.3
    • /
    • pp.91-101
    • /
    • 2011
  • Internet is becoming increasingly popular due to the rapid development of information and communication technology. There has been a convenient social activities such as the mutual exchange of information, e-commerce, internet banking, etc. through cyberspace on a computer. However, by using the convenience of the internet, the personal IDs(identity card, driving license, passport, student ID, etc.) represented by the electronic media are exposed on the internet frequently. Therefore, this study propose a feature extraction method to analyze the characteristics of image files containing personal information and a image retrieval method to find the images using the extracted features. The proposed method selects the feature information from color, texture, and shape of the images, and the images as searched by similarity analysis between feature information. The result which it experiments from the image which it acquires from the web-based image DB and correct image retrieval rate is 89%, the computing time per frame is 0.17 seconds. The proposed method can be efficiently apply a system to search the image files containing personal information and to determine the criteria of exposure of personal information.

Consumer′s Perception and Buying Behavior through the Shopping Mall -Focused on the Customers of D Cyber Mall- (소비자의 인터넷 쇼핑몰 이용가치와 불안요소 인지 - D백화점 쇼핑몰 고객을 중심으로 -)

  • 홍성희;배미경;서동주
    • Journal of the Korean Home Economics Association
    • /
    • v.40 no.6
    • /
    • pp.69-83
    • /
    • 2002
  • This study examined the effects of demographic variables on buying behavior, and investigated buyers'perceived value and risk perception of the internet shopping mall. The sample was collected by a department store in Daegu, and it included 1,732 individuals using the Cyber Mall. Research methods used in this study were simple statistics, t-test and ANOVA. The buyers perceived values through the internet shopping mall were classified into five categories-price, time, convenience, intrinsic attributes, reliability and the risk perception also was classified such as the overall purchasing process, quality of products, exposure of the personal information, delivery system, refund and exchange. The major findings of this study were 1) most important categories affecting their buying behavior were the value of convenience and following values in order were time, price, reliability, intrinsic attributes. 2) the risk perception were overall purchasing behavior, quality of products, exposure of personal information, delivery, and refund & exchange in order. 3) age of buyers, buying experience on the internet shopping mall, and gender were the important factors affecting the buyers'perceived value and risk. 4) the study also, showed that according to the variety of products, buyers perceived the value and risk differently, for example, the price was the most important perceived value in case of food product. The implication of the study is to strategically suggest how to enhance the buyers'perceived value and diminish perceived risk of different products.

Use of Portable Global Positioning System (GPS) Devices in Exposure Analysis for Time-location Measurement

  • Lee, Ki-Young;Kim, Joung-Yoon;Putti, Kiran;Bennett, Deborah H.;Cassady, Diana;Hertz-Picciotto, Irva
    • Journal of Environmental Health Sciences
    • /
    • v.35 no.6
    • /
    • pp.461-467
    • /
    • 2009
  • Exposure analysis is a critical component of determining the health impact of pollutants. Global positioning systems (GPS) could be useful in developing time-location information for use in exposure analysis. This study compares four low cost GPS receivers with data logging capability (Garmin 60, Garmin Forerunner 201, GeoStats GeoLogger and Skytrx minitracker MT4100) in terms of accuracy, precision, and ease of use. The accuracy of the devices was determined at two known National Geodetic Survey points. The coordinates logged by the devices were compared when the devices were carried while walking and driving. The Garmin 60 showed better accuracy and precision than the GeoLogger when they were placed at the geodetic points. The Forerunner and Skytrx did not record when they were kept stationary. When the subject wore the devices while walking, the location of the devices differed by about 8 m on average between any two device combinations involving the four devices. The distance between the coordinates logged by the devices decreased when the devices were carried with their antennas facing the sky. All the devices showed similar routes when they were used in a car. All the devices except the Forerunner had satisfactory signal reception when they were worn and when they were carried in the car. The GeoLogger is less comfortable for the subject because of specific wearing requirements. This evaluation found that the Garmin 60 and the Skytrx may be useful in personal exposure analysis studies to record time-location data.