• Title/Summary/Keyword: Information disclosure

Search Result 640, Processing Time 0.025 seconds

Privacy Protection Method for Sensitive Weighted Edges in Social Networks

  • Gong, Weihua;Jin, Rong;Li, Yanjun;Yang, Lianghuai;Mei, Jianping
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.2
    • /
    • pp.540-557
    • /
    • 2021
  • Privacy vulnerability of social networks is one of the major concerns for social science research and business analysis. Most existing studies which mainly focus on un-weighted network graph, have designed various privacy models similar to k-anonymity to prevent data disclosure of vertex attributes or relationships, but they may be suffered from serious problems of huge information loss and significant modification of key properties of the network structure. Furthermore, there still lacks further considerations of privacy protection for important sensitive edges in weighted social networks. To address this problem, this paper proposes a privacy preserving method to protect sensitive weighted edges. Firstly, the sensitive edges are differentiated from weighted edges according to the edge betweenness centrality, which evaluates the importance of entities in social network. Then, the perturbation operations are used to preserve the privacy of weighted social network by adding some pseudo-edges or modifying specific edge weights, so that the bottleneck problem of information flow can be well resolved in key area of the social network. Experimental results show that the proposed method can not only effectively preserve the sensitive edges with lower computation cost, but also maintain the stability of the network structures. Further, the capability of defending against malicious attacks to important sensitive edges has been greatly improved.

Family Firms and Stock Price Crash Risk (가족기업과 주가급락위험)

  • Ryu, Hae-Young;Chae, Soo-Joon
    • Asia-Pacific Journal of Business
    • /
    • v.10 no.4
    • /
    • pp.77-86
    • /
    • 2019
  • The purpose of this study is to examine how the characteristics of family firms affect stock price crash risk. Prior studies argued that the opacity of information due to agency problem causes a plunge in stock prices. The governance characteristics of family firms can increase information opacity which leads to crash risk. Therefore, this study verifies whether family firms have a high possibility of stock price crash risk. We use a logistic regression model to test the relationship between family firms and stock price crash risk using listed firms listed on the Korean Stock Exchange during the fiscal years 2011 through 2017. The family firm is defined as the case where the controlling shareholder is the chief executive officer or the registered executive. If the controlling shareholder's share is less than 5%, it is not considered a family business. We found that family firms are more likely to experience a plunge in stock prices. This supports the hypothesis of this study that passive information disclosure behavior and information opacity of family firms increase stock price crash risk.

A Novel Smart Contract based Optimized Cloud Selection Framework for Efficient Multi-Party Computation

  • Haotian Chen;Abir EL Azzaoui;Sekione Reward Jeremiah;Jong Hyuk Park
    • Journal of Information Processing Systems
    • /
    • v.19 no.2
    • /
    • pp.240-257
    • /
    • 2023
  • The industrial Internet of Things (IIoT) is characterized by intelligent connection, real-time data processing, collaborative monitoring, and automatic information processing. The heterogeneous IIoT devices require a high data rate, high reliability, high coverage, and low delay, thus posing a significant challenge to information security. High-performance edge and cloud servers are a good backup solution for IIoT devices with limited capabilities. However, privacy leakage and network attack cases may occur in heterogeneous IIoT environments. Cloud-based multi-party computing is a reliable privacy-protecting technology that encourages multiparty participation in joint computing without privacy disclosure. However, the default cloud selection method does not meet the heterogeneous IIoT requirements. The server can be dishonest, significantly increasing the probability of multi-party computation failure or inefficiency. This paper proposes a blockchain and smart contract-based optimized cloud node selection framework. Different participants choose the best server that meets their performance demands, considering the communication delay. Smart contracts provide a progressive request mechanism to increase participation. The simulation results show that our framework improves overall multi-party computing efficiency by up to 44.73%.

A Study on the Analysis of Related Information through the Establishment of the National Core Technology Network: Focused on Display Technology (국가핵심기술 관계망 구축을 통한 연관정보 분석연구: 디스플레이 기술을 중심으로)

  • Pak, Se Hee;Yoon, Won Seok;Chang, Hang Bae
    • The Journal of Society for e-Business Studies
    • /
    • v.26 no.2
    • /
    • pp.123-141
    • /
    • 2021
  • As the dependence of technology on the economic structure increases, the importance of National Core Technology is increasing. However, due to the nature of the technology itself, it is difficult to determine the scope of the technology to be protected because the scope of the relation is abstract and information disclosure is limited due to the nature of the National Core Technology. To solve this problem, we propose the most appropriate literature type and method of analysis to distinguish important technologies related to National Core Technology. We conducted a pilot test to apply TF-IDF, and LDA topic modeling, two techniques of text mining analysis for big data analysis, to four types of literature (news, papers, reports, patents) collected with National Core Technology keywords in the field of Display industry. As a result, applying LDA theme modeling to patent data are highly relevant to National Core Technology. Important technologies related to the front and rear industries of displays, including OLEDs and microLEDs, were identified, and the results were visualized as networks to clarify the scope of important technologies associated with National Core Technology. Throughout this study, we have clarified the ambiguity of the scope of association of technologies and overcome the limited information disclosure characteristics of national core technologies.

An RFID Authentication Protocol based Symmetric Key using Hashed Tag ID (해쉬된 태그ID와 대칭키 기반의 RFID 인증프로토콜)

  • Park, Yong-Soo;Shin, Ju-Seok;Choi, Myung-Sil;Chung, Kyung-Ho;Ahn, Kwang-Seon
    • The KIPS Transactions:PartC
    • /
    • v.16C no.6
    • /
    • pp.669-680
    • /
    • 2009
  • By identifying the unique information of the objects using the RF, the RFID technique which will be able to manage the object is spot-lighted as the main technology in Ubiquitous era. On RFID systems, since the information of RFID may easily be unveiled in air, the secure and privacy problems always exist. In this paper, we propose mutual authentication protocol based on symmetric key. Proposed protocol has been able to minimize the tag's H/W resource by using symmetric key. And we use tag ID which is encrypted with hash function and a shared symmetric key by Challenge-Response pair of PUF(Physically Unclonable Function), thus there is no key disclosure problem in our protocol.

A Study on the Methods to Improve Records Management of the National University: Focused on Industry-University Cooperation Center of the Foothold National Universities (국립대학교 기록관리 현황 및 개선방안 연구 - 거점국립대학교 산학협력단을 중심으로 -)

  • Bae, Sung Jung;Kim, Tae Young;Han, Hye Won;Kim, Yong
    • Journal of the Korean BIBLIA Society for library and Information Science
    • /
    • v.26 no.4
    • /
    • pp.151-178
    • /
    • 2015
  • This study aims to identify the problems of the records management of the foothold national university related university-industry collaboration. For these purpose, the study conducted a literature survey. Moreover, this study compared and analyzed the content of university archives and university-industry collaboration web sites. In addition, we gained the materials from the national archives in Korea thorough a request of information disclosure. It was found that problems and improvements in terms of institutional and achievement management. Consequently, based on the analysis, cooperation framework between university archives and university-industry collaboration was developed. With the proposed system, the academic utilization of university-industry collaboration records can be facilitated.

Effective Countermeasures against Vulnerability Assessment for the Public Website of Financial Institution (금융기관 공개용 홈페이지 취약점 분석평가에 대한 효율적인 대처방안)

  • Park, Hyun-jin;Kim, In-seok
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.27 no.4
    • /
    • pp.885-895
    • /
    • 2017
  • Security issues arise due to various types of external intrusions as much as the rapidly changing IT environment. Attacks using vulnerabilities in web applications are increasing, and companies are trying to find the cause of the vulnerability, prevent external intrusion, and protect their systems and important information. Especially, according to the Supervision Regulation, each financial institution and electronic financial service provider shall perform vulnerability analysis evaluation for the website for disclosure once every six months and report the result to the Financial Services Commission. In this study, based on the Web vulnerability items defined in the Supervision Regulation, based on the inspection cases of actual financial institution, we analyze the most frequently occurring items and propose effective countermeasures against them and ways to prevent them from occurring in advance.

Business Information Visuals and User Learning : A Case of Companies Listed on the Stock Exchange of Thailand

  • Tanlamai, Uthai;Tangsiri, Kittisak
    • Journal of Information Technology Applications and Management
    • /
    • v.17 no.1
    • /
    • pp.11-33
    • /
    • 2010
  • The majority of graphs and visuals made publicly available by Thai listed companies tend to be disjointed and minimal. Only a little over fifty percent of the total 478 companies included graphic representations of their business operations and performance in the form of two or three dimensional spreadsheet based graphs in their annual reports, investor relations documents, websites and so on. For novice users, these visual representations are unlikely to give the big picture of what is the company's financial position and performance. Neither will they tell where the company stands in its own operating environment. The existing graphics and visuals, in very rare cases, can provide a sense of the company's future outlook. For boundary users such as audit committees whose duty is to promote good governance through transparency and disclosure, preliminary interview results show that there is some doubt as to whether the inclusion of big-picture visuals can really be of use to minority shareholders. These boundary users expect to see more insightful visuals beyond those produced by traditional spreadsheets which will enable them to learn to cope with the on-going turbulence in today's business environment more quickly. However, the debate is still going on as to where to draw the line between internal or external reporting visuals.

  • PDF

Target Range Estimation Method using Ghost Target in the Submarine Linear Array Sonar (잠수함 선배열소나의 허위표적 정보를 이용한 표적의 거리추정 기법)

  • Choi, Byungwoong;Kim, Kyubaek
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.18 no.5
    • /
    • pp.532-537
    • /
    • 2015
  • In this paper, we propose target range estimation method using ghost target in the submarine linear array sonar. Usually, when submarine detect target, they use passive sonar detection to avoid self-disclosure by active sonar transmission. But, originally, passive linear array sonar have limitation for target range estimation and additional processing is required to get target range information. For the case of near-field target, typical range estimation method is using multiple information by multipath effect in underwater environment. Acoustic signal generated from target are propagated along with numerous multipath in underwater environment. Since multipath target signals received in the linear array sonar have different conic angles each other, ghost target is appeared at the bearing different with real target bearing and sonar operator can find these information on the operation console. Under several assumption, this geometric properties can be analysed mathematically and we get the target range by derivation of this geometric equations using measured conic angles of real target and ghost target.

Design and Implementation of Physical Secure Card for Financial Security (금융보안을 위한 물리적 보안 카드의 설계 및 구현)

  • Seo, Hwa-Jeong;Kim, Ho-Won
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.19 no.4
    • /
    • pp.855-863
    • /
    • 2015
  • In this paper, we present a novel method to verify the financial site and prevent sensitive information disclosure with financial security card and smart phone. This method allows homepage access when user accesses to the valid site with right security card and smart phone. Furthermore, traditional OTP method cannot be secure against to Man in the middle attack, but out method presents the countermeasure of this. User can readily recognize the phishing and pharming sites and even avoid Man in the middle attack by malicious users.