• Title/Summary/Keyword: Invasion of Privacy

Search Result 158, Processing Time 0.023 seconds

A study on Model of Personal Information Protection based on Artificial Intelligence Technology or Service (인공지능 기술/서비스 기반의 개인정보 보호 모델에 대한 연구)

  • Lee, Won-Tae;Kang, JangMook
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.16 no.4
    • /
    • pp.1-6
    • /
    • 2016
  • A.I. has being developed from the technology for Big data analysis to the technology like a human being. The sensing technology of IOT will make A.I. have the more delicate sense than human's five senses. The computer resource is going to be able to support A.I. by clouding networking technology wherever and whenever. Like this A.I. is getting developed as a golden boy of the latest technologies At the same time, many experts have the anxiety and bleak outlook about A.I. Most of dystopian images of the future come out when the contemplative view is lost or it is not possible to view the phenomena objectively. Or it is because of the absence of confidence and ability to convert from the visions of technology development to the subject visions of human will. This study is not about the mass dismissal, unemployment or the end of mankind by machinery according to the development of A.I. technology and service, but more about the occurrent issue like the personal information invasion in daily life. Also the ethical and institutional models are considered to develop A.I. industry protecting the personal information.

Improved u-Healthcare Service Authentication Protocol based on RFID Technology (개선된 RFID 기술을 이용한 u-헬스케어 서비스 인증 프로토콜)

  • Ahn, Hae-Soon;Yoon, Eun-Jun;Bu, Ki-Dong
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.50 no.10
    • /
    • pp.107-115
    • /
    • 2013
  • Recently, the RFID technology is combined with a u-healthcare services is an emerging trend in the field of medical services. u-healthcare service, as covering the field of personal health information beyond the level of simple health screening and treatment of life are closely related. Considering security, invasion of privacy, as well as life may be threatened even if your personal health information to be exposed or exploited illegally u-Healthcare services certification is essential. In 2012, Jeong proposed J-L patient authentication protocol that Initialization process, and patients using RFID technology separates the certification process. Jeong, such as the claim that the proposed protocol for reuse attacks, spoofing attacks, prevent information disclosure and traceability fire safety, but raises issues of security and operations efficiency. Therefore, in this paper, Jeong, such as the security of the proposed protocol and to prove the computational efficiency issues, and to enhance the safety and efficiency of RFID technology based on practical u-Healthcare services authentication protocol is proposed.

Understanding the Japanese History Problem on Trust in Technology Adoption of Workplace Surveillance Cameras: A Moderated Mediation Model in Korean and Chinese Context (한 · 중 데이터로 살펴본 직장 내 CCTV 도입 신뢰에 대한 일본 과거사의 점화효과 연구: 보안 취약성 지각의 조절된 매개 모형)

  • Sungwon Choi;Lifang Chang;Mijeong Kim;Jonghyun Park
    • Asia-Pacific Journal of Business
    • /
    • v.14 no.4
    • /
    • pp.49-65
    • /
    • 2023
  • Purpose - In the Korean and Chinese social landscape, it is vital to appreciate the significance of the Japanese history problem. The current study investigated whether the perception of the Japanese history problem affects decisions regarding technology adoption in organizations by comparing South Korea and China. Design/methodology/approach - The study involved 305 Korean and 379 Chinese participants who responded to scenarios and surveys regarding the adoption of workplace surveillance cameras supplied by a Japanese company. Findings - Using a moderated mediation model based on protection motivation theory (PMT), we found that past experiences of privacy invasion significantly reduced trust in the adoption of surveillance cameras at work. This relationship was mediated by respondents' perceptions of security vulnerability. The current study, however, did not confirm any significant moderating effect of the Japanese history problem priming on trust in the adoption of workplace surveillance cameras. Research implications - This suggests that the Japanese history problem may have a limited impact on organizational technology adoption decisions, different from the political consumerism behavior driven by public anti-Japanese affectivity. The current study reaffirms the validity and applicability of PMT and provides both theoretical insights and practical recommendations.

A Selection of Artificial Surveillance Zone through the Spatial Features Analysis of Crime Occurrence Place (범죄발생지점의 공간적 특성분석을 통한 인위적 감시지역의 선정)

  • Kim, Dong-Moon;Park, Jae-Kook
    • Journal of Korean Society for Geospatial Information Science
    • /
    • v.18 no.3
    • /
    • pp.83-90
    • /
    • 2010
  • In modern society, there has been an increase in needs to protect the life and property of the people, because the number of various crimes is on the increase due to the sudden and complicated changes of the urban environment. For the needs, security persons in the urban area are expanding the role and skill of police for more effective crime prevention and surveillance, although the number of policeman/woman is insufficient and their tasks are hard. Recently, a system to observe and prevent crime in effective has been introduced by using such an artificial surveillance device as CCTV to monitor focusing on one area for 24 hours. However, the system brings such problems as the insufficiency of systematic criteria to install surveillance device and the invasion of privacy. Therefore, in this study, artificial surveillance zones to monitor crimes are selected by applying spatial features between artificial surveillance devices including CCTV and crime occurrence place, and using GIS spatial analysis techniques. As a result of selecting, it's found that the number of CCTV is absolutely insufficient and spatial distribution is not fully considered in the existing location of installed CCTV.

Factors Influencing on User Satisfaction and Recommendation Intention in Location Based Service of Smartphone (스마트폰의 위치기반 서비스가 사용자 만족과 추천의도에 미치는 영향)

  • Nam, Soo-tai;Kim, Do-goan;Jin, Chan-yong
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2013.10a
    • /
    • pp.207-210
    • /
    • 2013
  • Recently, rapid innovation of Smartphone is changing the paradigm of our daily life. Smartphone users, opinion experts more than 99 percent of the economically active population is using, it has reached the saturation past the early stages of formation. Smartphone is equipped with a general purpose OS possible the implementation of high performance environment similar level as a personal computer. Also, it is a mobile communication terminal scalable which can be removed or installed various applications. Such extensibility, it is possible to use different applications through the Apps store. In addition, it is also possible various services which are location based service. However, these services also benefit many but it also has a disadvantage of invasion of privacy and disclosure of personal information. In this research, we aim to analyze factors influencing on perceived value and risk in location based service of Smartphone. In addition, we aim to analyze the causal relationship with perceived value and risk in satisfaction and recommendation intention. This study suggests practical and theoretical implications based on the results.

  • PDF

A Study on the Customized Security Policy for Effective Information Protection System (실효적인 정보보호관리 통제를 위한 맞춤형 보안정책 연구)

  • Son, Young-hwan;Kim, In-seok
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.27 no.3
    • /
    • pp.705-715
    • /
    • 2017
  • Today, the world is evolving into a huge community that can communicate with real-time information sharing and communication based on the rapid advancement of scientific technology and information. Behind this information, the adverse effects of information assets, such as hacking, viruses, information assets, and unauthorized disclosure of information assets, are continually increasing as a serious social problem. Each time an infringement of the invasion and personal information leaks occur, many regulatory policies have been announced, including stricter regulations for protecting the privacy of the government and establishing comprehensive countermeasures. Also, companies are making various efforts to increase awareness of the importance of information security. Nevertheless, information security accidents like the leaks of industrial secrets are continuously occurring and the frequency is not lessening. In this thesis, I proposed a customized security policy methodology that supports users with various business circumstances and service and also enables them to respond to the security threats more confidently and effectively through not a monotonous and technical but user-centered security policy.

A Study on Satisfaction and Dissatisfaction Coexistence of Social Network Service (소셜네트워크서비스의 만족과 불만족의 공존성에 관한 연구)

  • Lee, Jae-Beom;Lee, Jae-Beom;Park, Chanuk
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.15 no.5
    • /
    • pp.225-236
    • /
    • 2015
  • Social network services, it has attracted a lot of popularity that it us to allow the formation of past human network has been thought possible only in the main offline also on-line and mobile. However, by a variety of SNS with a recent other features it appeared a lot, the user, rather than stick to one SNS use only, if necessary, to join simultaneously two or more kinds of SNS status it is. By problem of invasion of privacy in recent SNS is a problem of, the user, in many cases that I have to worry about whether or not to leave the mainly use SNS. This study focused on these aspects and trying to figure out whether changing the SNS people to why use. Therefore, it is possible to obtain two factor theory is trying to figure out the psychology of users feel satisfaction SNS use and unsatisfactory at the same time as the significant result.

Application Plan of U.S Aviation Profiling for Prevention of Air Terrorism in Korea (항공테러 예방을 위한 미국 항공프로파일링 기법의 국내 활용방안)

  • Yang, Seung-Don;Yang, Young-Mo
    • Korean Security Journal
    • /
    • no.38
    • /
    • pp.33-56
    • /
    • 2014
  • This study is aim to make use of prevention of air terrorism and strengthen of air security in Korea. To achieve it. searching main feature in U.S aviation profiling. Aviation profiling in U.S used to Secure Flight, Screening Passengers by Observation Technique, Registered Travel Program. Through U.S Aviation Profiling, Prevention of air terrorism in Korea are as in the following. First, Through U.S Aviation Profiling, Information of terrorism constructed in advance and unification of constructed information. Second, Identifiying that institution exclusively for prevention of air terrorism. Third, Identifiying that human rights and privacy invasion to a minimun plan anout U.S aviation profiling. Finally, Identifiying that the spread of research development for prevention of air terrorism and strengthen of air security in Korea.

  • PDF

Distance-Based Keystroke Dynamics Smartphone Authentication and Threshold Formula Model (거리기반 키스트로크 다이나믹스 스마트폰 인증과 임계값 공식 모델)

  • Lee, Shincheol;Hwang, Jung Yeon;Lee, Hyungu;Kim, Dong In;Lee, Sung-Hoon;Shin, Ji Sun
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.2
    • /
    • pp.369-383
    • /
    • 2018
  • User authentication using PIN input or lock pattern is widely used as a user authentication method of smartphones. However, it is vulnerable to shoulder surfing attacks and because of low complexity of PIN and lock pattern, it has low security. To complement these problems, keystroke dynamics have been used as an authentication method for complex authentication and researches on this have been in progress. However, many studies have used imposter data in classifier training and validation. When keystroke dynamics authentications are actually applied in reality, it is realistic to use only legitimate user data for training, and using other people's data as imposter training data may result in problems such as leakage of authentication data and invasion of privacy. In response, in this paper, we experiment and obtain the optimal ratio of the thresholds for distance based classification. By suggesting the optimal ratio, we try to contribute to the real applications of keystroke authentications.

Verification of a Function-based Security Authentication Protocol for Implantable Medical Devices (함수 기반의 체내 삽입장치용 보안 인증프로토콜 검증)

  • Bae, WooSik;Han, KunHee
    • Journal of Digital Convergence
    • /
    • v.12 no.5
    • /
    • pp.249-254
    • /
    • 2014
  • Recent advancement of USN technology has lent itself to the evolving communication technology for implantable devices in the field of medical service. The wireless transmission section for communication between implantable medical devices and patients is a cause of concern over invasion of privacy, resulting from external attackers' hacking and thus leakage of private medical information. In addition, any attempt to manipulate patients' medical information could end up in serious medical issues. The present study proposes an authentication protocol safe against intruders' attacks when RFID/USN technology is applied to implantable medical devices. Being safe against spoofing, information exposure and eavesdropping attacks, the proposed protocol is based on hash-function operation and adopts session keys and random numbers to prevent re-encryption. This paper verifies the security of the proposed protocol using the formal verification tool, Casper/FDR.