• Title/Summary/Keyword: Mobile privacy

Search Result 354, Processing Time 0.022 seconds

The Study on the User Behavioral Effects of Perception and Characteristics on the Common Essential Applications of Smartphones (스마트폰 공통 필수앱에 대한 이용자 인식과 특성이 이용 행동에 미치는 영향)

  • Youn, Bo Heum;Lee, Yoon Jae;Choi, Seong Jhin
    • Journal of Broadcast Engineering
    • /
    • v.27 no.3
    • /
    • pp.415-436
    • /
    • 2022
  • This study was conducted by the customer survey of 15 to 65 years old in order to identify the user behavioral effects of perception and characteristics on the common essential applications of smartphones with the United Theory of Acceptance and Use of Technology (UTAUT) and Value-based Acceptance Model (VAM). As a result, it was found that performance expectancy, enjoyment, facilitating conditions, effort expectancy, and social influences, excluding information privacy concern, have a positive effect on use behavior. The moderating effect by age was found that the youth was higher between perceived value and behavioral intention, and the middle-aged was higher between enjoyment and perceived value. This study has significance in providing implications for establishing strategies on designing and pre-loading apps, and increasing usage rate.

Contact Tracking Development Trend Using Bibliometric Analysis

  • Li, Chaoqun;Chen, Zhigang;Yu, Tongrui;Song, Xinxia
    • Journal of Information Processing Systems
    • /
    • v.18 no.3
    • /
    • pp.359-373
    • /
    • 2022
  • The new crown pneumonia (COVID-19) has become a global epidemic. The disease has spread to most countries and poses a challenge to the healthcare system. Contact tracing technology is an effective way for public health to deal with diseases. Many experts have studied traditional contact tracing and developed digital contact tracking. In order to better understand the field of contact tracking, it is necessary to analyze the development of contact tracking in the field of computer science by bibliometrics. The purpose of this research is to use literature statistics and topic analysis to characterize the research literature of contact tracking in the field of computer science, to gain an in-depth understanding of the literature development status of contact tracking and the trend of hot topics over the past decade. In order to achieve the aforementioned goals, we conducted a bibliometric study in this paper. The study uses data collected from the Scopus database. Which contains more than 10,000 articles, including more than 2,000 in the field of computer science. For popular trends, we use VOSviewer for visual analysis. The number of contact tracking documents published annually in the computer field is increasing. At present, there are 200 to 300 papers published in the field of computer science each year, and the number of uncited papers is relatively small. Through the visual analysis of the paper, we found that the hot topic of contact tracking has changed from the past "mathematical model," "biological model," and "algorithm" to the current "digital contact tracking," "privacy," and "mobile application" and other topics. Contact tracking is currently a hot research topic. By selecting the most cited papers, we can display high-quality literature in contact tracking and characterize the development trend of the entire field through topic analysis. This is useful for students and researchers new to field of contact tracking ai well as for presenting our results to other subjects. Especially when comprehensive research cannot be conducted due to time constraints or lack of precise research questions, our research analysis can provide value for it.

Vulnerability analysis for privacy security Android apps (개인정보보호 안드로이드 앱에 대한 취약점 분석)

  • Lee, Jung-Woo;Hong, Pyo-Gil;Kim, Dohyun
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2022.05a
    • /
    • pp.184-186
    • /
    • 2022
  • Recently, as interest in personal information protection has increased, various apps for personal information protection have emerged. These apps protect data in various formats, such as photos, videos, and documents containing personal information, using encryption and hide functions. These apps can have a positive effect on personal information protection, but in digital forensics, they act as anti-forensic because they can be difficult to analyze data during the investigation process. In this paper, finds out PIN, an access control function, through reverse engineering on Calculator - photo vault, one of the personal information protection apps, and files such as photos and documents to which encryption and hide were applied. In addition, the vulnerability to this app was analyzed by research decryption for database files where logs for encrypted and hide files are stored.

  • PDF

Multi-type object detection-based de-identification technique for personal information protection (개인정보보호를 위한 다중 유형 객체 탐지 기반 비식별화 기법)

  • Ye-Seul Kil;Hyo-Jin Lee;Jung-Hwa Ryu;Il-Gu Lee
    • Convergence Security Journal
    • /
    • v.22 no.5
    • /
    • pp.11-20
    • /
    • 2022
  • As the Internet and web technology develop around mobile devices, image data contains various types of sensitive information such as people, text, and space. In addition to these characteristics, as the use of SNS increases, the amount of damage caused by exposure and abuse of personal information online is increasing. However, research on de-identification technology based on multi-type object detection for personal information protection is insufficient. Therefore, this paper proposes an artificial intelligence model that detects and de-identifies multiple types of objects using existing single-type object detection models in parallel. Through cutmix, an image in which person and text objects exist together are created and composed of training data, and detection and de-identification of objects with different characteristics of person and text was performed. The proposed model achieves a precision of 0.724 and mAP@.5 of 0.745 when two objects are present at the same time. In addition, after de-identification, mAP@.5 was 0.224 for all objects, showing a decrease of 0.4 or more.

A Research on the Transference of Trust from Service Provider to MyData Banking Service (서비스 제공 기업에 대한 신뢰가 금융 마이데이터 서비스에 전이되는 현상에 관한 연구)

  • Ah Ro Kum;Jung Hoon Lee;Yun A Yeo
    • Journal of Information Technology Services
    • /
    • v.23 no.1
    • /
    • pp.97-121
    • /
    • 2024
  • As data usage grows in importance, ensuring individual control over personal information becomes critical. The emergence of the 'MyData' concept addresses this, particularly in financial services. Although the institutional and technological framework for financial MyData services is in place, there's a need to establish consumer understanding and perception of its usefulness and safety for successful activation. This study focuses on investigating the impact of trust on the intention to use the new mobile banking service, financial MyData. This study has three objectives. Firstly, to analyze whether trust in financial MyData services and trust in financial MyData service providers affect the intention to use financial MyData services. Secondly, to analyze the process of forming trust in financial MyData services based on the phenomenon of transferring trust in service providers to trust in services. Thirdly, to identify the process by which trust transfer occurs between service providers and financial MyData services. Ultimately, the goal of this study is to promote the intention to use financial MyData services based on the concept of trust and to activate these services. In summary, this study emphasizes the significance of trust in financial MyData services, exploring its impact on user intention and the transfer of trust from providers to services. By promoting consumer trust, the research aims to contribute to the activation of financial MyData services.

Ubiquitous Sensor Network Application Strategy of Security Companies (시큐리티업체의 유비쿼터스 센서네트워크(USN) 응용전략)

  • Jang, Ye-Jin;An, Byeong-Su;Ju, Choul-Hyun
    • Korean Security Journal
    • /
    • no.21
    • /
    • pp.75-94
    • /
    • 2009
  • Since mechanical security systems are mostly composed of electronic, information and communication devices, they have effects in the aspects of overall social environment and crime-oriented environment. Also, the importance is increasing for wireless recognition of RFID and tracing function, which will be usefully utilized in controlling the incomings and outgoings of people/vehicles or allowance, surveillance and control. This is resulting from the increase in the care for the elderly according to the overall social environment, namely, the aging society, and the number of women entering, as well as the increase in the number of heinous crimes. The purpose of this study is to examine the theoretical considerations on ubiquitous sensor network and present a direction for securities companies for their development by focusing on the technological and application areas. To present strategies of response to a new environment for security companies, First, a diversification strategy is needed for security companies. The survival of only high level of security companies in accordance with the principle of liberal market competition will bring forth qualitative growth and competitiveness of security market. Second, active promotion by security companies is needed. It is no exaggeration to say that we are living in the modern society in the sea of advertisements and propaganda. The promotional activities that emphasize the areas of activity or importance of security need to be actively carried out using the mass media to change the aware of people regarding security companies, and they need to come up with a plan to simultaneously carry out the promotional activities that emphasize the public aspect of security by well utilizing the recent trend that the activities of security agents are being used as a topic in movies or TV dramas. Third, technically complementary establishment of ubiquitous sensor network and electronic tag is needed. Since they are used in mobile electronic tag services such as U-Home and U-Health Care, they are used throughout our lives by forming electronic tag environment within safe ubiquitous sensor network based on the existing privacy guideline for the support of mobile electronic tag terminal commercialization, reduction in communication and information usage costs, continuous technical development and strengthening of privacy protection, and the system of cooperation of academic-industrial-research needs to be established among the academic world and private research institutes for these parts.

  • PDF

Image Separation of Talker from a Background by Differential Image and Contours Information (차영상 및 윤곽선에 의한 배경에서 화자분리)

  • Park Jong-Il;Park Young-Bum;Yoo Hyun-Joong
    • The KIPS Transactions:PartB
    • /
    • v.12B no.6 s.102
    • /
    • pp.671-678
    • /
    • 2005
  • In this paper, we suggest an algorithm that allows us to extract the important obbject from motion pictures and then replace the background with arbitrary images. The suggested technique can be used not only for protecting privacy and reducing the size of data to be transferred by removing the background of each frame, but also for replacing the background with user-selected image in video communication systems including mobile phones. Because of the relatively large size of image data, digital image processing usually takes much of the resources like memory and CPU. This can cause trouble especially for mobile video phones which typically have restricted resources. In our experiments, we could reduce the requirements of time and memory for processing the images by restricting the search area to the vicinity of major object's contour found in the previous frame based on the fact that the movement of major object is not wide or rapid in general. Specifically, we detected edges and used the edge image of the initial frame to locate candidate-object areas. Then, on the located areas, we computed the difference image between adjacent frames and used it to determine and trace the major object that might be moving. And then we computed the contour of the major object and used it to separate major object from the background. We could successfully separate major object from the background and replate the background with arbitrary images.

Design and Implementation of Open Service Platform for LBS (LBS를 위한 개방형 서비스 플랫폼의 설계 및 구현)

  • Min, Kyoung-Wook;Han, Eun-Young;Kim, Gwang-Soo
    • The KIPS Transactions:PartD
    • /
    • v.11D no.6
    • /
    • pp.1247-1258
    • /
    • 2004
  • The LBS(Location-Based Service), which is based on individual's mobility, is required increasingly as mobile telecommunication and various infrastructures have developed rapidly. The technologies for LBS are location determination technology, service platform technology, contents provider technology and moving object database technology generally. Among these, service platform must be interoperable with location gate-way server and provide common function of billing, authentification, protect location information, privacy control, location trigger and intelligent acquisition and so on. The TTA(Telecommunications Technology Association) published specification that defines a standard protocol for safe and simple interface between LBS client and LBS platform and the OpenLS(Open Location Service) in OGC (Open GIS Consortium) released implementation specifications for providing Location based core services. In this paper, we implemented service platform for LBS which is able to interoperable with location gateway server and contents provider and is caracterized as follows. First, it could require and response location information from different types of location gateway server with same interface. Second, it complies with the standard interfaces with OpenLS 4 contents providers for core LBS. Third, it could provide location of wired phone as well as wireless mobile terminal compling with the standard protocol. Last, it could provide trajectorH information based past location as well as current location, because it is able to interoperable with moving object DBMS. This paper contributes to the construction and practical use of LBS by providing the method of implementation of service platform for LBS.

A Study on the Effect of Location-based Service Users' Perceived Value and Risk on their Intention for Security Enhancement and Continuous Use: With an Emphasis on Perceived Benefits and Risks (위치기반서비스 사용자의 지각된 가치와 위험이 보안강화의도와 지속이용의도에 미치는 영향에 관한 연구: 지각된 혜택과 위험을 중심으로)

  • Park, Kyung Ah;Lee, Dae Yong;Koo, Chulmo
    • Asia pacific journal of information systems
    • /
    • v.24 no.3
    • /
    • pp.299-323
    • /
    • 2014
  • The reason location based service is drawing attention recently is because smart phones are being supplied increasingly. Smart phone, basically equipped with GPS that can identify location information, has the advantage that it can provide contents and services suitable for the user by identifying user location accurately. Offering such diverse advantages, location based services are increasingly used. In addition, for use of location based services, release of user's personal information and location data is essentially required. Regarding personal information and location data, in addition to IT companies, general companies also are conducting various profitable businesses and sales activities based on personal information, and in particular, personal location data, comprehending high value of use among personal information, are drawing high attentions. Increase in demand of personal information is raising the risk of personal information infringement, and infringements of personal location data also are increasing in frequency and degree. Therefore, infringements of personal information should be minimized through user's action and efforts to reinforce security along with Act on the Protection of Personal Information and Act on the Protection of Location Information. This study aimed to improve the importance of personal information privacy by empirically analyzing the effect of perceived values on the intention to strengthen location information security and continuously use location information for users who received location-based services (LBS) in mobile environments with the privacy calculation model of benefits and risks as a theoretical background. This study regarded situation-based provision, the benefit which users perceived while using location-based services, and the risk related to personal location information, a risk which occurs while using services, as independent variables and investigated the perceived values of the two variables. It also examined whether there were efforts to reduce risks related to personal location information according to the values of location- based services, which consumers perceived through the intention to strengthen security. Furthermore, it presented a study model which intended to investigate the effect of perceived values and intention of strengthening security on the continuous use of location-based services. A survey was conducted for three hundred ten users who had received location-based services via their smartphones to verify study hypotheses. Three hundred four questionnaires except problematic ones were collected. The hypotheses were verified, using a statistical method and a logical basis was presented. An empirical analysis was made on the data collected through the survey with SPSS 12.0 and SmartPLS 2.0 to verify respondents' demographic characteristics, an exploratory factor analysis and the appropriateness of the study model. As a result, it was shown that the users who had received location-based services were significantly influenced by the perceived value of their benefits, but risk related to location information did not have an effect on consumers' perceived values. Even though users perceived the risk related to personal location information while using services, it was viewed that users' perceived value had nothing to do with the use of location-based services. However, it was shown that users significantly responded to the intention of strengthening security in relation to location information risks and tended to use services continuously, strengthening positive efforts for security when their perceived values were high.

Development and Application of Dynamic Visualization Model for Spatial Big Data (공간 빅데이터를 위한 동태적 시각화 모형의 개발과 적용)

  • KIM, Dong-han;KIM, David
    • Journal of the Korean Association of Geographic Information Studies
    • /
    • v.21 no.1
    • /
    • pp.57-70
    • /
    • 2018
  • The advancement and the spread of information and communication technology (ICT) changes the way we live and act. Computer and ICT devices become smaller and invisible, and they are now virtually everywhere in the world. Many socio-economic activities are now subject to the use of computer and ICT devices although we don't really recognize it. Various socio economic activities supported by digital devices leave digital records, and a myriad of these records becomes what we call'big data'. Big data differ from conventional data we have collected and managed in that it holds more detailed information of socio-economic activities. Thus, they offer not only new insight for our society and but also new opportunity for policy analysis. However, the use of big data requires development of new methods and tools as well as consideration of institutional issues such as privacy. The goals of this research are twofold. Firstly, it aims to understand the opportunities and challenges of using big data for planning support. Big data indeed is a big sum of microscopic and dynamic data, and this challenges conventional analytical methods and planning support tools. Secondly, it seeks to suggest ways of visualizing such spatial big data for planning support. In this regards, this study attempts to develop a dynamic visualization model and conducts an experimental case study with mobile phone big data for the Jeju island. Since the off-the-shelf commercial software for the analysis of spatial big data is not yet commonly available, the roles of open source software and computer programming are important. This research presents a pilot model of dynamic visualization for spatial big data, as well as results from them. Then, the study concludes with future studies and implications to promote the use of spatial big data in urban planning field.