• Title/Summary/Keyword: Online protection

Search Result 257, Processing Time 0.024 seconds

A study of the User Privacy Protection Behavior in Online Environment: Based on Protection Motivation Theory (인터넷상에서의 개인정보 보호행동에 관한 연구: 보호동기이론을 중심으로)

  • Park, Chanouk;Lee, Sang-Woo
    • Journal of Internet Computing and Services
    • /
    • v.15 no.2
    • /
    • pp.59-71
    • /
    • 2014
  • This study applied customer perspective to find out ways how to protect customers' privacy by themselves. It does so by examining the factors which affect customer privacy protection behaviors. Based on the Privacy Act, this study developed the construct of Privacy Rights awareness and finds the law's effect on privacy awareness and behavioral change. The study finds that there exists a significant difference in privacy protection behavior according to privacy rights awareness. Independent variables are as follows: Five variables (Perceived vulnerability, Perceived severity, Perceived response effectiveness, Perceived barriers, Privacy Rights awareness) were tested as critical variables influencing Behavioral Intention in PMT model. Privacy awareness had a moderating effect on the relationship between perceived severity and privacy protection behavior. This study would contribute on theoretical expansion of Protection Motivation Theory and also provide practical implications for effective ways to promote behavioral changes.

An Innovative Fast Relay Coordination Method to Bypass the Time Consumption of Optimization Algorithms in Relay Protection Coordination

  • Kheshti, Mostafa;Kang, Xiaoning;Jiao, Zaibin
    • Journal of Electrical Engineering and Technology
    • /
    • v.12 no.2
    • /
    • pp.612-620
    • /
    • 2017
  • Relay coordination in power system is a complex problem and so far, meta-heuristic algorithms and other methods as an alternative approach may not properly deal with large scale relay coordination due to their huge time consuming computation. In some cases the relay coordination could be unachievable. As the urgency for a proper approach is essential, in this paper an innovative and simple relay coordination method is introduced that is able to be applied on optimization algorithms for relay protection coordination. The objective function equation of operating time of relays are divided into two separate functions with less constraints. As the analytical results show here, this equivalent method has a remarkable speed with high accuracy to coordinate directional relays. Two distribution systems including directional overcurrent relays are studied in DigSILENT software and the collected data are examined in MATLAB. The relay settings of this method are compared with particle swarm optimization and genetic algorithm. The analytical results show the correctness of this mathematical and practical approach. This fast coordination method has a proper velocity of convergence with low iteration that can be used in large scale systems in practice and also to provide a feasible solution for protection coordination in smart grids as online or offline protection coordination.

Evaluation Criteria for Suitable Authentication Method for IoT Service Provider in Industry 4.0 Environment (4차 산업혁명 시대의 IoT 서비스 참여 주체에 대한 적합한 인증수단 선택을 위한 평가기준)

  • Jeong, Kwang Seob;Bae, Sukjoo;Kim, Hyoungtae
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.40 no.3
    • /
    • pp.116-122
    • /
    • 2017
  • Advances in information technology, communication and network technology are radically facilitating digital convergences as the integration of human, equipment, and space in the current industry 4.0 era. In industry 4.0 environment, the vast amount of information with networked computing technology can be simultaneously accessible even in limited physical space. Two main benefit points out of these information are the convenience and efficiency in their online transactions either buying things online or selling online. Even though there exist so many benefits that information technology can create for the people doing business over the internet there is a critical problem to be answered. In spite of many such advantages, however, online transactions have many dysfunctions such as personal information leakage, account hacking, and cybercrime. Without preparing the appropriate protection methods or schema people reluctantly use the transaction or would find some other partners with enhanced information security environment. In this paper we suggested a novel selection criteria that can be used to evaluate the reliable means of authentication against the expected risks under on-going IoT based environment. Our selection criteria consists of 4 steps. The first step is services and risk identification step. The second step is evaluation of risk occurrence step. The third step includes the evaluation of the extent of damage. And the final step is the assessment of the level of risk. With the help of the above 4 step-approach people can systematically identify potential risks hiding in the online transactions and effectively avoid by taking appropriate counter actions.

Arbitration Agreement through Standardized Terms and its Validity (약관을 통한 소비자중재합의와 그 유효성)

  • Lee, Byung-Jun
    • Journal of Arbitration Studies
    • /
    • v.24 no.1
    • /
    • pp.111-132
    • /
    • 2014
  • Recently, there have been discussions about the necessity of consumer arbitration such as ADR. The debate has progressed, because this area of arbitration has expanded into the press and medical fields. However, there is not an act for regulating consumer arbitration in South Korea. Thus, this issue has been deliberated at UNCITRAL Working Group III. The core issue of this deliberation is the validity of consumer arbitration. Especially if a pre-dispute arbitration agreement is contracted online, it progresses by using standardized terms; therefore it is possible that the Standardized Terms Regulating Act judges the relevant terms. This thesis consists of the following: First, concepts and categories of arbitration agreements. These include arbitration agreement, pre-dispute arbitration agreement, and arbitration agreement through standardized terms. Second, the validity of the above agreements will be discussed. There are three positions concerning their validity: affirmative as de lege ferenda, negative, and restrictively negative. Similar discussions concerning German law and cases would be helpful to specify and compare the issue. When a consumer arbitration agreement is contracted through standardized terms, it is necessary that the required formality of the agreement has been satisfied, before the effect of the agreement may be regulated by the German Civil Code.

  • PDF

A Study on Online Authenticate Themselves Techniques according to Resident Registration Number collect Prohibited (주민등록번호 수집금지에 따른 온라인 본인인증 기법 연구)

  • Son, Seung-wan;Kim, Kwang-seok;Lee, Gang-soo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2013.05a
    • /
    • pp.271-274
    • /
    • 2013
  • From February 18, 2013, an information and communications service provider, we will not be able to collect the resident registration number by paragraph 2 of Article 23 of the Act on the Promotion of the use and protection of information and information network. Rather than a revision in accordance with resident registration number, than these laws, it had been used in the alternative, such as OTP authentication phone authentication I-PIN authentication of certificates that are recognized as such authentication. In this paper, we propose a new online identity authentication technology was and Utilization of IMEI, the OTP to introduce online identity authentication technology replacing the resident registration number.

  • PDF

A Study on the Protection of Personal Privacy on Online Environment (온라인 환경에서 개인 프라이버시 보호에 관한 연구)

  • Nam, Soo-tai;Kim, Do-Goan;Jin, Chan-yong
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2014.05a
    • /
    • pp.183-186
    • /
    • 2014
  • Increasingly important user based service on the smart media era, and increasing awareness about the user experience. As the connected Internet information systems increases, one of the problems happening between users and information systems such as Internet shopping-malls, portal sites, and corporate web sites is related with the information privacy concerns issues. Thus, we have reviewed extensive previous studies on information privacy in local and foreign information systems, marketing and other fields. The purpose of this study is to provide future directions of studies on information privacy concerns by analyzing past and recent trends of the studies. By considering these realities, we were conducted review on the influencing factors of information privacy concerns on behavior intention based the online environment. Based on these findings, several theoretical and practical implications were suggested and discussed.

  • PDF

Postnatal social support experiences in primiparous women in Korea: a hermeneutic phenomenological study (한국의 초산모들의 산후 사회적 지원 경험: 해석학적 현상학 연구)

  • Eunjoo Lee;Kyongsuk Hong
    • Women's Health Nursing
    • /
    • v.30 no.2
    • /
    • pp.140-152
    • /
    • 2024
  • Purpose: Social support is essential for postpartum well-being, but little is known about the postpnatal social support preferred by primiparous women. This study aimed to comprehensively understand and describe the meaning of postnatal social support experience in primiparous women. Methods: The participants were seven primiparous women who were within 1 year after childbirth, recruited through purposive and snowball sampling from an online parenting community. The data were collected through in-depth interviews from November 14 to 28, 2022. Participants were interviewed face-to-face or via phone or online platform, according to their choice. Colaizzi's phenomenological qualitative research method was applied to analyze the meaning of the participants' experience. Results: Five theme clusters and fourteen themes were identified from the data. The five theme clusters are as follows: (1) Shortcomings of the childbirth and postpartum care system I learned through my experience; (2) Government policies focusing on childbirth and child-rearing rather than postpartum recovery; (3) Driving force of postpartum recovery: Shared childbirth process; (4) Childcare on my own; and (5) Conflicted between being a stay-at-home mom and a working mom under inadequate maternity protection policies. Conclusion: Despite postpartum support from the government that was perceived as inadequate, first-time mothers regained confidence and motivation for parenting with the help of family, peers, and social networks. First-time mothers need support from professionals and reliable online communities for postpartum recovery and parenting.

Analyses of Detection and Protection for Phishing on Web page (웹페이지의 피싱 차단 탐지 기술에 대한 분석)

  • Kim, Jung-Tae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2008.05a
    • /
    • pp.607-610
    • /
    • 2008
  • Phishing is a form of online identity theft that aims to steal sensitive information such as online banking passwords and credit card information from users. Phishing scams have been receiving extensive press coverage because such attacks have been escalating in number and sophistication. According to a study by Gartner, Many Internet users have identified the receipt of e-mail linked to phishing scams and about 2 million of them are estimated to have been tricked into giving away sensitive information. This paper presents a novel browser extension, AntiPhish, that aims to protect users against spoofed web site-based phishing attack.

  • PDF

A Design of Online Execution Class and Encryption-based Copyright Protection Hybrid (온라인 실행 코드와 암호화 기반 불법 복제 방지 시스템의 융합설계)

  • Kim, Hee-Sun;Kim, Sung-Ryul
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2012.06a
    • /
    • pp.113-115
    • /
    • 2012
  • 안드로이드 앱의 불법 복제를 방지하고자 기존에 온라인 실행(Online Execution Class: OEC) 또는 앱을 암호화된 상태로 배포하여 실행 시에 적법한 사용자만이 암호를 복호화하여 실행이 가능하도록 하는 방법들이 있다. 하지만 스마트폰이 저전력과 저사양인 점을 고려할 때, 위에 방법은 스마트폰의 보안을 보장할 수 있지만 성능 면에서 부담이 된다. 본 논문에서 OEC를 암호화하여 보안 수준을 높이고 개발자에게 보안 수준을 선택할 수 있게 하여 환경에 맞추어 안전을 유지할 수 있도록 시스템 설계를 제안한다.

The IRPA Young Generation Network: Activity Report from the Middle of 2018 to the Beginning of 2021

  • Andresz, Sylvain;Sakoda, Akihiro;Ha, Wi-Ho;Kabrt, Franz;Kono, Takahiko;Munoz, Marina Saez;Nusrat, Omar;Papp, Cinthia;Qiu, Rui;Bryant, Pete
    • Journal of Radiation Protection and Research
    • /
    • v.46 no.3
    • /
    • pp.143-150
    • /
    • 2021
  • Since its establishment in 2018, the Young Generation Network (YGN) has been dedicated, with support of the International Radiation Protection Association (IRPA), to a variety of activities to promote communication, collaboration and professional development of students and young professionals in the area of radiation protection and its allied fields. This article reports our recent activities from the middle of 2018 to the beginning of 2021, with highlights on some important events: "Joint JHPS-SRP-KARP Workshop of Young Generation Network" (December 2019 in Japan); contribution to "Nuclear Energy Agency Workshop on Optimization: Rethinking the Art of Reasonable" (January 2020 in Portugal); survey on the impact of coronavirus disease 2019 (COVID-19) on radiation protection among IRPA YGN members (March 2020); and contribution to IRPA15 (15th International Congress of the IRPA; January-February 2021, online). The discussion and insight obtained from each activity are also summarized. The IRPA YGN will aim to achieve its on-going activities and continue to follow the ways paved in the Strategic Agenda and despite the challenges raised by the COVID-19 pandemic. Namely, running an international survey (for example, on the usage of social media in radiation protection, and on the long-term consequences of the COVID-19 pandemic), engaging national YGNs, extending the network, finding new relationships with networks with an interest in the young generation and participation in (remote) events will be aspired for.