• Title/Summary/Keyword: Online protection

Search Result 251, Processing Time 0.024 seconds

Technical Protection Measures for Personal Information in Each Processing Phase in the Korean Public Sector

  • Shim, Min-A;Baek, Seung-Jo;Park, Tae-Hyoung;Seol, Jeong-Seon;Lim, Jong-In
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.3 no.5
    • /
    • pp.548-574
    • /
    • 2009
  • Personal information (hereinafter referred to as "PI") infringement has recently emerged as a serious social problem in Korea. PI infringement in the public and private sector is common. There were 182,666 cases of PI in 2,624 public organizations during the last three years. Online infringement cases have increased. PI leakage causes moral and economic damage and is an impediment to public confidence in public organizations seeking to manage e-government and maintain open and aboveboard administration. Thus, it is an important matter. Most cases of PI leakage result from unsatisfactory management of security, errors in home page design and insufficient system protection management. Protection management, such as encryption or management of access logs should be reinforced urgently. However, it is difficult to comprehend the scope of practical technology management satisfied legislation and regulations. Substantial protective countermeasures, such as access control, certification, log management and encryption need to be established. It is hard to deal with the massive leakage of PI and its security management. Therefore, in this study, we analyzed the conditions for the technical protection measures during the processing phase of PI. In addition, we classified the standard control items of protective measures suited to public circumstances. Therefore, this study provides a standard and checklist by which staff in public organizations can protect PI via technical management activities appropriate to laws and ordinances. In addition, this can lead to more detailed and clearer instructions on how to carry out technical protection measures and to evaluate the current status.

Forgery Protection System and 2D Bar-code inserted Watermark (워터마크가 삽입된 이차원 바코드와 위.변조 방지 시스템)

  • Lee, Sang-Kyung;Ko, Kwang-Enu;Sim, Kwee-Bo
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.20 no.6
    • /
    • pp.825-830
    • /
    • 2010
  • Generally, the copy protection mark and 2D bar-code techniques are widely used for forgery protection in printed public documents. But, it is hard to discriminate truth from the copy documents by using exisiting methods, because of that existing 2D-barcode is separated from the copy protection mark and it can be only recognized by specified optical barcord scanner. Therefor, in this paper, we proposed the forgery protection tehchnique for discriminating truth from the copy document by using watermark inserted 2D-barcord, which can be accurately distinguished not only by naked eye, but also by scanner. The copy protection mark consists of deformed patterns that are caused by the lowpass filter characteristic of digital I/O device. From these, we verified the performance of the proposed techniques by applying the histogram analysis based on the original, copy, and scanned copy image of the printed documents. Also, we suggested 2D-barcord confirmation system which can be accessed through the online server by using certification key data which is detected by web-camera, cell phone camera.

A study on the protection of on-line digital contents industry -focused on on-line digital contents industry development act- (온라인디지털콘텐츠산업의 보호에 관한 연구 -온라인디지털콘텐츠산업발전법을 중십으로-)

  • Kang, Sung-Ju
    • The Journal of Information Technology
    • /
    • v.7 no.2
    • /
    • pp.55-67
    • /
    • 2004
  • The copyright law only protects the creative representation of works because it conditionally requires a creativity aspect of works. Due to the lack of protection regime in existing laws and the systems, the online digital contents industrial development act has been enacted to alternatively protect the digital contents providers based on a principle of preventive of illegal competition.

  • PDF

The Study on the Evaluation Factor for Security of Age Verification Information (연령 검증정보의 안정성을 위한 평가인자에 대한 연구)

  • Kim, Tae Kyung
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.10 no.4
    • /
    • pp.127-132
    • /
    • 2014
  • Some laws and regulations may require internet service providers to provide services based on the age of users. Age verification in the online environment should be used as a tool to provide service that is appropriate to child based on age. Using the minimum attribute information, processes on age verification provides the proper guidance to the internet services. However, there is a lack of a globally accepted trust framework for age verification process including evaluation factors for age verification information. In this paper the federation model of user attributes were described and evaluation factors for the age verification information were suggested. Also using the suggested evaluation factors, performance evaluation of federation model of user evaluation was performed. To meet the requirements of evaluation factors, framework of federation model should consider the unlinkability pseudonym support, eavesdropping protection and cloning protection.

The Effect of Individual Risk Appraisal and Ability to Control on Information Privacy Concerns in Online Social Network (온라인 소셜네트워크에서 개인의 위험성평가와 자기통제력이 정보보안우려감에 미치는 영향)

  • Moon, Yun Ji
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.18 no.5
    • /
    • pp.294-301
    • /
    • 2017
  • Recently, online social networks have become one of the most representative Internet services and are being used increasingly, which allows people to share information and interact with other people. On the other hand, as the use of OSN is increased, there has been an increased incidence where illegally accessed personal information is used wrongfully. Accordingly, privacy has become a key concern by the users. Regarding the construct of information privacy concerns (IPC), this study explored the antecedents of IPC at the individual personal level - risk appraisal and perceived behavioral control - based on Protection Motivation Theory. Hence, the current paper investigated the moderating effect of gender in the relationship between individual characteristics and IPC. The hypothesized research model was examined with 233 questionnaires of OSN users. The results showed that the positive effects of risk appraisal and the negative effects of perceived behavioral control on IPC are supported. In addition, the moderate effects of gender between risk appraisal and IPC is only supported.

Proposals for New Regulations Concerning Consumer ADR and ODR and their Implications in the EU (EU의 소비자 ADR 및 ODR에 관한 새로운 규정 논의와 국내에의 시사점)

  • Son, Hyun
    • Journal of Arbitration Studies
    • /
    • v.23 no.1
    • /
    • pp.107-131
    • /
    • 2013
  • Online-ADR (Alternative Dispute Resolution) has been receiving attention from the international community as a means of alternative dispute resolution for consumer disputes in both small and mass international e-commerce. The EU Parliament and the Council proposed the Online Dispute Resolution Regulation for Consumer Disputes (hereafter, "EU Consumer ODR Regulation") and the Directive on Alternative Dispute Resolution of Consumer Disputes (hereafter, "EU Consumer ADR Directive") as a legislative package, now scheduled to be adopted. Those efforts strengthen consumer protection by enhancing ODR in international e-commerce and improving of the functions of the e-commerce market. The EU Consumer ADR and ODR regulation package will operate in conjunction with the ODR platform as a single point across Europe, abandoning the ADR system of each member. Consumers and traders who need dispute resolution apply on the EU ODR platform linked website, and the applications are distributed to individual ADR institutions in accordance with the Rules and Procedure of ADR institutions in the respective country. Although there has been partial progress in Korea for ODR programs such as the establishment of the Online Administrative Trial and the procedures of individual ADR agencies operating through the website, existing norms do not fully support the system. At this point, we see many implications of the EU Consumer ADR and ODR regulation package on the direction chosen for domestic ADR and ODR policy and legislation. This study introduces the main features and content of the EU Consumer ADR Directive (draft) and ODR Regulation provisions, and describes the direction of domestic policy and legislation regarding Online-ADR.

  • PDF

Protected versus Unprotected Carotid Artery Stenting : Meta-Analysis of the Current Literature

  • Cho, Young Dae;Kim, Sung-Eun;Lim, Jeong Wook;Choi, Hyuk Jai;Cho, Yong Jun;Jeon, Jin Pyeong
    • Journal of Korean Neurosurgical Society
    • /
    • v.61 no.4
    • /
    • pp.458-466
    • /
    • 2018
  • Objective : To compare peri-operative any symptomatic stroke after carotid angioplasty and stenting (CAS), based on the application or absence of a cerebral protection device. Methods : A systematic literature review using PubMed, Embase, and the Cochrane Central was done across an online data base from January 1995 to October 2016. Procedures which were performed due to carotid dissection or aneurysm, procedures using covered stents or conducted in an emergency, were excluded. The primary endpoint was perioperative any symptomatic stroke within 30 days after the procedure. A fixed effect model was used in cases of heterogeneity less than 50%. Results : In the 25 articles included in this study, the number of stroke events was 326 (2.0%) in protected CAS and 142 (3.4%) in unprotected CAS. The use of cerebral protection device significantly decreased stroke after CAS (odds ratio [OR] 0.633, 95% confidence interval [CI] 0.479-0.837, p=0.001). In the publication bias analysis, Egger's regression test disclosed that the intercept was -0.317 (95% CI -1.015-0.382, p=0.358). Regarding symptomatic patients (four studies, 539 CAS procedures), the number of stroke was six (1.7%) in protected CAS and 11 (5.7%) in unprotected CAS. The protective effect against stroke events by cerebral protection device did not have a statistical significance (OR 0.455, 95% CI 0.151-1.366, p=0.160). Conclusion : The use of protection device significantly decreased stroke after CAS. However, its efficacy was not demonstrated in symptomatic patients. Routine use of protection device during CAS should be critically assessed before mandatory use.

Analysis of the Effectiveness of Application of Content Quota System for On-Demand Video Streaming Platform: Focusing on the European Union Response to Netflix (온디맨드 비디오 스트리밍 플랫폼에 대한 콘텐츠 쿼터제 적용의 실효성 분석: 넷플릭스에 대한 EU의 대응을 중심으로)

  • Kim, Hyun-jung
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.22 no.9
    • /
    • pp.1191-1198
    • /
    • 2018
  • This paper illustrates not only the effectiveness of applying content quota system for on-demand video streaming platform, but also the effect of OTT regulation on copyright protection and cultural industry protection in a single market, focusing on the community's response to Netflix's entry into the EU market. Additionally, this paper examines on-demand video streaming services, growth of Netflix. The EU policy on the on-demand video streaming service market consists of 'portability' in the digital single market and content quota for copyright protection. In this paper, I analyze the market protection and the aspect of improving competitiveness of online streaming service industry. The EU is trying to protect the cultural industry and copyright protection in the region by applying and regulating the OTT business in content quota system, which has been applied only to European broadcasting companies.

Implementation of Privacy Protection Policy Language and Module For Social Network Services (소셜 네트워크 서비스를 위한 프라이버시 보호 정책언어 및 프라이버시 보호 모듈 구현)

  • Kim, Ji-Hye;Lee, Hyung-Hyo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.21 no.1
    • /
    • pp.53-63
    • /
    • 2011
  • An SNS(Social Network Service) enables people to form a social network on online as in the real world. With the rising popularity of the service, side effects of SNSs were issued. Therefore we propose and implement a policy-based privacy protection module and access control policy language for ensuring the right of control of personal information and sharing data among SNSs. The policy language for protecting privacy is based on an attribute-based access control model which grants an access to personal information based on a user's attributes. The policy language and the privacy protection module proposed to give the right of control of personal information to the owner, they can be adopted to other application domains in which privacy protection is needed as well as secure sharing data among SNSs.

A Study on IAM-Based Personal Data Protection Techniques in BaaS (BaaS에서 IAM을 이용한 개인정보 보호 기법에 관한 연구)

  • Mi-Hui Kim;Myung-Joe Kang
    • Journal of IKEEE
    • /
    • v.27 no.4
    • /
    • pp.548-555
    • /
    • 2023
  • With the advancement of the internet, the use of personal information in online interactions has increased, underscoring the significance of data protection. Breaches of personal data due to unauthorized access can result in psychological and financial damage to individuals, and may even enable wide-ranging societal attacks aimed at those associated with the victims. In response to such threats, there is active research into security measures using blockchain to safeguard personal information. This study proposes a system that uses middleware and IAM (Identity and Access Management) services to protect personal information in a BaaS (Blockchain as a Service) environment where blockchain is provided via the Internet. The middleware operates on servers where IAM roles and policies are applied, authenticates users, and performs access control to allow only legitimate users to access blockchain data existing in the cloud. Additionally, to understand the impact of the proposed personal information protection method on the system, we measure the response time according to the time taken and the number of users under three assumed scenarios, and compare the proposed method and research related to personal information protection using blockchain in terms of security characteristics such as idea, type of blockchain, authentication, and confidentiality.