• 제목/요약/키워드: Personal Identification Information

검색결과 338건 처리시간 0.028초

The De-identification Technique Using Data Grouping in Relational Database (관계형 데이터베이스에서 데이터 그룹화를 이용한 익명화 처리 기법)

  • Park, Jun-Bum;Jin, Seung-Hun;Choi, Daeseon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • 제25권3호
    • /
    • pp.493-500
    • /
    • 2015
  • Personal information exposed in the Internet is increasing by the public data opening and sharing, vitalization of SNS(Social Network Service) and growth of information shared between users. Exposed personal information in the Internet can infringe upon targeted users using linkage attack or background attack. To prevent these attack De-identification models were appeared a few years ago. The 'k-anonymity' has been introduced in the first place, and the '${\ell}$-diversity' and 't-closeness' have been followed up as solutions, and diverse algorithms have been being suggested for performance improvement nowadays. However, industry or public sectors actually needs a whole solution as a system for the de-identification process rather than performance of the de-identification algorithm. This paper explains a way of de-identification techique for 'k-anonymity', '${\ell}$-diversity', and 't-closeness' algorithm using QI(Quasi-Identifier) grouping method in the relational database.

A Study of Factors Influencing on Watching Personal Game Webcasting (1인 게임방송 시청에 영향을 미치는 요인에 관한 연구)

  • Choe, Min-Ji;Park, Jeong-Min;Noh, Ghee-Young
    • Journal of Korea Game Society
    • /
    • 제16권6호
    • /
    • pp.39-48
    • /
    • 2016
  • This study intended to find out the influence of media usage motivations including Wishful Identification toward BJ, Entertainment, Passing Time, Information Seeking on watching personal game webcasting, based on Use & Gratification Theory. We conducted a survey of 395 audiences who had experienced in watching personal game webcasting and analyzed collected data using hierarchical regression analysis. First, we put and analyzed demographic factors of audiences in model 1. After that, we added media usage motivations in model 2. As a result of the study, gender and age in model 1 and age, Wishful Identification and Entertainment in model 2 are found to have a significant influence on watching personal game webcasting respectively.

The Mediating Effect and Moderating Effect of Pseudonymized Information Combination in the Relationship Between Regulation Factors of Personal Information and Big Data Utilization (개인정보 규제요인과 빅데이터 활용간의 관계에서 가명정보 결합의 매개효과 및 조절효과)

  • Kim, Sang-Gwang
    • Informatization Policy
    • /
    • 제27권3호
    • /
    • pp.82-111
    • /
    • 2020
  • Recently, increasing use of big data have caused regulation factors of personal information and combination of pseudonymized information to emerge as key policy measures. Therefore, this study empirically analyzed the mediating effect and moderating effect of pseudonymized information combination as the third variable in the relationship between regulation factors of personal information and big data utilization. The analysis showed the following results: First, among personal information regulation factors, definition regulation, consent regulation, supervisory authority regulation, and punishment intensity regulation showed a positive(+) relationship with the big data utilization, while among pseudonymized information combination factors, non-identification of combination, standardization of combined pseudonymized information, and responsibility of combination were also found to be in a positive relationship with the use of big data. Second, among the factors of pseudonymized information combination, non-identification of combination, standardization of combined pseudonymized information, and responsibility of combination showed a positive(+) mediating effect in relation to regulation factors of personal information and big data utilization. Third, in the relationship between personal information regulation factors and big data utilization, the moderating effect hypothesis that each combination institution type of pseudonymized information (free-type, intermediary-type, and designated-type) would play a different role as a moderator was rejected. Based on the results of the empirical research, policy alternatives of 'Good Regulation' were proposed, which would maintain balance between protection of personal information and big data utilization.

A study on Data Context-Based Risk Measurement Method for Pseudonymized Information Processing

  • Kim, Dong-Hyun
    • Journal of the Korea Society of Computer and Information
    • /
    • 제27권6호
    • /
    • pp.53-63
    • /
    • 2022
  • Recently, as digital transformation due to the COVID-19 pandemic accelerates, data to improve individual quality of life is being used in large quantities, and more reinforced non-identification processing procedures are required to utilize the most valuable personal information among data. In Korea, procedures for de-identification measures are presented through amendments to laws and guidelines, but there is no methodology to measure the level of de-identification in the field due to ambiguous processing standards and subjective risk measurement methods. This paper compares and analyzes the current status of policy and guidelines related to de-identification measures proposed at home and abroad to derive complementary points, suggests a data context-based risk measurement method centered on pseudonymized information processing, and verifies its validity. As a result of verification through Delphi survey and focus group interview (FGI), it was confirmed that the need for the proposed methodology and the validity of the indicators were high.

Realtime Individual Identification based on EOG Algorithm for Customized Sleep Care Service (맞춤형 수면케어 서비스를 위한 EOG 기반의 실시간 개인식별 알고리즘)

  • Hong, Ki Hyeon;Lee, Byung Mun;Park, Yang Jae
    • Journal of Convergence for Information Technology
    • /
    • 제9권12호
    • /
    • pp.8-16
    • /
    • 2019
  • Customized sleep care service needs to be provided differently for individuals since individual has different degree of sleep disorder. Because the brainwave data shows unique waveform characteristics for each person, this characteristic can be used to identify individuals. Personal identification provides an important role in enabling customized services. When you blink, you can obtain brain wave characteristics by measuring the area of the frontal lobe. Therefore, a real-time personal identification algorithm based on blinking EOG for customized sleep care service is proposed in this paper. For evaluation, 10 individuals were tested for personal identification accuracy. The results of the experiment confirmed that a maximum accuracy of 93% were taken. Algorithms can be developed by reflecting characteristics such as changes in the external environment in the future.

Problems of alternative means of Inhabitants Registration Identification Number on Internet and their Countermeasures (인터넷상의 주민등록번호 대체수단의 문제점들과 해결방법)

  • Ahn, Jeong Hee
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • 제4권3호
    • /
    • pp.45-53
    • /
    • 2008
  • As internet is wide spread, the number of internet service provider is increased. Internet service providers gather the personnel information with inhabitants registration identification number for the user management and the adult authentication. The personnel information is spreaded thorough the Internet by the system hacking, mismanagement and malicious resale. And the personnel information is used for spam email, phishing scams, etc. by malicious others. So the Ministry of Information and Communication Republic of Korea developments I-PIN system of the personnel identification. But, I-PIN has some problem the guideline for it and the method of 5 I-PIN services. In this paper, we analyze the problem about the guideline for I-PIN and the method of 5 I-PIN services. And we propose the countermeasure about the problem.

Smart Card User Identification Using Low-sized Face Feature Information (경량화된 얼굴 특징 정보를 이용한 스마트 카드 사용자 인증)

  • Park, Jian;Cho, Seongwon;Chung, Sun-Tae
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • 제24권4호
    • /
    • pp.349-354
    • /
    • 2014
  • PIN(Personal Identification Number)-based identification method has been used to identify the user of smart cards. However, this type of identification method has several problems. Firstly, PIN can be forgotten by owners of the card. Secondly, PIN can be used by others illegally. Furthermore, the possibility of hacking PIN can be high because this PIN type matching process is performed on terminal. Thus, in this paper we suggest a new identification method which is performed on smart card using face feature information. The proposed identification method uses low-sized face feature vectors and simple matching algorithm in order to get around the limits in computing capability and memory size of smart card.

User Identification System Based on Iris Information Using a Mouse (홍채 정보 기반 마우스를 활용한 사용자 인증 시스템)

  • Kim Sin-Hong;Rho Kwang-Hyun;Moon Soon-Hwan
    • The Journal of the Korea Contents Association
    • /
    • 제6권1호
    • /
    • pp.143-150
    • /
    • 2006
  • Recently, the fields such as internet banking and electronic commerce are more and more growing due to the growth of practical use of personal computer and the progress of communication technology, So importance of information security has been increased. In fact, traditional identification systems are inherently insecure because the personal identification information can be forgotten, stolen or lost. In this paper, we propose an identification system that can decide whether the user is registered based on iris information using a mouse. The proposed system is mounted a CCD camera and an illumination device on general type mouse. Then it decides whether the user is registered after the acquired image are processed and analyzed. This system gives a PC user the advantage of low-cost and convenience without necessity preparing high-cost equipment for biometrics when using a identification system.

  • PDF