• Title/Summary/Keyword: Personal Network

Search Result 1,447, Processing Time 0.026 seconds

A study on frame transition of personal information leakage, 1984-2014: social network analysis approach (사회연결망 분석을 활용한 개인정보 유출 프레임 변화에 관한 연구: 1984년-2014년을 중심으로)

  • Jeong, Seo Hwa;Cho, Hyun Suk
    • Journal of Digital Convergence
    • /
    • v.12 no.5
    • /
    • pp.57-68
    • /
    • 2014
  • This article analyses frame transition of personal information leakage in Korea from 1984 to 2014. In order to investigate the transition, we have collected newspaper article's titles. This study adopts classification, text network analysis(by co-occurrence symmetric matrix), and clustering techniques as part of social network analysis. Moreover, we apply definition of centrality in network in order to reveal the main frame formed in each of four periods. As a result, accessibility of personal information is extended from public sector to private sector. The boundary of personal information leakage is expanded to overseas. Therefore it is urgent to institutionalize the protection of personal information from a global perspective.

A Monitoring Tool for Personal Information Leakage Prevention in Network Packets (네트워크 패킷 내 개인정보 유출 방지를 위한 모니터링 도구 개발)

  • Ju, Tea Kyung;Hong, Chong Min;Shin, Weon
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.2 no.11
    • /
    • pp.489-494
    • /
    • 2013
  • Personal information has been transmitted in a variety of services of Internet environment, but individual users do not know what information is sent. In this paper, we aim to develop a monitoring tool that continuously monitors personal sensitive information in network packets and informs the user whether or not to leak. So we implement a monitoring tool of personal information and analyze the experiment results. In addition, we introduce a prevention of confidential information in company and a leakage prevention of medical information, for applications that take direct advantage. The results of this study, by contributing to prevent leakage of personal information, can help reduce cyber threats variously targeting personal information of users.

The Effects of Site Quality, Personal Characteristic, and Relationship Benefit on the Continuance Intention to Use Social Network Services through Relationship Quality (사이트 품질, 개인적 특성 및 관계 혜택이 관계 품질을 매개로 소셜네트워크서비스 지속사용의도에 미치는 영향)

  • Huh, Hyun-Jung;Park, Kyung-Bae;Noh, Mi-Jin
    • The Journal of Information Systems
    • /
    • v.24 no.1
    • /
    • pp.67-94
    • /
    • 2015
  • Recently, the popularity of Social Network Service (SNS) along with the spread of smart phone, personal computer and tablet PC helps personal network to construct new forms of services in cyberspace. As such, SNS plays a significant role in constructing diverse online networks and there is a growing interest on SNS at societal level. In this vein, the purpose of the research was to find the factors affecting the continuance intention to use social network services. The major findings are summarized as follows. First, "System Quality", "Contents Quality", "Personal Innovativeness", "Self-Efficiency", "Honor Benefit" has significant effects on "Relationship Quality". Yet, "Economic Benefit" is not statistically significant on "Relationship Quality". Second, "Relationship Quality" has a significant effect on "Continuous Usage Intention". Last, our research discovered the relationship between exogenous variables which would serve as valuable inputs in the development of strategic guideline and plan for SNS companies and related services.

The Effects of Information Transfer of Personal Information Security Breaches (개인정보 유출의 정보전이 효과)

  • Park, Sang-Soo;Lee, Hyun-Chul
    • The Journal of Information Systems
    • /
    • v.27 no.1
    • /
    • pp.193-224
    • /
    • 2018
  • Purpose Targeting Korean companies listed on Korean securities markets (i.e., KOSPI and KOSDAQ markets), this study aims to shed lights the effects of personal information security breaches on stock prices of information security companies. Interestingly, this study is, to the best of our knowledge, the first to examine the information transfer effect on personal information security breaches of companies. Design / Methodology /Approach To examine the information transfer effect of personal information security breaches, our study employs the event study commonly used in financial studies. To this end, we investigate a variety of events of personal information security breaches of companies listed on the KOPSI stock market and the KOSDAQ market. We collect the total samples of one hundred and twelve with forty seven of events of personal information security breaches by thirty companies and sixty five of information security companies. Findings The principal findings from the empirical study are as follows. First, for companies of personal information security breaches, our event study presents the significantly negative AAR (averaged abnormal return) value on the event day at the 5 % level and the highly significant negative CAAR(cumulative averaged abnormal return) value on the event day and the day after the event day at the 1 % level. The results suggest that personal information breaches significantly contribute to an decrease in value of the information breached companies. The cross sectional regressions in this study estimate the significantly negative coefficient for the ME/BE variable, the proxy for a growth opportunity at the 5 % level. This suggests a reverse relation between the growth opportunity of companies and their value. As for the various samples of the information security companies categorized by physical security, network and system security, security application software, code authentication, system integration, we find the significantly positive AAR on the day after the event day at the 5% level, only for the network and system security-companies. This addresses that the information transfer effect followed by personal information breaches is uniquely observable for companies categorized into network and system companies. The regressions for the network and system companies estimate the significantly positive coefficient for the NS dummy variable (i.e., the dummy of the network and system security companies) at the standard level. This allows us to identify appropriate times needed to make the information transfer effect realized from personal information breached companies to information security companies.

A Qualitative Research on the Structure and Determinants of Personal Device Network in the Ubiquitous Computing Context (유비쿼터스 컴퓨팅 환경에서 PDN의 구조와 결정 요인에 대한 정성적 연구)

  • Jeon Seok-Won;Jang Youn-Sun;Kim Jin-Woo
    • Journal of Information Technology Applications and Management
    • /
    • v.13 no.3
    • /
    • pp.1-28
    • /
    • 2006
  • In the ubiquitous computing environments. people usually carry multiple information technology devices with them. Personal device network (PDN) refers to the way how people connect multiple IT devices for their personal as well as professional purposes. Even though it has been Quite popular to construct the PDN in ubiquitous computing context, not much research has been conducted on how people actually connected multiple devices and what influences their methods of connection. In this paper we conducted a content analysis on community bulletin boards of IT devices and a contextual inquiry with expert users of PDN for investigating the configurations with which users connect multiple IT devices. Base on the results of two related studies, we identified three major types of PDN configurations, and key factors that influence the configurations of PDN. We conclude this research with guidelines to design a set of devices for each of the three configuration types.

  • PDF

Personal Data Security in Recruitment Platforms

  • Bajoudah, Alya'a;AlSuwat, Hatim
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.6
    • /
    • pp.310-318
    • /
    • 2022
  • Job offers have become more widespread and it has become easier and faster to apply for jobs through electronic recruitment platforms. In order to increase the protection of the data that is attached to the recruitment platforms. In this research, a proposed model was created through the use of hybrid encryption, which is used through the following algorithms: AES,Twofish,. This proposed model proved the effectiveness of using hybrid encryption in protecting personal data.

A Study on Korean Related Identities of the OCLC WorldCat Identities Network (OCLC WorldCat Identities Network의 한국 관련 아이덴티티에 관한 연구)

  • Yoon, Cheong-Ok
    • Journal of Korean Library and Information Science Society
    • /
    • v.46 no.4
    • /
    • pp.451-470
    • /
    • 2015
  • The purpose of this study is to review the processing of Korean related personal identities included in the OCLC WorldCat Identities Network and propose how to improve its errors. With twelve samples of English and Korean personal and subject identities, their related identities and works were examined, and their bibliographic records were retrieved from WorldCat. In searching WorldCat, inconsistencies in default search queries and the processing of identities with a date or a fuller form of name were observed.

Implementation of a Mobile Agent Platform for Handheld Devices to Access the SNMP MIB (SNMP MIB 액세스를 위한 휴대단말기용 이동에이전트 플랫폼)

  • 전병국;김영철
    • Journal of Internet Computing and Services
    • /
    • v.3 no.2
    • /
    • pp.87-95
    • /
    • 2002
  • Due to rapid development of high speed wire/wireless internet technologies, at the current age, it cares into being one phenomenon that the internet business is able to work on anyplace and anytime. In this environment, a technology of mobile agent provides very useful mechanism for personal handheld devices because of supporting migration as autonomously executable software object Instead of users. Therefore, this paper focuses on Implementing a mobile agent platform for personal handheld devices, which supports mobile agents in wire/wireless internet environment. To do this, we construct the system with modified JAMAS, based on Java, in our previous research. Based on our proposed system, we implement the browsing application in personal handheld devices to access the MIB(Management Information Base) on SNMP(Simple Network Management Protocol), which supervises network environment on wire/wireless internet. This proposed application system is easily to access the MIB managed by SNMP agent. then provides network map viewer and updates the MIB through the browser to network administrator. As a result, we can support application area of mobile agents such as hare network management. M-Commerce, integration of remote database systems, active message and active network with personal handheld devices.

  • PDF

Design for Supporting Interoperation between Heterogeneous Networks in Personal Robot System

  • Choo, Seong-Ho;Li, Vitaly;Jang, Ik-Gyu;Park, Tae-Kyu;Jung, Ki-Duk;Choi, Dong-Hee;Park, Hong-Seong
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2004.08a
    • /
    • pp.820-824
    • /
    • 2004
  • Personal Robot System in developing, have a module architecture, each module are connected through heterogeneors network systems like Ethernet, WLAN (802.11), IEEE1394 (Firewire), Bluetooth, USB, CAN, or RS-232C. In developing personal robot system we think that the key of robot performance is interoperability among modules. Each network protocol are well connected in the view of network system for the interoperability. So we make a bridging architecture that can routing, converting, transporting data packets with matcing each network's properties. Furthermore we suggest a advanced design scheme for realtime / non-realtime and control signal (short, requiring hard-realtime) / multimedia data (large, requiring soft-realtime). By some application systems, we could test performance, interoperability and stability. In this paper, we show our design concept, middleware architecture, and some applications systems using this middleware.

  • PDF

Wearable Personal Network Based on Fabric Serial Bus Using Electrically Conductive Yarn

  • Lee, Hyung-Sun;Park, Choong-Bum;Noh, Kyoung-Ju;SunWoo, John;Choi, Hoon;Cho, Il-Yeon
    • ETRI Journal
    • /
    • v.32 no.5
    • /
    • pp.713-721
    • /
    • 2010
  • E-textile technology has earned a great deal of interest in many fields; however, existing wearable network protocols are not optimized for use with conductive yarn. In this paper, some of the basic properties of conductive textiles and requirements on wearable personal area networks (PANs) are reviewed. Then, we present a wearable personal network (WPN), which is a four-layered wearable PAN using bus topology. We have designed the WPN to be a lightweight protocol to work with a variety of microcontrollers. The profile layer is provided to make the application development process easy. The data link layer exchanges frames in a master-slave manner in either the reliable or best-effort mode. The lower part of the data link layer and the physical layer of WPN are made of a fabric serial-bus interface which is capable of measuring bus signal properties and adapting to medium variation. After a formal verification of operation and performances of WPN, we implemented WPN communication modules (WCMs) on small flexible printed circuit boards. In order to demonstrate the behavior of our WPN on a textile, we designed a WPN tutorial shirt prototype using implemented WCMs and conductive yarn.