• 제목/요약/키워드: Personal Use

Search Result 2,694, Processing Time 0.03 seconds

Zero-knowledge proof algorithm for Data Privacy

  • Min, Youn-A
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.13 no.2
    • /
    • pp.67-75
    • /
    • 2021
  • As pass the three revised bills, the Personal Information Protection Act was revised to have a larger application for personal information. For an industrial development through an efficient and secure usage of personal information, there is a need to revise the existing anonymity processing method. This paper modifies the Zero Knowledge Proofs algorithm among the anonymity processing methods to modify the anonymity process calculations by taking into account the reliability of the used service company. More detail, the formula of ZKP (Zero Knowledge Proof) used by ZK-SNAKE is used to modify the personal information for pseudonymization processing. The core function of the proposed algorithm is the addition of user variables and adjustment of the difficulty level according to the reliability of the data user organization and the scope of use. Through Setup_p, the additional variable γ can be selectively applied according to the reliability of the user institution, and the degree of agreement of Witness is adjusted according to the reliability of the institution entered through Prove_p. The difficulty of the verification process is adjusted by considering the reliability of the institution entered through Verify_p. SimProve, a simulator, also refers to the scope of use and the reliability of the input authority. With this suggestion, it is possible to increase reliability and security of anonymity processing and distribution of personal information.

Privacy-Preserving Deep Learning using Collaborative Learning of Neural Network Model

  • Hye-Kyeong Ko
    • International journal of advanced smart convergence
    • /
    • v.12 no.2
    • /
    • pp.56-66
    • /
    • 2023
  • The goal of deep learning is to extract complex features from multidimensional data use the features to create models that connect input and output. Deep learning is a process of learning nonlinear features and functions from complex data, and the user data that is employed to train deep learning models has become the focus of privacy concerns. Companies that collect user's sensitive personal information, such as users' images and voices, own this data for indefinite period of times. Users cannot delete their personal information, and they cannot limit the purposes for which the data is used. The study has designed a deep learning method that employs privacy protection technology that uses distributed collaborative learning so that multiple participants can use neural network models collaboratively without sharing the input datasets. To prevent direct leaks of personal information, participants are not shown the training datasets during the model training process, unlike traditional deep learning so that the personal information in the data can be protected. The study used a method that can selectively share subsets via an optimization algorithm that is based on modified distributed stochastic gradient descent, and the result showed that it was possible to learn with improved learning accuracy while protecting personal information.

The Usefulness Perception and The Use Degree about Internet Shopping of Housewives (주부의 인터넷 쇼핑에 대한 유용성 인지정도와 활용정도)

  • 박미석;이유리
    • Journal of the Korean Home Economics Association
    • /
    • v.38 no.4
    • /
    • pp.163-177
    • /
    • 2000
  • The purposes of this study were to examine the perception of usefulness and the use degree of search and purchase about internet shopping of housewives. Specifically, this study analyzes the trend of the perception of usefulness and the use degree of internet shopping, and closely examines the influential factors. The major findings are follows: (1) Those who are college-educated, employed, positive about household informationalization, internet-educated, highly capable of the internet, and comfortable with an issue of an effluence of personal data showed high perception of usefulness of internet shopping. (2) Those who are young, college-educated, and employed showed the high use degree of search. Those who are age 20 to 30, college-educated, employed, and at the early stage of family life cycle showed the high use degree of purchase. In addition, those who are positive about household informationalization high in the tendency of innovation and the awareness of time constaints, exposed to the internet education, high in the internet capability, and low in a burden of the internet bills and the effluence of personal data showed the high use degree of search and purchase.

  • PDF

Analysis on Information Use of Smartphone in the context of Tourists (관광객 대상 스마트폰 사용의 정보이용 분석)

  • Jee, Geun-Sung;Kim, Min-cheol;Ha, Tai-Hyun
    • Journal of Digital Contents Society
    • /
    • v.18 no.8
    • /
    • pp.1543-1550
    • /
    • 2017
  • Previous research on smartphone has been focused on personal performance, accessibility, and information gaps in information system quality. In order to analyze the relationship between the use of smartphone information and personal characteristics, this study conducted a survey of 300 tourists at Jeju Airport, by using three variables of self-efficacy, 'impulsiveness and demographic variables (age, sex, education level, etc.) of smartphone use with personal characteristics. In conclusion, self-efficacy and impulsiveness seem to be positively related to the use of smartphone because it seems to be a living environment in which the desired information can be acquired within a desired time. In addition, there seems to be a difference between a mobile native environment in which online and offline boundaries are always connected and an environment in which 40 to 50 digital literacies are connected. This can be interpreted as a result of additional analysis.

A Study on Strengthening Domestic Personal Information Impact Assessment(PIA)

  • Young-Bok Cho
    • Journal of the Korea Society of Computer and Information
    • /
    • v.29 no.6
    • /
    • pp.61-67
    • /
    • 2024
  • In this paper, we presented a strengthening plan to prevent personal information leakage incidents by securing legal compliance for personal information impact assessment and suggesting measures to strengthen privacy during personal information impact assessment. Recently, as various services based on big data have been created, efforts are being made to protect personal information, focusing on the EU's GDPR and Korea's Personal Information Protection Act. In this society, companies entrust processing of personal information to provide customized services based on the latest technology, but at this time, the problem of personal information leakage through consignees is seriously occurring. Therefore, the use of personal information by trustees.

The Value of Personal Information: An Exploratory Study for Types of Personal Information and Its Value

  • Minjung Park;Sangmi Chai
    • Asia pacific journal of information systems
    • /
    • v.28 no.3
    • /
    • pp.154-166
    • /
    • 2018
  • As the number of online privacy incidents are increasing, lawsuits related with personal information infringements have been also growing as well. However, there are large differences between a plaintiff and a defendant to determine the amount of payment for damages from the incident. After the verdict was made, a plaintiff is not satisfied with the amount of compensation, whereas a defendant usually tries to their best to reduce the payment amount. This is because the value for personal information are hardly assessed exactly. In addition, there is no criteria for calculating the price of the information itself. Since the development of information technology enables the firms could collect and use any piece of information to identify a particular individual, the range of personal information has been also broadening. Based on these phenomenon, this study tries to grouping the types of personal information and exploring the perceived value of types of information. Therefore, this study could provide a foundation for narrowing the gap of the value of personal information between the firm and the defendant. Through AHP (Analytic Hierarchy Process), this study finds out that people usually value more on biometrics information, medical records, and criminal records whereas weigh less for email address and date of birth.

Investigating the Privacy Paradox in Facebook Based on Dual Factor Theory (페이스북에서의 프라이버시 패러독스 현상 연구 : 듀얼팩터이론을 중심으로)

  • Yu, Jae Ho;Lee, Ae Ri;Kim, Kyung Kyu
    • Knowledge Management Research
    • /
    • v.17 no.1
    • /
    • pp.17-47
    • /
    • 2016
  • People use social network services (SNSs) for various purposes, for example, to share information, to express themselves, and to strengthen social relationships with others. Meanwhile, problems of personal information leakage and privacy infringement become a social issue and thus information privacy concerns about inappropriate collection and use of personal information increase in SNSs (e.g., Facebook). Although people have privacy concerns in SNSs, they behave in a contradictory way, voluntarily presenting themselves and disclosing personal information. This phenomenon is called 'privacy paradox'. Using dual factor theory, this study investigates the phenomenon of privacy paradox by looking into enablers (e.g., self-presentation) and inhibitors (e.g., information privacy concern) for continuous use of Facebook that can co-exist independently of each other. It also includes antecedents of self-presentation (i.e., narcissism, need for affiliation, involvement, and self-efficacy) and those of information privacy concern (i.e., previous experience of privacy infringement, privacy awareness, and privacy control). The results show that most hypothesized relationships were supported. These findings provide strategic implications for SNS providers who want to promote continuous use of SNS. Under the current circumstances in which enhanced privacy policies are required, this study would be a useful reference for future research on information privacy issues in SNSs.

  • PDF

Motivational methods to increase in-field use of personal protective equipment (산업현장에서의 재해예방용 안전기구사용증대를 위한 방법)

  • 박민용
    • Proceedings of the ESK Conference
    • /
    • 1993.10a
    • /
    • pp.15-19
    • /
    • 1993
  • Numerous motivational methodologies were analyzed with respect to improvement of the use of personal protective equipment (PPE) in the industrial field. Common industrial protective devices under consideration included hearing protection devices, respiratory protection devices, eye and face protection devices, etc. It was found that several of such methods could readily be implemented in the real world to protect workers from hazardous industrial sterssors, such as intense noises, toxic air contaminants, and other dangerous industrial objects (e,g., chemicals). Current research issues and recommendations for future research are addressed.

  • PDF

Next-Generation Personal Authentication Scheme Based on EEG Signal and Deep Learning

  • Yang, Gi-Chul
    • Journal of Information Processing Systems
    • /
    • v.16 no.5
    • /
    • pp.1034-1047
    • /
    • 2020
  • The personal authentication technique is an essential tool in this complex and modern digital information society. Traditionally, the most general mechanism of personal authentication was using alphanumeric passwords. However, passwords that are hard to guess or to break, are often hard to remember. There are demands for a technology capable of replacing the text-based password system. Graphical passwords can be an alternative, but it is vulnerable to shoulder-surfing attacks. This paper looks through a number of recently developed graphical password systems and introduces a personal authentication system using a machine learning technique with electroencephalography (EEG) signals as a new type of personal authentication system which is easier for a person to use and more difficult for others to steal than other preexisting authentication systems.

A Study on the Attitudes on the Clothing of the Korean People Implied in the Korean Proverb (韓國俗談에 나타나는 韓國人의 衣服態度에 관한 硏究)

  • 김진구
    • The Research Journal of the Costume Culture
    • /
    • v.3 no.1
    • /
    • pp.83-92
    • /
    • 1995
  • The purpose of this study was to find the attitudes on clothing of the Korean people implied in the Korean proverb. The results of the analysis of this research was as follows: It was found that the Koreans regarded clothing and personal appearance as important matter in their everyday life. The awareness of the importance of wearing clothes and personal appearance was usual matter to the Koreans. Thus they put a great value on good and appropriate clothing behavior and personal appearance. The Koreans understood the meaning of clothes make the man and they knew how to use the clothing and personal appearance to relate people in the social order. They showed a tendency to treat a personal in terms of his appearance. it seems that since the Koreans knew the importance of clothing and personal appearance in the relationship between person and person they emphasized appropriate clothing behavior and decency.

  • PDF