• Title/Summary/Keyword: Privacy Trust

Search Result 171, Processing Time 0.024 seconds

How Do People Evaluate a Web Site's Credibility (이용자들의 웹 사이트 신뢰성 평가 방법에 관한 연구)

  • Kim, Young-Ki
    • Journal of Korean Library and Information Science Society
    • /
    • v.38 no.3
    • /
    • pp.53-72
    • /
    • 2007
  • The Internet is now an integral part of the everyday lives of a majority of people. They are demanding web sites that offer credible information - Just as much as they want sites that are easy to navigate. But the online reality today is that few Internet users say they can trust the web sites that have products for sale or the sites that offer advice about which products and services to buy. Users want the web sites they visit to provide clear information to allow them to judge the site's credibility. Users want to know who runs the site; how to reach those people; the site's privacy policy; and how the site deals with mistakes. In the eyes of users all sites ate not equal. Users have different credibility standards for different types of sites. For news and information sites users want advertising clearly labeled as advertising. And users want the site to provide a list of the editors responsible for the site's contents, including the editor's email address. For e-commerce sites, user expectations and demands are just about as high as they can be. They say that it is very important that these sites provide specific, accurate information about the site's policies and practices.

  • PDF

A Study on Location Untraceability Service and Payment Protocol using Temporary Pseudonym in Mobile Communication Environments (이동통신 환경에서 임시 익명 아이디를 이용한 위치 불추적 서비스와 지불 프로토콜에 관한 연구)

  • 김순석;김성권
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.30 no.2
    • /
    • pp.78-92
    • /
    • 2003
  • In related to mobile communication environment, many researchers have studied problems concerning current locations of mobile users and exposure of their movements in the privacy aspect so far [1,2,3,4,5,6,7,8,9]. Among them, Kesdogan and Pfitzmann [3,6] proposed effective solutions using temporary pseudonym identification, called TP(Temporary Pseudonym ) to solve them. After that, Kesdogan et al. proposed an improved method protecting mobile users from some types of attacks of network providers in [8]. However, among their methods, in particular the method, attaching the other new device (so-called Reachability Manager) to system against active attack of network providers, is alterative rather than practical and is not clear. Moreover, it requires the other cost and overhead. Therefore we propose a practical method against active attack of network providers without attaching new device in original environments. The basie idea of proposed method is to protect a fraud act of network provider as a inside user by exchanging a secret information, which only users and network providers know, via network provider between mobile user and the trusted third party (so-called Trust Device). Moreover, we introduce a new payment protocol which applied our method.

HFN-Based Right Management for IoT Health Data Sharing (IoT 헬스 데이터 공유를 위한 HFN 기반 권한 관리)

  • Kim, Mi-sun;Park, Yongsuk;Seo, Jae-Hyun
    • Smart Media Journal
    • /
    • v.10 no.1
    • /
    • pp.88-98
    • /
    • 2021
  • As blockchain technology has emerged as a security issue for IoT, technology which integrates block chain into IoT is being studied. In this paper is a research concerning token-based IoT service access control technology for data sharing, which propose a possessor focused data sharing technic by using the permissioned blockchain. To share IoT health data, a Hyperledger Fabric Network consisting of three organizations was designed to provide a way to share data by applying different access control policies centered on device owners for different services. In the proposed system, the device owner issues access control tokens with different security levels applied to the participants in the organization, and the token issue information is shared through the distributed ledger of the HFN. In IoT, it is possible to lightweight the access control processing of IoT devices by granting tokens to service requesters who request access to data. Furthmore, by sharing token issuance information among network participants using HFN, the integrity of the token is guaranteed and all network participants can trust the token. The device owners can trust that their data is being used within their authorized rights, and control the collection and use of data.

Practical Conjunctive Searchable Encryption Using Prime Table (소수테이블을 이용한 실용적인 다중 키워드 검색가능 암호시스템)

  • Yang, Yu-Jin;Kim, Sangjin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.24 no.1
    • /
    • pp.5-14
    • /
    • 2014
  • Searchable encryption systems provide search on encrypted data while preserving the privacy of the data and the search keywords used in queries. Recently, interest on data outsourcing has increased due to proliferation of cloud computing services. Many researches are on going to minimize the trust put on external servers and searchable encryption is one of them. However, most of previous searchable encryption schemes provide only a single keyword boolean search. Although, there have been proposals to provide conjunctive keyword search, most of these works use a fixed field which limit their application. In this paper, we propose a field-free conjunctive keyword searchable encryption that also provides rank information of search results. Our system uses prime tables and greatest common divisor operation, making our system very efficient. Moreover, our system is practical and can be implemented very easily since it does not require sophisticated cryptographic module.

Classification of Online Tracking Technology and Implications in User Perspective (온라인 트래킹 기술 분류 및 이용자 관점에서의 시사점)

  • Lee, Bohan;Rha, Jong-Youn
    • Journal of Digital Convergence
    • /
    • v.16 no.9
    • /
    • pp.159-172
    • /
    • 2018
  • This study searched and analyzed online tracking technologies. It tried to understand what to consider when establishing policies related to online tracking. Online tracking technologies were classified into 'general cookies', 'super cookies', 'fingerprinting', 'device ID tracking' and 'cross-device tracking'. Political considerations should include the layers of online tracking, the subjects of tracking technology, purpose of use, duration and storage format of information, and development of technology. The implications of this study are as follows: first, policy makers and industry should be aware that the degree of risk perceived by users may vary according to the characteristics of online tracking technology. Secondly, it is necessary to understand factors that affect the classification of online tracking technology. Finally, in the industry, preemptive measures such as building an integrated privacy system are needed to relieve anxiety of users and to build trust.

Internet-Mediated Research in the Age of Social Distancing: Methodological Reflections and Recommendations from Two Online Research Projects (사회적 거리두기 시대의 인터넷 기반 연구: 두 온라인 연구 프로젝트로부터의 방법론적 고찰과 제안점)

  • Lee, Jisue;Hollister, Jonathan M.
    • Journal of Korean Library and Information Science Society
    • /
    • v.51 no.2
    • /
    • pp.319-353
    • /
    • 2020
  • Due to the COVID-19 pandemic, scholars at institutions of higher education around the world are transitioning their teaching, service, and research into online settings; for many this may be a new and challenging experience. While many of the best practices associated with research in traditional or face-to-face settings also apply to research in or via online settings, there are some additional challenges and nuances that researchers must adequately address and plan for due to the affordances and limitations of online settings. This paper discusses the key issues of privacy, informed consent, trust and trustworthiness, and retention through the literature and provides practical recommendations based on evidence and experience from two different online research projects. The reflections on and examples from these two research projects contextualize the above issues and act as evidence to inform research as a practice. The authors hope this evidence and practical guidance may help researchers better prepare for research in a socially distanced world.

A Glimpse into Brazil Conference (2014 브라질 회의로 가는 길)

  • Chun, Eung Hwi
    • Review of Korean Society for Internet Information
    • /
    • v.14 no.4
    • /
    • pp.63-76
    • /
    • 2013
  • This short report introduces the general background why Brazil conference is being prepared and what topics would be undertaken and what goals are being taken into account. It overviews what differences from traditional telecommunication governance, internet governance has had in its historical development and how such differences had been formed from its technological differences and the regulatory policy shift from common carrier regulation to privatization. Moreover, the fact that open, voluntary, bottom-up, diverse stakeholder's participation had evolved throughout the historical development of the internet, had established the present multistakeholder governance model from technological standardization to addressing scheme policies. ICANN, which has governed internet addressing schemes since the earlier 2000s, had developed address policies including IANA function from Jon Postel and technical community's legacy management system into contract based formation between ICANN and gTLD, ccTLD registries. And it made dispute resolution policies responding to trademark disputes and resolved gTLD monopoly issue by introducing new TLD generation and the separation of registry and registar. However, there had been challenges on the legitimacy of ICANN due to its dependency on the Federal Government of the U.S. particularly in its oversight role over ICANN and IANA contract. WSIS raised up internet governance issues including addressing governance, and set up IGF as a discussion platform for multistakeholders to discuss and share all views on other internet related public policies. IGF's loose and non-binding discussion once frustrated governments and other stakeholders, but more focused discussion and visible outcomes have consolidated its unique role for internet governance discourses. Particularly, IGF addressed many emerging internet related issues like cybersecurity, privacy, net neuratlity, development related issues. WTPF of 2013, after WCIT debate on whether traditional telecommunication regulation could be applied to internet infrastructure, suggested other governance issues such as the transition to ipv6, IXP coordination etc. How to make sure the legitimacy of internet addressing governance and how and where other internet related public policies could be undertaken are fundamental tasks for internet governance. Brazil conference, which has been motivated by the breakdown of trust in internet governance from NSA mass surveillance revealed by Snowden, faces these questions and try to make consensus on principles, institutions and roadmap for internet governance in multistakeholder participation way.

  • PDF

The Classic Security Application in M2M: the Authentication Scheme of Mobile Payment

  • Hu, Liang;Chi, Ling;Li, Hong-Tu;Yuan, Wei;Sun, Yuyu;Chu, Jian-Feng
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.6 no.1
    • /
    • pp.131-146
    • /
    • 2012
  • As one of the four basic technologies of IOT (Internet of Things), M2M technology whose advance could influence on the technology of Internet of Things has a rapid development. Mobile Payment is one of the most widespread applications in M2M. Due to applying wireless network in Mobile Payment, the security issues based on wireless network have to be solved. The technologies applied in solutions generally include two sorts, encryption mechanism and authentication mechanism, the focus in this paper is the authentication mechanism of Mobile Payment. In this paper, we consider that there are four vital things in the authentication mechanism of Mobile Payment: two-way authentication, re-authentication, roaming authentication and inside authentication. Two-way authentication is to make the mobile device and the center system trust each other, and two-way authentication is the foundation of the other three. Re-authentication is to re-establish the active communication after the mobile subscriber changes his point of attachment to the network. Inside authentication is to prevent the attacker from obtaining the privacy via attacking the mobile device if the attacker captures the mobile device. Roaming authentication is to prove the mobile subscriber's legitimate identity to the foreign agency when he roams into a foreign place, and roaming authentication can be regarded as the integration of the above three. After making a simulation of our proposed authentication mechanism and analyzing the existed schemes, we summarize that the authentication mechanism based on the mentioned above in this paper and the encryption mechanism establish the integrate security framework of Mobile Payment together. This makes the parties of Mobile Payment apply the services which Mobile Payment provides credibly.

Empirical Study of Determinants Influencing Intention to Recommend Contents Based on Information System Success Model (콘텐츠 추천의도에 영향을 미치는 요인에 관한 연구: 정보시스템 성공모형을 중심으로)

  • Kim, Sanghyun;Park, Hyunsun
    • Knowledge Management Research
    • /
    • v.21 no.4
    • /
    • pp.175-193
    • /
    • 2020
  • With the proliferation of information technology communication and smart device, the environment where contents are produced and distributed is changing. People can use the contents quickly and easily, and the content industry is attracting attention and creating newly added value by converging with other industries. Accordingly, there is a need for content-related companies to understand the quality of content perceived by users in order to succeed in content, and to use it strategically. Therefore, this study aims to examine the relationship between content quality factors, user satisfaction, and recommendation intention through empirical analysis based on an IS success model. The analysis was conducted using smartPLS3.0 based on a total of 301 survey responses. As a result of the study, it was found that content usefulness, accessible system quality, convenient system quality, service provider trust, and interaction had a significant effect on user's satisfaction. Perceived privacy protection had a significant effect on user satisfaction and recommendation intention. Lastly, it was found that user satisfaction had a significant effect on recommendation intention. The results of this study are expected to provide useful information and therefore content companies can understand about the quality perceived by users.

Automation System for Sharing CDM Data (CDM 데이터 공유를 위한 자동화 시스템)

  • Jeong, Chae-Eun;Kang, Yunhee;Park, Young B.
    • Journal of Platform Technology
    • /
    • v.8 no.3
    • /
    • pp.3-9
    • /
    • 2020
  • As the need for sharing for research purposes in the medical field increases, the use of a Common Data Model (CDM) is increasing. However, when sharing CDM data, there are some problems in that access control and personal information in the data are not protected. In this paper, in order to solve this problem, access to CDM data is controlled by using an encryption method in a blockchain network, and information of CDM data is recorded to enable tracking. In addition, IPFS was used to share a large amount of CDM data, and Celery was used to automate the sharing process. In other words, we propose a multi-channel automation system in which the information required for CDM data sharing is shared by a trust-based technology, a distributed file system, and a message queue for automation. This aims to solve the problem of access control and personal information protection in the data that occur in the process of sharing CDM data.

  • PDF