• 제목/요약/키워드: Privacy concerns

검색결과 265건 처리시간 0.022초

A Study on the Factors Affecting Drone Use Intention -Comparative analysis of Korea and United Kingdom

  • Park, Seo Youn
    • 항공우주시스템공학회지
    • /
    • 제15권6호
    • /
    • pp.33-41
    • /
    • 2021
  • As interest in drones controlled by remote technology rapidly increases worldwide, drones are used in many fields such as military, rescue, and transportation as future innovations in many countries. In particular, as the drone has been spotlighted as a new future strategic industry, it is also used for public purposes such as disaster relief and crime investigation. However, security concerns such as the penetration of major national facilities, collisions with aircraft, and the possibility of privacy infringement due to aerial photography are also being raised. Unlike the increased interest in drones, there have been few studies on drone use, drone safety, and public attitudes toward drone use. This paper analyzed the perceptions of drone attitudes, drone stability and policy support for drones for Korean and United Kingdom.

College Students' Thoughts on Family Participated delivery

  • Kim, Jungae
    • International Journal of Advanced Culture Technology
    • /
    • 제9권2호
    • /
    • pp.39-46
    • /
    • 2021
  • This study wanted to find out what college students thought about family participated delivery and what concerns they had. To this end, eight college students aged 20 to 25 were interviewed three times. The data collection period was from March 20 to April 10, 2021. Interview materials were collected and interpreted simultaneously using the Giorgi method, a phenomenological research method. As a result of the analysis, 29 semantic units were derived, 12 subcomponents were grouped again, and five categories were formed as final components. The five categories of thoughts on the participated delivery of college students consisted of Responsibility, Happiness, Stability, Shame, and Anxiety. Based on the above meaning, college students were found to be comfortable with their families and to be more comfortable with birth happiness, while also feeling the risk of infection and shame as women. Accordingly, this study suggests that when participating in the delivery of family participation of college students who will be future parents, a systematic protocol will be established to thoroughly prepare for infection and protect women's privacy.

Review on Software-Defined Vehicular Networks (SDVN)

  • Mohammed, Badiea Abdulkarem
    • International Journal of Computer Science & Network Security
    • /
    • 제22권9호
    • /
    • pp.376-388
    • /
    • 2022
  • The expansion of new applications and business models is being significantly fueled by the development of Fifth Generation (5G) networks, which are becoming more widely accessible. The creation of the newest intelligent vehicular networks and applications is made possible by the use of Vehicular Ad hoc Networks (VANETs) and Software Defined Networking (SDN). Researchers have been concentrating on the integration of SDN and VANET in recent years, and they have examined a variety of issues connected to the architecture, the advantages of software-defined VANET services, and the new features that can be added to them. However, the overall architecture's security and robustness are still in doubt and have received little attention. Furthermore, new security threats and vulnerabilities are brought about by the deployment and integration of novel entities and a number of architectural components. In this study, we comprehensively examine the good and negative effects of the most recent SDN-enabled vehicular network topologies, focusing on security and privacy. We examine various security flaws and attacks based on the existing SDVN architecture. Finally, a thorough discussion of the unresolved concerns and potential future study directions is provided.

Software-Defined Vehicular Networks (SDVN)

  • Al-Mekhlafi, Zeyad Ghaleb
    • International Journal of Computer Science & Network Security
    • /
    • 제22권9호
    • /
    • pp.231-243
    • /
    • 2022
  • The expansion of new applications and business models is being significantly fueled by the development of Fifth Generation (5G) networks, which are becoming more widely accessible. The creation of the newest intelligent vehicular net- works and applications is made possible by the use of Vehicular Ad hoc Networks (VANETs) and Software Defined Networking (SDN). Researchers have been concentrating on the integration of SDN and VANET in recent years, and they have examined a variety of issues connected to the architecture, the advantages of software defined VANET services, and the new features that can be added to them. However, the overall architecture's security and robustness are still in doubt and have received little attention. Furthermore, new security threats and vulnerabilities are brought about by the deployment and integration of novel entities and several architectural components. In this study, we comprehensively examine the good and negative effects of the most recent SDN-enabled vehicular network topologies, focusing on security and privacy. We examine various security flaws and attacks based on the existing SDVN architecture. Finally, a thorough discussion of the unresolved concerns and potential future study directions is provided.

Security Determinants of the Educational Use of Mobile Cloud Computing in Higher Education

  • Waleed Alghaith
    • International Journal of Computer Science & Network Security
    • /
    • 제24권9호
    • /
    • pp.50-62
    • /
    • 2024
  • The decision to integrate mobile cloud computing (MCC) in higher education without first defining suitable usage scenarios is a global issue as the usage of such services becomes extensive. Consequently, this study investigates the security determinants of the educational use of mobile cloud computing among universities' students. This study proposes and develops a theoretical model by adopting and modifying the Protection Motivation Theory (PMT). The study's findings show that a significant amount of variance in MCC adoption was explained by the proposed model. MCC adoption intention was shown to be highly influenced by threat appraisal and coping appraisal factors. Perceived severity alone explains 37.8% of students "Intention" to adopt MCC applications, which indicates the student's perception of the degree of harm that would happen can hinder them from using MCC. It encompasses concerns about data security, privacy breaches, and academic integrity issues. Response cost, perceived vulnerability and response efficacy also have significant influence on students "intention" by 18.8%, 17.7%, and 6.7%, respectively.

Security Determinants of the Educational Use of Mobile Cloud Computing in Higher Education

  • Waleed Alghaith
    • International Journal of Computer Science & Network Security
    • /
    • 제24권8호
    • /
    • pp.105-118
    • /
    • 2024
  • The decision to integrate mobile cloud computing (MCC) in higher education without first defining suitable usage scenarios is a global issue as the usage of such services becomes extensive. Consequently, this study investigates the security determinants of the educational use of mobile cloud computing among universities students. This study proposes and develops a theoretical model by adopting and modifying the Protection Motivation Theory (PMT). The studys findings show that a significant amount of variance in MCC adoption was explained by the proposed model. MCC adoption intention was shown to be highly influenced by threat appraisal and coping appraisal factors. Perceived severity alone explains 37.8% of students "Intention" to adopt MCC applications, which indicates the student's perception of the degree of harm that would happen can hinder them from using MCC. It encompasses concerns about data security, privacy breaches, and academic integrity issues. Response cost, perceived vulnerability and response efficacy also have significant influence on students "intention" by 18.8%, 17.7%, and 6.7%, respectively.

스마트 그리드의 소비자 보호를 위한 안전한 분산 데이터 관리 구조 (Secure Distributed Data Management Architecture for Consumer Protection of Smart Grid)

  • 박남제;송유진;박광용
    • 한국콘텐츠학회논문지
    • /
    • 제10권9호
    • /
    • pp.57-67
    • /
    • 2010
  • 스마트 그리드 기술은 소비자의 에너지 사용을 실시간으로 감시하고 비사용 기간 동안 차단 요구에 응답할 가정용 기기와 통신함으로써, 에너지 효율을 가정으로까지 확대해 준다. 그러나, 스마트 그리드에서 수집된 정보는 개인 정보의 라이브러리 형태가 될 것이므로 이것을 잘못 다루게 되면 소비자의 개인정보를 크게 해칠 수 있다. 소비자 중심의 투명성과 통제의 원칙이 처음부터 끝까지 필수 설계 원칙으로 취급되지 않는다면 중대한 우려가 있을 것이다. 본 논문에서는 All-Or-Nothing Transform(AONT) 암호화 모드의 특성을 이용하여 스마트 그리드 환경에서의 안전한 소비자 정보보호를 제공하기 위한 효율적인 데이터 분산 보안 관리방안을 제안한다. 본 논문에서 제안된 알고리즘은 처리속도 측면에서 데이터의 고속 분산 및 복원이 가능하며, 각 비밀조각 사이즈의 총합이 평문과 동일하여 스마트 그리드 시스템의 개인 데이터 처리에 적합하다.

도시주거지 주차환경개선을 위한 녹색주차사업 참여확대 및 인식제고 방안 (A Study on Expanding Participation in and Raising Awareness of the Green Parking Project for Improvement of Parking Conditions in Urban Residential Areas)

  • 김묘정
    • 한국주거학회논문집
    • /
    • 제26권1호
    • /
    • pp.61-70
    • /
    • 2015
  • The purpose of this study was to provide information on how to expend participation in and raise awareness of the Green Parking Project. A survey was conducted for this study among two groups. One group consisted of 38 residents of the Green Parking Zone in Nam-gu, Ulsan, and the other group consised 129 residents with no experience with the Green Parking Project. For analysis, the frequency and means were calculated, and t-test, analysis of variance, and chi-square test were performed. The results showed, first, that general residents tended to think that parking on the street in front of one's house is a divine right, while residents living the Green Parking Zone thought that the street is a public space. Second, general residents regarded fences as means of security to protect their private property, while people living in the Green Parking Zone tended to think of their yards as semi-private spaces and allowed access to neighbors. Third, general residents had concerns about maintenance and administration fees, noise and dust, security of houses, and privacy. However, residents of the Green Parking Zone evaluated those conditions positively. Fourth, people who were well-informed about the Green Parking Project had low anxiety about security and invasion of privacy, results from the project. Therefore, effective public relations are very important for expanding participation and raising awareness.

온라인상의 개인정보 노출에 대한 인식과 보호 태도 연구 빅데이터 시대 개인정보 노출에 대한 심리적 반발에 주목하며 (An Empirical Study of People's Perceptions and Attitudes Toward Personal Information Disclosure Online Focusing on 'Psychological Reactance' in the Big Data Age)

  • 김형지;전은식;김성태
    • 한국언론정보학보
    • /
    • 제80권
    • /
    • pp.143-166
    • /
    • 2016
  • 본 연구는 미래 새로운 경쟁력으로서의 빅데이터의 가치가 개인의 인권을 침해하면서 우선시 되어서는 안 된다는 전제하에서 온라인 이용자의 개인정보 노출에 대한 인식과 보호 태도를 알아보았다. 주요 분석결과는 다음과 같다. 첫째, 개인정보 활용주체에 대한 신뢰와 개인정보 노출에 대한 심리적 반발이 개인정보 노출 방법과 유형에 따라 다름을 확인하였다. 둘째, 개인정보 노출에 대한 심리적 반발이 강할수록, 인적 개인정보 노출이 많을수록 개인정보 보호 규제에 대한 태도는 강경했다. 한편, 사람들이 개인정보 활용주체가 개인이나 기업일수록, 금융 정보의 노출이 많은 사람일수록 개인정보 보호 규제에 대한 태도는 상대적으로 소극적이었다. 이들은 온라인상에서 공개한 자신에 관한 정보를 법의 테두리 안에서 보호받기 위해 자기정보에 대한 권리를 강화하고 자율적으로 관리하고자 하는 경향을 엿볼 수 있겠다.

  • PDF

테러대응 관련 법제의 국가별 비교 연구 (Comparative Study on Major Nations's Related Legislation for Counter-terrorism)

  • 권정훈
    • 한국콘텐츠학회논문지
    • /
    • 제10권1호
    • /
    • pp.343-352
    • /
    • 2010
  • 각국의 테러대응 관련 법제들을 비교 분석해 본 결과, 테러환경에 능동적으로 대처하기 위해서는 현행의 법령적 근거보다는 상위의 법률적 체제가 필요함이 사료된다. 그리고 상위법에서는 다음의 몇 가지 사항에 대한 구체적인 규정이 포함되어야 할 것이다. 첫째, 테러혐의자의 감시와 관련한 '통신비밀보호법'의 근거에 의해서는 테러정보의 수집 및 감시활동이 불가능하기 때문에 국민의 생명과 재산을 보호하는 국가의 의무적 차원에서 볼 때, 심도 있는 논의가 필요하다. 둘째, '출입국관리법'에 의한 현행 법규로는 테러대응의 관리에 부족한 점이 지적되고 있기 때문에 이를 보완하여 대응 관리해야 한다. 셋째, 현행 '특정금융거래정보의 보고 및 이용 등에 관한 법률'로는 테러자금의 차단이 불가능하기 때문에 테러조직의 자금 차단과 처벌 근거를 마련해야 한다. 넷째, 테러범죄의 처벌은 통상적인 형벌에 의거하고 있는데, 테러행위와 테러단체를 확연히 구분하여 처벌규정을 마련해야 할 것이다. 다섯째, 국가중요시설 및 다중이용시설의 보호를 강화하기 위한 민간경비시스템의 활용이 필요할 것이다.