• 제목/요약/키워드: Privacy issue

검색결과 219건 처리시간 0.029초

유비쿼터스 도시 환경에서 프라시버시 보호 방안에 관한 소고 - 경쟁하는 개인정보가치 분석을 중심으로 - (A Study Privacy and Security in Ubiquitous City Environment (Focous on Computing Values Analysis of Personal Information))

  • 정창덕;강장묵
    • 한국정보통신설비학회:학술대회논문집
    • /
    • 한국정보통신설비학회 2006년도 하계학술대회
    • /
    • pp.249-254
    • /
    • 2006
  • As the concept of Ubiquitous City has become an important issue, we need to have a voice in the field of privacy. The Ubiquitous Computing revolution, it is achieved a physical space and an intelligent union of cyber space in the space where an off-line space was integrated with on-line. It is combined with a life space naturally, and Ubiquitous creates a new integrated space. The space is the opportunity space that is limitless as soon as it is the unknown world that mankind was not able to experience yet. According to the recent papers and studies, Privacy or Personal Information sector is mentioned as a major problem for Ubiquitous Computing Society. Therefore, this paper checks Ubiquitous City, the present privacy concept and situation of currently proceeding Ubiquitous computing environment. Also, The main purpose of this paper is to analyze the concepts privacy, personal information. Thus this paper treated the analysis of case, technological or social issue, problem and solution, competing values of privacy and so on.

  • PDF

개인정보보호법에 기반한 빅데이터 활용 방안 연구 (A study on Utilization of Big Data Based on the Personal Information Protection Act)

  • 김병철
    • 디지털융복합연구
    • /
    • 제12권12호
    • /
    • pp.87-92
    • /
    • 2014
  • 최근 대규모 데이터 처리와 다양한 형태의 데이터 처리 기술이 진화함에 따라 사회문제 진단 및 현안 해결 도구로써 빅데이터의 잠재력에 주목하고 있다. 동시에 빅데이터의 위험요소로 프라이버시 문제가 강력하게 제기되고 있기도 하다. 빅데이터의 적극적인 활용과 프라이버시 문제는 서로 상충되는 관례로써 본 논문에서는 이와 관련한 당면한 문제점을 지적하고, 해외 선진국의 사례분석을 통해 우리나라의 개인정보보호에 기반한 빅데이터 활용방안을 제안하고자 한다.

연결완전성 제고와 프라이버시 보호를 위한 유비쿼터스 상거래의 설계 방안

  • 이경전;주정인
    • 한국지능정보시스템학회:학술대회논문집
    • /
    • 한국지능정보시스템학회 2005년도 공동추계학술대회
    • /
    • pp.157-162
    • /
    • 2005
  • Seamlessness is the Keyword of U-Commerce Which may be defined as the commercial interaction among providers, consumers, products, and services, enabled and supported especially by the real-world seamless communication of each entity and object's digital information. However, the possibility of the seamless transactions increases the privacy risk of the entities involved. Therefore, the core issue of U-Commerce is how to promote seamless transactions while protecting the privacy. for the seamlessness, the role of incentive-emphasized business model is important since the seamlessness makes clear which economic entities contribute to a commercial transaction. Economic entities will reject the seamless transactions unless the sufficient incentives are given to them. In order to consider the privacy issue, we suggest an alternative U-Commerce architecture based on Hybrid P2P Model and Personal Information Base.

  • PDF

CS-RBAC 기반의 동적 Location Privacy 보호 구조 설계 (Design of Dynamic Location Privacy Protection Scheme Based an CS-RBAC)

  • 송유진;한승현;이동혁
    • 정보처리학회논문지C
    • /
    • 제13C권4호
    • /
    • pp.415-426
    • /
    • 2006
  • 유비쿼터스의 주요한 특성은 상황 인식(Context-Awareness)이며 이것은 시공간에 따라 변하는 사용자 데이터를 직접 입력 하지 않고 상황에 맞게 자동적으로 처리해 주는 것을 뜻한다. 그러나 Context Aware 환경에서 위치정보는 사용자의 명확한 동의 없이 수집될 수 있기 때문에 사용자는 자신의 위치정보에 대한 완전한 제어를 할 수 없다. 이러한 문제로 인해 사용자 위치정보 접근시 Privacy Issue가 발생할 수 있다. 여기서, 시간이나 장소, 사용자의 상황, 정보를 요구하는 사람 등 다양한 조건에 따라 위치정보의 공개를 결정하는 프라이버시를 고려한 위치정보 시스템의 구축은 매우 중요하다. 따라서 본 논문에서는 위치정보의 유출을 차단하고 안전하게 위치기반 서비스를 제공하기 위해 기존의 LBS에 고객의 상황에 민감하게 반응할 수 있도록 CS-RBAC을 기반으로 새로운 시스템을 제안하였다. 아울러 사용자의 Preference를 적극적으로 반영 할 수 있는 PCP의 장점도 그대로 수용하였다. 또한 Privacy Weight라는 새로운 개념을 통하여 정보공개의 가부만을 결정하는게 아니라 위치정 보에 Grade를 부여하도록 하였다. 이러한 방법으로 Context-Aware 환경에서 Role에 기반하여 사용자의 위치정보를 안전하게 보호할 수 있다.

페이스북에서의 프라이버시 패러독스 현상 연구 : 듀얼팩터이론을 중심으로 (Investigating the Privacy Paradox in Facebook Based on Dual Factor Theory)

  • 유재호;이애리;김경규
    • 지식경영연구
    • /
    • 제17권1호
    • /
    • pp.17-47
    • /
    • 2016
  • People use social network services (SNSs) for various purposes, for example, to share information, to express themselves, and to strengthen social relationships with others. Meanwhile, problems of personal information leakage and privacy infringement become a social issue and thus information privacy concerns about inappropriate collection and use of personal information increase in SNSs (e.g., Facebook). Although people have privacy concerns in SNSs, they behave in a contradictory way, voluntarily presenting themselves and disclosing personal information. This phenomenon is called 'privacy paradox'. Using dual factor theory, this study investigates the phenomenon of privacy paradox by looking into enablers (e.g., self-presentation) and inhibitors (e.g., information privacy concern) for continuous use of Facebook that can co-exist independently of each other. It also includes antecedents of self-presentation (i.e., narcissism, need for affiliation, involvement, and self-efficacy) and those of information privacy concern (i.e., previous experience of privacy infringement, privacy awareness, and privacy control). The results show that most hypothesized relationships were supported. These findings provide strategic implications for SNS providers who want to promote continuous use of SNS. Under the current circumstances in which enhanced privacy policies are required, this study would be a useful reference for future research on information privacy issues in SNSs.

  • PDF

빅데이터 분석/처리에 따른 생활밀착형 서비스의 프라이버시 보호 측면에서의 구조혈 연구 (A Study on Structural Holes of Privacy Protection for Life Logging Service as analyzing/processing of Big-Data)

  • 강장묵;송유진
    • 한국인터넷방송통신학회논문지
    • /
    • 제14권1호
    • /
    • pp.189-193
    • /
    • 2014
  • 네트워크 서비스는 로컬서비스와 결합하면서 생활밀착형 서비스로 발전하고 있다. 생활밀착형 서비스는 기존의 모바일 서비스와는 달리, 위치정보와 로컬정보 그리고 소셜 네트워크서비스 정보 등을 모아 개인화된 서비스를 제공할 것으로 예상된다. 여러 정보를 모아 처리하는 과정에서 빅데이터 기술, 클라우드 기술 등이 필요하다. 이미 이에 대한 효율성 높은 알고리즘이 연구되고 있으나 반면, 생활 밀착형 서비스 모델 또는 빅데이터 환경에서의 프라이버시 보호 모델에 대한 연구는 상대적으로 미흡한 편이다. 이 글은 생활밀착형 서비스에 활용될 빅데이터 기술이 야기하는 프라이버시 문제에 대하여 구조혈 중심으로 다룬다.

Privacy-Preserving IoT Data Collection in Fog-Cloud Computing Environment

  • Lim, Jong-Hyun;Kim, Jong Wook
    • 한국컴퓨터정보학회논문지
    • /
    • 제24권9호
    • /
    • pp.43-49
    • /
    • 2019
  • Today, with the development of the internet of things, wearable devices related to personal health care have become widespread. Various global information and communication technology companies are developing various wearable health devices, which can collect personal health information such as heart rate, steps, and calories, using sensors built into the device. However, since individual health data includes sensitive information, the collection of irrelevant health data can lead to personal privacy issue. Therefore, there is a growing need to develop technology for collecting sensitive health data from wearable health devices, while preserving privacy. In recent years, local differential privacy (LDP), which enables sensitive data collection while preserving privacy, has attracted much attention. In this paper, we develop a technology for collecting vast amount of health data from a smartwatch device, which is one of popular wearable health devices, using local difference privacy. Experiment results with real data show that the proposed method is able to effectively collect sensitive health data from smartwatch users, while preserving privacy.

Privacy measurement method using a graph structure on online social networks

  • Li, XueFeng;Zhao, Chensu;Tian, Keke
    • ETRI Journal
    • /
    • 제43권5호
    • /
    • pp.812-824
    • /
    • 2021
  • Recently, with an increase in Internet usage, users of online social networks (OSNs) have increased. Consequently, privacy leakage has become more serious. However, few studies have investigated the difference between privacy and actual behaviors. In particular, users' desire to change their privacy status is not supported by their privacy literacy. Presenting an accurate measurement of users' privacy status can cultivate the privacy literacy of users. However, the highly interactive nature of interpersonal communication on OSNs has promoted privacy to be viewed as a communal issue. As a large number of redundant users on social networks are unrelated to the user's privacy, existing algorithms are no longer applicable. To solve this problem, we propose a structural similarity measurement method suitable for the characteristics of social networks. The proposed method excludes redundant users and combines the attribute information to measure the privacy status of users. Using this approach, users can intuitively recognize their privacy status on OSNs. Experiments using real data show that our method can effectively and accurately help users improve their privacy disclosures.

A Beacon-Based Trust Management System for Enhancing User Centric Location Privacy in VANETs

  • Chen, Yi-Ming;Wei, Yu-Chih
    • Journal of Communications and Networks
    • /
    • 제15권2호
    • /
    • pp.153-163
    • /
    • 2013
  • In recent years, more and more researches have been focusing on trust management of vehicle ad-hoc networks (VANETs) for improving the safety of vehicles. However, in these researches, little attention has been paid to the location privacy due to the natural conflict between trust and anonymity, which is the basic protection of privacy. Although traffic safety remains the most crucial issue in VANETs, location privacy can be just as important for drivers, and neither can be ignored. In this paper, we propose a beacon-based trust management system, called BTM, that aims to thwart internal attackers from sending false messages in privacy-enhanced VANETs. To evaluate the reliability and performance of the proposed system, we conducted a set of simulations under alteration attacks, bogus message attacks, and message suppression attacks. The simulation results show that the proposed system is highly resilient to adversarial attacks, whether it is under a fixed silent period or random silent period location privacy-enhancement scheme.

Assessment for Efficiency of Two-Stage Randomized Response Technique

  • Park, Kyung-Ho
    • Communications for Statistical Applications and Methods
    • /
    • 제7권2호
    • /
    • pp.427-433
    • /
    • 2000
  • In this paper, we review several two-stage randomized response techniques for gathering self-report data when persons are asked sensitive question. Also efficiencies and privacy protections based on the two-stage randomized response procedures are compared. Finally, we find optimal parameter conditions.

  • PDF