• Title/Summary/Keyword: Privacy risk

Search Result 274, Processing Time 0.021 seconds

A Study on the Market Status and Issues of e-Commerce Insurance (전자상거래 보험의 시장현황 및 쟁점에 관한 고찰)

  • Shin, Gun-Hoon
    • International Commerce and Information Review
    • /
    • v.7 no.3
    • /
    • pp.27-51
    • /
    • 2005
  • Todays, computers in business world are potent facilitators that most companies could not without them, while they are only tools. They offer extremely efficient means of communication, particularly when connected to Internet. What I stress in this article is the risks accompanied by e-commerce rather than the advantages of Internet or e-commerce. The management of e-commerce companies, therefore, should keep in mind that the benefit of e-commerce through the Internet are accompanied by enhanced and new risks, cyber risks or e-commerce risks. For example, companies are exposed to computer system breakdown and business interruption risks owing to traditional and physical risks such as theft and fire etc, computer programming errors and defect softwares and outsider's attack such as hacking and virus. E-commerce companies are also exposed to tort liabilities owing to defamation, the infringement of intellectual property such as copyright, trademark and patent right, negligent misrepresent and breach of confidential information or privacy infringement. In this article, I would like to suggest e-commerce insurance or cyber liability insurance as a means of risk management rather than some technical devices, because there is not technically perfect defence against cyber risks. But e-commerce insurance has some gaps between risks confronted by companies and coverage needed by them, because it is at most 6 or 7 years since it has been introduced to market. Nevertheless, in my opinion, e-commerce insurance has offered the most perfect defence against cyber risks to e-commerce companies up to now.

  • PDF

An Empirical Study on the Customer Value Factors Affecting Trust of Mobile Entertainment (모바일 엔터테인먼트의 신뢰에 영향을 미치는 고객가치 요인에 관한 실증적 연구)

  • Lee, Yi-jin;Yum, Chang-sun
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.16 no.3
    • /
    • pp.59-71
    • /
    • 2020
  • The purpose of this study is to analyze the relationship between customer value and trust and the effect of trust on loyalty in the field of mobile entertainment. As smartphone use becomes more popular, the mobile business is growing rapidly. In particular, the mobile entertainment industry, such as mobile games and mobile video, is growing faster. This study was based on the main survey had conducted from 25th September 2019 to 7th October 2019 by 300 users who had experienced mobile entertainment applications in the past. Statistical analysis was performed by using the IBM SPSS v.22.0. The analysis results are as follows. First, the utility and quality of utilitarian value, enjoyment and aesthetics of hedonic value, and status enhancing of social value have significantly positive influence on trust. Second, privacy risk of social value have significantly negative influence on trust. Finally, trust has significantly positive influence on loyalty. Based on the results, we discussed the implications for the successful operation of mobile entertainment.

Provable Secure Brand-new Multi-auction Mechanism with Dynamic Identity

  • Lee, Jung-San;Wei, Kuo-Jui;Chen, Ying-Chin;Sun, Yun-Hsiang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.12
    • /
    • pp.5616-5642
    • /
    • 2016
  • Different from traditional auctions, electronic auctions provide a platform to allow bidders and auctioneers merchandise to each other over network anytime and anywhere. Auctioneers can publish information of goods, and bidders can choose the interested targets through this bidding platform. To ensure the fairness and security of electronic auctions, Li et al. have proposed a practical electronic auction scheme which can confirm the requirement of strong anonymity, bidding privacy, and secret bidding price. However, we have found out that Li et al.'s scheme may lurk the risk of the denial-of-service attack during the bidding phase in a sealed-bid auction. Thus, we propose a brand-new sealed-bid auction mechanism, in which the essentials of e-auction can be firmly preserved. In particular, each bidder only needs to register at the center once and then can join to multiple plays launched by different auctioneers. Moreover, the correctness of mutual authentication is confirmed according to the BAN logic model.

Folksonomy-based Personalized Web Search System (폭소노미 기반 개인화 웹 검색 시스템)

  • Kim, Dong-Wook;Kang, Soo-Yong;Kim, Han-Joon;Lee, Byung-Jeong
    • Journal of Digital Contents Society
    • /
    • v.11 no.1
    • /
    • pp.105-115
    • /
    • 2010
  • Search engines provide web documents that are related to user's query. However, using only the query terms that user provided, it is hard for search engines to know user's exact intention and provide the very matching web documents. To remedy this problem, search systems are needed to exploit personalized search technologies. In this paper, we propose not only a novel personalized query recommendation scheme based on folksonomy but also a new personalized search service architecture which reduces the risk of privacy violation while enabling search service providers to provide other various personalized services such as personalized advertisement.

Research on the drone detection based on the radar (레이다 기반의 드론 탐지 기법 연구)

  • Moon, Minjung;Song, Kyungmin;Yu, Sujin;Sim, Hyunseok;Lee, Wookyung
    • Journal of Satellite, Information and Communications
    • /
    • v.12 no.2
    • /
    • pp.99-103
    • /
    • 2017
  • Recently, acccording to price decline and miniaturization of drone, it is increased dramatically that drone usage in various category including military and private sectors. In accordance with popular usage, There is a increasing risk of safety accident, national security and public privacy problem. Hence there is a high demand for study and analysis applicable to the related technology and anti-drone method including drone detection and jamming. In general, it is extremely difficult to detect and recognize drones using conventional sensors. In this paper, we classify drone detection technology and Drone detection experiments are performed using CW RADAR to obtain and analyze micro-doppler pattern. This preliminary study aims to provide fundamental theory on radar drone detection and experimental test results such that in-depth anti-drone technology can be established in future.

Identity-based Provable Data Possession for Multicloud Storage with Parallel Key-Insulation

  • Nithya, S. Mary V.;Rhymend Uthariaraj, V.
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.9
    • /
    • pp.3322-3347
    • /
    • 2021
  • Cloud Storage is the primary component of many businesses on cloud. Majority of the enterprises today are adopting a multicloud strategy to keep away from vendor lock-in and to optimize cost. Auditing schemes are used to ascertain the integrity of cloud data. Of these schemes, only the Provable Data Possession schemes (PDP) are resilient to key-exposure. These PDP schemes are devised using Public Key Infrastructure (PKI-) based cryptography, Identity-based cryptography, etc. PKI-based systems suffer from certificate-related communication/computational complexities. The Identity-based schemes deal with the exposure of only the auditing secret key (audit key). But with the exposure of both the audit key and the secret key used to update the audit key, the auditing process itself becomes a complete failure. So, an Identity-based PDP scheme with Parallel Key-Insulation is proposed for multiple cloud storage. It reduces the risk of exposure of both the audit key and the secret key used to update the audit key. It preserves the data privacy from the Third Party Auditor, secure against malicious Cloud Service Providers and facilitates batch auditing. The resilience to key-exposure is proved using the CDH assumption. Compared to the existing Identity-based multicloud schemes, it is efficient in integrity verification.

Generate Optimal Number of Features in Mobile Malware Classification using Venn Diagram Intersection

  • Ismail, Najiahtul Syafiqah;Yusof, Robiah Binti;MA, Faiza
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.7
    • /
    • pp.389-396
    • /
    • 2022
  • Smartphones are growing more susceptible as technology develops because they contain sensitive data that offers a severe security risk if it falls into the wrong hands. The Android OS includes permissions as a crucial component for safeguarding user privacy and confidentiality. On the other hand, mobile malware continues to struggle with permission misuse. Although permission-based detection is frequently utilized, the significant false alarm rates brought on by the permission-based issue are thought to make it inadequate. The present detection method has a high incidence of false alarms, which reduces its ability to identify permission-based attacks. By using permission features with intent, this research attempted to improve permission-based detection. However, it creates an excessive number of features and increases the likelihood of false alarms. In order to generate the optimal number of features created and boost the quality of features chosen, this research developed an intersection feature approach. Performance was assessed using metrics including accuracy, TPR, TNR, and FPR. The most important characteristics were chosen using the Correlation Feature Selection, and the malicious program was categorized using SVM and naive Bayes. The Intersection Feature Technique, according to the findings, reduces characteristics from 486 to 17, has a 97 percent accuracy rate, and produces 0.1 percent false alarms.

Understanding the Risks on Saudi Arabian's Youth Being Online Without Having Strong Cyber-Security Awareness

  • Alharbi, Nawaf;Soh, Ben;AlZain, Mohammed A;Alharbi, Mawaddah
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.7
    • /
    • pp.131-146
    • /
    • 2022
  • The Internet is becoming a basic need for many individuals globally in this digital age. The youths became more active online than before, with the majority relying on different platforms to communicate and interact with peers. Saudi Arabia is one of the nations where internet usage is high, with an increasing number of active internet users. The youth in Saudi Arabia are engaged in various online platforms. However, they lack adequate knowledge about cybersecurity and the dangers of internet usage, which exposes them to the risk of falling victims to cybercriminals. The most common dangers of internet usage include viruses, malware, phishing, and hacking, compromising users' sensitive information. Increased awareness of these potential threats helps protect Internet users and secure their data. The understanding of the dangers of Internet usage among youths varies across countries. In this regard, our study explores the risks of internet usage among youth in Saudi Arabia compared to the United States, South Africa, and New Zealand.

Ethical Issues on Environmental Health Study

  • Hyein WOO
    • Journal of Research and Publication Ethics
    • /
    • v.4 no.1
    • /
    • pp.9-14
    • /
    • 2023
  • Purpose: Adequate public input and participation in environmental health research must be provided to ensure accurate results from studies involving human exposure to potentially hazardous substances. By addressing these ethical issues associated with environmental health research, this study can help reduce risks for individuals participating in studies and whole communities affected by their impactful findings. Research design, data and methodology: The current research should have followed the rule of qualitative textual research, searching and exploring the adequate prior resources such as books and peer-reviewed journal articles so that the current author could screen proper previous works which are acceptable for the content analysis. Results: The current research has figured out four ethical issues to improve environmental health study as follows: (1) Lack of Guidance for Collecting and Utilizing Data Ethically, (2) Insufficient Consideration Is Given to Vulnerable Populations When Conducting Studies, (3) Unclear Standards Exist for Protecting the Privacy Of Participant's Personal Information, and (4) Conducting Socially and Religiously Acceptable Research in Various Communities. Conclusions: This research concludes that future researchers should consider implementing anonymization techniques where possible so that findings are still accessible, but the risk posed by disclosing identifying information remains minimized during the analysis/publication stages.

AStudy of Potential CustomerUsage Intentfor in-Vehicle Apps and App Markettype (차량용 앱 및 앱 마켓 유형에 대한 잠재고객의 사용의도 분석 연구: 스마트폰과의 상호 운용성의 중요성)

  • Hong, Joo Hey;Lee, Chang Hoon;Park, Kyu Hong
    • The Journal of Information Systems
    • /
    • v.32 no.3
    • /
    • pp.225-251
    • /
    • 2023
  • Purpose The purpose of this study is to examine the future direction of in-vehicle app development and service, the relationship between potential customers' intention to use and the factors that affect it was explored. It was also checked whether the two types of app development platform and the experience of the existing smartphone app platform had a moderating effect on these relationships. Design/methodology/approach Data was gathered through surveys, collecting responses from 904 potential consumers of vehicle app services in Korea. Structural equation modeling was utilized to analyze the data. Findings According to the empirical analysis result, it was found that potential customers considered enjoyment as the most important benefit factor in in-vehicle app service, and the most important external factor affecting enjoyment was functional compatibility with smartphone. The type of vehicle app development platform did not have a meaningful moderating effect on the factor relationship, whereas the smartphone app platform experience showed a meaningful moderating effect on the relationship between factors. It was analyzed that the risk of app performance, personal information privacy, and driving safety data did not have a negative effect on the intention to use the vehicle app service.