• Title/Summary/Keyword: Privacy risk

Search Result 274, Processing Time 0.026 seconds

FCBAFL: An Energy-Conserving Federated Learning Approach in Industrial Internet of Things

  • Bin Qiu;Duan Li;Xian Li;Hailin Xiao
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.18 no.9
    • /
    • pp.2764-2781
    • /
    • 2024
  • Federated learning (FL) has been proposed as an emerging distributed machine learning framework, which lowers the risk of privacy leakage by training models without uploading original data. Therefore, it has been widely utilized in the Industrial Internet of Things (IIoT). Despite this, FL still faces challenges including the non-independent identically distributed (Non-IID) data and heterogeneity of devices, which may cause difficulties in model convergence. To address these issues, a local surrogate function is initially constructed for each device to ensure a smooth decline in global loss. Subsequently, aiming to minimize the system energy consumption, an FL approach for joint CPU frequency control and bandwidth allocation, called FCBAFL is proposed. Specifically, the maximum delay of a single round is first treated as a uniform delay constraint, and a limited-memory Broyden-Fletcher-Goldfarb-Shanno bounded (L-BFGS-B) algorithm is employed to find the optimal bandwidth allocation with a fixed CPU frequency. Following that, the result is utilized to derive the optimal CPU frequency. Numerical simulation results show that the proposed FCBAFL algorithm exhibits more excellent convergence compared with baseline algorithm, and outperforms other schemes in declining the energy consumption.

Enhancing Construction Safety through Wearable Technology - A Study of Employee Acceptance and Adoption in the USACE

  • Karen E. CARNAGO;Junshan LIU;Scott KRAMER
    • International conference on construction engineering and project management
    • /
    • 2024.07a
    • /
    • pp.879-886
    • /
    • 2024
  • In the dynamic construction industry, particularly within the United States Army Corps of Engineers (USACE), ensuring worker safety in high-risk environments is a critical challenge. This study explores the integration of wearable technology in construction safety, focusing on its potential to enhance personal protective equipment (PPE). The primary goal of this study is to understand the factors influencing USACE employees' acceptance and adoption of wearable technology. Additionally, the research aims to assess the experiences of employees who have already used such technology to identify its practical benefits and levels of user satisfaction. A mixed-method approach was employed to gather qualitative insights from interviews with USACE safety experts and quantitative data from an online survey of USACE personnel. The findings indicate a general reluctance among workers to adopt wearable technology for monitoring work activities, mainly due to privacy concerns, usability issues, and perceived additional workload. However, there is interest in technologies that provide direct safety benefits, such as hazard alerts. This study illuminates the gap between the potential benefits of wearable technology and its current level of acceptance in the construction industry. It identifies the need for strategies to enhance worker acceptance and offers recommendations for future research.

The effects of the degree of education related to information systems on online transaction intention and security concerns - Comparative analysis of the use of the Internet and smartphone (정보시스템 관련 교육의 정도가 보안 우려 및 온라인 거래 의도에 미치는 영향 - 인터넷 이용과 스마트 폰 이용의 비교 분석)

  • Jung, Seung-Min
    • Journal of the Korea Society of Computer and Information
    • /
    • v.17 no.8
    • /
    • pp.145-161
    • /
    • 2012
  • This study aims to explore how the degree of education related to information systems and the Internet literacy affect perceived security risk and how these three variables affect online transaction intention based on the Technology Acceptance Model (TAM). Since using smartphone to purchase necessary products is increasing, the study provided two different cases of using the existing Internet and smartphone to buy products. As a result of an empirical test, the degree of information system education, internet literacy, and perceived security risk had significant effects on online transaction intention mediating perceived usefulness and perceived ease of use. Unlike the expectation, the more people have education related to information systems, the more they have knowledge about hacking or cases of privacy infringement, leading to even more concerns about security, thereby believing the Internet transactions require much effort. The more the education about information system, the more we have concerns about security; therefore, perceived security risk have a positive(+) effect on perceived usefulness not a negative(-) effect. Lastly, while the degree of education related to information systems has relations with the recognition of the usefulness of the Internet transaction, the study showed that there are no relations of recognizing the usefulness and the ease of use of smartphone.

An Analysis of Research Trends in Digital Literacy Education: Implications for Responding to Digital Risks in Science Education (디지털 리터러시 교육 연구 현황 분석 -과학교육에서의 디지털 위험 대응을 위한 함의 도출 -)

  • Gaeun Kim;Wonbin Jang;Minchul Kim
    • Journal of The Korean Association For Science Education
    • /
    • v.44 no.5
    • /
    • pp.433-451
    • /
    • 2024
  • Modern society has become a "digital risk society" with the rapid advancement of digital technologies. The growing use of digital tools in education has led to discussions on managing digital risks that arise in teaching and learning contexts. Among all subjects, science education has experienced significant digital transformation, emphasizing the need for strategies to address digital risks within the subject. This study explores digital literacy education as a possible approach to addressing digital risks in science education. To achieve this, the study analyzes the types of digital risks prevalent in modern society and examines the trends of research on digital risks within the context of digital literacy education. This was done by collecting 415 SSCI articles published over the past decade (2014-2023) with the keyword "Digital Risk" and conducting topic modeling and hierarchical clustering to identify types of digital risks. Additionally, 110 KCI articles published with the keyword "Digital Literacy Education" were collected and classified according to the identified digital risk types. These articles were then compared and analyzed based on publication year, school level, and subject to understand the characteristics of digital risks within science education. The findings are as follows: First, the identified digital risk types include intellectual property infringement, spreading fake news, privacy infringement, cyber financial crimes, gaps in digital literacy, digital technology overdependence, and social structural risks. Second, an analysis of publication trends over the years revealed that discussions on digital risks increased significantly during the COVID-19 pandemic, with research on the digital literacy gap being the most prominent. Third, in terms of school level, digital literacy education addressing digital risks was more actively researched in primary education than in secondary education. Finally, subject-area analysis indicated that science education had the lowest proportion of research on digital risks relative to overall digital literacy studies. In science education, discussions primarily focused on intellectual property infringement, spreading fake news, and gaps in digital literacy. This study emphasizes the importance of addressing digital risks in science education and provides foundational data for further discussions on this topic.

A Comparative Assessment Between ACSS of Canada and FedACH of America as a Electronic Payment System (전자결제시스템으로서 캐나다의 ACSS와 미국의 FedACH의 비교연구)

  • Lee, Byeong-Ryul
    • International Commerce and Information Review
    • /
    • v.18 no.1
    • /
    • pp.55-78
    • /
    • 2016
  • This paper discusses on Electronic Payment System between U.S.A. and Canada. In particular, I focused on ACSS compare with FedACH(Fed Automated Clearing House) to advance a research effects. Because both of them is a low-value, high-volume retail payment system which their countries represent. The ACSS(Automated Clearing Settlement System) is the system through which the vast majority of CPA payment items are cleared, through various payment streams. In 2014, ACSS system cleared approximately 6.8billion payments worth a total value of $ 44.9 trillion. While, The FedACH Network are the center of America Commerce, moving more than $40 trillion each year. That's made up of almost 23 billion electronic financial transaction, including direct deposit via ACH, social security and government benefits, electronic bill payments such as utility and mortgage payments. Thus in this article, first of all, I considered features of payment system and the types of payment items between ACSS and FedAch. Second, I analyzed the status of central bank and legal background. Third, I focused on the operational policy and risk aversion policy. Lastly, I suggested that their payment and banking system have to assume, with good reason, more efficiently accurately and securely operation to protect their customer from credit risk and financial fraud.

  • PDF

Study on Improvement of Weil Pairing IBE for Secret Document Distribution (기밀문서유통을 위한 Weil Pairing IBE 개선 연구)

  • Choi, Cheong-Hyeon
    • Journal of Internet Computing and Services
    • /
    • v.13 no.2
    • /
    • pp.59-71
    • /
    • 2012
  • PKI-based public key scheme is outstanding in terms of authenticity and privacy. Nevertheless its application brings big burden due to the certificate/key management. It is difficult to apply it to limited computing devices in WSN because of its high encryption complexity. The Bilinear Pairing emerged from the original IBE to eliminate the certificate, is a future significant cryptosystem as based on the DDH(Decisional DH) algorithm which is significant in terms of computation and secure enough for authentication, as well as secure and faster. The practical EC Weil Pairing presents that its encryption algorithm is simple and it satisfies IND/NM security constraints against CCA. The Random Oracle Model based IBE PKG is appropriate to the structure of our target system with one secret file server in the operational perspective. Our work proposes modification of the Weil Pairing as proper to the closed network for secret file distribution[2]. First we proposed the improved one computing both encryption and message/user authentication as fast as O(DES) level, in which our scheme satisfies privacy, authenticity and integrity. Secondly as using the public key ID as effective as PKI, our improved IBE variant reduces the key exposure risk.

Legal and Technical Issues of Using Location Information for Police Rescue (경찰 위치추적권 활용의 법적·기술적 문제와 개선방안)

  • Park, Kwang-Ju;Jang, Yun-Sik;Park, Ro-Seop
    • Korean Security Journal
    • /
    • no.53
    • /
    • pp.211-228
    • /
    • 2017
  • In May 2012, the police was empowered to electronically obtain location information of mobile devices from the telecommunication service provides for the purpose of rescue by the Act on the Protection, Use, ETC. of Location Information, after years of pressure with repeated serious violent crime outbreaks and controversy concerning the risk of breaching privacy. This study examines the environmental, legal, and technological challenges related to location tracking at the time of five years after the amendment of the law. The bottom line of police's locating power is to secure the lives of people in deadly emergent circumstance. Therefore, location tracking using given information should be swiftly proceeded after consideration and judgment of justification in timely manner to electronically request information to mobile carriers, and it is necessary to have somewhat flexibility of interpretation to be applied to diverse situation. In addition, location tracking technology should be continuously updated through cooperation with the stake-holders. Recognizing substantial problems in practice, we identified and explored the issues including obtaining prior consent for tracking the user's location in case of emergency, confirmation of emergency situation requiring police presence, qualification of legitimate requester, and limited applicability in various circumstances, which are required to reconsidered in conjunction with the personal information protection laws. Additional practical issues may include the expenses for information provision and other incentives to promote active cooperation by the telecom companies.

  • PDF

An Exploratory Study on the Risks and Threats of SNS(Social Network Service): From a Policing Perspective (SNS(Social Network Service)의 위험성 및 Policing(경찰활동)에 미칠 영향에 대한 시론적 연구)

  • Choi, Jin-Hyuk
    • Korean Security Journal
    • /
    • no.29
    • /
    • pp.301-336
    • /
    • 2011
  • This exploratory study aims to review the risks and threats of social network services(SNSs), particularly focusing upon the policing perspective. This paper seeks to acknowledge the present risk/danger of SNSs and the very significance of establishing a strategic framework to effectively prevent and/or control criminal misuse of SNSs. This research thus advocates that proactive study on security issues and criminal aspects of SNSs and preventive countermeasures can play a significant role in policing the networked society in the time of digital/internet age. Social network sites have been increasingly attracting the attention of entrepreneurs, and academic researchers as well. In this exploratory article, the researcher tried to define concepts and features of SNSs and describe a variety of issues and threats posed by SNSs. After summarizing existing security risks, the researcher also investigated both the potential threats to privacy associated with SNSs, such as ID theft and fraud, and the very danger of SNSs in case of being utilized by terrorists and/or criminals, including cyber-criminals. In this study, the researcher primarily used literature reviews and empirical methods. The researcher thus conducted extensive case studies and literature reviews on SNSs. The literature reviews herein cover theoretical discussions on characteristics, usefulness, and/or potential danger/harm of SNSs. Through the literature review, the researcher also concentrated upon being able to identify a strategic framework for law enforcement to effectively prevent criminal misuse of SNSs The limitation of this study can be lack of statistical data and attempts to examine previously un-researched area in the field of SNS and its security risks and potential criminal misuse. Thus, to supplement this exploratory study, more objective theoretical models and/or statistical approaches would be needed to provide law enforcement with sustainable policing framework and contribute to suggesting policy implications.

  • PDF

A Study on Personalized Product Demand Manufactured by Smart Factory (스마트팩토리 환경의 개인맞춤형 제품 구매의도의 영향요인에 관한 연구)

  • Woo, Su-Han;Kwon, Sun-Dong
    • Management & Information Systems Review
    • /
    • v.38 no.1
    • /
    • pp.23-41
    • /
    • 2019
  • Smart Factory is different from existing factory automation in that it aims to produce personalized products with minimum time and cost through ICT. However, previous researches, not from consumers but from product suppliers, have focused on technology trends and technology application methods. In order for Smart Factory to be successful, it must go beyond supplier-focus to meet the needs of consumers. In this study, we surveyed the purchase intention of the personalized product manufactured by smart factory. Influencing factors of purchase intention were drawn as consumers' need for uniqueness, innovativeness, need for touch, and privacy concern, based on previous research. As results of data analysis, it was confirmed that respondents were willing to purchase personalized products, and that consumers' need for uniqueness, innovativeness, and need for touch had a significant impact on purchase intention of personalized products. Our findings can be summarized as follows. First, Consumers' need for uniqueness was found to have positive effects(${\beta}=0.168$) on purchase intention of personalized products. The desire to differentiate themselves from others will be reflected in their personalized products. Therefore, consumers with a higher desire for uniqueness tend to be more willing to purchase personalized products. Second, consumer innovativeness was found to have positive effects(${\beta}=0.233$) on purchase intention of personalized products. Personalized shoes suggested in this study is a new type of personalized product that is manufactured by the latest information and communication technologies such as multi-function robots and 3D printing. Therefore, consumers seeking innovative new experiences are more willing to purchase personalized products. Third, need for touch was found to have positive effects(${\beta}=0.299$) on purchase intention of personalized products. In a smart factory environment, prosuming participation is given to consumers. If consumers participate in the product development process and reflect their requirements on the product, they are expected to increase their purchase intention by virtually satisfying the need for touch. Fourth, privacy concern was found to have no significantly related to purchase intention of personalized products. This is interpreted as a willingness to tolerate the risk of exposing personal information such as home address, telephone number, body size, and preference for consumers who feel highly useful in personalized products.

Classification of Online Tracking Technology and Implications in User Perspective (온라인 트래킹 기술 분류 및 이용자 관점에서의 시사점)

  • Lee, Bohan;Rha, Jong-Youn
    • Journal of Digital Convergence
    • /
    • v.16 no.9
    • /
    • pp.159-172
    • /
    • 2018
  • This study searched and analyzed online tracking technologies. It tried to understand what to consider when establishing policies related to online tracking. Online tracking technologies were classified into 'general cookies', 'super cookies', 'fingerprinting', 'device ID tracking' and 'cross-device tracking'. Political considerations should include the layers of online tracking, the subjects of tracking technology, purpose of use, duration and storage format of information, and development of technology. The implications of this study are as follows: first, policy makers and industry should be aware that the degree of risk perceived by users may vary according to the characteristics of online tracking technology. Secondly, it is necessary to understand factors that affect the classification of online tracking technology. Finally, in the industry, preemptive measures such as building an integrated privacy system are needed to relieve anxiety of users and to build trust.