• Title/Summary/Keyword: SNS security

Search Result 143, Processing Time 0.027 seconds

Relationship-based Dynamic Access Control Model with Choosable Encryption for Social Network Service (소셜 네트워크 서비스를 위한 선별적 암호화 기능을 제공하는 관계 기반 동적 접근제어 모델)

  • Kwon, Keun;Jung, Youngman;Jung, Jaewook;Choi, Younsung;Jeon, Woongryul;Won, Dongho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.24 no.1
    • /
    • pp.59-74
    • /
    • 2014
  • The social network service is a online service letting users express the personality and enhancing the human network. However, these features result in side effects which diffuse personal information and make users access to treacherous information. Therefore, various access control models have been proposed. However, the access control mechanisms which encrypt data are only able to be applied for controlling access from direct node, and the access control mechanisms without data encryption allow service provider to access all the information. Moreover, both mechanisms do not consider dynamic changes in reliability of the users. In this paper, we propose relationship-based dynamic access control model including encryption of sensitive data, which consider the characteristics of SNS and improves the security of SNS.

Determinants of Click-Through Intention as Affiliate Marketing and the Moderating Effect of Tie Strength in SNS (SNS에서 제휴마케팅 관점의 클릭의도에 영향을 주는 요인과 연대강도의 조절효과)

  • Mu, Huimin;Joo, Jaehun
    • Information Systems Review
    • /
    • v.15 no.3
    • /
    • pp.89-110
    • /
    • 2013
  • Affiliate marketing is classified as a type of online advertising, where merchants share a percentage of sales revenue generated by each customer, who visited the company's website via a content provider. Content provider, referred to as an affiliate, usually places an online advertisement at its website. For the past few years, there have been a lot of companies or individuals who participate in affiliate marketing. Generally speaking, most of them have websites and post the merchant's ads on their own websites. However, building and maintaining websites have some technology requirements. The widespread use of Social Network Service (SNS), especially microblog-based SNS such as Twitter and Sina Weibo, provides opportunities for individuals who want to be content providers of affiliate marketing. Since information spreads quickly on microblog-based SNS and the easy in targeting customers, it is both an effective and an efficient tool to do affiliate marketing. The relationship between a content provider and the potential customer, which is referred as "tie strength", is quite an important issue in such situation. This paper proved that service characteristics of the microblog-based SNS (security, community drivenness and navigability) and content quality all had positive influence on click-through intention, while tie strength played a moderating role. For the group with strong tie, tie strength is crucial in influencing click-through intention. While for the weak tie group, content quality was very important. Finally, we proposed some implications for both academics and practitioners.

  • PDF

Sites and tools manufactured in accordance with the Web Accessibility Guidelines (웹접근성 지침에 따른 사이트와 도구 제작)

  • Kim, Woong-jae;Oh, Ji-hwan;Lee, Myung-hoon;Lee, Min-seung;Jung, Suji;Ji, Min-kyu
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2014.11a
    • /
    • pp.1054-1056
    • /
    • 2014
  • Means reducing the gap to prevent discomfort to use information from the perspective of Web accessibility is disabled. The current was strong sanctions that have been implemented from the year 2014 to the beginning Government, the public policy of the Web Accessibility Web accessibility compliance obligations. According to 2013 data of the Korea Information Security Agency is only half that of the general public by 28.8% to 100% of the domestic SNS public utilization. Began to cause a change in the web environment and the emergence of mobile SNS. And is a factor that interferes with utilization of the informational content to be neglected Prosumer the environment of their production is consumed too quickly, rapidly problem. Let's start from the idea that we provide a convenient tool for Web accessibility is not an issue on the web site accessibility standards of the project is to create these problems.

The Industrial Security along with the International Transfer of Technology (국제기술이전계약에서의 산업보안에 관한 연구)

  • SEO, Jung-Doo
    • THE INTERNATIONAL COMMERCE & LAW REVIEW
    • /
    • v.76
    • /
    • pp.1-20
    • /
    • 2017
  • The industrial technology (including trade secrets), which is commonly understood as systematic and applied technical knowledge, can be transferred to third parties by contracting for the transfer of technology or by granting of a licence. The activity of industrial espionage, due to the gradual increase of the economic interests of intellectual property, is displaying intensively in order to gain advanced technology information. With our outstanding high technology, but compared to the level of the advanced countries, the technical protection systems, the legal protection measures and the systematic management thereof may still be insufficient. Our industrial technology outflow abroad, due to the vulnerability to the security control system in our country, has been increasing since the 2000. Computer software and SNS, such as smart devices, appear as a rapid change in the technical information environment. In order to minimize the dead zone of a new industrial security, the country's organic activity is being conducted. In 2006, Industrial Technology Outflow Prevention and Protection Law was enacted, which emphasized the responsibilities of the country. In this paper for the economic entity's efforts to prevent technology leakage oversea, I have looked to how the industrial technology can be protected in terms of national security and economic benefits of our enterprises. To solve the above-mentioned problems hereof, Korean government should willingly establish a reliable legal system for supporting to enterprise's operations, and Korean companies should autonomously introduce a synthetic technology protection system and incorporate the confidentiality clauses in an international transfer of technology agreement with third parties.

  • PDF

A Study on Hotel CRM(Customer Relationship Management) using Big Data and Security (빅 데이터를 이용한 호텔기업 CRM 및 보안에 관한 연구)

  • Kong, Hyo-Soon;Song, Eun-Jee
    • Convergence Security Journal
    • /
    • v.13 no.4
    • /
    • pp.69-75
    • /
    • 2013
  • Customer is the base factor of income for some corporations, so that effective CRM (Customer Relationship Management) is very important to develop the business. In order to use CRM efficiently, we should figure out customers' demands and provide services or products that the customers want. However, it is getting difficult to comprehend customers' demands because they have complicated form and getting more diverse. Recently, social media like Twitter and Facebook let customers to express their demands, and using big data is a very effective method for efficient CRM. This research suggests how to utilize big data for hotel CRM, which considers customer itself as asset of business. In addition, we discuss security problems of big data service and propose the solution for that.

Privacy Data Leakage Problem and its Solution in the Used Product Trading Markets (중고거래플랫폼에서 나타나는 개인정보 유출 현황 및 제안)

  • Jang, Min-Kyung;Kim, Ji-Won;Park, Hye-won;Lim, Su-Jin;Kim, Myuhng-Joo
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2022.05a
    • /
    • pp.225-228
    • /
    • 2022
  • 중고 거래 플랫폼 사용이 증가함에 따라 각 중고 거래 플랫폼에 많은 사진과 글이 업로드되고 있다. 플랫폼에 올린 사진과 글을 통해 일차적으로 해당 이용자의 나이대, 사는 동네, 가족 관계, 신체 사이즈, 특정 제품 취향을 알 수 있다. 중고 거래 플랫폼에서 전화번호를 얻게 될 경우, 이차적으로 카카오톡을 통해 이용자의 얼굴 사진, 연동된 계정을 알 수 있다. 이때 얻은 얼굴 정보와 이름, 계정을 통해 인스타그램, 카카오스토리, 페이스북 등 SNS 를 통한 해당 이용자의 추가적인 개인정보들을 얻을 수 있다. 이처럼 이용자가 작성한 글을 통해 사적인 정보가 드러남으로써 심각한 개인정보 유출로 이어질 수 있다. 중고 거래 플랫폼 이용자의 직접적인 입력으로 인한 개인정보 노출을 예방하기 위해서는 이용자에게 게시물에 포함된 개인정보와 개인정보 유출의 위험성을 인지시켜 유출 위험성이 높은 개인정보는 게시하지 않도록 해야 한다. 본 논문에서는 중고 거래 판매 게시물 기반 개인정보 유출 워크플로우를 작성하여 중고 거래 플랫폼에서 나타나는 개인정보 유출의 현황을 분석하고 이를 방지하기 위한 방법을 제안했다.

Differential Item Functioning (DIF) of the Arabic Version of the SONTUS

  • Alhaythami, Hassan M.
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.5
    • /
    • pp.49-54
    • /
    • 2022
  • The objective of this study was to examine the function of the items on the Arabic version of the Social Networking Time Use Scale (SONTUS) using Differential Item Functioning (DIF) across groups of university students in SA (i.e., males and females at UQU). The findings of this study indicated that some of the items in the Arabic version of the SONTUS functioned differently across male and female students in SA. University faculty and administrators in Saudi Arabia as well as in the Arabic world can benefit from understanding students use of SNS.

Design of MBTI Job Recommendation Algorithm Based on Deep Learning (딥러닝 기반의 MBTI 직업 추천 알고리즘 설계)

  • June-Gyeom Kim;Young-Bok Cho
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2023.01a
    • /
    • pp.13-15
    • /
    • 2023
  • 본 논문에서는 성격, 성향을 근거로 사람의 성향에 따른 직업 및 전공에 대한 만족도를 분류한 데이터셋을 구축하여 사전에 사용자의 성향을 파악하여 직업을 추천하는 알고리즘을 제안한다. 성격유형검사 뿐만이 아닌 최근 게시한 SNS 텍스트를 사전에 학습한 데이터셋에 적용해 성격유형 결과의 정확도를 상승시키고자 한다. 사전에 생성한 데이터셋 외에 대상자가 작성한 정보(직업, 전공, 직엄 및 전공에 대한 만족도)로 연합학습을 진행하여 데이터셋의 정확도를 향상시키고자 한다. 모델의 학습 및 분류의 정확도 향상을 위해 SVM, NB, KNN, SDG 알고리즘들을 비교하였고 각각 67%, 21%, 28%, 69%의 정확도를 도출하였다. 데이터 셋은 캐글에서 제공받았다.

  • PDF

A Study on a Prevention Method for Personal Information Exposure (개인정보 노출을 예방하는 방법에 관한 연구)

  • Lee, Ki-Sung;Ahn, Hyo-Beom;Lee, Su-Youn
    • Convergence Security Journal
    • /
    • v.12 no.1
    • /
    • pp.71-77
    • /
    • 2012
  • Along with the development of Internet services such as Social Network Service (SNS) and blog Service, the privacy is very important in these services. But personal data is not safety from exposure to internet service. If personal data is leak out, the privacy is disclosed to hacker or illegal person and the personal information can be used in a cyber crime as phishing attacks. Therefore, the model and method that protects to disclose privacy is requested in SNS and blog services. The model must evaluate degree of exposure to protect privacy and the method protects personal information from Internet services. This paper proposes a model to evaluate risk for privacy with property of personal data and exposure level of internet service such as bulletin board. Also, we show a method using degree of risk to evaluate with a proposed model at bulletin board.

A Study on Secure Digital Convergence Curation System to WebShell (웹셀에 안전한 디지털 융합 큐레이션 시스템에 관한 연구)

  • Shin, Seung-Soo;Kim, Jung-In;Lee, Jun-Yeon
    • Journal of the Korea Convergence Society
    • /
    • v.6 no.4
    • /
    • pp.187-195
    • /
    • 2015
  • In the knowledge and information society which came into being with the advancements made in information and communication technology, there is an increasing perception of the importance of having knowledge and therefore being able to appropriately respond to the rapidly-changing society. Along with this, for the paradigm that stresses creativity and character, there must accompany advanced ways of conducting education which are capable of supporting changes in the educational objectives and contents. With respect to this, there is a need for sustained and long-term research into ways of utilizing SNS and ICT in the field of education. Accordingly, in this paper, a digital curation system was developed for educational contents that aim to develop one's creativity and character. Recently, web hacking is taking place actively. In this paper, a digital curation system that is secure against WebShell - one of the web hacking methods - is analyzed, as well as how to appropriately deal with this type of an attack.