• Title/Summary/Keyword: data anonymity

Search Result 140, Processing Time 0.027 seconds

A comparison of working alliance, session evaluation and participants' experience of university student clients by counseling media -Comparison of face-to-face, phone, video, and video with digital mask counseling- (대학생 내담자를 대상으로 한 상담 작업동맹과 회기 평가 및 내담자 경험 비교 연구 - 전화, 화상 및 디지털가면 화상상담과 대면상담 비교 -)

  • Cho, Eunsuk;Oh, Yoon-Seok;Jang, Eun-Hee
    • The Journal of the Convergence on Culture Technology
    • /
    • v.8 no.6
    • /
    • pp.49-58
    • /
    • 2022
  • The purpose of this study is to find out how on-line counseling modalities (phone, video, and video counseling using digital mask) differ from face-to-face counseling in terms of clients' perception of working alliance, depth and smoothness of each session, satisfaction, and their qualitative counseling experience. 40 university students participated in the experiment, divided into 4 groups, received 3 personal counseling sessions per person. The quantitative data revealed no significant difference among the four counseling groups in working alliance. Also, the "depth" of the session was similar in the four groups, but phone and video with mask counseling group who did not expose their faces showed higher "smoothness" in the first and second sessions than face-to-face counseling group, indicating that anonymity was helping the clients' inhibition overcome. Through the post-interview data, subtle differences in experience of each counseling method were identified by the participants. The results are expected to provide primary information for developing and implementing various online counseling modalities in the future.

A Hybrid Blockchain-Based E-Voting System with BaaS (BaaS를 이용한 하이브리드 블록체인 기반 전자투표 시스템)

  • Kang Myung Joe;Kim Mi Hui
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.12 no.8
    • /
    • pp.253-262
    • /
    • 2023
  • E-voting is a concept that includes actions such as kiosk voting at a designated place and internet voting at an unspecified place, and has emerged to alleviate the problem of consuming a lot of resources and costs when conducting offline voting. Using E-voting has many advantages over existing voting systems, such as increased efficiency in voting and ballot counting, reduced costs, increased voting rate, and reduced errors. However, centralized E-voting has not received attention in public elections and voting on corporate agendas because the results of voting cannot be trusted due to concerns about data forgery and modulation and hacking by others. In order to solve this problem, recently, by designing an E-voting system using blockchain, research has been actively conducted to supplement concepts lacking in existing E-voting, such as increasing the reliability of voting information and securing transparency. In this paper, we proposed an electronic voting system that introduced hybrid blockchain that uses public and private blockchains in convergence. A hybrid blockchain can solve the problem of slow transaction processing speed, expensive fee by using a private blockchain, and can supplement for the lack of transparency and data integrity of transactions through a public blockchain. In addition, the proposed system is implemented as BaaS to ensure the ease of type conversion and scalability of blockchain and to provide powerful computing power. BaaS is an abbreviation of Blockchain as a Service, which is one of the cloud computing technologies and means a service that provides a blockchain platform ans software through the internet. In this paper, in order to evaluate the feasibility, the proposed system and domestic and foreign electronic voting-related studies are compared and analyzed in terms of blockchain type, anonymity, verification process, smart contract, performance, and scalability.

Prevention Methods of Cyber-crimes using the Private Security (민간경비를 활용한 사이버범죄 예방 방안)

  • Kim, Sang-Woon;Jo, Hyun-Bin
    • The Journal of the Korea Contents Association
    • /
    • v.13 no.3
    • /
    • pp.141-151
    • /
    • 2013
  • With the spread of Personal Computers(PC) in the 1980's, many people started to deal businesses with PC. From late 1990's, the Internet age with PC have started and many people have showed keen interest in cyber-space and now they are utilizing it. Since 2000's the use of cyber-space have skyrocketed and it caused significant changes to humans' life. There was a huge prosperity to us but the new kind of crime, cyber-crime, was raised. Unlike past physical type of crimes, those cyber-crimes take place in the cyber-space and they have special features of non-facing, anonymity, specialty, technologic, repetition, continuation. Those cyber-crimes are continually growing since 2003 and in 2010 it almost doubled compared to 2003. General cyber-crimes like phishing-scam pornography circulation was most of them and notably perpetrators of them are younger generation. Recently cyber-crimes are showing the trend of advancing more and more and cyber-bullying, fraud like phishing scam are on the rise. The police are responding by making 'Cyber Terror Response Center', but it does not work effectively with the problems of breakup of prevention and investigation unit, procedure of investigation and the system itself. So, I suggest practical use of private security to remedy our police's weakness and to prevent cyber-crimes. Preventing solutions of cyber-crime with private security are physical defense of large-scale servers and vital computers, building of Back-up system to prevent vital data loss, and building of cyber-crime preventing system combining software and hardware.

Adolescents' Information-seeking Behavior for Gender Identity in a Community-driven Knowledge Site (청소년들의 성 정체성에 관한 지식검색 커뮤니티 정보탐색행태)

  • Yi, Da Jeong;Yi, Yong Jeong
    • Journal of the Korean Society for information Management
    • /
    • v.36 no.4
    • /
    • pp.161-181
    • /
    • 2019
  • People begin to recognize sexual orientation or gender identity in adolescence, and adolescents frequently use an accessible and anonymous anonymity knowledge retrieval community to explore sensitive health information about gender. This study attempted to observe their information search behavior based on questions and answers about adolescents' gender identity in the knowledge retrieval community. First, we wanted to examine their information needs and to investigate what factors they preferred to answer by comparing the characteristics of the answers adopted with the non-adopted answers among the answers provided in the questions they shared. To this end, Naver, Korea's representative knowledge search community. In Knowledge-iN, a total of 358 sets of data were analyzed, consisting of responses adopted over three years from January 2016 to December 2018. As a result, adolescents with concerns about gender identity demanded information about definition or confusion about gender identity. In the responses adopted by the users, the factors that gave empathy and positive feelings were higher than those that were not adopted, whereas the negative responses were higher in the unaccepted answers. This study is meaningful in that it analyzes the information needs and information search behaviors of adolescents with no established gender identity, expands the discussion in the information search field, and confirms cognitive and emotional models for information evaluation of health information users. Also, based on the research results, we propose practical implications for effective information services on gender identity that social media should provide to young people.

An Adaptive Authentication Protocol for Ambient Assisted Living Systems (전천 후 생활보조 시스템을 위한 적응형 인증 프로토콜)

  • Yi, Myung-Kyu;Choi, Hyunchul;Whangbo, Taeg-Keun
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.18 no.4
    • /
    • pp.19-26
    • /
    • 2018
  • In recent years, the substantial increase in the population's average age leads to an exceeded number of older persons comparing with the number of any other age group. As a result, both industry and academia are focused on the development of several solutions aimed to guarantee a healthy and safe lifestyle to the elderly. Ambient Assisted Living (AAL) approach is the way to guarantee better life conditions for the aged and for monitoring their health conditions by the development of innovative technologies and services. AAL technologies can also provide more safety for the elderly, offering emergency response mechanisms, fall detection solutions, and video surveillance systems. Unfortunately, due to the sensitive nature of AAL data, AAL systems should satisfy security requirements such as integrity, confidentiality, availability, anonymity, and others. In this paper, we propose an adaptive authentication protocol for the AAL systems. The proposed authentication protocol not only supports several important security requirements needed by the AAL systems, but can also withstand various types of attacks. In addition, the security analysis results show that the proposed authentication protocol is more efficient and secure than the existing authentication protocols.

Verifying a Safe P2P Security Protocol in M2M Communication Environment (M2M 통신환경에서 안전한 P2P 보안 프로토콜 검증)

  • Han, Kun-Hee;Bae, Woo-Sik
    • Journal of Digital Convergence
    • /
    • v.13 no.5
    • /
    • pp.213-218
    • /
    • 2015
  • In parallel with evolving information communication technology, M2M(Machine-to-Machine) industry has implemented multi-functional and high-performance systems, and made great strides with IoT(Internet of Things) and IoE(Internet of Everything). Authentication, confidentiality, anonymity, non-repudiation, data reliability, connectionless and traceability are prerequisites for communication security. Yet, the wireless transmission section in M2M communication is exposed to intruders' attacks. Any security issues attributable to M2M wireless communication protocols may lead to serious concerns including system faults, information leakage and privacy challenges. Therefore, mutual authentication and security are key components of protocol design. Recently, secure communication protocols have been regarded as highly important and explored as such. The present paper draws on hash function, random numbers, secret keys and session keys to design a secure communication protocol. Also, this paper tests the proposed protocol with a formal verification tool, Casper/FDR, to demonstrate its security against a range of intruders' attacks. In brief, the proposed protocol meets the security requirements, addressing the challenges without any problems.

Effects of Positive Psychological Capital, Social Support, and Social Existence on Quality of Life for Vietnamese Students (베트남 유학생의 긍정심리자본, 사회적지지, 사회적 현존감이 삶의 질에 미치는 영향)

  • Yoon, Ji-Won;Je, Nam-Ju;Hwa, Jeong-Seok;Park, Mee-Ra
    • The Journal of the Convergence on Culture Technology
    • /
    • v.8 no.5
    • /
    • pp.271-278
    • /
    • 2022
  • This study attempted to prepare basic data for international students with Vietnamese nationality in Korea to identify positive psychological capital, social support, social presence, and quality of life and to prepare support measures to improve their quality of life. Data collection is from May 1, 2021 to June 30, 2021, and was conducted through an online survey for anonymity and convenience. For data analysis, the IBM SPSS/25 statistical program was used, and the significance level for the results was measured as .05, and the reliability of each measurement tool was calculated. The results of this study are summarized as follows. First, the age of the subjects was '24 years old-27 years old', and women accounted for the majority. In the fourth grade, the fourth grade was the most, with "outgoing" personality, "sometimes" experiences of interpersonal conflict, "more than four years and less than five years" in the period of residence in Korea, and the level of Korean proficiency was "grade three." Second, the average quality of life of Vietnamese international students was 3.52 points (out of 5 points), positive psychological capital was 3.98 points (out of 6 points), social support was 2.96 points (out of 4 points), and social presence was 3.59 points (out of 5 points). Third, in the case of the quality of life of Vietnamese international students, there was a significant difference according to their personality, and as a result of post-verification, the quality of life of the 'extroverted' group was higher than the 'mixed' group. There was a significant difference according to interpersonal conflict), and as a result of post-examination, the "no conflict" group had a higher quality of life than the "conflict frequent" group. Fourth, the factors that most affected the subject's quality of life were social support, positive psychological capital, and personality (extroverted). The explanatory power of the model was 33.2%.

Smoking Adolescents' Acquisition of Cigarettes and Status of Proof of Age (흡연을 하는 청소년의 담배 구입 경로 및 신분 확인의 유무)

  • Kim, Hee Ra;Kim, Ji Young;Lee, Gee Hyung;Choung, Ji Tae;Park, Sang Hee
    • Clinical and Experimental Pediatrics
    • /
    • v.48 no.4
    • /
    • pp.363-368
    • /
    • 2005
  • Purpose : The aim of this study is to identify where and how adolescents acquire cigarettes and how many were asked for identification while purchasing cigarettes. Methods : This study was conducted in 2003; participants were 2,200 students in middle and high schools, aged from 13 to 18 years old(males 1,098; females 1,102) in Ansan, Korea. The questionnaire assured them of anonymity, and self-administered in school. The data was analyzed with chisquare test for trends. Results : The prevalence of smoking was about 20 percent among respondents, was higher in males than in females, and in older students than in younger students(P<0.001). The most frequent source of cigarettes was purchased from a store(36.3 percent). About 29.2 percent of the students borrowed from friends or family members. By sex, the main sources of cigarettes were purchase from a store and borrowing. Younger students were borrowed more cigarettes; older students purchased more cigarettes from stores. Only 48.8 percent were asked for proof of age during their purchase. Of those asked for proof of age, about 73.3 percent answered that this made it difficult to buy cigarettes(P<0.001), and they thought that it was more difficult when asked for a photo ID than simply being asked their age(P=0.019). Conclusion : So far, there has been no systemic prevention of adolescents' smoking. It is difficult for minors to purchase cigarettes if asked for proof of age, but most minors go to stores to purchase cigarettes. Therefore, prevention efforts should include educating retailers not to sell cigarettes to minors and enforcing existing laws requiring youth to provide proof of age when attempting to buy cigarettes.

A Study about the Direction and Responsibility of the National Intelligence Agency to the Cyber Security Issues (사이버 안보에 대한 국가정보기구의 책무와 방향성에 대한 고찰)

  • Han, Hee-Won
    • Korean Security Journal
    • /
    • no.39
    • /
    • pp.319-353
    • /
    • 2014
  • Cyber-based technologies are now ubiquitous around the glob and are emerging as an "instrument of power" in societies, and are becoming more available to a country's opponents, who may use it to attack, degrade, and disrupt communications and the flow of information. The globe-spanning range of cyberspace and no national borders will challenge legal systems and complicate a nation's ability to deter threats and respond to contingencies. Through cyberspace, competitive powers will target industry, academia, government, as well as the military in the air, land, maritime, and space domains of our nations. Enemies in cyberspace will include both states and non-states and will range from the unsophisticated amateur to highly trained professional hackers. In much the same way that airpower transformed the battlefield of World War II, cyberspace has fractured the physical barriers that shield a nation from attacks on its commerce and communication. Cyberthreats to the infrastructure and other assets are a growing concern to policymakers. In 2013 Cyberwarfare was, for the first time, considered a larger threat than Al Qaeda or terrorism, by many U.S. intelligence officials. The new United States military strategy makes explicit that a cyberattack is casus belli just as a traditional act of war. The Economist describes cyberspace as "the fifth domain of warfare and writes that China, Russia, Israel and North Korea. Iran are boasting of having the world's second-largest cyber-army. Entities posing a significant threat to the cybersecurity of critical infrastructure assets include cyberterrorists, cyberspies, cyberthieves, cyberwarriors, and cyberhacktivists. These malefactors may access cyber-based technologies in order to deny service, steal or manipulate data, or use a device to launch an attack against itself or another piece of equipment. However because the Internet offers near-total anonymity, it is difficult to discern the identity, the motives, and the location of an intruder. The scope and enormity of the threats are not just focused to private industry but also to the country's heavily networked critical infrastructure. There are many ongoing efforts in government and industry that focus on making computers, the Internet, and related technologies more secure. As the national intelligence institution's effort, cyber counter-intelligence is measures to identify, penetrate, or neutralize foreign operations that use cyber means as the primary tradecraft methodology, as well as foreign intelligence service collection efforts that use traditional methods to gauge cyber capabilities and intentions. However one of the hardest issues in cyber counterintelligence is the problem of "Attribution". Unlike conventional warfare, figuring out who is behind an attack can be very difficult, even though the Defense Secretary Leon Panetta has claimed that the United States has the capability to trace attacks back to their sources and hold the attackers "accountable". Considering all these cyber security problems, this paper examines closely cyber security issues through the lessons from that of U.S experience. For that purpose I review the arising cyber security issues considering changing global security environments in the 21st century and their implications to the reshaping the government system. For that purpose this study mainly deals with and emphasis the cyber security issues as one of the growing national security threats. This article also reviews what our intelligence and security Agencies should do among the transforming cyber space. At any rate, despite of all hot debates about the various legality and human rights issues derived from the cyber space and intelligence service activity, the national security should be secured. Therefore, this paper suggests that one of the most important and immediate step is to understanding the legal ideology of national security and national intelligence.

  • PDF

Toward a Social Sciences Methodology for Electronic Survey Research on the Internet or Personal Computer check (사회과학 연구에 있어 인터넷 및 상업용 통신망을 이용한 전자설문 조사방법의 활용)

  • Hong Yong-Gee;Lee Hong-Gee;Chae Su-Kyung
    • Management & Information Systems Review
    • /
    • v.3
    • /
    • pp.287-316
    • /
    • 1999
  • Cyberspace permits us to more beyond traditional face-to-face, mail and telephone surveys, yet still to examine basic issues regarding the quality of data collection: sampling, questionnaire design, survey distribution, means of response, and database creation. This article address each of these issues by contrasting and comparing traditional survey methods(Paper-and-Pencil) with Internet or Personal Computer networks-mediated (Screen-and-Keyboard) survey methods also introduces researchers to this revolutionary and innovative tool and outlines a variety of practical methods for using the Internet or Personal Computer Networks. The revolution in telecommunications technology has fostered the rapid growth of the Internet all over the world. The Internet is a massive global network and comprising many national and international networks of interconnected computers. The Internet or Personal Computer Networks could be the comprehensive interactive tool that will facilitate the development of the skills. The Internet or Personal Computer Networks provides a virtual frontier to expand our access to information and to increase our knowledge and understanding of public opinion, political behavior, social trends and lifestyles through survey research. Comparable to other technological advancements, the Internet or Personal Computer Networks presents opportunities that will impact significantly on the process and quality of survey research now and in the twenty-first century. There are trade-offs between traditional and the Internet or Personal Computer Networks survey. The Internet or Personal Computer Networks is an important channel for obtaining information for target participants. The cost savings in time, efforts, and material were substantial. The use of the Internet or Personal Computer Networks survey tool will increase the quality of research environment. There are several limitations to the Internet or Personal Computer Network survey approach. It requires the researcher to be familiar with Internet navigation and E-mail, it is essential for this process. The use of Listserv and Newsgroup result in a biased sample of the population of corporate trainers. However, it is this group that participates in technology and is in the fore front of shaping the new organizations of interest, and therefore it consists of appropriate participants. If this survey method becomes popular and is too frequently used, potential respondents may become as annoyed with E-mail as the sometimes are with mail survey and junk mail. Being a member of the Listserv of Newsgroup may moderate that reaction. There is a need to determine efficient, effective ways for the researcher to strip identifiers from E-mail, so that respondents remain anonymous, while simultaneously blocking a respondent from responding to a particular survey instrument more than once. The optimum process would be on that is initiated by the researcher : simple, fast and inexpensive to administer and has credibility with respondents. This would protect the legitimacy of the sample and anonymity. Creating attractive Internet or Personal Computer Networks survey formats that build on the strengths of standardized structures but also capitalize on the dynamic and interactive capability of the medium. Without such innovations in survey design, it is difficult to imagine why potential survey respondents would use their time to answer questions. More must be done to create diverse and exciting ways of building an credibility between respondents and researchers on the Internet or Personal Computer Networks. We believe that the future of much exciting research is based in the Electronic survey research. The ability to communicate across distance, time, and national boundaries offers great possibilities for studying the ways in which technology and technological discourse are shaped. used, and disseminated ; the many recent doctoral dissertations that treat some aspect of electronic survey research testify to the increase focus on the Internet or Personal Computer Networks. Thus, scholars should begin a serious conversation about the methodological issues of conducting research In cyberspace. Of all the disciplines, Internet or Personal Computer Networks, emphasis on the relationship between technology and human communication, should take the lead in considering research in the cyberspace.

  • PDF