• Title/Summary/Keyword: digital privacy

Search Result 377, Processing Time 0.035 seconds

Windows 7 Operating System Event based Visual Incident Analysis System (윈도우즈 7 운영체제 이벤트에 대한 시각적 침해사고 분석 시스템)

  • Lee, Hyung-Woo
    • Journal of Digital Convergence
    • /
    • v.10 no.5
    • /
    • pp.223-232
    • /
    • 2012
  • Recently, the leakage of personal information and privacy piracy increase. The victimized case of the malicious object rapidlies increase. Most of users use the windows operating system. Recently, the Windows 7 operating system was announced. Therefore, we need to study for the intrusion response technique at the next generation operate system circumstances. The accident response technique developed till now was mostly implemented around the Windows XP or the Windows Vista. However, a new vulnerability problem will be happen in the breach process of reaction as the Windows 7 operating system is announced. In the windows operating system, the system incident event needs to be efficiently analyzed. For this, the event information generated in a system needs to be visually analyzed around the time information or the security threat weight information. Therefore, in this research, we analyzed visually about the system event information generated in the Windows 7 operating system. And the system analyzing the system incident through the visual event information analysis process was designed and implemented. In case of using the system developed in this study the more efficient accident analysis is expected to be possible.

RFID-based Authentication Protocol for Implantable Medical Device (체내삽입장치에 RFID 기술을 적용한 인증 프로토콜)

  • Jeong, Yoon-Su
    • Journal of Digital Convergence
    • /
    • v.10 no.2
    • /
    • pp.141-146
    • /
    • 2012
  • U-healthcare, which grafted advanced IT technology onto medical technology, is in the limelight because it can provide medical services at anytime and anywhere. U-healthcare system applied RFID technology for Implantable Medical Device (IMD), but patient's biometric information can be easily exposed to third parties. In this article, RFID-based U-healthcare authentication protocol is proposed to prevent illegal usage for personal biometric information exposed to the third patty. The proposed protocol guarantees patients' biometric information integrity as compounding random numbers between administrators and hospital/clinic managers, and uses continuous number SEQ and time stamp T to synchronize IMD/administrators and administrators/hospital managers. Also, to protect user's privacy from the third party, patients' biometric information can be safely guarded by managing patients' security identifiers by administrators.

A Study on Improvement of Used-goods Market Platform Using Blockchain (블록체인을 이용한 중고거래 플랫폼 개선방안 연구)

  • Lee, Kyoung-Nam;Jeon, Gyeahyung
    • Journal of Digital Convergence
    • /
    • v.16 no.9
    • /
    • pp.133-145
    • /
    • 2018
  • This study was investigated the necessity and possibility of using block-chain technology in online used-goods trading platform. Current online used-goods trading platforms operate a safety trading system, but it is difficult to utilize due to relatively high commission rate. As a result, people mainly use the method of meeting and purchasing in person, which is a relatively costly method. This study discusses how to build a platform to solve or mitigate problems such as privacy, information distortion and omission, fraud, etc. In the platform proposed in this study, it is possible to solve the major fraud and personal information protection problems that may occur in the transaction proceeding by appropriately reflecting the types and characteristics of the block-chain technology. In future work, we will discuss legal framework and technology development plan to apply the proposed platform in this study.

Classification of Online Tracking Technology and Implications in User Perspective (온라인 트래킹 기술 분류 및 이용자 관점에서의 시사점)

  • Lee, Bohan;Rha, Jong-Youn
    • Journal of Digital Convergence
    • /
    • v.16 no.9
    • /
    • pp.159-172
    • /
    • 2018
  • This study searched and analyzed online tracking technologies. It tried to understand what to consider when establishing policies related to online tracking. Online tracking technologies were classified into 'general cookies', 'super cookies', 'fingerprinting', 'device ID tracking' and 'cross-device tracking'. Political considerations should include the layers of online tracking, the subjects of tracking technology, purpose of use, duration and storage format of information, and development of technology. The implications of this study are as follows: first, policy makers and industry should be aware that the degree of risk perceived by users may vary according to the characteristics of online tracking technology. Secondly, it is necessary to understand factors that affect the classification of online tracking technology. Finally, in the industry, preemptive measures such as building an integrated privacy system are needed to relieve anxiety of users and to build trust.

Dilemma of Data Driven Technology Regulation : Applying Principal-agent Model on Tracking and Profiling Cases in Korea (데이터 기반 기술규제의 딜레마 : 국내 트래킹·프로파일링 사례에 대한 주인-대리인 모델의 적용)

  • Lee, Youhyun;Jung, Ilyoung
    • Journal of Digital Convergence
    • /
    • v.18 no.6
    • /
    • pp.17-32
    • /
    • 2020
  • This study analyzes the regulatory issues of stakeholders, the firm, the government, and the individual, in the data industry using the principal-agent theory. While the importance of data driven economy is increasing rapidly, policy regulations and restrictions to use data impede the growth of data industry. We applied descriptive case analysis methodology using principal-agent theory. From our analysis, we found several meaningful results. First, key policy actors in data industry are data firms and the government among stakeholders. Second, two major concerns are that firms frequently invade personal privacy and the global companies obtain monopolistic power in data industry. This paper finally suggests policy and strategy in response to regulatory issues. The government should activate the domestic agent system for the supervision of global companies and increase data protection. Companies need to address discriminatory regulatory environments and expand legal data usage standards. Finally, individuals must embody an active behavior of consent.

A Study of Message Communication Method Using Attribute Based Encryption in IoT Environment (IoT 환경에서 속성기반 암호화 기술을 활용한 메시지 통신 기법에 관한 연구)

  • Park, Jung-Oh
    • Journal of Digital Convergence
    • /
    • v.14 no.10
    • /
    • pp.295-302
    • /
    • 2016
  • Many countries, especially ICT powers, are supporting IoT-based technology at a national level and this technology is actively being researched in the businesses and research institutes in an aim to develop technology and create an ecosystem. Roads in the Seoul city are building public facilities based on IoT to provide various services and conveniences for the users. However, for the full-fledged introduction and development of IoT, there are many cases where infringement on security and privacy and threat for life and safety happen. Also, as the IoT environment includes various environment technologies such as the existing sensor network, heterogeneous communication network, and devices optimized for the IoT environment, it inherits the existing security threat and various attack techniques. This paper researches the attribute based encryption technology for safe communication in the IoT environment. The data collected from the device is transmitted utilizing the attribute based encryption and by designing the key generation protocol, grades and authorities for the device and users are identified to transmit safe messages.

Investigation of Research Trends in Information Systems Domain Using Topic Modeling and Time Series Regression Analysis (토픽모델링과 시계열회귀분석을 활용한 정보시스템분야 연구동향 분석)

  • Kim, Chang-Sik;Choi, Su-Jung;Kwahk, Kee-Young
    • Journal of Digital Contents Society
    • /
    • v.18 no.6
    • /
    • pp.1143-1150
    • /
    • 2017
  • The objective of this study is to examine the trends in information systems research. The abstracts of 1,245 articles were extracted from three leading Korean journals published between 2002 and 2016: Asia Pacific Journal of Information Systems, Information Systems Review, and The Journal of Information Systems. Time series analysis and topic modeling methods were implemented. The topic modeling results showed that the research topics were mainly "systems implementation", "communication innovation", and "customer loyalty". The time series regression results indicated that "customer satisfaction", "communication innovation", "information security", and "personal privacy" were hot topics, and on the other hand, "system implementation" and "web site" were the least popular. This study also provided suggestions for future research.

Impacts of Information Source and E-service Quality on Mobile Shopping Behavior in KakaoTalk

  • Yi, Kyong-Hwa;Jeon, Sua;Kim, HaeJung Maria;Forney, Judith
    • Journal of Fashion Business
    • /
    • v.20 no.6
    • /
    • pp.32-51
    • /
    • 2016
  • KakaoTalk has become a reputed mobile social network and an inseparable part of people's lives by leading the mobile industry in South Korea. However, there is a lack of studies in academia regarding perception of the consumers and assessment toward the mobile marketing and services by KakaoTalk. Based on the theoretical orientation of Elaboration Likelihood Model (ELM: Petty & Cacioppo, 1986) and electronic service quality (E-S-QUAL: Parasuraman, Zeithaml, & Malhotra, 2005), this study investigates the effects of information sources (Charles & Richard, 1988), and examines the consumer perception toward the service quality of KakaoTalk. A total of 209 responses were collected, using a self-administered survey in Seoul and Gyeonggi province, South Korea from March 2015 to June 2015. A seven-point Likert scale survey was developed to measure the information sources (i.e., argument quality, post popularity, and post attractiveness), electronic service quality (i.e., efficiency, fulfillment, privacy, and system availability), attitude (i.e., usefulness, preference, and overall attitude), and behavioral intention (i.e., like intention, share intention, and purchase intention). This study reveals a consensus that an online environment is different from the traditional retail context in terms of information source and service quality. Specifically, the results indicate that argument quality greatly impacts the attitudes of the individuals and their behavioral intention toward mobile shopping via social media channel. The most powerful factor among E-S-QUAL is "efficiency." This dimension of service quality influences the customer perception of usefulness and preference as well as share and like intention toward mobile shopping on KakaoTalk.

An Empirical Study of the Effect of Perceived Risk upon Intention to LBS Use (위치기반서비스 이용에 대한 인지된 위험의 영향 연구)

  • Kim, Sang Min;Lee, Ji-Eun;Park, Chankwon
    • Journal of Digital Convergence
    • /
    • v.12 no.12
    • /
    • pp.119-127
    • /
    • 2014
  • As the disclosure of privacy information has grown steadily, concerns about mobile services based on the personal information also increased. We aspired to reveal factors influencing the use of Location-Based services(LBS) App and analyse how the perceived risk affected between these factors and the use of LBS App. Results showed that usefulness and social influence influenced on the use of LBS App. We also found that the group who highly recognized the perceived risk was highly affected by usefulness and the group who lowly recognized the perceived risk was highly affected by social influence. Findings show that the company's strategy should be different depending on the level of consumers' perceived risk.

A Study on the Web Service Quality and User Satisfaction at Open Market (오픈마켓의 웹서비스 품질과 사용자 만족)

  • Son, Yong-Shim;Seo, Chang-Gab
    • Journal of Digital Convergence
    • /
    • v.11 no.6
    • /
    • pp.113-127
    • /
    • 2013
  • The open market are expanding service quality which was used as rating scale in the field of marketing. In accordance with open market, they convert it to e-service quality and use it. Udo et al.[6] suggested web service quality combining e-SEVQUAL[2] and extended Information Success Model[7]. This study suggests four influence factors of e-service quality in the open market; website privacy and security, web site contents, web site convenience, and images of the open market companies. The study conducted survey on 301 college students and life long education center students in Busan. The study found that all four influence factors have positive effects on the web service quality and ultimately web service quality has beneficial effects on the satisfaction in open market users' information system.