• Title/Summary/Keyword: digital privacy

Search Result 377, Processing Time 0.027 seconds

The Growth of Mobile Advertising and the Future of the Advertising Industry (모바일광고의 성장과 광고산업의 미래)

  • Lee, Chi-Hyung
    • Journal of Digital Convergence
    • /
    • v.14 no.8
    • /
    • pp.203-209
    • /
    • 2016
  • The advertising media is undergoing a dramatic change mainly due to the increased use of smartphone. This study predicts the future of the advertising industry driven by the mobile advertising using scenario planning. Targeting technologies, restriction on the use of personal information, and overcoming ad avoidance were selected as key uncertain variables expected to impact on the growth of the mobile advertising 5 years later. With the support by expert interviews, the $2{\times}2$ matric combines two cases to generate four scenarios; the one whether mobile ads surpass PC-based online ads, the other whether the combined force of mobile and PC-based ads surpass the traditional media in advertising spendings. Each scenario is articulated according to the future of key variables. The most likely scenario is that mobile will dominate the advertising media market. However, it is important not to ignore different scenarios because key variables evolves in unexpected manner and then they can become reality. The future research will combine its key variables with social and economic ones and segment technical variables in more details.

A Study on the Improvement of User Centered Public Service Design - focused on Sung-Nam local tax bills (수요자 중심의 공공서비스 디자인 개선방안 - 성남시 지방세 고지서 디자인 개선안을 중심으로)

  • Park, Jinhee
    • Journal of Digital Convergence
    • /
    • v.14 no.3
    • /
    • pp.381-389
    • /
    • 2016
  • I conducted this study, trying to improve the methods of Sung-Nam city local tax bills, which was based on my previous study where I suggested methods into developing redesign of tax bills. Local tax bills are labeled to be very intricate and puzzling experience to tax payers. To resolve this issue, several local governments have redesigned their tax bills for citizens; however, it was not effective. Therefore I apply the methods to protect their privacy on tax bills and provide checks on their pay bills. Also I design to distinguish between different taxes and change into a better layout for their legibility and better understanding on tax bills. From my previous study, I utilized suggestions into Sung-Nam local tax bills which changed flaws into improvements and easier understanding of the tax payers. I believe the improvements in Sung Nam local tax bills will pursue the public interest of the community through public service design innovations.

An Exploratory Study on the Current Situation of Smart Advertising and its Activation Plan (스마트광고의 활용현황과 활성화 방안에 관한 탐색적 연구)

  • Park, Sung-Ho
    • Journal of Digital Convergence
    • /
    • v.11 no.3
    • /
    • pp.33-40
    • /
    • 2013
  • The smart media has changed the patterns of advertising information consumption and media usage behavior drastically. The smart advertisements, however, have failed to perform as sophisticated as the smart devices carried out. In this respect, this study is designed to figure out the current situation and the ecosystem of smart advertising and to prepare its activation plan through a survey(FGI), which will be able to give policy suggestions about smart media and advertising. In conclusion, this study points out that the proliferation of smart advertising needs to install "Smart Media Representative" which provides independable decisions on the regulation of smart advertising, the system of price, standardization of advertising, the development of various forms of advertisements, the scientific measurement of the effectiveness, the protection of privacy, professional manpower training, etc.

Long Distance Vehicle License Plate Region Detection Using Low Resolution Feature of License Plate Region in Road View Images (로드뷰 영상에서 번호판 영역의 저해상도 특징을 이용한 원거리 자동차 번호판 영역 검출)

  • Oh, Myoung-Kwan;Park, Jong-Cheon
    • Journal of Digital Convergence
    • /
    • v.15 no.1
    • /
    • pp.239-245
    • /
    • 2017
  • For privacy protection, we propose a vehicle license plate region detection method in road view image served from portal site. Because vehicle license plate regions in road view images have different feature depending on distance, long distance vehicle license plate regions are not detected by feature of low resolution. Therefore, we suggest a method to detect short distance vehicle license plate regions by edge feature and long distance vehicle license plate regions using MSER feature. And then, we select candidate region of vehicle license plate region from detected region of each method, because the number of the vehicle license plate has a structural feature, we used it to detect the final vehicle license plate region. As the experiment result, we got a recall rate of 93%, precision rate of 75%, and F-Score rate of 80% in various road view images.

Authentication Method using Multiple Biometric Information in FIDO Environment (FIDO 환경에서 다중 생체정보를 이용한 인증 방법)

  • Chae, Cheol-Joo;Cho, Han-Jin;Jung, Hyun Mi
    • Journal of Digital Convergence
    • /
    • v.16 no.1
    • /
    • pp.159-164
    • /
    • 2018
  • Biometric information does not need to be stored separately, and there is no risk of loss and no theft. For this reason, it has been attracting attention as an alternative authentication means for existing authentication means such as passwords and authorized certificates. However, there may be a privacy problem due to leakage of personal information stored in the server. To overcome these weaknesses, FIDO solved the problem of leakage of personal information on the server by using biometric information stored on the user device and authenticating. In this paper, we propose a multiple biometric authentication method that can be used in FIDO environment. In order to utilize multiple biometric information, fingerprints and EEG signals can be generated and used in FIDO system. The proposed method can solve the problem due to limitations of existing 2-factor authentication system by authentication using multiple biometric information.

A Study about problem and a correspondence strategy along a beauty culture-Ubiquitous implementation (미용 부분의 유비쿼터스 구현에 따른 문제점과 대응전략에 관한 연구)

  • Lim Jin-Sook;Kang Jang-Mook
    • Journal of Digital Contents Society
    • /
    • v.5 no.3
    • /
    • pp.163-170
    • /
    • 2004
  • Ubiquitous is an agriculture revolution, the Industrial Revolution, the fourth revolution to equal an information revolution are Ubiquitous. Historic agriculture was revolutionary, but the Industrial Revolution was a revolution of the physics space that was a base of a mankind civilization, and the informatization revolution that Cyber Space saw a prime while world wide web service was expended was a revolution of cyber space. Be charmed with this, and, as for the Ubiquitous revolution, it is achieved a physics space and an intelligent union of cyber space in the space where an off-line space was integrated with compunction on-line. It is combined with a life space naturally, and Ubiquitous technology. Also, I presented the plan that derivation tried a problem about Ubiquitous, and can solve an each problem. Specially, infringement about personal privacy very has a lot of possession to occur in the world that radio communication between all appliances is possible. It is Ubiquitous by becoming the data which is useful to thorough preparation about the Ubiquitous world to come with presenting policy a little technical solution plan about this to the future Republic of Korea. many company has been cracked by crackers information security and everyday new computer virus come out.

  • PDF

Verification of a Function-based Security Authentication Protocol for Implantable Medical Devices (함수 기반의 체내 삽입장치용 보안 인증프로토콜 검증)

  • Bae, WooSik;Han, KunHee
    • Journal of Digital Convergence
    • /
    • v.12 no.5
    • /
    • pp.249-254
    • /
    • 2014
  • Recent advancement of USN technology has lent itself to the evolving communication technology for implantable devices in the field of medical service. The wireless transmission section for communication between implantable medical devices and patients is a cause of concern over invasion of privacy, resulting from external attackers' hacking and thus leakage of private medical information. In addition, any attempt to manipulate patients' medical information could end up in serious medical issues. The present study proposes an authentication protocol safe against intruders' attacks when RFID/USN technology is applied to implantable medical devices. Being safe against spoofing, information exposure and eavesdropping attacks, the proposed protocol is based on hash-function operation and adopts session keys and random numbers to prevent re-encryption. This paper verifies the security of the proposed protocol using the formal verification tool, Casper/FDR.

Social Media Uses: ethical factors and the effects for teenagers (소셜 미디어 이용: 청소년 대상 윤리적 요인과 그 영향)

  • Lee, Hyun-Suk
    • Journal of Digital Convergence
    • /
    • v.15 no.12
    • /
    • pp.477-487
    • /
    • 2017
  • This study is for empirical analyzing the ethical contents in using social media, such as what kind of ethical responsibility do the teenage users have, how do they recognize the ethical concept in producing or sharing the information and how these ethical factors affect their behavior of social media uses. After survey with the structured questionnaire, statistical analyses with available 227 cases are processed. As a result, there are 4 ethical factors in using social media which as included 'privacy', 'copyright', 'fullness', 'accuracy', 'truth-telling', 'fairness', 'relief of harmful effect', 'credibility', 'objectivity', 'impartiality', included 'moderation', 'respect', 'autonomy', 'control', 'care of mischief', included 'interactivity', 'multiplicity', 'anonymity', 'divergence', 'social community', included 'transparency', 'openness'. All these ethical factors are positive correlated to the level of social media users' opinion expression, opinion support, information leading, information searching. Especially, is the most effective factor to social media users' behavior.

A Study on Influencing Factors of Continuous Use Intention by SNS Connection Type and User Psychology (SNS 접속형태와 이용심리에 의한 지속사용의도 영향요인 연구)

  • Hong, Hee-Kyung;Choi, Jung-Il;Han, Kyeong-Seok
    • Journal of Digital Contents Society
    • /
    • v.18 no.5
    • /
    • pp.957-967
    • /
    • 2017
  • In this study, factor, is focused on user's psychology and SNS using style, of intention to use SNS continuously being affeted to who want to stop using SNS. This study utilized the foundational frame of PCM and TAM2 and indepednent variable and Mediating variable were based on previous research. I used statistical programs such as AMOS 18.0 and SPSS 18.0 to verify the practical examination of the hypothesis of this study and the questionnaire was distributed to the public and IT students who once used SNS, and made the 443 questionnaires to analyze on final except missing values and insincere responses. The result of study was that intention to use SNS continuously are affected by positive and negative psychological factors and will be helpful to provide a service plan for SNS and establish for marketing strategy.

Medical Information Management Scheme of Healthcare Service Patient through 2-way Access Control (2-way 접근제어를 통한 헬스케어 서비스 환자의 의료 정보 관리 기법)

  • Jeong, Yoon-Su
    • Journal of Digital Convergence
    • /
    • v.14 no.7
    • /
    • pp.185-191
    • /
    • 2016
  • Recently, various medical services are provided with the advance of IT. However, there is a problem that a third party would exploit medical information when the information is sent and received through wired or wireless connection. In this paper, a patient information management scheme using group index information for the third party not to illegally exploit a patient's medical information without his consent is proposed. This proposed scheme creates index information in each hierarchical level to be used with access information so that not only medical staff can have access to patient's medical information hierarchically but also it can manage access level in groups. The scheme aims to enable the medical staff to minimize the time spent to analyze the type of disease and to prescribe for it so that they can improve patients' satisfaction. Plus, the scheme aims to improve work efficiency by minimizing the medical staff's workload according to the authority to access patients' medical information.