• Title/Summary/Keyword: invasion of privacy

Search Result 159, Processing Time 0.022 seconds

Anonymous Qualification Verifying Method on Web Environment (웹 환경에서 익명성을 제공하는 자격증명 방법)

  • Lee, Yun-Kyung;Hwang, Jung-Yeon;Chung, Byung-Ho;Kim, Jeong-Nyeo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.21 no.5
    • /
    • pp.181-195
    • /
    • 2011
  • There's a controversy about an invasion of privacy which includes a leakage of private information and linking of user's behavior on internet. Although many solutions for this problem are proposed, we think anonymous authentication, authorization, and payment mechanism is the best solution for this problem. In this paper, we propose an effective anonymity-based method that achieves not only authentication but also authorization. Our proposed method uses anonymous qualification certificate and group signature method as an underlying primitive, and combines anonymous authentication and qualification information. An eligible user is legitimately issued a group member key pair through key issuing process and issued some qualification certificates anonymously, and then, he can take the safe and convenience web service which supplies anonymous authentication and authorization. The qualification certificate can be expanded according to application environment and it can be used as payment token.

RFID Tag Identification with Scalability Using SP-Division Algorithm on the Grid Environment (그리드 환경에서 SP분할 알고리즘을 이용한 확장성 있는 RFID 태그 판별)

  • Shin, Myeong-Sook;Ahn, Seong-Soo;Lee, Joon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.13 no.10
    • /
    • pp.2105-2112
    • /
    • 2009
  • Recently RFID system has been adopted in various fields rapidly. However, we ought to solve the problem of privacy invasion that can be occurred by obtaining information of RFID Tag without any permission for popularization of RFID system To solve the problems, it is Ohkubo et al.'s Hash-Chain Scheme which is the safest method. However, this method has a problem that requesting lots of computing process because of increasing numbers of Tag. Therefore, We suggest the way (process) satisfied with all necessary security of Privacy Protection Shreme and decreased in Tag Identification Time in this paper. First, We'll suggest the SP-Division Algorithm seperating SPs using the Performance Measurement consequence of each node after framing the program to create Hash-Chain Calculated table to get optimized performance because of character of the grid environment comprised of heterogeneous system. If we compare consequence fixed the number of nodes to 4 with a single node, equal partition, and SP partition, when the total number of SPs is 1000, 40%, 49%, when the total number of SPs is 2000, 42%, 51%, when the total number of SPs is 3000, 39%, 49%, and when the total number of SPs is 4000, 46%, 56% is improved.

An Empirical Study of SNS Users' Switching Intention Toward Closed SNS (SNS 이용자의 폐쇄형 SNS로의 전환의도에 영향을 미치는 요인에 관한 연구)

  • Park, Hyunsun;Kim, Sanghyun
    • Information Systems Review
    • /
    • v.16 no.3
    • /
    • pp.135-160
    • /
    • 2014
  • Most Social Network Service (SNS) provide online chat, video and file sharing, blogging and others. Because of this advantage, people depend on SNS to communicate with others. However, recently SNS encourage people to reveal too much information broadly so SNS users are concerned about privacy invasion and data spill. They also feel fatigue in process of touching people they don't know while using SNSs. That is the reason why they attempt to switch from opened SNS to Closed SNS. Therefore, the purpose of this study is to empirically investigate and analyze the effect of the factors on the SNS users' switching behavior when using SNS. To accomplish this purpose, this research adopted "Push-Pull-Mooring (PPM)" framework. The PPM is proposed by population geologist, who used it to explain the incentives of demographic migration. Following PPM model, this research empirically examines the three categories of antecedents for SNS switching intention toward closed SNS: push (i.e., weak connection, privacy concern, relative complexity), pull (i.e., enjoyment, belongingness, peer influence), mooring (i.e., SNS fatigue, user resistance) factors. The survey was conducted for 285 users on SNS communities in Korea. The results of this study are as follows; First, wear connection and privacy concern are significantly related to SNS switching intention. Second, enjoyment and belongingness are significantly related to SNS switching intention. Finally, the results show that SNS fatigue has a moderating effect on the links between push factors and SNS switching Intention. Also, user resistance has a moderating effect on the links between pull factors and SNS switching Intention. These findings contribute to the SNS literature both theoretically and practically.

A Categorization Method based on RCBAC for Enhanced Contents and Social Networking Service for User (사용자를 위한 향상된 콘텐츠 및 소셜 네트워킹 서비스 제공을 위한 RCBAC 기반 분류 방법)

  • Cho, Eun-Ae;Moon, Chang-Joo;Park, Dae-Ha
    • Journal of Digital Contents Society
    • /
    • v.13 no.1
    • /
    • pp.101-110
    • /
    • 2012
  • Recently, social network sites are very popular with the enhancement of mobile device function and distribution. This gives rise to the registrations of the people on the social network sites and the usage of services on the social sites is also getting active. However, social network sites' venders do not provide services enough compared to the demand of users' to share contents from diverse roots by users effectively. In addition, the personal information can be revealed improperly in processes sharing policies and it is obvious that it raises a privacy invasion problem when users access the contents created from diverse devices according to the relationship by policies. However, the existing methods for the integration management of social network are weak to solve this problem. Thus, we propose a model to preserve user privacy, categorize contents efficiently, and give the access control permissions at the same time. In this paper, we encrypt policies and the trusted third party classifies the encrypted policies when the social network sites share the generated contents by users. In addition, the proposed model uses the RCBAC model to manage the contents generated by various devices and measures the similarity between relationships after encrypting when the user policies are shared. So, this paper can contribute to preserve user policies and contents from malicious attackers.

The Direction for a Sustainable Residential Environment Plan based on Resident Testimonies about the Use of the 'Streets in the Sky' of the Park Hill Flats in the United Kingdom

  • Park, Joon Young;Park, Woo Jang;Jeong, Sang Kyu
    • KIEAE Journal
    • /
    • v.14 no.2
    • /
    • pp.61-68
    • /
    • 2014
  • This study aims at proposing a sound and sustainable development direction of an residential environment by analyzing testimonies of residents who lived in Park Hill flats or their surround at Sheffield City in the United Kingdom. The results are obtained through the analysis on a residential environment of Park Hill flats, opinions of the residents on its refurbishment, and effects of the building on the residential environment. The block of Park Hill flats was a community with a strong unity and solidarity, but that became increasingly a slum by the decline of the physical and social environment since the 1980s. In particular, it was identified that the deterioration of the social environment than that of the physical environment was a major cause of the decline. Nevertheless, it was found that "streets in the sky", the concept applied in Park Hill, played a key role in activating the community in the apartment complex. However, that street system in the complex has caused noise, poor security, and invasion of privacy. If such problems are solved, the streets in the sky will be a meaningful alternative for community activation and then ensuring sustainability in Korean residential environments that lost the function of the community.

The Experience of Nursing Staff on the Dementia Patients′ Aggressive Behavior (간호제공자들의 치매노인 공격행동 경험에 대한 연구)

  • 오진주
    • Journal of Korean Academy of Nursing
    • /
    • v.30 no.2
    • /
    • pp.293-306
    • /
    • 2000
  • Providing care to the dementia elderly with behavioral problem is a major issue in nursing homes today. This study was aimed to explore the nursing staffs′ response to aggressive dementia patients, and the effect that the aggressive behavior had on Nsgstaff. The interviews used a semi-structured questionnaire are were carried out from May to July, 1999. The subjects were 23 nursing personnel working in the nursing homes for dementia elderly. The result are as follows; 1. The types of aggressive behavior cited by the subjects was "physical", "linguistic", and "sexual". 2. The factors that caused the behavior were "symptoms of disease", "under- conditioning", "context of nursing care", "unsatisfied need", "relationship to other patients", "change of outer environment", and "invasion of one′s own privacy". 3. The response of the subjects were "unhappiness", "stress", "anger", "exaggeration", "anxiety", and "fear". 4. The management strategies listed by nursing personnel used to alleviate aggressive behavior were "ignorance" "patience" "leaving the area" "soothing sounds" "verbal punishment" "restriction and isolation" and "various management skill appliance" "adaptation". 5. The effect that aggressive behavior and were "disturbance of relationship to elderly" "decline in the amount and quality of nursing care" "interruption of task performance" "job exhaustion" "desire to leave the job" "physical impact" "stress on the cognition of others" "anxiety about health and one own future" "interference to family life′. The findings of this study will be useful in understanding the difficulties of nursing personnel when confronting the aggressive behavior of dementia partients. It also is useful as basic data in preparing efficient intervention program for these difficulties.

  • PDF

Study on Decision-making and Control of Personal Data Posted on the Internet (인터넷에 올라와 있는 개인정보의 자기결정권과 통제권에 관한 연구)

  • Yoon, KyungBae
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.14 no.4
    • /
    • pp.227-232
    • /
    • 2014
  • Recent development and generalization of Internet technology contributes to the large scale of commerce and capital followed by appearance and growth of large portal sites. As a result, the personal data on the Internet not deleted for a long period of time is a new risk factor, for example, the invasion of people's privacy. In particular, exposing personal data like witch-hunts is a critical issue so that the person concerned cannot carry on with normal life. This study suggests the necessity of the right to request personal data deletion related to a person concerned on Internet sites, a method of introducing the right in Korea, and a method of improving the application.

A Study on North Korea's Cyber Attacks and Countermeasures (북한의 사이버공격과 대응방안에 관한 연구)

  • Chung, Min Kyung;Lim, Jong In;Kwon, Hun Yeong
    • Journal of Information Technology Services
    • /
    • v.15 no.1
    • /
    • pp.67-79
    • /
    • 2016
  • This study aims to present the necessary elements that should be part of South Korea's National Defense Strategy against the recent North Korean cyber-attacks. The elements proposed in this study also reflect the recent trend of cyber-attack incidents that are happening in the Unites States and other countries and have been classified into the three levels of cyber incidents: cyberwarfare, cyberterrorism and cybercrime. As such, the elements proposed are presented in accordance with this classification system. In order to properly take into account the recent trend of cyber-attacks perpetrated by North Korea, this paper analyzed the characteristics of recent North Korean cyber-attacks as well as the countermeasures and responses of South Korea. Moreover, by making use of case studies of cyber-attack incidents by foreign nations that threaten national security, the response measures at a national level can be deduced and applied as in this study. Thus, the authors of this study hope that the newly proposed elements here within will help to strengthen the level of Korea's cyber security against foreign attacks, specifically that of North Korea such as the KHNP hacking incidents and so on. It is hoped that further damage such as leakage of confidential information, invasion of privacy and physical intimidation can be mitigated.

A Study on the Psychological anxiety on Private information leakage to likelihood of internet users (인터넷 이용자의 개인정보 유출 가능성에 대한심리적 불안에 관한 연구: 성별, 이용량, 이용 빈도를 중심으로)

  • Jin, Seong-Cheol;Kim, In-Kyung
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.6 no.5
    • /
    • pp.731-737
    • /
    • 2011
  • The purpose of this study is to examine Internet users' psychological anxiety about the possibility of personal information leakage. The investigator examined the difference of psychological anxiety focusing on the possibility of personal information leakage according to the use amount of Internet, the number of joined sites and the frequency of e-commerce transaction. Study findings show that women felt more psychological anxiety than men did. In addition, people who used Internet more frequently felt more psychological anxiety. However, the number of joined sites and the average frequency of e-commerce transaction in a month had no significant influence upon users' psychological anxiety about the possibility of personal information leakage.

A Study on Improvement of Crime Prevention Environment Design in Gyeongui Line Forest Park - In Case of Changjeon-dong section - (경의선 숲길공원의 범죄예방 환경디자인 개선점 연구 - 창전동 구간을 중심으로 -)

  • Kim, Yeon-Kyeong;Yoo, Daun
    • Journal of the Architectural Institute of Korea Planning & Design
    • /
    • v.36 no.1
    • /
    • pp.113-124
    • /
    • 2020
  • The purpose of this study is to suggest an improvement for the CPTED(Crime Prevention Through Environmental Design) guidelines for the urban linear park. We analysed the Changjeon-dong section of Gyeongui Line Forest Park into 12 sub-areas and evaluated CPTED design applied on the park based on analysis framework derived from 15 precedent studies by conducting on-site observations. Both surveys and in-depth interviews on users of the park were conducted and the results of analysis on the evaluation from users and the on-site observation were compared. We found that the lighting condition and the height of wall and trees at the park boundaries are very important to insure natural surveillance since the adjacent areas are easy to be hidden from passers-by and subject to invasion and threat of crime while protecting the privacy of residents on the boundary. There should be improvement on management facilities and crime prevention facilities for more safe and convenient use of the linear park and the adjacent commercial use during nighttime also need to be managed for conflicts between various type of users.