• Title/Summary/Keyword: privacy invasion

Search Result 158, Processing Time 0.02 seconds

A Method of Masking for 2005 Korean Census Microdata (인구주택총조사 마이크로자료의 개인정보 노출제한방법)

  • Jeong, Dong-Myeong;Jeong, Mi-Ock
    • The Korean Journal of Applied Statistics
    • /
    • v.21 no.2
    • /
    • pp.313-325
    • /
    • 2008
  • Large amounts of information on individuals is available to many organizations and data users and government agencies release microdata files from their survey data or administrative records data. However, if a microdata file is released without any limitation, an invasion of privacy is likely to occur. Therefore, in creating a microdata file, agencies attempt to eliminate disclosure risk of the file while maintaining maximum utility of the data. In this paper, we introduce the concept of disclosure risk, identification and uniqueness. Also, we show the method for creating a 2% microdata file using the 2005 Korean census microdata.

Distance-Based Keystroke Dynamics Smartphone Authentication and Threshold Formula Model (거리기반 키스트로크 다이나믹스 스마트폰 인증과 임계값 공식 모델)

  • Lee, Shincheol;Hwang, Jung Yeon;Lee, Hyungu;Kim, Dong In;Lee, Sung-Hoon;Shin, Ji Sun
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.2
    • /
    • pp.369-383
    • /
    • 2018
  • User authentication using PIN input or lock pattern is widely used as a user authentication method of smartphones. However, it is vulnerable to shoulder surfing attacks and because of low complexity of PIN and lock pattern, it has low security. To complement these problems, keystroke dynamics have been used as an authentication method for complex authentication and researches on this have been in progress. However, many studies have used imposter data in classifier training and validation. When keystroke dynamics authentications are actually applied in reality, it is realistic to use only legitimate user data for training, and using other people's data as imposter training data may result in problems such as leakage of authentication data and invasion of privacy. In response, in this paper, we experiment and obtain the optimal ratio of the thresholds for distance based classification. By suggesting the optimal ratio, we try to contribute to the real applications of keystroke authentications.

Key Management Framework based on Double Hash Chain for Secure Smart Grid Environments (안전한 스마트 그리드 환경을 위한 이중 해쉬 체인 기반 키 관리 프레임워크)

  • Lee, Young-Seok
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.17 no.9
    • /
    • pp.2063-2072
    • /
    • 2013
  • Smart Grid is the next-generation intelligent power grid that maximizes energy efficiency with the convergence of IT technologies and the existing power grid. It enables consumers to check power rates in real time for active power consumption. It also enables suppliers to measure their expected power generation load, which stabilizes the operation of the power system. However, there are high possibility that various kinds of security threats such as data exposure, data theft, and privacy invasion may occur in interactive communication with intelligent devices. Therefore, to establish a secure environment for responding to such security threat with the smart grid, the key management technique, which is the core of the development of a security mechanism, is required. Using a hash chain, this paper suggests a group key management mechanism that is efficiently applicable to the smart grid environment with its hierarchical structure, and analyzes the security and efficiency of the suggested group key management framework.

Status and Prevention of Negative Behavior due to Disinhibition Effect in SNS(Social Network Service) (사회 관계망 서비스(SNS)에서 탈억제 효과로 인한 부정적 행위의 실태 및 예방 대책)

  • Kang, Moon-seol
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.20 no.12
    • /
    • pp.2370-2378
    • /
    • 2016
  • Social Network Service(SNS) users are increasing globally. Within that trend, 'SNS attacking' victims are increasing in social network service space like KakaoStory, facebook, or Instargram as people damage others' personality or reputation. In this paper is to investigate and analyze awareness of negative behavior attributed to disinhibition effect with undergraduates who are the group of people using social network service the most diversely in smart environment and devise preventive measures to reduce social network service attacking victims and attackers. In social network service space, undergraduates are hardly aware of other people's personality, defamation, or invasion of privacy, and the level of guilt they feel towards social network service attacking is seriously low. To solve this problem, this study suggests preventive measures so that they can be equipped with awareness and regulations right for this social network service age and can prevent negative behavior resulted from disinhibition effect.

Priority of Residential Choice and Housing Satisfaction among Studio-type Multi-family Housing Dwellers in the City of Gwangju (원룸형 다가구주택 거주자의 주거선택 중요도와 주거만족도 - 광주광역시를 중심으로 -)

  • Kang, Hi-Goo;Kim, Mi-Hee
    • Journal of the Korean housing association
    • /
    • v.21 no.3
    • /
    • pp.11-21
    • /
    • 2010
  • The purpose of this study is to gather baseline data on perceived priority of residential choice and housing satisfaction rates among consumers with the aim of using this information for future planning. Self-administered questionnaires were provided to 196 studio-type multi-family housing dwellers in the City of Gwangju from 2009 Apri 5th to 29th. The collected data was used to conduct comparative and descriptive statistical analysis: factor analysis, t-test, one-way ANOVA, correlation analysis. The main findings obtained are as follows: Firstly, in relation to perceived priority of residential choice, dwellers identified seven factors as important. Secondly, in terms of housing satisfaction about a unit room, the respondents identified five factors as important. This study confirmed that there existed passive correlation between priority of residential choice and housing satisfaction among residents in studio-type multi-family housings in Gwangju. It is very necessary to project a studio-type multi-family housing close to transportation for easy access, avoiding commercial districts. Delicate interior and design will attract more female residents as well as fully-equipped parking lots for people who drive to their workplace. According to research on a degree of housing satisfaction, all respondents expressed dissatisfaction with "noise". Therefore, in dealing with construction plans of studio apartment units, from now on, sound proofing facilities are required to reduce the acoustic invasion of privacy, especially, for units with more than two people. In order to satisfy all the demand of residents in studio apartment units, we have to pursue systematic and succeeding research about a studio-type multi-family housing well-fitted for the actual circumstances of local area and suitable for longer stay. To sum up, more research and development will be required for high-class studio-type multiplex housing for sale in dealing with households with financial stability such as two-paycheck couples, so-called DINK, or a professional single person, in the future.

A Study about Social Inclusion of Permanent Rental and Lot-Sold Apartment (영구임대 및 분양아파트 단지의 사회적 통합 실태조사)

  • Lee, Min-Ah;Kim, Mi-Hee;Na, Ha-Young
    • Journal of Families and Better Life
    • /
    • v.27 no.2
    • /
    • pp.123-138
    • /
    • 2009
  • The purpose of this study was to investigate the social inclusion of permanent rental and lot-sold apartment and to provide basic source of their physical and social inclusion. The research method was in-depth interview for 32 residents in two apartment complex based on the social inclusion index developed in the previous study. The results of the study were summarized as follows: First, the majority of the residents' average monthly income in the permanent rental apartment were lower than the minimum cost of living. But, they were not seriously realized it and gave up any economic activities due to their poor health and age. Second, the big different indexes from the residents in lot-sold apartment were the family networks and social activity participations. They were not satisfied with their family members, seldom had social gatherings, and did not have any information of community cultural events. Third, since they had narrow sphere of activities, they could not properly evaluate the diversity of neighborhood facilities and the convenience of public transportations. But, they obviously recognized anti-social behaviors and the invasion of the privacy in the apartment complex, and maintained superficial neighborship. Fourth, on the other hand, the residents in lot-sold apartment had the feeling of being harmed by the various troubles of the permanent rental apartment.

Derivation of Security Requirements of Smart TV Based on STRIDE Threat Modeling (STRIDE 위협 모델링에 기반한 스마트 TV 보안 요구사항 도출)

  • Oh, In-Kyung;Seo, Jae-Wan;Lee, Min-Kyu;Lee, Tae-Hoon;Han, Yu-Na;Park, Ui-Seong;Ji, Han-Byeol;Lee, Jong-Ho;Cho, Kyu-Hyung;Kim, Kyounggon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.2
    • /
    • pp.213-230
    • /
    • 2020
  • As smart TVs have recently emerged as the center of the IoT ecosystem, their importance is increasing. If a vulnerability occurs within a smart TV, there is a possibility that it will cause financial damage, not just in terms of privacy invasion and personal information leakage due to sniffing and theft. Therefore, in this paper, to enhance the completeness of smart TV vulnerability analysis, STRIDE threat classification are used to systematically identify threats. In addition, through the manufacture of the Attack Tree and the actual vulnerability analysis, the effectiveness of the checklist was verified and security requirements were derived for the safe smart TV use environment.

A Study on Satisfaction and Dissatisfaction Coexistence of Social Network Service (소셜네트워크서비스의 만족과 불만족의 공존성에 관한 연구)

  • Lee, Jae-Beom;Lee, Jae-Beom;Park, Chanuk
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.15 no.5
    • /
    • pp.225-236
    • /
    • 2015
  • Social network services, it has attracted a lot of popularity that it us to allow the formation of past human network has been thought possible only in the main offline also on-line and mobile. However, by a variety of SNS with a recent other features it appeared a lot, the user, rather than stick to one SNS use only, if necessary, to join simultaneously two or more kinds of SNS status it is. By problem of invasion of privacy in recent SNS is a problem of, the user, in many cases that I have to worry about whether or not to leave the mainly use SNS. This study focused on these aspects and trying to figure out whether changing the SNS people to why use. Therefore, it is possible to obtain two factor theory is trying to figure out the psychology of users feel satisfaction SNS use and unsatisfactory at the same time as the significant result.

Analysis and Study on Invasion Threat and Security Measures for Smart Home Services in IoT Environment (사물인터넷 환경에서의 스마트홈 서비스 침해위협 분석 및 보안 대책 연구)

  • Lee, Myongyeal;Park, Jaepyo
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.16 no.5
    • /
    • pp.27-32
    • /
    • 2016
  • In general, IoT(Internet of things) designate the intelligence technologies and services which interact all necessity information between human and things, things and thing and things and systems with all things connecting through the internet based. The smart home in present of IoT environment fuses the daily supplies/equipment which needs to use for the private life with the internet of things that is the fruit of the converged business through all most private consumption related in vastly. The concept of smart home has been built around early 2000s due to the spread of high speed internet and advanced of smart electronics and internet, furthermore influencing by the enhancement of wireless network and smart devices, it is advanced as a smart home within the internet of things environment. Smart home service inside the house which most closely implemented with personal life is being developed and advanced in various forms. These developments may exert a positive effect, but if it does not resolve the security issues for the smart home service, then it may cause a big plague of privacy and personal life.

Research on Utilizing Method of CCTV System for Crime Prevention and Safety Accident Reduction (범죄예방 및 안전사고 감소를 위한 CCTV시스템의 활용방안에 관한 연구)

  • Kim, Tae-Hwan
    • Journal of the Society of Disaster Information
    • /
    • v.3 no.1
    • /
    • pp.55-68
    • /
    • 2007
  • Recently, people in cities of developed countries are exposed to unfortified damages of crime and disaster due to urbanization, industrialization and information-oriented era caused by congestion of population in terms of hardware and various social pathology phenomena and frequent and large scale of disaster caused by crime and disorder, which occur in the course of going through nuclear family, a gap between rich and poor and aging society in terms of software. In this regard, demand for security upon individual life and property has been increased but the police that are responsible for the public security does not effectively reduce damage in life and property because their activities are mainly oriented in coping with security accidents more than prevention. Shortage of manpower and budget, retarded equipment, and heavy overwork are the reasons. In order to confront with this kind of situation, we should utilize CCTV system with the purpose of declining possible chances of crime, not for eliminating cause of crime as crime prevention activities to predict danger in advance as a way of prevention and we may expect a role of damage prevention by installing CCTV in places where security accident may possibly happen. In conclusion, there are invasion of privacy, misuse of the system, insufficiency of overall monitoring office management, lack of citizens' understanding and economical allotment of the system installation costs in installation of CCTV system. However. it is necessary to install the CCTV system for effective prevention of crime and prevention activities of security accidents and accurate PR of purposes of installing CCTV to local residents, establishing relevant laws about system misuse, allotment of equipment costs and fees by R&D of the system machinery, cost reduction method of storage, management and replacement, saving costs from co-operative attitude of government, and local autonomous entities and local residents should be involved.

  • PDF