• Title/Summary/Keyword: privacy invasion

Search Result 158, Processing Time 0.019 seconds

A Study on Vulnerability Factors of The Smart Home Service ('스마트홈 서비스'의 보안취약요인에 관한 연구)

  • Jeon, Jeong Hoon
    • Convergence Security Journal
    • /
    • v.20 no.4
    • /
    • pp.169-176
    • /
    • 2020
  • Recently, the era in which various services using smart devices are used is sometimes referred to as the so-called "smart era". Among these, Smart Home Service' have not only brought about significant changes in the residential environment and culture, but are evolving very rapidly. and The 'Smart Home Service' provides more convenient services to users through communication between various electronic products in general homes, and has a bright future in the future. In particular,'Smart Home Service' provides various services combined based on IoT(Internet of Things) technology and wired/wireless communication in connection between various devices. However, such a "smart home service" inherits the security vulnerabilities of the underlying technologies such as the Internet of Things and wired and wireless communication technologies, and accidents that lead to the leakage of personal information and invasion of privacy continue to occur. So, it is necessary to prepare a countermeasure and prevention against the weak factors of the underlying technologies. Therefore, this paper is expected to be used as basic data for future application technology development and countermeasure technology by examining various security vulnerability factors of 'Smart Home Service'.

Current Issues with the Big Data Utilization from a Humanities Perspective (인문학적 관점으로 본 빅데이터 활용을 위한 당면 문제)

  • Park, Eun-ha;Jeon, Jin-woo
    • The Journal of the Korea Contents Association
    • /
    • v.22 no.6
    • /
    • pp.125-134
    • /
    • 2022
  • This study aims to critically discuss the problems that need to be solved from a humanities perspective in order to utilize big data. It identifies and discusses three research problems that may arise from collecting, processing, and using big data. First, it looks at the fake information circulating with regard to problems with the data itself, specifically looking at article-type advertisements and fake news related to politics. Second, discrimination by the algorithm was cited as a problem with big data processing and its results. This discrimination was seen while searching for engineers on the portal site. Finally, problems related to the invasion of personal related information were seen in three categories: the right to privacy, the right to self-determination of information, and the right to be forgotten. This study is meaningful in that it points out the problems facing in the aspect of big data utilization from the humanities perspective in the era of big data and discusses possible problems in the collection, processing, and use of big data, respectively.

Delegated Provision of Personal Information and Storage of Provided Information on a Blockchain Ensuring Data Confidentiality (개인정보의 위임 제공 및 데이터 기밀성을 보장하는 블록체인에 제공 정보의 저장)

  • Jun-Cheol, Park
    • Smart Media Journal
    • /
    • v.11 no.10
    • /
    • pp.76-88
    • /
    • 2022
  • Personal information leakage is very harmful as it can lead to additional attacks using leaked information as well as privacy invasion, and it is primarily caused by hacking server databases of institutions that collect and store personal information. We propose a scheme that allows a service-requesting user to authorize a secure delegated transfer of his personal information to the service provider via a reliable authority and enables only the two parties of the service to retrieve the provided information stored on a blockchain ensuring data confidentiality. It thus eliminates the necessity of storing customer information in the service provider's own database. As a result, the service provider can serve customers without requiring membership registration or storing personal information in the database, so that information leakage through the server database can be completely blocked. In addition, the scheme is free from the risk of information leakage and subsequent attacks through smartphones because it does not require a user's smartphone to store any authentication credential or personal information of its owner.

Understanding the Japanese History Problem on Trust in Technology Adoption of Workplace Surveillance Cameras: A Moderated Mediation Model in Korean and Chinese Context (한 · 중 데이터로 살펴본 직장 내 CCTV 도입 신뢰에 대한 일본 과거사의 점화효과 연구: 보안 취약성 지각의 조절된 매개 모형)

  • Sungwon Choi;Lifang Chang;Mijeong Kim;Jonghyun Park
    • Asia-Pacific Journal of Business
    • /
    • v.14 no.4
    • /
    • pp.49-65
    • /
    • 2023
  • Purpose - In the Korean and Chinese social landscape, it is vital to appreciate the significance of the Japanese history problem. The current study investigated whether the perception of the Japanese history problem affects decisions regarding technology adoption in organizations by comparing South Korea and China. Design/methodology/approach - The study involved 305 Korean and 379 Chinese participants who responded to scenarios and surveys regarding the adoption of workplace surveillance cameras supplied by a Japanese company. Findings - Using a moderated mediation model based on protection motivation theory (PMT), we found that past experiences of privacy invasion significantly reduced trust in the adoption of surveillance cameras at work. This relationship was mediated by respondents' perceptions of security vulnerability. The current study, however, did not confirm any significant moderating effect of the Japanese history problem priming on trust in the adoption of workplace surveillance cameras. Research implications - This suggests that the Japanese history problem may have a limited impact on organizational technology adoption decisions, different from the political consumerism behavior driven by public anti-Japanese affectivity. The current study reaffirms the validity and applicability of PMT and provides both theoretical insights and practical recommendations.

Implementation of a Crowding Measurement System Based on High Frequency Signal

  • Myoungbeom Chung
    • Journal of the Korea Society of Computer and Information
    • /
    • v.29 no.5
    • /
    • pp.67-74
    • /
    • 2024
  • As the number of coffee shops increases, many people are studying or working at coffee shops. Coffee shop operators have been required to analyze customer visits due to customer turnover and profit problems. Methods such as image analysis, QR code authentication, and Bluetooth beacon have been proposed for these statistics and analysis. However, it is difficult to use due to problems such as invasion of privacy and low accuracy. Therefore, in this study, to solve these problem and provide more accurate in-store congestion information, we propose a crowding measurement method of coffee shop using high frequency signal. There is an advantage in that a high frequency signal replaces the Bluetooth signal, and the transmission range of the signal is limited to the store, thereby increasing the accuracy of the method. To verify the performance of the proposed system, we conducted a comparative experiment with a Bluetooth based system, and as a result, the proposed method showed lower misrecognition rate. Thus, the proposed method will be an effective useful service for providing information on crowding at coffee shops and processing statistics.

A Study on the Freedom of the Press and the Remedy for Defamation (언론의 자유와 명예훼손 구제방법에 관한 연구)

  • Jeon, Chan-Hui;Ji, Yong-Soo
    • The Journal of the Korea Contents Association
    • /
    • v.12 no.10
    • /
    • pp.159-168
    • /
    • 2012
  • Freedom of speech is indispensable in Democracy. It is a rink among government agencies. Mass media as institutionalized means which forms public opinion impacts quite a few to a society. Mass media as a life media in our daily lives has characteristics of speed and prompt report. It is difficult to measure the effect on a society. Mass media is a lifeline in democracy because it has freedom of opinion for seeing, listening, speaking, and criticizing about the people's right to know in an information society. Our Constitution also guarantees freedom of the press, information(peoples's right to know), report, the collection of news, and edition. Because an unnecessary thing about a privacy is reported by mass media, it can violate defamation. This study seeks to be unbiased in reporting and what the principles of the Constitution for minimizing an invasion of a person's privacy is. This study also seeks freedom of speech and the right to know. In case that a personal honor is invaded by a mass media and a publication, this study provides the Constitution basis, Criminal Law basis, and Civic Law basis for remedy violation. A report for apology on newspaper and by television was widely used as "a proper punishment for honor recovery in the past". The constitutional court had decided that including the report of apology for "a proper punishment of honor recovery" in the article 764 of the Civic Law as a reason of freedom of conscience and the violation of personal rights was against the Constitution. Therefore, this study examples what is a legal remedy in practical?, where is legal basis of special remedy in the Civic Law, and what is a method by the Press Arbitration Law compared with the examples of other countries. On the other hand, because a mass media may injure a person's honor and infringe a person's privacy, if the report is categorized as a malicious press, the true role which mass media has to do may not demonstrated. In conclusion, this study was to minimalize infringement of mass media to a person and to seek a realistic alternative of a legal remedy.

Legal Research about the Public Offering of Director Compensation (이사보수의 공개에 관한 법적 연구)

  • Kwon, Sang-Ro
    • The Journal of the Korea Contents Association
    • /
    • v.12 no.10
    • /
    • pp.169-177
    • /
    • 2012
  • Due to the influences of global financial crisis, countries are putting their efforts on the enhancement of appropriateness and transparency of director compensation. In several countries including Germany, the United States, the United Kingdom, France, and Italy, listed companies and financial institutions in certain levels make public announcement for compensations of individual directors, not the averages. Recently, even Asian countries including China, Hong Kong, and Singapore are introducing individual director compensation public announcement policies. On the other hand, in cases of companies, which must submit annual reports, under current Korean capital market laws and enforcement ordinances, they are obligated to mention 'total wage paid to all executives in that business year' on the annual report, but does not have to mention individual wages of each executive. About this, at the 17th national assembly, revised bill for the Securities and Exchange Act for companies to mention wages of each executive. The financial world is opposing to open individual director compensation to the public as they concern about the shrinking of outstanding human resources recruitment, breach of corporate confidence, privacy invasion, deterioration of labor-management relations, and downfall of the executive's management will as director compensation will be standardized downward; however, if public opening of individual director compensation is forced, domestic companies will prepare more objective and rational standards when they calculate director compensations, and moreover, it will prevent arbitrary intervention of dominant shareholders. Therefore, to clearly and efficiently control director compensation, we need regulations for obligating public opening of individual director compensation.

An analysis on invasion threat and a study on countermeasures for Smart Car (스마트카 정보보안 침해위협 분석 및 대응방안 연구)

  • Lee, Myong-Yeal;Park, Jae-Pyo
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.18 no.3
    • /
    • pp.374-380
    • /
    • 2017
  • The Internet of Things (IoT) refers to intelligent technologies and services that connect all things to the internet so they can interactively communicate with people, other things, and other systems. The development of the IoT environment accompanies advances in network protocols applicable to more lightweight and intelligent sensors, and lightweight and diverse environments. The development of those elemental technologies is promoting the rapid progress in smart car environments that provide safety features and user convenience. These developments in smart car services will bring a positive effect, but can also lead to a catastrophe for a person's life if security issues with the services are not resolved. Although smart cars have various features with different types of communications functions to control the vehicles under the existing platforms, insecure features and functions may bring various security threats, such as bypassing authentication, malfunctions through illegitimate control of the vehicle via data forgery, and leaking of private information. In this paper, we look at types of smart car services in the IoT, deriving the security threats from smart car services based on various scenarios, suggesting countermeasures against them, and we finally propose a safe smart car application plan.

Woman College Students' Perception of Their Parent's Child-rearing Attitudes (여대생이 지각한 부모의 양육태도)

  • Kim Young-Hee;Kim Shin-Jeong
    • Child Health Nursing Research
    • /
    • v.9 no.3
    • /
    • pp.309-322
    • /
    • 2003
  • Purpose: This study was carried out to show the parental child-rearing attitudes perceived by daughters(woman college students), who were in the process of pursuit of resonable values, ethics and preparing for marriage and settling down, and another purposes were to help them to have positive attitudes toward their child-rearing in the future and set up preliminary parenting education program. Method: The subjects were 120 woman college students who were freshmen to junior in one university in Seoul. Using the self-report questionnaire, data were collected from December in 1999 to March in 2000. The contents which subjects wrote down were categorized by content analysis method. Result: 1) The age range of subjects were 19-25 years old and main rearer was mother(85.84%). 2) The perception of parent's child-rearing by subjects were revealed 555 statements and then tied together 50 themes: 'emphasizing on studying hard'(8.3%), 'doing by oneself'(5.6%), 'sternness'(5.2%), 'respect of personality'(4.5%), 'eagerness'(4.0%), 'humanity education'(4.0%), 'moderating in daily living'(4.0%), 'propriety education'(3.8%), 'sacrificing for children'(3.6%), 'expectation'(3.2%), 'concerning'(3.1%), 'parent-centered'(3.1%), 'giving a free hand'(2.9%), 'sharing with'(2.9%), 'consideration'(2.7%), 'over-protectiveness'(2.3%), 'hostile attitude' (2.2%), 'corporal punishment'(2.2%), 'expression of parental love'(2.0%), 'encouragement'(1.8%), 'family-centered' (1.8%), 'treating fairly'(1.6%), 'offering live experiences'(1.6%), 'exacting obedience'(1.62%), 'exemplary parental role' (1.6%), 'sexual discrimination'(1.6%), 'cooperation'(1.4%), 'giving favors'(1.4%), 'indifference'(1.4%), 'understanding' (1.3%), 'confidence'(1.3%), 'intimacy'(1.3%), 'pursuit of health'(1.3%), 'warm-hearted'(1.1%), 'stinginess'(1.1%),'broad-mindedness'(0.7%), 'granting'(0.7%), 'interfering'(0.7%), 'reproach'(0.7%), 'distinction of sex in household affairs'(0.7%), 'help'(0.5%), 'preparing for the future'(0.5%), 'disregarding'(0.5%), 'making environment'(0.4%), 'bringing up a child personally' (0.4%), 'comparing'(0.4%), 'religious life'(0.4%), 'good deed'(0.4%), invasion of privacy' (0.2%), 'controlling desire'(0.2%). 3) 50 themes were categorized by 18 categories once more: 'control' (13.2%), 'crazy for education'(12.3%), 'endeavoring'(8.6%), 'autonomy'(8.5%), 'home education'(7.7%), 'esteem' (6.67%), 'support'(6.67%), 'pursuit of healthy daily life'(5.6%), 'earnestness'(5.4%), 'disregarding personality'(5.4%), 'emotional bonding'(3.2%), 'imposing a burden'(3.2%). 'inhospitality'(3.1%), 'acceptance'(5%), 'discrimination'(2.3%), 'mature parenthood'(1.8%), 'strengthening family tie'(1.8%), 'psychological intimacy'(1.1%). 4) On the basis of this study, 3/5 of subjects(61.2%) perceived their parents had mature and autonomous child-rearing attitudes, and on the other hand 2/5(39.5%) of them perceived controlling, just forcing to work harder and personally disregarding attitudes. Conclusion: So we need to offer them nursing implementation such as preliminary parenting education program and parenting consulting like to strengthen positive perception and help improving in realistic, developmental child-rearing attitudes.

  • PDF

Smartphone Usage Experience of College students (대학생들의 스마트폰 사용 경험)

  • Kim, Jungae;Cho, Eui-young
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.16 no.3
    • /
    • pp.187-201
    • /
    • 2016
  • The purpose of this study was to analyze the smart phone usage experience structure for college students. The phenomenology approach was used by conducting 4 times in-depth interviews with the 7 college students age between 20~23. Collected Data was analyzed by Giorgi's phenomenological method. There were 4 general structure descriptions and 28 themes. General structure descriptions were 'Dependence on smart phone', 'Phenomenon of smart phone usage', 'Results of smart phone usage' and 'Relationship between stress and smart phone'. Themes consisted of 'Ambivalence', 'Positive feelings for smart phones', 'Separation anxiety', 'Negative feelings for smart phones'. 'Dependent feelings for smart phones', 'A sense of unity with smart phones', 'Helpful for my life', 'Deeply involved with my life', 'Useful tool in my life', 'Study, communication, relaxation and health care', 'Maintain personal relationship', 'The most important thing in my life', 'Shallow relationship stress', 'Interference with personal relationship', 'Forming a negative relationship', 'Invasion of privacy', 'Forming a Incorrect relationship', 'Unwanted participation', 'No effort to improve relationship', 'Poor concentration', 'Interference with academic study', 'Study assistance', 'Limited help for study in depth', 'Shelter from the stress', 'Amplification of the stress', 'Obsessive focus', 'Feel separation for the reality' and 'Waste of time'. Smart phone usage make college students dependent on smart phones and had negative influence on both personal relationship and academic results. Usage of smart phone also amplified stress. Therefore we need fundamental principles on usage of smart phone and propose to build cultural etiquette that provides reasonable way to use smartphone.