• Title/Summary/Keyword: privacy issues

Search Result 416, Processing Time 0.088 seconds

A Study on the FinTech : The consideration of the Security (핀테크의 보안 고려사항에 대한 연구)

  • Lee, Yujin;Chang, Beomhwan;Lee, Youngsook
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.12 no.3
    • /
    • pp.111-123
    • /
    • 2016
  • Recently, mobile devices have been widely used. Therefore, the service users want that are not constrained by time and space. Among them, electronic payment services, mobile finance service is enjoying a tremendous popularity. The FinTech is the result of the fusion of finance and ICT(Information & Communication Technology). Security experts is pointed the FinTech security risk. New technology and Innovative FinTech services are even available, Insecure FinTech services is insignificant. In this paper we were surveyed market and product trends of FinTech and analyzed the threats about FinTech. Also, we analyzed the security considerations for FinTech using a questionnaire. As a result, users considers secure payment process and privacy. Therefore, we proposed security considerations for each vulnerability. So, we must be resolved of security technology and policy issues. If establishing a secure payment process and the unclear legal issue is resolved, FinTech service will provide a secure financial services to the user.

The Proposal for Solution of Problems from Drone Operation by Examine Cases (사례로 살펴본 드론 활용 문제점에 따른 방향성 제시)

  • Choi, Heesik;Cho, Yanghyun
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.12 no.3
    • /
    • pp.55-64
    • /
    • 2016
  • Recently, unmanned aerial vehicle, also known as drone is being used in variety of areas. Previously drones are used as military purposes. After unmanned technology went abroad to civil, drones are used as multipurpose such as hobby, business and other more. Even though drones are very useful in many areas, problems such as safety and personal privacy infringement raised new social issues. In this thesis it will analyze and suggest solutions to the social problems of personal privacy infringement which occurred by drone filming. This thesis will also suggest that new law of drone safety must legislate quickly. Drone is exploration of new filed. Varies of new technology help to grow drone industries. Drone is able to complete tasks which are impossible or very difficult to do. To constantly grow drone industries, people must have solutions for problems of drone. If people can figure out solutions problem of drone which introduced by this thesis, value of drone will grow even more.

The Present Situation and Legal Problems of U-Health (u-Health의 현황과 법적 문제)

  • Cho, Hyong-Won
    • The Korean Society of Law and Medicine
    • /
    • v.7 no.2
    • /
    • pp.137-178
    • /
    • 2006
  • The purpose of this paper is to analyse the present situation and legal problems of u-health. U-health plays an important role in enlarging the healthcare service and making the healthcare service efficient. The use of Korean excellent IT technology can lead us to a world wide competitive healthcare industry. Although u-health has the weakness in privacy protection, the usefulness and convenience of u-health is great. Therefore we must analyse the legal issues of security technology, RFID, telemedicine and EMR pertaining to u-health and construct the appropriate legislative structure to resolve the legal problems of u-health.

  • PDF

Analyses of Trend of Threat of Security in Internet of Things (사물 인터넷망에서의 보안 위협 기술 동향 분석)

  • Shin, Yoon-gu;Jung, Sungha;Do, Tahoon;Kim, Jung Tae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2015.05a
    • /
    • pp.895-896
    • /
    • 2015
  • With the development of sensor, wireless mobile communication, embedded system and cloud computing, the technologies of Internet of Things have been widely used in logistics, Smart devices security, intelligent building and o on. Bridging between wireless sensor networks with traditional communication networks or Internet, IoT gateway plays n important role in IoT applications, which facilitates the integration of wireless sensor networks and mobile communication networks or Internet, and the management and control with wireless sensor networks. The IoT Gateway is a key component in IoT application systems but It has lot of security issues. We analyzed the trends of security and privacy matters.

  • PDF

Study on video information regulation and VPIC compliance issues in GDPR

  • Ryu, Ki-Il;Cho, Young-Im
    • Journal of the Korea Society of Computer and Information
    • /
    • v.22 no.6
    • /
    • pp.41-48
    • /
    • 2017
  • All the personal information controllers or processors collecting, processing and storing personal information through the entry into force of the EU GDPR (General Data Protection Regulation) are required to provide the basic principle of privacy by design at all stages of developing products or services throughout the organization, And to ensure that the basic rights of the subject of personal information are protected and that internal control techniques are provided to prevent any abuse or leakage. We will review the regulations and countermeasures required by the GDPR for video information with serious privacy problems, and propose a solution.

The Study about Solution for The Protection of Spam Mails (스팸메일 방지를 위한 제도적 기술적 해결방안에 관한 연구)

  • Kang, Jang-Mook;Yoo, Eui-Sang;Lee, Jung-Hoon
    • Journal of Information Technology Services
    • /
    • v.2 no.1
    • /
    • pp.25-34
    • /
    • 2003
  • Spam mail is one of the side effect of the development and improvement of the internet that restrains the privacy of the individual on line. However indiscriminate application of Spam mail blocking can also cause significant violation on freedom of doing business to the fluent commercial transactions on line. Therefore this research looks at the exact understanding of the concept of Spam mail and inquiry on Its issues. Also it looks at the case studies of its institutional solutions in USA and Europe as well as the advantage and disadvantage of the case studies on its technical solution. Finally, the research inquires into overall prevention of Spam mail, which considers both technical and institutional soiution. With this research, limitations of current Spam mail prevention system and technology are pointed out and more effective course of overall Spam mail prevention solution is studied.

Enhancing Privacy Protection in Steppy Applications through Pseudonymization

  • Nugroho, Heri Arum;Prihatmanto, Ary Setijadi;Rhee, Kyung Hyune
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2015.10a
    • /
    • pp.763-766
    • /
    • 2015
  • Smart Healthcare System as an Open Platform (Shesop) is an integrated healthcare system and have several features, one of them is Steppy Application. Steppy does count your step and display on Shesop website. In this system security issues are not properly addressed, while Personal Health Record (PHR) patient stored in the cloud platform could be at risk. In fact, the huge electronic information available online, people needs reliable and effective technique for privacy preserving. In order to improve the security of data which are displayed on the Shesop website, so that anyone who access could not tamper without permission. Recently Xu et al. showed a pseudonym scheme using smart card as a solution in e-health systems which uses discrete logarithm problem with cyclic group. In this paper, we adopt their scheme and use it application into smartphone using Near Field Communication (NFC) to construct security in Steppy apps.

Analyses of Technology Trend and marketability in Internet of Things (사물인터넷 통신의 시장성 및 기술 동향 분석)

  • Jang, Chang-Whan;Jo, Sung-Ho;Kim, Jung Tae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2016.10a
    • /
    • pp.882-883
    • /
    • 2016
  • The idea of Internet of Things (IoT) and the challenges is developed and growing rapidly. The general layered architecture of IoT along with its constituent elements is analyzed and described. Further, the paper provides for a secure construction of the IoT architecture, by tackling security issues at each layer of the architecture. We survey an introduction to industrial IoT systems, the related security and privacy challenges, and an outlook on possible solutions towards security framework for Industrial IoT systems.

  • PDF

Blockchain-based Federated Learning for Intrusion Detection in IoT Networks (IoT 네트워크에서 침입 탐지를 위한 블록체인 기반 연합 학습)

  • Md Mamunur Rashid;Philjoo Choi;Suk-Hwan Lee;Ki-Ryong Kwon
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2023.05a
    • /
    • pp.262-264
    • /
    • 2023
  • Internet of Things (IoT) networks currently employ an increased number of users and applications, raising their susceptibility to cyberattacks and data breaches, and endangering our security and privacy. Intrusion detection, which includes monitoring and analyzing incoming and outgoing traffic to detect and prohibit the hostile activity, is critical to ensure cybersecurity. Conventional intrusion detection systems (IDS) are centralized, making them susceptible to cyberattacks and other relevant privacy issues because all the data is gathered and processed inside a single entity. This research aims to create a blockchain-based architecture to support federated learning and improve cybersecurity and intrusion detection in IoT networks. In order to assess the effectiveness of the suggested approach, we have utilized well-known cybersecurity datasets along with centralized and federated machine learning models.

Privacy Protection for 5G Mobile-based IoT Users (5G 이동 통신 기반의 IoT 사용자를 위한 프라이버시 보호 기법)

  • Jeong, Yoon-Su;Yoon, Deok-Byeong;Shin, Seung-Soo
    • Journal of the Korea Convergence Society
    • /
    • v.11 no.1
    • /
    • pp.1-7
    • /
    • 2020
  • Recently 5G technology is one of the technologies that has been receiving much positive responses from users as it is integrated with virtual technology. However, 5G's security issues have not been fully resolved and more security is soon required. In this paper, an approach technique is proposed as a probability-based hierarchy to provide personal privacy for 5G-based IoT users more safely. The proposed technique is aimed at not exposing the privacy of IoT users to third parties by using two random keys created personally by IoT users. In order to satisfy both safety and efficiency, the proposed technology divides the privacy of IoT users into two layers. In the first stage, IoT users will control access to intermediate media using anonymous keys generated by IoT users, and in the second stage, information of IoT users registered with servers will be darkened and replicated. The proposed technique has improved the accuracy of the privacy protection of IoT users as they assign weights to layered information after layering users' privacy information on a probabilistic basis.