• Title/Summary/Keyword: privacy issues

Search Result 420, Processing Time 0.027 seconds

A Study on Dispute Resolution and Policy Problem in the Drone Logistics Industry (드론 물류산업의 분쟁해결과 정책적 과제)

  • Park, Jong-Sam
    • Journal of Arbitration Studies
    • /
    • v.26 no.4
    • /
    • pp.151-179
    • /
    • 2016
  • Emerging as a strategic domain of the service industry, the drone logistics industry is evolving into a zero effort industry, which realizes smart device service ranging from corporate services to daily customer services. The role of the drone industry is becoming increasingly important in strengthening national competitiveness, as well as corporate competitiveness, beyond the strengthening of product competitiveness. Although drones have various strengths and weaknesses for industries, there are plenty of possibilities for diverse disputes and conflicts due to lack of related laws, regulations, and institutional norms, as well as unsolved problems related to technologies and operations; that is, there are still policy tasks and problems to be solved such as unauthorized seizure of drones, hacking, protection of personal privacy, safety concerns, regulation and limitation of flying areas, damage relief, and dispute settlements. Thus, in order to vitalize the drone industry as a future growth engine while responding to the changes in the environment of the drone industry in Korea and overseas and to strengthen national and corporate competitiveness by harmonizing with advanced management innovations, it is necessary to conduct in-depth discussions and review policy issues related to the vitalization of the drone industry. Therefore, the purpose of this study is to review the domestic and overseas realities and statuses of the drone logistics industry and application cases, analyze policies regarding the drone logistics industry of each country, review general theories on the solution of disputes arising out of the transactions in the drone logistics industry, and, as a conclusion, suggest desirable policy issues for the vitalization of the drone logistics industry in Korea.

Untraceable Authenticated Key Agreement Scheme for Multi-server Environment (다중서버를 위한 비-추적성을 제공하는 인증된 키 동의 기법)

  • Choi, Hae-Won;Kim, Sangjin;Ryoo, Myungchun
    • Journal of Digital Convergence
    • /
    • v.15 no.10
    • /
    • pp.253-260
    • /
    • 2017
  • Authenticated key agreement in multi-server environments is one of very important security issues because only authorized user needs to access their data and services. To support this issue, numerous schemes have been proposed over recent years. Recently, Shin showed the security weaknesses in the previous scheme and proposed an improved scheme called SIAKAS to solve them. Unfortunately, this paper shows that SIAKAS is still weak against application server impersonation attack and could be traceable to attackers. To solve the problems in SIAKAS, we propose an untraceable authenticated key agreement scheme, denoted by UAKAS. UAKAS efficiently solves security and privacy issues in SIAKAS and the related schemes and could reduce the operation overhead at least 12% compared to them.

Deducing environmentally conscious factors for apartment complex planning and weight evaluation (환경요소를 고려한 공동주택 단지계획요소 도출 및 가중치 평가)

  • Jung, Suk-Jin;Seo, Jung-Bum;Yoon, Seong-Hwan
    • KIEAE Journal
    • /
    • v.16 no.6
    • /
    • pp.51-56
    • /
    • 2016
  • Purpose: As declines in the quality of residential environments occur, such as urban heat island effect, tropical night phenomenon, and violations of right to light and privacy due to urban densification and high rise building, these problems are emerging as social issues. In order to improve these issues, design factors which consider environmental aspects must be selected when planning apartment complexes, and ways to reflect them in the planning phase must be explored. Method: In this study, the analytical hierarchy process(AHP) was used to deduce design factors that considered environmental elements during the planning of apartment complexes. Furthermore, the priority and weight for each evaluation index were assessed. The objective was to propose a guideline for planning apartment complexes by finding the best solution for each evaluation index using complex weight values. Result: Floor area ratio was selected as the most important evaluation criterion in the environmentally conscious evaluation index for apartment complex planning. The shape and placement of skylights were selected as the most important evaluation criteria in the sunshine environment for a pleasant residential environment. Ground surface cover design was selected as the most important criterion in the outdoor thermal environment index for improving the microclimate within cities and apartment complexes. Thus, the results of this study can serve as an investigation guideline that concerns policy and regulations, and as reference data that can be used in planning apartment complexes.

Social Welfare Ethics in the Information Age - Focusing on Dataveillance through Social Welfare Information System - (사회복지정보화의 윤리적 쟁점 - 사회보장정보시스템을 통한 데이터감시를 중심으로-)

  • Kim, Suyoung
    • Korean Journal of Social Welfare
    • /
    • v.68 no.1
    • /
    • pp.193-224
    • /
    • 2016
  • The article aims to discuss ethical issues of social welfare informationisation, focusing on dataveillance through social welfare information system in South Korea. The Korean government plans to upgrade social welfare information system, by strengthening welfare fraud tracking and adding blind spot discovering functions. However, surveillance over poor population's data is inevitable when conducting such investigations. This article reviews current debates on dataveillance. It then conducts a case study on social welfare dataveillance in South Korea, asking what ethical problems lie in the dataveillance in terms of privacy, accuracy, property, and accessibility issues. Subsequently, this paper identifies three fundamental ethical dilemmas of social welfare in the informational age. Finally, it suggests policy alternatives to tackle the ethical problems and dilemmas of social welfare informationisation.

  • PDF

Extension of Engineering Ethics: Searching for Nanoethics (공학윤리의 확장: 나노윤리의 모색)

  • Choi, Kyung-Hee;Song, Sung-Soo;Rhee, Hyang-Yon
    • Journal of Engineering Education Research
    • /
    • v.14 no.4
    • /
    • pp.39-47
    • /
    • 2011
  • This paper deals with nanoethics as a sort of extension of engineering ethics utilizing various books, articles, and reports concerning historical, social, and ethical aspects of nanotechnology. After a brief examination on the place and development process of nanotechnology, ethical issues on nanotechnology are analysed including safety problem, impact on environment, violating privacy, social inequity, military use, and human enhancement. The basic principles on nanoethics are proposed such as promotion of public understanding, construction of participatory governance, contribution to sustainable development, commitment to precautionary principle, and compliance with research integrity. Lastly, integrated method in nanoethics education is illustrated putting lecture model, investigation model and discussion model together. This paper can provide the contents available for nanoethics education, and make a basis for the sound development of nanotechnology.

The Classic Security Application in M2M: the Authentication Scheme of Mobile Payment

  • Hu, Liang;Chi, Ling;Li, Hong-Tu;Yuan, Wei;Sun, Yuyu;Chu, Jian-Feng
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.6 no.1
    • /
    • pp.131-146
    • /
    • 2012
  • As one of the four basic technologies of IOT (Internet of Things), M2M technology whose advance could influence on the technology of Internet of Things has a rapid development. Mobile Payment is one of the most widespread applications in M2M. Due to applying wireless network in Mobile Payment, the security issues based on wireless network have to be solved. The technologies applied in solutions generally include two sorts, encryption mechanism and authentication mechanism, the focus in this paper is the authentication mechanism of Mobile Payment. In this paper, we consider that there are four vital things in the authentication mechanism of Mobile Payment: two-way authentication, re-authentication, roaming authentication and inside authentication. Two-way authentication is to make the mobile device and the center system trust each other, and two-way authentication is the foundation of the other three. Re-authentication is to re-establish the active communication after the mobile subscriber changes his point of attachment to the network. Inside authentication is to prevent the attacker from obtaining the privacy via attacking the mobile device if the attacker captures the mobile device. Roaming authentication is to prove the mobile subscriber's legitimate identity to the foreign agency when he roams into a foreign place, and roaming authentication can be regarded as the integration of the above three. After making a simulation of our proposed authentication mechanism and analyzing the existed schemes, we summarize that the authentication mechanism based on the mentioned above in this paper and the encryption mechanism establish the integrate security framework of Mobile Payment together. This makes the parties of Mobile Payment apply the services which Mobile Payment provides credibly.

Social Issues Arising from the Establishment of a National DNA Database (신원확인 유전자정보은행 설립을 둘러싼 쟁점 연구)

  • Kim Byoung-Soo
    • Journal of Science and Technology Studies
    • /
    • v.3 no.2 s.6
    • /
    • pp.83-104
    • /
    • 2003
  • The use of DNA in identification is growing. The criminal DNA databases are in operation in some countries including the UK, Austria, Germany, and US. The militaries and law enforcement agencies in these countries have used the DNA profile. In Korea, DNA identification has been used in determining paternity and in criminal cases since the middle 1990's, and in recent years law enforcement agencies are promoting a national DNA database for identification. The DNA database threatens our civil liberties because of its potential to be used as an instrument of surveillance. Expanding the database puts increasing numbers of people on a 'list of suspects'. Nevertheless, there is little social concern about using DNA database for identification. This paper reviews social issues related to the establishment of DNA database and investigates the features of DNA profile and DNA Database establishment project promoted law enforcement agencies.

  • PDF

A Study on the Analysis and Solutions of the Blockchain Security Issues (블록체인 보안 이슈에 대한 분석과 해결 방안에 대한 연구)

  • Noh, Siwan;Rhee, Kyung-Hyune
    • Journal of Internet Computing and Services
    • /
    • v.20 no.4
    • /
    • pp.1-11
    • /
    • 2019
  • A Blockchain-based access control technology is one of the various use cases of blockchain and is used in many areas to transparently transfer and manage ownership of data between users without the trusted third party. The characteristics of transparency, Irreversibility, and decentralization provided by the public blockchain help to offer new benefits that existing access control technologies did not offer. However, various security issues facing the current blockchain are raising the issue of the safety of the technology. Therefore, in this paper, we analyze an overview of the blockchain-based access control technology and solutions of the security challenges faced. Moreover, we further present solutions that are not affected by the blockchain trilemma and models of access control technology based on them.

A Study on Library Service using Artificial Intelligence: Focused on North American University Libraries (인공지능(AI)을 이용한 도서관서비스 연구 - 북미 대학도서관을 중심으로 -)

  • Kim, Ji-Hyun
    • Journal of Korean Library and Information Science Society
    • /
    • v.51 no.4
    • /
    • pp.231-247
    • /
    • 2020
  • As artificial intelligence (AI) has emerged as a promising future technology among the fourth industrial revolution, we are trying to apply artificial intelligence technology across all area of society, including libraries. This study investigated the effects, issues, and implications of artificial intelligence on university library services. As a research method, in-depth interviews were conducted with IT experts of university libraries in North America, and conclusions and discussion were drawn from interview results and related documents. Research results revealed that university libraries in North America were trying to build an infrastructure that facilitates information access and retrieval based on artificial intelligence systems and to provide new services in collaboration with AI research institutes in universities. This study raised issues regarding the expansion of the role of libraries and librarians, privacy, and data quality. It was also discussed that the need for re-education of university librarians to become software engineers who play a role in disseminating knowledge. In addition, this study suggested the investment for the establishment of the information system and an artificial intelligence research center in the library. The study discussed limitations of research due to changes in the research environment and suggestions for future research.

Energy-Aware Data-Preprocessing Scheme for Efficient Audio Deep Learning in Solar-Powered IoT Edge Computing Environments (태양 에너지 수집형 IoT 엣지 컴퓨팅 환경에서 효율적인 오디오 딥러닝을 위한 에너지 적응형 데이터 전처리 기법)

  • Yeontae Yoo;Dong Kun Noh
    • IEMEK Journal of Embedded Systems and Applications
    • /
    • v.18 no.4
    • /
    • pp.159-164
    • /
    • 2023
  • Solar energy harvesting IoT devices prioritize maximizing the utilization of collected energy due to the periodic recharging nature of solar energy, rather than minimizing energy consumption. Meanwhile, research on edge AI, which performs machine learning near the data source instead of the cloud, is actively conducted for reasons such as data confidentiality and privacy, response time, and cost. One such research area involves performing various audio AI applications using audio data collected from multiple IoT devices in an IoT edge computing environment. However, in most studies, IoT devices only perform sensing data transmission to the edge server, and all processes, including data preprocessing, are performed on the edge server. In this case, it not only leads to overload issues on the edge server but also causes network congestion by transmitting unnecessary data for learning. On the other way, if data preprocessing is delegated to each IoT device to address this issue, it leads to another problem of increased blackout time due to energy shortages in the devices. In this paper, we aim to alleviate the problem of increased blackout time in devices while mitigating issues in server-centric edge AI environments by determining where the data preprocessed based on the energy state of each IoT device. In the proposed method, IoT devices only perform the preprocessing process, which includes sound discrimination and noise removal, and transmit to the server if there is more energy available than the energy threshold required for the basic operation of the device.