Browse > Article
http://dx.doi.org/10.13089/JKIISC.2009.19.3.153

Development of Mobile Alarm System using Message Tree for Personal Information Management  

Jang, Eun-Young (Division of Computer, Seoul Women's University)
Kim, Hyung-Jong (Division of Computer, Seoul Women's University)
Hwang, Jun (Division of Computer, Seoul Women's University)
Abstract
When a private information security incident occurs, the people who own the information are not acknowledged about their information leakage until those affairs appear in public media. This research aims at developing a mobile alarm system for acknowledging suspicious events to the information owners. The mobile alarm system was designed considering the limited user interface of mobile terminal and concept of "personal information leakage message tree" is deployed. The message tree contains every possible situation about personal information leakage and the leaves of the tree has several choices that the information owner can select. This message tree concept enables each information owner to manager his or her information leakage situation by just pushing a few buttons of mobile device. The contribution of this paper is in design of a comprehensive alarm message tree and development of mobile alarm system containing the message tree concept.
Keywords
Mobile Alarm; Personal information leakage; Message Tree;
Citations & Related Records
Times Cited By KSCI : 2  (Citation Analysis)
연도 인용수 순위
1 강성철, "개인정보보호 실태와 정책방향," 인터넷정보학회지, 1(2), pp. 54-58, 2000년 12월
2 J. Burkhadrdt, T. Schaeck, S. HappeL K. Rindtorff. and T. Schaeck, Pervasive computing: Technology and Architecture of mobile internet applications, AddisonWesley Longman Publishing Co, ,Tan. 2001
3 R. Sekar and P. Uppuluri. "Synthesizing Fast Intrusion Prevention/Detection Systems from High-Level Specifications," Proceedings of the 3rd USENIX Windows NT Symposium, pp. 12-15 , July 1999
4 송유진, "유비쿼터스 환경에서 개인정보보호의 기술동향," 정보보호학회지, 16(3), pp. 75-86, 2006 6월
5 L.H. Overby, "Selectively responding to intrusions by computers evaluating," Patent Application Publication, Mar. 2005
6 김행욱, 정숙희, 강홍식, "WAP기반의 무선 단말기를 이용한 효과적인 IDS 관리/제어 시스템 구현," 한국정보보호과학회 2002 가을 학술발표논문집, 29(2), pp. 643-645, 2002년 10월
7 김기수, "유비쿼터스 네트워크에서 안전한 개인정보보호를 위한 프라이버시 보호방안," 한국정보과학회 2007 가을 학술발표 논문집, 34(2), pp. 132-135, 2007년 10월
8 장재혁, 정현철, 최용락, "E-Mail을 이용한 실시간 침입대응시스템," 한국인터넷정보학회 2001 추계학술발표대회 논문집, 2(2), pp. 281-285, 2001년 11월
9 B. LEE. Users' Perspective on Regulation to Protect Privacy on the Web, The International J nformation and Library Review, pp. 379-402, Sep. 2000   DOI   ScienceOn
10 장혜진, "자바 무선 보안," 정보과학회지, 20(4), pp. 66-72, 2002년, 4월
11 김형교, 강민구, 강성철, 정준현, "휴대단말 및 개인정보의 정보보호 동향," 인터넷정보학회지, 2(3), pp. 73-93, 2001년 9월