• Title/Summary/Keyword: 가명

Search Result 84, Processing Time 0.024 seconds

A Study on the Improvement of the Legal System for the Promotion of Opening and Utilization of Open Government Data - Focusing on cases of refusal to provide - (공공데이터의 개방·활용 촉진을 위한 법제도 개선방안 연구 - 공공데이터 제공거부 사례를 중심으로 -)

  • Kim Eun-Seon
    • Informatization Policy
    • /
    • v.30 no.2
    • /
    • pp.46-67
    • /
    • 2023
  • There are criticisms that, despite the proactive government policy on open government data (hereinafter "open data"), certain highly demanded data remains restricted due to legal constraints. In this study, we aim to analyze the factors that limit the opening and utilization of open data, focusing on cases wherein requests for open data provision have been denied. We will explore possible approaches that are in harmony with the Open Data Law while examining the constitutional value of open data, considering the foundational Open Data Charter that underpins the government's data policy. We will also examine cases wherein requests for data provision have been denied for institutional reasons, with nearly half of these cases involving open data that includes personal information. It is necessary to explore the potential for improvement in these cases. Furthermore, considering the recent amendment to the Personal Information Protection Act, which allows for the processing of pseudonymous information without the consent of the data subject for limited purposes, it is an opportune time to consider the need for amending the Open Data Law to facilitate broader access and utilization of open data for the nation. Lastly, we will propose institutional improvement directions aligned with the opening and utilization of open data by examining the constraints of and need for improvement in the selected target laws.

A Study on Privacy Security in Maritime Information Gateway System (지능형 해상교통정보 연계시스템에서의 개인정보 보안에 관한 연구)

  • Yong-hak Song;Hyun Kim;Deuk-Jae Cho;Jong-Hwa Beak;Do-yeon Kim
    • Proceedings of the Korean Institute of Navigation and Port Research Conference
    • /
    • 2023.05a
    • /
    • pp.202-203
    • /
    • 2023
  • The Ministry of Oceans and Fisheries is providing maritime safety services through the operation of the Korean e-Navigation service, and research is continuously needed to improve reliability and quality to secure the competitiveness of the system. In order to secure such competitiveness, we presented the basic design for the big-data maritime information gateway system for minimizes thereal-time operation impact of the Korean e-Navigation service, and a theoretical hardware structure diagram including pseudonymization procedures to implement the overall system and solve privacy security issues. However, the proposed structure diagram and design include only the overall concept, to link real-time maritime information, required detailed privacy security method to satisfy the Privacy Act of the Republic of Korea. To solve this problem, this study will identify factors to violate the Privacy Act within the real-time maritime information(privacy of shipowner, shipping company, captain, navigator, fisherman, etc.) linked by the big-data maritime information gateway system, and research the method to link the secured information to other institutions by encrypting identified the factors.

  • PDF

Effects of Real Name Using on SNS User's Behavior and Continuous Use Intention (실명사용 SNS 사용자의 행태와 지속이용 의도의 영향)

  • Hwang, YeonHee;Kim, YoungBerm;Lee, SangHo
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.25 no.3
    • /
    • pp.83-97
    • /
    • 2020
  • Unlike the feature of SNS, which strengthens two-way communication and promotes interaction through consistent on/off line identity management, passive use of Facebook to unilaterally accept other people's opinions is being strengthened, and more people tend to use Facebook anonymously or pseudonym to enjoy freedom of expression. To illustrate this transformative use behavior, this study suggests an integrated model including psychological and behavioral variables such as self-esteem, real name use, and opinion expression to explore the effect on social relationship value perception and satisfaction. Studies have shown that self-esteem affects the use of real names and self-exposure, and that the satisfaction and sustainability of relationships have increased as real-name users expose more information about themselves.

Privacy-Preserving ID-based Service in Anonymity-based Ubiquitous Computing Environment (익명기반 유비쿼터스 환경의 프라이버시 보장 ID기반 서비스)

  • Kim Hak-Joon;Hwang Kyoung-Soon;Lee Keon Myung
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.15 no.1
    • /
    • pp.65-68
    • /
    • 2005
  • Privacy preservation is crucial in ubiquitous computing environment in which lots of privacy- sensitive information can be collected and distributed without appropriate control. The anonymity-based approach is a famous one used for privacy preservation communication, which allows users to use pseudonyms instead of real ID so as not to reveal their identities. This approach is effective in that it can hide the identity of users. However, it makes it difficult to provide ID-based services like buddy service, dangerous area alert, P2P communication in the ubiquitous computing. We proposes a system architecture which enables ID-based services in the ubiquitous computing environment employing anonymity - based privacy - preserving approach.

Anonymous Connection Protocol against Location Tracking Attacks in Bluetooth Environment (블루투스에서 위치 추적 공격을 방지하기 위한 익명 접속 프로토콜)

  • Park, Hee-Jin;Kim, Yu-Na;Kim, Jong
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.14 no.3
    • /
    • pp.266-270
    • /
    • 2008
  • Bluetooth technology provides a way to connect and exchange information between personal devices over a secure and short-range radio frequency without any authentication infrastructures. For this infrastructure-less feature, Bluetooth has several problems which could not occur in other network, and among them location tracking attacks is essential problem which should be solved. In this paper, we introduce the location tracking attack and propose an anonymous connection protocol against it. We also perform security analysis based on possible scenarios of this attack, and estimate both execution time and memory spaces of our scheme and existing methods.

Transfer Learning based on Adaboost for Feature Selection from Multiple ConvNet Layer Features (다중 신경망 레이어에서 특징점을 선택하기 위한 전이 학습 기반의 AdaBoost 기법)

  • Alikhanov, Jumabek;Ga, Myeong Hyeon;Ko, Seunghyun;Jo, Geun-Sik
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2016.04a
    • /
    • pp.633-635
    • /
    • 2016
  • Convolutional Networks (ConvNets) are powerful models that learn hierarchies of visual features, which could also be used to obtain image representations for transfer learning. The basic pipeline for transfer learning is to first train a ConvNet on a large dataset (source task) and then use feed-forward units activation of the trained ConvNet as image representation for smaller datasets (target task). Our key contribution is to demonstrate superior performance of multiple ConvNet layer features over single ConvNet layer features. Combining multiple ConvNet layer features will result in more complex feature space with some features being repetitive. This requires some form of feature selection. We use AdaBoost with single stumps to implicitly select only distinct features that are useful towards classification from concatenated ConvNet features. Experimental results show that using multiple ConvNet layer activation features instead of single ConvNet layer features consistently will produce superior performance. Improvements becomes significant as we increase the distance between source task and the target task.

Suggestions for Applications of Anonymous Data under the Revised Data Privacy Acts (데이터 3법 시대의 익명화된 데이터 활용에 대한 제언)

  • Chun, Ji Young;Noh, Geontae
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.3
    • /
    • pp.503-512
    • /
    • 2020
  • The revisions to data privacy acts allows the disclosure of data after anonymizing personal information. Such anonymized data is expected to be useful in research and services, but there are high concerns about privacy breaches such as re-identifying of the individuals from the anonymized data. In this paper, we showed that identifying individuals from public data is not very difficult, and also raises questions about the reliability of the public data. We suggest that users understand the trade-offs between data disclosure and privacy protection so that they can use data securely under the revised data privacy acts.

A Study on the Buddhist Worldview and Aesthetics of Secular Humor in Jo Oh-Hyeon's Literature: With a Focus on For Vupasama(Extinction) (조오현 문학에 나타난 불교적 세계관과 세속적 해학미 - 『적멸을 위하여: 조오현문학전집』을 중심으로)

  • Lee, Chan
    • Cross-Cultural Studies
    • /
    • v.35
    • /
    • pp.155-184
    • /
    • 2014
  • The present study aims at exploring in detail the Buddhist worldview and aesthetics of humor in Jo O-hyeon's literary works. This includes the same context as an elucidation of the ways in which his poems closely correspond in expressive forms and thematic contents. It is because, in Jo's literary world, where short poems and prose poems form a contrast, the expressive forms and thematic contents sharply differ depending on the ways in which prajnapti (provisional designation) is either foregrounded or backgrounded. In his literary world, when such a view of language and a worldview based on prajnapti are foregrounded, works that either inherit or play a variation on the fixed structure of the sijo emerge; and when they recede to the rear and are backgrounded, verses in the form of the prose poem are formulated. In addition, in Jo's literary works, where such a worldview of prajnapti and an aesthetics of secular humor intersect together, the thoughts on bheda-abheda(difference-non-difference) and the madhyama-pratipad (middle way) are formed. Such thoughts have considerable significance because they not only harbor a possibility of deconstructing and overcoming the opposition of the sacred/profane but also present a vision of a new unity.

Mix-based Decentralized Anonymous Transaction for Blockchain (블록체인을 위한 믹스 기반 분산화된 익명 거래)

  • Lee, Yun-ho
    • Journal of Internet Computing and Services
    • /
    • v.21 no.6
    • /
    • pp.51-56
    • /
    • 2020
  • Cryptocurrencies, including Bitcoin, has decentralization, distribution and P2P properties unlike traditional currencies relies on trusted central party such as banks. All transactions are stored transparently and distributively, hence all participants can check the details of those transactions. Due to the properties of cryptographic hash function, deletion or modification of the stored transations is computationally not possible. However, cryptocurrencies only provide pseudonymity, not anonymity, which is provided by traditional currencies. Therefore many researches were conducted to provide anonymity to cryptocurrencies such as mix-based methods. In this paper, I will propose more efficient hybrid mix-based method for anonymity than previous mix-based one.

Analysis of Security Vulnerability in U2U Authentication Using MEC in IoD Environment (IoD 환경에서 MEC를 활용한 U2U 인증에서 보안 취약점 분석)

  • Choi, Jae Hyun;Lee, Sang Hoon;Jeong, Ik Rae;Byun, Jin Wook
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.31 no.1
    • /
    • pp.11-17
    • /
    • 2021
  • Due to the recent development of the Internet of Things (IoT) and the increase in services using drones, research on IoD is actively underway. Drones have limited computational power and storage size, and when communicating between drones, data is exchanged after proper authentication between entities. Drones must be secure from traceability because they contain sensitive information such as location and travel path. In this paper, we point out a fatal security vulnerability that can be caused by the use of pseudonyms and certificates in existing IoD research and propose a solution.