• 제목/요약/키워드: 개인정보침해

검색결과 617건 처리시간 0.031초

A study on Model of Personal Information Protection based on Artificial Intelligence Technology or Service (인공지능 기술/서비스 기반의 개인정보 보호 모델에 대한 연구)

  • Lee, Won-Tae;Kang, JangMook
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • 제16권4호
    • /
    • pp.1-6
    • /
    • 2016
  • A.I. has being developed from the technology for Big data analysis to the technology like a human being. The sensing technology of IOT will make A.I. have the more delicate sense than human's five senses. The computer resource is going to be able to support A.I. by clouding networking technology wherever and whenever. Like this A.I. is getting developed as a golden boy of the latest technologies At the same time, many experts have the anxiety and bleak outlook about A.I. Most of dystopian images of the future come out when the contemplative view is lost or it is not possible to view the phenomena objectively. Or it is because of the absence of confidence and ability to convert from the visions of technology development to the subject visions of human will. This study is not about the mass dismissal, unemployment or the end of mankind by machinery according to the development of A.I. technology and service, but more about the occurrent issue like the personal information invasion in daily life. Also the ethical and institutional models are considered to develop A.I. industry protecting the personal information.

Big data, how to balance privacy and social values (빅데이터, 프라이버시와 사회적 가치의 조화방안)

  • Hwang, Joo-Seong
    • Journal of Digital Convergence
    • /
    • 제11권11호
    • /
    • pp.143-153
    • /
    • 2013
  • Big data is expected to bring forth enormous public good as well as economic opportunity. However there is ongoing concern about privacy not only from public authorities but also from private enterprises. Big data is suspected to aggravate the existing privacy battle ground by introducing new types of privacy risks such as privacy risk of behavioral pattern. On the other hand, big data is asserted to become a new way to by-pass tradition behavioral tracking such as cookies, DPIs, finger printing${\cdots}$ and etc. For it is not based on a targeted person. This paper is to find out if big data could contribute to catching out behavioral patterns of consumers without threatening or damaging their privacy. The difference between traditional behavioral tracking and big data analysis from the perspective of privacy will be discerned.

A Study on Continuance Usage Intention of ChatGPT (ChatGPT의 지속 사용 의도에 관한 연구)

  • Dong Young Lee;Seok Chan Jeong;Sang Lee Cho
    • The Journal of Bigdata
    • /
    • 제9권1호
    • /
    • pp.17-30
    • /
    • 2024
  • This study categorizes the factors that affect the intention to continue using ChatGPT into positive motivational factors (personalization, social influence) and negative motivational factors (privacy concern, perceived risk) and investigates whether they affect the intention to continue using ChatGPT through information trust, performance expectancy, and effort expectancy. To this end, a survey was conducted among 265 adults in their 20s and above who have used ChatGPT service. The results showed that personalization and social influence had a defining effect on information trust, performance expectancy, and effort expectancy. For privacy concern, we found a negative effect of wealth on performance expectations, but not on effort expectations. Perceived risk had a negative effect on performance expectancy and effort expectancy. In addition, information trust, performance expectancy, and effort expectancy have a defining effect on continuance intention. This study extends the scope of existing research that focuses on positive factors, deepens our the understanding of ChatGPT. It also provides useful suggestions for continued use of ChatGPT.

A Content Analysis of Korean Newspaper Coverage of Information Technology (신문기사에 나타난 정보기술의 활용)

  • 정경수;박영석
    • The Journal of Information Technology and Database
    • /
    • 제1권1호
    • /
    • pp.83-106
    • /
    • 1994
  • 본 연구는 정보기술에 관련된 신문기사의 내용과 성격에 관하여 분석하였다. 동아일보와 조선일보양대 일간지를 88년 1월 부터 92년 12월 까지 5년동안 조사하였으며 총 1551건의 정보기술 관련 기사를 분석하였다. 조사결과를 보면 1988년 부터 1992년 사이에 양대 신문에 나타난 정보기술 관련기사가 점점 더 증가하는 추세를 보였으며 이는 정보화사회의 도래와 함께 정보기술이 우리사회의 여러분야로 확산되고 있음을 잘 보여주고 있다고 하겠다. 기사의 내용은 원격통신, 신제품 개발, 컴퓨터관련 교육, 하드웨어와 소프트웨어의 개발과 유통 등에 관련된 기사가 주류를 이루었으며 그외에 공장자동화, 사무자동화, 가사자동화, 컴퓨터관련 범죄, 데이타베이스, 지역정보화, 멀티미디어 등에 관한 주제가 다루어졌다. 한편, 정보기술 관련기사의 성격은 기존의 신문기사에서 부정적인 기사가 주류를 이루고 있는 것과는 달리 긍정적인 기사가 큰 비중을 차지하고 있는 것으로 드러났다. 이는 정보기술이 비교적 새로운 분야이므로 정보기술의 부정적인 측면보다 긍정적인 측면을 부각시키고 있기 때문인 것으로 판단된다. 그러나 최근의 기사에서는 컴퓨터 사용에 관련된 문제점, 컴퓨터를 이용한 범죄, 개인의 프라이버시 침해 등 부정적인 측면의 문제도 제기되고 있다. 신문기사의 내용분석에 의하면 기업의 업종에 따라 정보기술의 활용면에서도 분명한 차이를 보여주고 있는데 제조업의 경우 기업의 내부 물적활동, 생산활동, 외부 물적활동에 관한 기사들이 많았으며 서비스업종의 경우에는 고객에 대한 협상력을 증가시키는데 관련된 기사들이 많았고, 하드웨어나 소프트웨어 산업의 경우에는 고객에 대한 협상력을 증가시키는 문제와 함께 대체재의 개발에 관련된 기사도 많이 등장하였다.

  • PDF

Privacy Protection Mechanism using MAC Security in VANET (차량 통신에서 MAC Security 기반의 사용자 프라이버시 보호기법)

  • Lim, Hun-Jung;Lee, Jun-Won;Kim, Tae-Kyung;Chung, Tai-Myoung
    • Annual Conference of KIPS
    • /
    • 한국정보처리학회 2011년도 춘계학술발표대회
    • /
    • pp.812-815
    • /
    • 2011
  • 통신기술이 발달하면서 차량 통신에 대한 연구가 활발히 진행되고 있다. 주 연구 분야로 라우팅 및 위치정보 기반의 주소 설정과 통신, 보안 문제 해결 등이 있다. 차량은 지극히 개인적인 공간이므로 운전자의 위치 및 식별정보에 대한 보호가 필요하다. 이러한 연구는 운전자 프라이버시 보호 측면에서 보안기능과는 별도로 연구가 진행되고 있다. 기존의 프라이버시 보호 기술들은 각 계층별 프라이버시 보호는 만족하고 있지만, 계층별 정보들의 연결을 통해 프라이버시를 공격하는 연관 공격(Relation Attack)에 대하여서는 취약함을 보이고 있다. 따라서 본 논문에서는 MAC Security 기술을 이용하여 운전자의 프라이버시를 보호하는 기법을 제안하려 한다. 제안하는 기법은 네트워크 접속 계층 주소를 제외한 나머지 정보를 암호화 하기 때문에 물리 주소로 인한 프라이버시가 침해가 발생 하더라도 다른 계층의 정보를 알 수 없으므로 네트워크 계층의 위치 정보 및 응용계층의 사용자의 식별 정보 등을 보호 함으로 상관 공격에 안전하다. 물리 주소 역시 해당 도메인에서 유일한 식별 정보 이므로 멀티 도메인 통신이 이루어 지는 인터넷 상에서는 운전자의 프라이버시를 보호 할 수 있다.

Anonymous Qualification Verifying Method on Web Environment (웹 환경에서 익명성을 제공하는 자격증명 방법)

  • Lee, Yun-Kyung;Hwang, Jung-Yeon;Chung, Byung-Ho;Kim, Jeong-Nyeo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • 제21권5호
    • /
    • pp.181-195
    • /
    • 2011
  • There's a controversy about an invasion of privacy which includes a leakage of private information and linking of user's behavior on internet. Although many solutions for this problem are proposed, we think anonymous authentication, authorization, and payment mechanism is the best solution for this problem. In this paper, we propose an effective anonymity-based method that achieves not only authentication but also authorization. Our proposed method uses anonymous qualification certificate and group signature method as an underlying primitive, and combines anonymous authentication and qualification information. An eligible user is legitimately issued a group member key pair through key issuing process and issued some qualification certificates anonymously, and then, he can take the safe and convenience web service which supplies anonymous authentication and authorization. The qualification certificate can be expanded according to application environment and it can be used as payment token.

Privacy-Preserving Collection and Analysis of Medical Microdata

  • Jong Wook Kim
    • Journal of the Korea Society of Computer and Information
    • /
    • 제29권5호
    • /
    • pp.93-100
    • /
    • 2024
  • With the advent of the Fourth Industrial Revolution, cutting-edge technologies such as artificial intelligence, big data, the Internet of Things, and cloud computing are driving innovation across industries. These technologies are generating massive amounts of data that many companies are leveraging. However, there is a notable reluctance among users to share sensitive information due to the privacy risks associated with collecting personal data. This is particularly evident in the healthcare sector, where the collection of sensitive information such as patients' medical conditions poses significant challenges, with privacy concerns hindering data collection and analysis. This research presents a novel technique for collecting and analyzing medical data that not only preserves privacy, but also effectively extracts statistical information. This method goes beyond basic data collection by incorporating a strategy to efficiently mine statistical data while maintaining privacy. Performance evaluations using real-world data have shown that the propose technique outperforms existing methods in extracting meaningful statistical insights.

A Study of Intrusion Security Research and Smishing Hacking Attack on a Smartphone (스마트폰에서 Smishing 해킹 공격과 침해사고 보안 연구)

  • Park, In-Woo;Park, Dea-Woo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 한국정보통신학회 2013년도 추계학술대회
    • /
    • pp.141-145
    • /
    • 2013
  • Damage is increasing by (Smishing) hacking attack Smishing you use a smart phone after entering 2013. Takeover of personal information and direct financial damage in collaboration with graphics sewing machine hacking attack has occurred. Monetary damage that leads to Internet payment service (ISP) and secure payment system in conjunction with graphics sewing machine hacking attack on a smartphone has occurred. In this paper, I will study analysis in the laboratory examples of actual infringement vinegar sewing machine hacking attack. It is a major power security measures to prevent damage to the secure payment system that a case analysis and practical principle technical nest sewing machine hacking attack, using Smishing. In this paper, I will be to research to be able to through a smart phone, to the online payment safer and more convenient.

  • PDF

Study on the New Re-identification Process of Health Information Applying ISO TS 25237 (ISO TS 25237을 적용한 보건의료정보의 새로운 재식별 처리에 관한 연구)

  • Kim, Soon Seok
    • Convergence Security Journal
    • /
    • 제19권5호
    • /
    • pp.25-36
    • /
    • 2019
  • With the development of information and communication technology, hospitals that electronically process and manage medical information of patients are increasing. However, if medical information is processed electronically, there is still room for infringing personal information of the patient or medical staff. Accordingly, in 2017, the International Organization for Standardization (ISO) published ISO TS 25237 Health Information - Pseudonymization[1]. In this paper, we examine the re - identification process based on ISO TS 25237, the procedure and the problems of our proposed method. In addition, we propose a new processing scheme that adds a re-identification procedure to our secure differential privacy method [2] by keeping a mapping table between de-identified data sets and original data as ciphertext. The proposed method has proved to satisfy the requirements of ISO TS 25237 trust service providers except for some policy matters.

Development of S-SLA based on the Analyses of Security Functions for Anti-virus System (안티바이러스 시스템 보안기능 분석을 통한 보안SLA 등급화 지표 개발)

  • Yi, Wan-Suck;Lee, Dong-Bum;Won, Dong-Ho;Kwak, Jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • 제20권6호
    • /
    • pp.237-249
    • /
    • 2010
  • If one analyzes recent cyber incidents including personal information infringement cases, it seems like actual attack is targeting Internet service providers but actually they are targeting Internet service users. For many users, all the services were not provided to them as they have signed for in the contract or personal informations, which users have provided to service providers when signing contracts, were disclosed to public without users' consent causing aftereffect. As a result, importance of S-SLA indexes, which is to be included in the SLA to be signed between a user and a service provider, is ever more increasing. Especially, if there is a S-SLA indexes for anti-virus services, service providers have to provide a high quality of service as they have signed in the SLA. However, there wasn't any researches in the S-SLA area domestically and there are only limited SLA indexes related to system or service maintenances at the moment. Therefore, this paper analyses security functions in anti-virus services and proposes S-SLA indexes for different security level.