• Title/Summary/Keyword: 개인정보침해

Search Result 617, Processing Time 0.019 seconds

Patent Analysis and Standardization Methods of Automobile Black Box Technology (차량용 블랙박스 기술 특허분석 및 표준화 방안)

  • Han, In-Hwan
    • Journal of Korean Society of Transportation
    • /
    • v.25 no.3
    • /
    • pp.29-43
    • /
    • 2007
  • An automobile black box can provide sufficient and accurate information for investigating the causes of vehicle accidents as well as preventing them in the future. The database of accident information from stored data in the black box can provide a variety of services to the general public when it is accessed in a reasonable manner. minimizing intrusion into drivers' privacy. Therefore, the black box could become the main intelligent automobile Part, with extensive benefits for all associated industries as well as government agencies and insurance companies. While the introduction and spread of the black box are imminent in Korea, this paper reviews technology and product trends of the black box. In particular, this paper presents findings on the investigation of black box-related patent applications and an in-depth study of core patents from several leading counties, including the United States. In addition, this paper describes trends of standardization and legislation in leading countries and presents methods of standardization with suggestions for some development topics related to black box technology.

An analysis of consumption behavior and consumption problem according to the digital convergence (디지털 융복합에 따른 소비행동과 소비문제)

  • Kim, Yeon-Jeong
    • Journal of Digital Convergence
    • /
    • v.14 no.2
    • /
    • pp.149-156
    • /
    • 2016
  • The purpose of this study is to estimate convergence level of digital device and service and analyze group difference of consumption behavior and problem according to digital convergence level. The research method was survey with digital business expert and 343 samples. ANOVA research method was applied. The results of research are as follows. First, the study suggests that with a self-directed consuming attitude associated with both online and offline, there are the possibility to spread social problem which has unclear boundary, the possibility of intrusion into privacy through the network flow, and the matter of the credibility of information in convergence media. Second, since digital devices are important to connect consumers to the network, consumers have anxious dependence on the devices, which causes the fatigue of information to increase rapidly.

Threat-Based Security Analysis for the Domestic Smart Home Appliance (위협 모델링을 이용한 국내 스마트 홈 보안 분석에 대한 연구)

  • Hong, Paul;Lee, Sangmin;Park, Minsu;Kim, Seungjoo
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.6 no.3
    • /
    • pp.143-158
    • /
    • 2017
  • Smart Home Appliance which makes people to operate machines in the home by remote control is service or technology to provide convenience. It is close to home, so it has privacy problem and security problem. If Smart Home Applications is attacked, Scale of damage is anticipated. In case of products from overseas country, various vulnerability has been announced every year. Therefore, It is necessary to identify and to analysis threats of Smart Home Appliance using systematically method for using safe Smart home appliance service. In this paper, we present check list for identifying and analyzing threats using Threat Modeling and then we analyzed the Domestic Smart Home Appliance using check list which we present.

A Study on the Profiling System in the Aviation Security (항공보안에서의 프로파일링 연구)

  • Hwang, Ho-Won;Lee, Kyu-Hang
    • The Korean Journal of Air & Space Law and Policy
    • /
    • v.22 no.2
    • /
    • pp.155-175
    • /
    • 2007
  • As intellectual terror threats increase, we feel the limit in coping with those threats and the things we do are placing traditional X-ray machines & ETD and increasing aviation security staffs. In fact, even if air transportation system is the fast and most efficient transportation methods, it is true that there are many inconveniences to endure due to terror threats. In the name of security, even if we make a lot of efforts and time to screen both good-natured passengers, baggage, cargo and suspicious passengers, it is impossible to screen perfectly and it is not an efficient methods. Therefore, we introduce profiling system that reduce the effort to screen good-natured passengers but focus on screening dangerous passengers and baggages. Profiling system strengthens aviation security, using the concept "Selection & Concentration". Israel started to introduce manual profiling system in aviation security, which is interviewing suspicious passengers and it has been used in crime investigation since 1960. And it has been upgraded and diversified to CAPPS(Computer Assisted Passenger Screening Program) and SPOT(Screening Passenger by Observation). So, this theses is to study on the concept & kind of profiling and profiling methods adopted in airlines. Also it presents the method of introduction of profiling system in Korea and the necessity of making law on it.

  • PDF

Analysis of Homomorphic Authenticated Encryption (Encrypt with Authenticate Construction) (결합 준동형 인증 암호의 안전성 분석)

  • Kim, Jinsu
    • Convergence Security Journal
    • /
    • v.21 no.1
    • /
    • pp.33-44
    • /
    • 2021
  • Data outsourcing utilizing the Cloud faces a problem of the third-party exposure, modulation, and reliability for the provided computational delegation results. In order to solve those problematic security issues, homomorphic encryption(HE) which executes calculation and analysis on encrypted data becomes popular. By extension, a new type of HE with a authentication functionality, homomorphic authenticated encryption(HAE) is suggested. However, a research on the HAE is on the initial stage. Furthermore, based on a message authenticated scheme with HE, the method and analysis to design is still absent. This paper aims to analyze an HAE, with a generic combination of a message authenticated scheme and a HE, known as "Encrypt with Authentication". Following a series of analysis, we show that by adopting a unforgeable message authenticated scheme, the generically constructed HAE demonstrated an unforgeability as well. Though, a strong unforgeability is not the case. This paper concludes that although indistinguishable HE can be applied to design the HAE, a security issue on the possibility of indistinguishability is still not satisfied.

A Study on the Causes of Security Vulnerability in 'Wall Pads' ('월패드'의 보안 취약 원인에 관한 고찰)

  • Kim Sang Choon;Jeon Jeong Hoon
    • Convergence Security Journal
    • /
    • v.22 no.2
    • /
    • pp.59-66
    • /
    • 2022
  • Recently, smart home technology has been developed with a great response due to the convenience of home automation. Smart home technology provides various services by connecting various Internet of Things (IoT) and sensors to a home network through wired/wireless networks. In addition, the smart home service easily and conveniently controls lighting, energy, environment, and door cameras through a wall pad. However, while it has become a social issue due to the recent hacking accident of wall pads, personal information leakage and privacy infringement are expected. Accordingly, it is necessary to prepare preventive and countermeasures against security vulnerability factors of wall pads. Therefore, this study expects that it can be used as basic data for future smart home application and response technology development by examining the weak causes and countermeasures related to wall pads.

A Study on the Privacy Awareness through Bigdata Analysis (빅데이터 분석을 통한 프라이버시 인식에 관한 연구)

  • Lee, Song-Yi;Kim, Sung-Won;Lee, Hwan-Soo
    • Journal of Digital Convergence
    • /
    • v.17 no.10
    • /
    • pp.49-58
    • /
    • 2019
  • In the era of the 4th industrial revolution, the development of information technology brought various benefits, but it also increased social interest in privacy issues. As the possibility of personal privacy violation by big data increases, academic discussion about privacy management has begun to be active. While the traditional view of privacy has been defined at various levels as the basic human rights, most of the recent research trends are mainly concerned only with the information privacy of online privacy protection. This limited discussion can distort the theoretical concept and the actual perception, making the academic and social consensus of the concept of privacy more difficult. In this study, we analyze the privacy concept that is exposed on the internet based on 12,000 news data of the portal site for the past one year and compare the difference between the theoretical concept and the socially accepted concept. This empirical approach is expected to provide an understanding of the changing concept of privacy and a research direction for the conceptualization of privacy for current situations.

A study on the policy of de-identifying unstructured data for the medical data industry (의료 데이터 산업을 위한 비정형 데이터 비식별화 정책에 관한 연구)

  • Sun-Jin Lee;Tae-Rim Park;So-Hui Kim;Young-Eun Oh;Il-Gu Lee
    • Convergence Security Journal
    • /
    • v.22 no.4
    • /
    • pp.85-97
    • /
    • 2022
  • With the development of big data technology, data is rapidly entering a hyperconnected intelligent society that accelerates innovative growth in all industries. The convergence industry, which holds and utilizes various high-quality data, is becoming a new growth engine, and big data is fused to various traditional industries. In particular, in the medical field, structured data such as electronic medical record data and unstructured medical data such as CT and MRI are used together to increase the accuracy of disease prediction and diagnosis. Currently, the importance and size of unstructured data are increasing day by day in the medical industry, but conventional data security technologies and policies are structured data-oriented, and considerations for the security and utilization of unstructured data are insufficient. In order for medical treatment using big data to be activated in the future, data diversity and security must be internalized and organically linked at the stage of data construction, distribution, and utilization. In this paper, the current status of domestic and foreign data security systems and technologies is analyzed. After that, it is proposed to add unstructured data-centered de-identification technology to the guidelines for unstructured data and technology application cases in the industry so that unstructured data can be actively used in the medical field, and to establish standards for judging personal information for unstructured data. Furthermore, an object feature-based identification ID that can be used for unstructured data without infringing on personal information is proposed.

A Study on Information Security Policy in the era of Smart Society (스마트시대 정보보호정책에 관한 연구)

  • Kim, Dong-Wook;Sung, Wook-Joon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.4
    • /
    • pp.883-899
    • /
    • 2012
  • This study will propose the policy priorities of cyber information security by AHP(Analytic Hierarchy Process) survey. The policy categories for AHP survey consist in the foundation of information security and activity of information security(1st hierarchy). In the second hierarchy, the foundation of information security was classified into laws-system, human resources, h/w-s/w technology and sociocultural awareness. And the activity of information security was divided into infrastructure protection, privacy protection, related industry promotion, and national security. Information policy alternatives were composed of 16 categories in the third hierarchy. According to the AHP result, in the perspective of policy importance, the modification of related laws was the first agenda in the policy priority, better treatment of professionals was the second, and the re-establishment of policy system was the third. In the perspective of policy urgency, the re-establishment of policy system was the first item, the modification of related laws was the second, and better treatment of professionals is the third.

A comparative study on the priorities between perceived importance and investment of the areas for Information Security Management System (정보보호관리체계(ISMS) 항목의 중요도 인식과 투자의 우선순위 비교 연구)

  • Lee, Choong-Cheang;Kim, Jin;Lee, Chung-Hun
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.24 no.5
    • /
    • pp.919-929
    • /
    • 2014
  • Recently, organizational efforts to adopt ISMS(Information Security Management System) have been increasingly mandated and demanded due to the rising threat and the heavier cost of security failure. However there is a serious gap between awareness and investment of information security in a company, hence it is very important for the company to control effectively a variety of information security threats within a tight budget. To phase the ISMS, this study suggests the priorities based on evaluating the Importance of 13 areas for the ISMS by the information security experts and then we attempt to see the difference between importance and investment through the assessment of the actual investment in each area. The research findings show that intrusion incident handling is most important and IT disaster recovery is the area that is invested the most. Then, information security areas with the considerable difference between priorities of importance and investment are cryptography control, information security policies, education and training on information security and personnel security. The study results are expected to be used in making a decision for the effective investment of information security when companies with a limited budget are considering to introduce ISMS or operating it.