• Title/Summary/Keyword: 개인정보 유출

Search Result 929, Processing Time 0.034 seconds

Online Privacy Protection: An Analysis of Social Media Reactions to Data Breaches (온라인 정보 보호: 소셜 미디어 내 정보 유출 반응 분석)

  • Seungwoo Seo;Youngjoon Go;Hong Joo Lee
    • Knowledge Management Research
    • /
    • v.25 no.1
    • /
    • pp.1-19
    • /
    • 2024
  • This study analyzed the changes in social media reactions of data subjects to major personal data breach incidents in South Korea from January 2014 to October 2022. We collected a total of 1,317 posts written on Naver Blogs within a week immediately following each incident. Applying the LDA topic modeling technique to these posts, five main topics were identified: personal data breaches, hacking, information technology, etc. Analyzing the temporal changes in topic distribution, we found that immediately after a data breach incident, the proportion of topics directly mentioning the incident was the highest. However, as time passed, the proportion of mentions related indirectly to the personal data breach increased. This suggests that the attention of data subjects shifts from the specific incident to related topics over time, and interest in personal data protection also decreases. The findings of this study imply a future need for research on the changes in privacy awareness of data subjects following personal data breach incidents.

Web Document Analysis based Personal Information Hazard Classification System (웹 문서 분석 기반 개인정보 위험도 분류 시스템)

  • Lee, Hyoungseon;Lim, Jaedon;Jung, Hoekyung
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.22 no.1
    • /
    • pp.69-74
    • /
    • 2018
  • Recently, personal information leakage has caused phishing and spam. Previously developed systems focus on preventing personal information leakage. Therefore, there is a problem that the leakage of personal information can not be discriminated if there is already leaked personal information. In this paper, we propose a personal information hazard classification system based on web document analysis that calculates the hazard. The system collects web documents from the Twitter server and checks whether there are any user-entered search terms in the web documents. And we calculate the hazard classification weighting of the personal information leaked in the web documents and confirm the authority of the Twitter account that distributed the personal information. Based on this, the hazard can be derived and the user can be informed of the leakage of personal information of the web document.

Analyzing Effects on Firms' Market Value of Personal Information Security Breaches (개인정보 유출이 기업의 주가에 미치는 영향)

  • Kim, JeongYeon
    • The Journal of Society for e-Business Studies
    • /
    • v.18 no.1
    • /
    • pp.1-12
    • /
    • 2013
  • With the increases of requirement for user identification in Internet services, we should let the service companies know my personal information. If the shared personal information with them are used in not-allowed area or delivered to un-authorized persons, we may have practical harms in several fields such as financial related operations. Korean Government has introduced new management method for personal information, but it is not hard to find the personal information management issues from Korean news papers. The proper measurement should be delivered to related companies to help them to decide investment for security. This paper review the indirect measurement method of demages by check the stock prices of related company for personal information management issue. We check the relationship between change of stock price and the information management issue. The result shows there are no changes in stock market. Korean government added strong regulations for personal information management though. To prevent further personal information issues, we should recognize the indirect damages properly and let the company pay higher reparations for any personal information abuse.

Privacy Lounge - Ambulance Chaser와 개인정보보호

  • Kim, Il-Seop
    • 정보보호뉴스
    • /
    • s.136
    • /
    • pp.48-51
    • /
    • 2009
  • 금년 들어 미국의 신용카드 결제처리업체인 하트랜드 시스템즈(Heartland Payment Systems)에서 사상 최악의 신용카드 정보 유출 사건이 발생했으며, 이로 인한 금융 피해금액이 수억 달러에 이를 것으로 추산되고 있다. 이 회사는 매달 1억건에 달하는 신용카드 거래를 처리한다고 하니 그 유출된 개인 금융정보의 양은 상상을 초월할 것으로 보인다. 이렇게 유출된 정보는 카드복제, 신용도용 등 쉽게 예상할 수 있는 범죄 이외에도 어떠한 형태의 범죄로 당사자들에게 피해가 되돌아 올 지는 가늠하기 어렵다. 최근 국내에서 발생한 일련의 개인정보 유출사건과 마찬가지로 정보화와 개인정보보호 문제에 경종을 울리는 또 하나의 사건이라 하겠다.

  • PDF

A Study on Certificate-based Personal Authentification System for Preventing Private Information Leakage through Internet (개인정보 유출 피해 방지를 위한 공인인증서 기반 인터넷 개인인증체계 개선 모델에 관한 연구)

  • Lee, Jung-Hyun;Kwon, Hun-Young;Lim, Jong-In
    • Convergence Security Journal
    • /
    • v.10 no.4
    • /
    • pp.1-11
    • /
    • 2010
  • Recently, We have many private information leakage cases through internet which cause social problems and it is impossible to change or update the leaked information, it is also used to the third crime such as identity theft, internet fraud. Hackers are interested in stealing private information for making money, in this point private information leakage problems are constantly increased hereafter. In this paper, I surveyed the authorization model on site registration which is currently used in Korea, and the problem of collecting personal identification number, I proposed policy model of useless method of private information, especially leaked information can not be used anymore in internet.

Analyzing the Privacy Leakage Prevention Behavior of Internet Users Based on Risk Perception and Efficacy Beliefs : Using Risk Perception Attitude Framework (위험지각과 효능감에 따른 인터넷 사용자의 개인정보 유출 예방행위 분석 : 위험지각태도 프레임웍을 기반으로)

  • Jang, Ickjin;Choi, Byounggu
    • The Journal of Society for e-Business Studies
    • /
    • v.19 no.3
    • /
    • pp.65-89
    • /
    • 2014
  • Although many studies have focused on the influences and outcomes of personal information leakage, few studies have investigated how the personal information leakage prevention behavior differs depending on internet user. This study attempts to supplement the existing studies' limitations with the use of risk perception attitude (RPA) framework. More specifically, this study tries to show internet user can be classified into four groups based on perceived risk of personal information leakage and efficacy beliefs of personal information protection, and to identify how the groups differ in terms of motivation, information seeking, and behaviors for privacy leakage prevention. Analysis on survey data from 276 internet users reveals that the users can be classified into responsive, avoidance, proactive, indifference groups. Furthermore, there are differences between groups in terms of motivation, information seeking, and behaviors for personal information leakage prevention. This study contributes to expand existing literature by providing tailored guidelines for implementation of personal information protection strategies and policy.

민간 기업의 개인정보 유출 위험에 대한 측정 방법과 그 사례에 대한 연구

  • Lee, Gi-Hyouk;Youn, Jae-Dong
    • Review of KIISC
    • /
    • v.18 no.3
    • /
    • pp.92-100
    • /
    • 2008
  • 본 논문은 개인정보를 취급하는 민간기업들이 개인정보유출을 사전에 방지하기 위한 일환으로 예방의 원칙에 기초를 두고 있는 개인정보영향평가를 수행할 수 있으며 이러한 일련의 프로세스를 이용한 개인정보 유출에 대한 차별화된 위험 분석과 심각도 분석을 통해 민간기업에 실질적으로 영향을 줄 수 있는 위험과 위험평가 결과를 토대로 위험에 효율적으로 대응할 수 있는 방안을 제시한다.

A Study on the Damage Cost Estimation Model for Personal Information Leakage in Korea (개인정보유출 피해 비용 산출 모델에 관한 연구)

  • Lim, Gyoo Gun;Liu, Mei Na;Lee, Jung Mi
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.1
    • /
    • pp.215-227
    • /
    • 2018
  • As Korea is rapidly becoming an IT powerhouse in the short term, various side effects such as cyber violence, personal information leakage and cyber terrorism are emerging as new social problems. Especially, the seriousness of leakage of personal information, which is the basis of safe cyber life, has been highlighted all over the world. In this regard, it is necessary to estimate the amount of the damage cost due to the leakage of personal information. In this study, we propose four evaluation methods to calculate the cost of damages due to personal information leakage according to average real transactions value, personally recognized value, compensation amount basis, and comparison to similar countries. We analyzed data from 2007 to 2016 to collect personal information leakage cases for 10 years and estimated the cost of damages. The number of cases used in the estimation is 65, and the total number of personal information leakage is about 430 million. The estimated cost of personal information leakage in 2016 was estimated to be at least KRW 7.4 billion, up to KRW 220 billion, and the 10 year average was estimated at from KRW 10.7 billion to KRW 307 billion per year. Also, we could find out the singularity that the estimated damage due to personal information leakage increases every three years. In the future, this study will be able to provide an index that can measure the damage cost caused by the leakage of personal information more accurately, and it can be used as an index of measures to reduce the damage cost due to personal information leakage.

Model for personal information protection from smart phone synchronization (스마트폰 동기화의 개인정보 유출방지 모델)

  • Maeng, Ho-Kyu;Oh, Tae-Won
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2011.06d
    • /
    • pp.44-47
    • /
    • 2011
  • 본 연구는 스마트폰 사용자들의 개인정보유출 경로와 스마트폰과 PC에서 동기화가 이뤄질 때 개인정보 유출 방지에 관하여 기술한다. 스마트폰에서 노트북이나 데스크탑 PC로 동기화시킨 후 로컬 컴퓨터 내에 남아있는 스마트폰 사용자의 모든 정보는 침입자들의 정보라고 하여도 과언이 아니다. 특히 스마트폰 사용자의 PC가 DDos에 감염된 좀비 PC라면 스마트폰 사용자의 취약성은 더욱 더 높아질 것이다. 최근 OTP카드의 프로그램을 만드는 최고 보안등급을 가진 RSA사 조차도 해킹을 당했다고 한다. 스마트폰 사용자들의 개인정보는 더욱 취약하다는 것을 반증하는 것이다. 본 연구에서는 개인정보 유출을 막기위해 동기화 후 PC에 남아있는 데이터를 처리하는 방법을 제안한다.

Qualitative Study on the Leakage of Personal Information of Children through Ground Theory (근거이론을 통한 아동 개인정보 유출에 대한 질적연구)

  • JEON, Changuk;YOO, Jinho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.2
    • /
    • pp.263-277
    • /
    • 2020
  • Children's use of the Internet is growing. Each company collects children's personal information. However, it is also difficult for children to recognize the concept of personal information. In this study, based on the analysis of newspaper children's personal information leakage, we investigated the occurrence of personal information leakage in children through ground theory, one of qualitative research methods used in the social science field. The ground theory is thought to be able to derive a causal relationship by identifying the leakage of children's personal information. As a result of the study, it was collected through the consent of the legal representative, but depending on the situation, the consent process was not performed. Even with the consent, it was found that due to insufficient measure to protect personal information, various situation(criminal damage, anxiety, embarrassment, anger, etc.) occurred the legal representative. As a result, children's personal information collection providers paid fines according to the situation.