• Title/Summary/Keyword: 보호 동기

Search Result 311, Processing Time 0.039 seconds

Analyzing the Privacy Leakage Prevention Behavior of Internet Users Based on Risk Perception and Efficacy Beliefs : Using Risk Perception Attitude Framework (위험지각과 효능감에 따른 인터넷 사용자의 개인정보 유출 예방행위 분석 : 위험지각태도 프레임웍을 기반으로)

  • Jang, Ickjin;Choi, Byounggu
    • The Journal of Society for e-Business Studies
    • /
    • v.19 no.3
    • /
    • pp.65-89
    • /
    • 2014
  • Although many studies have focused on the influences and outcomes of personal information leakage, few studies have investigated how the personal information leakage prevention behavior differs depending on internet user. This study attempts to supplement the existing studies' limitations with the use of risk perception attitude (RPA) framework. More specifically, this study tries to show internet user can be classified into four groups based on perceived risk of personal information leakage and efficacy beliefs of personal information protection, and to identify how the groups differ in terms of motivation, information seeking, and behaviors for privacy leakage prevention. Analysis on survey data from 276 internet users reveals that the users can be classified into responsive, avoidance, proactive, indifference groups. Furthermore, there are differences between groups in terms of motivation, information seeking, and behaviors for personal information leakage prevention. This study contributes to expand existing literature by providing tailored guidelines for implementation of personal information protection strategies and policy.

A Study on Privacy Protect Scheme of RFID Provide Synchronization using Random Number (난수를 이용하여 동기화를 제공하는 RFID 프라이버시 보호 기법에 관한 연구)

  • Kang, Soo-Young;Lee, Im-Yeong
    • Journal of Korea Multimedia Society
    • /
    • v.10 no.5
    • /
    • pp.623-630
    • /
    • 2007
  • With the development in IT technology and with growing demands of users, a ubiquitous environment is being made. Because of individuals identification is important in ubiquitous environment, RFID, a technology used frequently. RFID, a technology that radio frequency identification, reader send signer, then tag provide user information. RFID has various strengths, such as high recognition rates, quick recognition speed, but Eavesdropping is possible and problem that user information is revealed happens. To solve this, study is proceeded with activity, but, because of low-cost passive tag is limited operation capability, usually used hash function and random number. Also updates value that is used to present session and uses in next session. Therefore, this scheme protects user privacy using random number. And this sheme can offer synchronization by creating variable value without updating value.

  • PDF

Role of Management and Protection Motivation's influence on the Intention of Compliance with Information Security Policies: Based on the Theory of Planned Behavior (경영진 역할과 보호동기 요인이 정보보안정책 준수 의지에 미치는 영향: 계획행동이론을 기반으로)

  • Shin, Hyuk;Kang, Min Hyung;Lee, Cheol Gyu
    • Convergence Security Journal
    • /
    • v.18 no.1
    • /
    • pp.69-84
    • /
    • 2018
  • This study examines antecedents of the intention of compliance with information security policies based on Ajzen's Theory of Planned Behavior. The study conducted the following: Verification of casual relations between role of management and protection motivation and the antecedents of planned behavior as parameters to determine the effect on the intention of compliance with information security policy, and comparative analysis between the research model and a competition model. The result of the study disclosed that, in the research model, attitude and subjective norm took an intermediary role on management beliefs, response efficacy, response cost, self-efficacy, and compliance intention, and perceived behavior control on management beliefs, self-efficacy and compliance intention.

  • PDF

A Study on the Effects of Protective Behavioral Strategies on Alcohol-Related Harms in Adults (보호행동전략이 성인의 음주폐해에 끼치는 영향에 관한 연구)

  • Lee, Hee Jong;Park, Ka Young
    • The Journal of the Korea Contents Association
    • /
    • v.21 no.5
    • /
    • pp.627-637
    • /
    • 2021
  • Many efforts have been made to prevent alcohol related harms such as health problems and socio-economic problems. Among them, the method of improving drinking behavior at the individual level is the most direct intervention. The effectiveness of the use of protective behavior strategies(PBS) has been widely known in Western countries. The purpose of this study is to empirically verify whether the use of PBS affects alcohol related harms in Korean adults. The survey has been conducted on 2,000 adult men and women. As a result, it is found that the use of PBS reduced alcohol related harms in adults. Among the PBS, the biggest impact on alcohol related harms is the area related serious harm reduction strategy, followed by restrictions on 'manner of drinking'. The effects of 'limiting/ stopping of drinking' is not significant. In addition, drinking frequency, binge drinking, and drinking motivations have significant positive effects on alcohol-related harms, and only social motivation has a negative effect. In this work, we propose follow-up studies on identifying relationships between protective behaviors and alcohol related factors through longitudinal studies and strengthening the use of protective behavior strategies that applied to the refined target populations.

RFID Anonymization Mechanism for Privacy Protection (프라이버시 보호를 위한 RFID 익명화 메커니즘)

  • Lee Dong-Hyeok;Song You-Jin
    • Proceedings of the Korea Institutes of Information Security and Cryptology Conference
    • /
    • 2006.06a
    • /
    • pp.574-578
    • /
    • 2006
  • 유비쿼터스 컴퓨팅 환경에서는 센서를 통하여 실시간의 상황인식 서비스를 제공하며, 이를 위해 사용자의 위치 정보 수집이 필요하다. NTT에서는 RFID에 대한 익명화를 통한 프라이버시보호 메커니즘을 제안하였다. 그러나, 불법적으로 접근하는 리더가 존재할 경우 i값의 비동기화를 통한 태그에 대한 Random Tampering공격이 가능하다. 본 논문에서는 NTT 연구소의 RFID 익명화 방법을 개선하여 태그의 Random Tampering 공격 방지가 가능하고, 태그와 리더 상호간 인증이 가능하며, 연산 과정을 절감시킨 새로운 RFID 익명화 프로토콜을 제안한다. 제안한 방법을 통하여 보다 안전하고 효율적으로 RFID기반 센서 네트워크 환경에서 사용자의 프라이버시를 보호할 수 있다.

  • PDF

Privacy-preserving Approach in Blockchain-based e-Commerce Systems (블록체인 기반 전자상거래 시스템에서의 개인정보보호 적용 방안)

  • Jinsue Lee;Jihye Kim;Jong-Hyouk Lee
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2024.05a
    • /
    • pp.425-426
    • /
    • 2024
  • 블록체인 기반 전자상거래 시스템은 탈중앙화된 P2P(Peer-to-Peer) 방식으로 데이터를 처리하고 합의 메커니즘을 통해 동기화되는 분산원장에 기록할 수 있다. 그러나, P2P 운영에 기반하여 전자상거래 과정에서 파생되는 고객의 외부 노출에 민감한 정보로 인해 고객의 개인정보가 공개되거나 유출되는 위협이 발생할 수 있다. 이에 따라, 본 논문에서는 블록체인 기반 전자상거래 시스템에서 고객의 개인정보를 보호하기 위한 PET(Privacy Enhancing Technology)를 식별하고, 블록체인 기반 전자 상거래 시스템에 적용하기 위한 방안을 분석한다.

Factors Drawing Members of a Financial Institution to Information Security Risk Management (금융기관 종사자들을 정보보안 위험관리로 이끄는 요인)

  • An, Hoju;Jang, Jaeyoung;Kim, Beomsoo
    • Information Systems Review
    • /
    • v.17 no.3
    • /
    • pp.39-64
    • /
    • 2015
  • As information and information technology become more important in competitive corporate environments, the risk of information security breaches has increased accordingly. Although organizations establish security measures to manage information security risks, members of organizations do not comply with them well, and their information security behavior intention is unclear. Therefore, to understand the information security risk management intention of the members of organizations, the present study developed a research model using Protection Motivation Theory, Supervisory Authority Pressure, and Background factors. This study presents empirical research findings based on the analysis of survey data from 201 members of financial institutions. Perceived Severity, Self-efficacy, and Supervisory Authority Pressure had a positive effect on intention; however, Perceived Vulnerability and Response Efficacy did not affect intention. Security Avoidance Habit, which was considered a background factor, had a negative effect on all parameters, and did not have an effect on intention. Security Awareness Training, another background factor, had a positive effect on information security risk management intention and perceived vulnerability, self-efficacy, response efficacy, and supervisory authority pressure, and had no effect on perceived severity. This study used supervisory authority pressure and background factors in the field of information security, and provided a basis to use supervisory authority pressure in future studies on behavior of organizations and members of an organization. In addition, the use of various background factors presented the groundwork for the expansion of protection motivation theory. Furthermore, practitioners can use the study findings as a foundation for organization's security activities, and to improve regulations.

Protection Actions of SPS and SPS in Korea Power System (SPS의 보호동작과 우리나라 계통보호설비 현황)

  • Park, Jong-Young;Park, Jong-Keun;Chu, Jin-Bu;Jang, Byung-Tae;Kang, Gye-Hee;Yang, Jung-Jae
    • Proceedings of the KIEE Conference
    • /
    • 2002.07a
    • /
    • pp.274-276
    • /
    • 2002
  • 긴급보호제어시스템(SPS, Special Protection System)은 일반적인 보호동작 범위를 벗어난 외란에 대해서 계통 전지역의 보호를 목적으로 하는 광역시스템 보호기술이다. 따라서 SPS는 외란 시에 계통 장비의 보호보다는 계통을 보호함으로써 전력 공급능력 향상에 주안점을 두게 된다. SPS는 자주 동작하지 않고 평소에는 대기 상태로 있으며, 긴급한 동작이 요구되기 때문에 많은 경우에 그 동작이 미리 결정되어 있다. SPS는 입력변수나 전력계통에의 영향에 따라 분류할 수 있는데, 입력변수에 따라서는 계통 응답에 기초한 SPS와 사고에 기초한 SPS로 나눌 수 있다. 발전기 탈락, 부하 차단이 SPS의 주요 보호 동작이며 이 외에 가스터빈이나 양수발전기 기동, AGC 제어, HVDC 고속전력변환, 분로기기의 자동스위칭 등의 제어 동작이 있다. 우리나라의 경우에는 주로 동기탈조 방지를 위한 발전기 탈락의 동작을 하는 SPS가 설치, 운전되고 있다.

  • PDF

Performance Analysis of Wideband CDMA System with Feq./Timing Error in Muliti-path Fading Channel (다중경로 감쇄 채널에서의 광대역 부호분할다중접속방식 시스템의 주파수 및 보호 동기 오차에 따른 성능 분석)

  • 최영관;안철용;김동우
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.25 no.6A
    • /
    • pp.773-781
    • /
    • 2000
  • The average bit error rate of wideband CDMA in forward link is evaluated for frequency and timing errors in multipath Rayleigh fading channel. The channel BER is evaluated analytically and information BER is investigated with simulation. The performance degradation due to the code/frequency synchronization errors was obtained through simulation for particular two coding schemes - convolutional codes and turbo codes. The results show 1dB degradation due to Tc/4 timing error and 0.5dB degradation due to 50Hz frequency error, for both coding schemes.

  • PDF

Concrete Security of the 3GPP-MAC Algorithm (3GPP-MAC 알고리즘에 대한 Concrete Security)

  • 성재철;이상진;임종인;홍도원
    • Proceedings of the Korea Institutes of Information Security and Cryptology Conference
    • /
    • 2001.11a
    • /
    • pp.20-25
    • /
    • 2001
  • 블록 암호 알고리즘과 블록 암호의 운영모드 및 메시지 인증 알고리즘에 대한 의사 난수성의 증명은 근래의 암호 분석에서 구조적인 안전성을 증명을 위한 기법으로 커다란 안전성의 평가 방법으로 자리 매김하고 있다. 본 논문에서는 비동기식(W-CDMA) 3세대 이동통신 3GPP에서의 MAC 알고리즘의 안전성을 의사 난수성에 기반한 concrete security 관점에서의 안전성에 대해 알아본다. 즉, 3GPP-MAC 알고리즘의 구조적인 안전성에 대한 증명을 다룬다.

  • PDF