• Title/Summary/Keyword: 비익명화

Search Result 22, Processing Time 0.024 seconds

MICA: Mind Care Dataset on Korean Anonymous Mental Health Platform (MICA: 한국 익명 심리건강 플랫폼 기반 심리상담 데이터셋)

  • Seungmoo Yang;Seonghyun Kim;Chanhee Jeong;Jeehye Koo;Seunghyeok Hong
    • Annual Conference on Human and Language Technology
    • /
    • 2022.10a
    • /
    • pp.210-215
    • /
    • 2022
  • 최근 전 세계적으로 불안감, 우울증 등을 비롯한 정신 건강 관리에 어려움을 겪고 있다. 특히 COVID-19 팬데믹 사태로 인해 경제적, 사회적으로 고립되는 시간이 길어지면서 정신 건강이 악화되고 있다. 한국의 경우도 심리상담을 받는 비율이 증가하는 등 정신 건강 관리의 수요가 높아지고 있다. 정신 건강 관리를 위한 여러 진입 장벽들을 극복하기 위해 개발된 비대면 심리상담들이 인기를 얻고 있다. 특히, 인공지능 기술과 정신 건강 관리를 결합하려는 시도가 많아지고 있으며, 미국, 중국 등 해외에서는 이미 워봇(Woebot), 유퍼(Youper) 같은 심리상담 챗봇이 상용화되어 서비스 중이다. 그러나 한국에서의 심리상담 챗봇은 아직까지 해외만큼 상용화 단계에 이르지 못했다. 또한, 이러한 챗봇을 구축하기 위한 데이터셋 연구가 부족한 실정이다. 본 논문에서는 익명 심리 플랫폼을 통하여, 심리전문가가 비식별화한 고민과 해당 고민에 대한 전문가 답변을 활용하여 구축한 MICA를 소개한다. 또한, 본 데이터셋을 활용해 딥러닝 기반의 언어 모델을 학습하고 정량적, 정성적 성능 평가를 통해 챗봇의 가능성을 확인하였다.

  • PDF

Status and Measures for Cyber Sexual Violence (사이버 성폭력에 대한 실태와 대책방안)

  • Park, Cho-A
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2012.07a
    • /
    • pp.191-193
    • /
    • 2012
  • 인터넷과 기타 휴대용 PC등이 발전하고 보편화됨에 따라 인터넷 이용이 편리해짐은 좋지만 비대면성, 비익명성, 비 국경성 등 인터넷의 이러한 특성상 사이버 범죄들이 나날이 다양해지고 증가하고 있는 추세이다. 특히 사이버 범죄 중에서도 스토킹, 원조교제의 수단, 몰래카메라, 사이버음란물 유통 등 각종 신종 성폭력이 심각해지고 있어 사회문제로 끈임 없이 등장하고 있다. 현실세계에서의 성폭력과 마찬가지로 피해자가 느끼는 성적 수치심이나 심적 고통은 피해자의 자아에 깊은 상처를 남기며 더 나아가 왜곡된 성문화를 정착 시키는 새로운 사회적 문제로 작용한다는 점에서 사이버성폭력의 심각성과 문제는 오프라인상의 성폭력범죄에 비해 결코 뒤지지 않을 것이다. 물론 이러한 범죄들에 대한 처벌 조항들은 있다. 그러나 이런 것들이 있음에도 사이버상의 성폭력은 근절되지 않고 있다. 이것은 법적인 조치의 강화를 요구하는 동시에 인터넷을 사용하는 네티즌 스스로의 적극적 대처를 요구하는 것이기도 하다.

  • PDF

Policy Suggestions on Personal Data Utilization by Analyzing Domestic and International De-identification Policy (국내외 비식별화 현황 분석을 통한 개인정보 활용 정책 제언)

  • Kang, Hye-young;Kwon, Hun-yeong
    • Convergence Security Journal
    • /
    • v.19 no.1
    • /
    • pp.41-48
    • /
    • 2019
  • In the era of Internet of Things and Artificial Intelligence, it has become essential to digitize mass data, which leads 'data-driven economy'. Digitalized personal data can be easily collected, stored, duplicated and analyzed. As ICT technology is evolving the concept of traditional personal data has changed. The United States, the European Union, Japan, Korea and many countries have introduced new concept of personal data into law such as de-identification, anonymization, and pseudonymization to protect and utilize digitalized personal information. These concepts are distinguishable depending on countries. Therefore, this study will be done by researching and analyzing personal data related policies of several countries. Based on this study, this paper will suggest policy on di-identification to draw the right balance between personal data protection and use, which contributes to the development of digital economy.

A Survey on Hardware Characteristic-based Drone Identification and Authentication Technology (하드웨어적 고유 특성 기반 드론 식별 및 인증 기술 연구 동향 분석)

  • Sungbin Park;Hoon Ji;Yeonjoon Lee
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2023.11a
    • /
    • pp.1181-1184
    • /
    • 2023
  • 최근 드론은 군사 작전, 물류 운송, 인명 구조 등 다양한 분야에서 활용되고 있으며 관련 산업의 규모는 증가하는 추세이다. 이에 따라, GPS 스푸핑, 조종사 비익명화 등의 드론을 향한 공격 기법들 또한 발달하고 있다. 이런 공격들은 드론에 대한 인증을 도입함으로써 대비할 수 있는 공격들이다. 이에, 학계에서는 강건한 인증을 위해 드론 하드웨어의 고유 특성을 활용할 수 있는 RF 신호, 소리 신호, 드론 내부 센서 신호 등에 기반한 인증 기술들이 연구되어온 바 있다. 본 논문에서는 지금까지의 드론 인증 기술 연구 동향을 분석하고, 이를 기반으로 향후 연구 방향을 제시한다.

The Need for Homomorphic Encryption to Protection Privacy (프라이버시 보호를 위한 동형암호의 필요성)

  • Seo, Jin-Beom;Cho, Young-Bok
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2021.10a
    • /
    • pp.47-49
    • /
    • 2021
  • According to the revision of the Data 3 Act in 2020, personal information of medical data can be processed anonymously for statistical purposes, research, and public interest record keeping. However, unidentified data can be re-identified using genetic information, credit information, etc., and personal health information can be abused as sensitive information. In this paper, we derive the need for homomorphic encryption to protect the privacy of personal information separated by sensitive information.

  • PDF

Peer to Peer Anonymous Protocol Based Random Walk (랜덤 워크 기반의 P2P 익명 프로토콜)

  • Cho, Jun-Ha;Rhee, Hyun-Sook;Park, Hyun-A;Lee, Dong-Hoon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.17 no.6
    • /
    • pp.65-76
    • /
    • 2007
  • The P2P file sharing system sends the results to users by searching the files in the shared folders. In the process of it, the problem is that the transferred information includes the pathname and file information and it can be revealed who searches which files. In related to this problem, anonymous file sharing P2P protocol has been an active research area where a number of works have been produced. However, the previous studies still have a few of weakness. Therefore, We propose two anonymous P2P file sharing protocols based on the decentralized and unstructured Random Walk. The first scheme uses the dynamic onion routing where the requester can receive the wanted file without knowing other peers' IDs. The second scheme uses the IP multicast method which lowers the computational overhead. Both of them are more suited for the dynamic P2P system.

Anonymity of Tor Users on Unsecured Applications (비 암호화 프로그램 사용자의 토르망 익명성 보장 분석)

  • Shin, Seok-Joo;Dahal, Saurav;Pudasaini, Amod;Kang, Moon-Soo
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.12 no.5
    • /
    • pp.805-816
    • /
    • 2017
  • Tor is a popular, low-latency open network that offers online anonymity to users by concealing their information from anyone conducting traffic analysis. At the same time, a number of conventional passive and active attacking schemes have been proposed to compromise the anonymity provided by the Tor network. In addition to attacks on the network through traffic analysis, interacting with an unsecured application can reveal a Tor user's IP address. Specific traffic from such applications bypasses Tor proxy settings in the user's machine and forms connections outside the Tor network. This paper presents such applications and shows how they can be used to deanonymize Tor users. Extensive test studies performed in the paper show that applications such as Flash and BitTorrent can reveal the IP addresses of Tor users.

A Study of Privacy Protection for Users of Electronic Money Using Blockchain Technology (블록체인 기법을 사용하는 전자화폐 사용자의 프라이버시 보호에 대한 연구)

  • Kang, Yong-Hyeog
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2017.10a
    • /
    • pp.571-572
    • /
    • 2017
  • The blockchain technology that implements electronic money uses decentralized computing and all transactions in a blockchain are open to everyone. This technique seems to guarantee anonymity by performing the transaction on the address instead of the user, but by using direction acyclic graph based on the transaction graph, the privacy problem is caused by tracking the addresses. In this paper, we analyze various techniques for centralized processing which makes it difficult to find the relevance on the graph in order to protect the privacy in the block chain technology. We also analyze the techniques of anonymizing in a distributed way to enhance privacy. Using the zero knowledge proof scheme guarantees full distributed anonymity but requires more computation and storage space, and various techniques to make this efficient are proposed. In this paper, we propose a privacy protection scheme of blockchain technology to integrate existing privacy protection techniques into a blockchain technology and perform it more efficiently with a centralized or decentralized technique.

  • PDF

Biasing Factors in Self-Report Assessment of Bullying/Victimization: Examining Variability in Involvement Rates by Testing Conditions (자기보고식 괴롭힘 경험률 평가의 편향요인 탐색: 평가조건 변인을 중심으로)

  • Lee, Donghyung
    • Korean Journal of School Psychology
    • /
    • v.15 no.3
    • /
    • pp.459-488
    • /
    • 2018
  • The self-report assessment has been most commonly used to estimate bullying/victimization (B/V) rates in most domestic and international prevalence studies. However, the presence of many potential biasing factors in such an assessment method, including specific operationalization/measurement strategies and testing conditions, has become an issue due to a considerable variability in reported involvement rates across studies. This study analyzed self-reported B/V involvement rates on Olweus Bullying Questionnaire (OBQ) among 690 Korean middle school students by gender and two different cut-offs (generous vs. strict cut-offs) and examined if the involvement rates were significantly varied by testing conditions such as presentation vs. omission of a precise definition of B/V, anonymous vs. non-anonymous/confidential administration, and the use of global vs. specific questions. Chi-square analyses revealed that boys displayed higher involvement rates on global measures of B/V and on items related to direct forms of B/V, with no significant gender differences on specific measures of relational B/V rates. It was also found that a global rate of bullying and specific rates of verbal B/V were 111% to 157% higher when no definition was provided. However, anonymous vs. non-anonymous administration had no significant impacts on rates of involvement, except for one item; there were also no significant differences in reported degrees of frankness and perceived confidentiality of their responses across two adminstration conditions. Finally, when involvement rates were assessed by using specific vs. global items, they were 68% to 148% higher with binominal correlations in low to moderate ranges. Findings also indicated that global items had a high specificity but a relatively low sensitivity. Implications of these findings were fully discussed for researchers and practitioners in the field of B/V assessment.

Research on technical protection measures through risk analysis of pseudonym information for life-cycle (가명정보 Life-Cycle에 대한 위험 분석을 통한 관리적/기술적 보호조치 방안에 대한 연구)

  • Cha, Gun-Sang
    • Convergence Security Journal
    • /
    • v.20 no.5
    • /
    • pp.53-63
    • /
    • 2020
  • In accordance with the revision of the Data 3 Act, such as the Personal Information Protection Act, it is possible to process pseudonym information without the consent of the information subject for statistical creation, scientific research, and preservation of public records, and unlike personal information, it is legal for personal information leakage notification and personal information destruction There are exceptions. It is necessary to revise the pseudonym information in that the standard for the pseudonym processing differs by country and the identification guidelines and anonymization are identified in the guidelines for non-identification of personal information in Korea. In this paper, we focus on the use of personal information in accordance with the 4th Industrial Revolution, examine the concept of pseudonym information for safe use of newly introduced pseudonym information, and generate / use / provide / destroy domestic and foreign non-identification measures standards and pseudonym information. At this stage, through the review of the main contents of the law or the enforcement ordinance (draft), I would like to make suggestions on future management / technical protection measures.