• Title/Summary/Keyword: 온라인 개인정보보호

Search Result 137, Processing Time 0.037 seconds

A Content Analysis of Web sites from a Perspective of Children's Online Privacy Protection (아동 대상 인터넷 사이트의 개인정보보호 실태와 개선 방향)

  • Kim, So-Ra;Rhee, Kee-Choon
    • Journal of the Korean Home Economics Association
    • /
    • v.45 no.8
    • /
    • pp.127-142
    • /
    • 2007
  • The objective of this study was to discuss child privacy issues at Web sites targeting children, Specifically, the study examined l)types of information required for join the membership, 2)whether privacy policies at Web sites for children abide by privacy guideline, and 3)specific examples of recommendable privacy policy and problematic privacy policy from Web sites, Total of 305 Web sites targeting children were used for content analysis, Selected Web sites included recommended sites by Korea Council of Children's Organizations and food business Web sites, The results showed that more than 70% of Web sites required private information when children join the membership. Most of these Web sites provided mailing service for children. Generally, Web sites showed problems in parents' approval procedures. Also, privacy policies at Web sites frequently omitted purpose specification principle and the security safeguard principle. Regulating online service provides and marketers targeting children would be necessary for protecting child privacy. Further, education program targeting parents and children could help them make right choices to protect children's online privacy.

스마트카드와 바이오메트릭스

  • 반성범;안도성;정윤수
    • Review of KIISC
    • /
    • v.15 no.6
    • /
    • pp.41-45
    • /
    • 2005
  • 다양한 온라인 서비스의 보급으로 인해 안정적인 보안수준을 제공하면서 사용이 편리한 사용자 인증 시스템의 필요성이 대두되었다. 사용자 인증 수단으로 많이 사용되던 개인장치나 비밀번호 등추 분실 가능성 및 도용의 위험이 있어 보안이 중요한 환경에서는 사용상의 제약이 따른다. 그러므로 바이오메트릭 정보를 이용한 사용자 인증에 대한 관심이 꾸준히 증가하고 이에 따라 바이오메트릭스 기술의 발전으로 적용이 되고 있으나, 바이오메트릭 정보는 비밀번호와 같이 사용자가 임의로 변경할 수 없으므로 외부로 유출된다면 심각한 문제가 발생할 수 있다는 문제가 있다. 그러므로 본 고에서는 이러한 문제를 해결할 수 있는 바이오메트릭 정보의 취득, 저장 및 인증을 스마트카드에서 처리하는 기술에 대하여 설명하고 이의 활용 현황에 대하여 소개한다.

테마연재 / 온라인 프라이버시 침해 증가 .. 소비자 정보 보호 필요

  • Kim, Yeon-Su
    • Digital Contents
    • /
    • no.1 s.116
    • /
    • pp.84-99
    • /
    • 2003
  • 본고를 통해 일반적으로 소비자, 이용자·네티즌 등의 법적의미와 온라인 사업자로 지칭되는 인터넷 기타 정보통신관련 사업자들의 법률 적용 범위를 명확히 함으로써 사업자, 전기통신사업자, 정보통신서비스제공자, 전자거래 사업자, 전자상거래 사업자, 통신판매업자의 관계를 관련 특별법을 통해 비교,분석해 그 정의와 법적 범위를 분명히 하는데 일조하고자 한다. 또한 이러한 관계에서 정보주체의 개인정보 도용사례를 기술적 과정과 동향을 통해 구체적으로 살펴보기로 한다.

  • PDF

Measuring Individuals' Privacy Concerns and Survey of Privacy Recognition (개인정보 보호 의식 측정 척도의 개발과 개인정보 중요성에 관한 인지도 조사)

  • Kim, Yeong-Real
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.15 no.5
    • /
    • pp.259-271
    • /
    • 2010
  • It is inevitable that personal privacy will be one of the most significant pressure points for most of the 2000s. Information privacy has been called one of the most important ethical issues in information age. It has become apparent that organizational practices, individuals' perceptions of these practices, and societal responses are very closely related in many ways. However, unfortunately, researches attempting to develop and validate an instrument that identifies and measures the primary dimensions of individuals' concerns about organizational information privacy practices were scarce. Based on a number of preliminary studies, this study tried to develop and validate an Korean organization oriented measurement instrument. This instrument is expected to be used as useful guide lines for the managers who are responsible for IT/IS ethical issues.

BBS+ Signature Environment Simulation for User Privacy Protection (사용자 프라이버시 보호를 위한 BBS+서명 기법 기반 시뮬레이션 환경구축)

  • Yoon, Tae-Yeon;Lee, Jong-Ryun
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2022.05a
    • /
    • pp.217-220
    • /
    • 2022
  • 디지털 전환 시대를 맞아 일상생활 대부분이 온라인으로 이동하면서 온라인상에서 자신을 나타내는 신뢰할 수 있는 신분증의 필요성이 커지게 되었다. 신원 확인 방법은 중앙 집중식 모델에서 현재는 자기주권신원 모델로 변화하는 과정에 있으며 사용되는 핵심 기술은 탈중앙 식별자 DID(Decentralized Identifier)이다. DID는 기존 신원 체계와 달리 개인의 데이터 소유권을 개인에게 돌려줘 데이터 주권을 지킬 수 있게 해줌으로써 개인의 정보 공유 범위를 결정하는 SSI(Self Sovereign Identity)를 실현하는 기술이다. DID를 이용하면 데이터의 무결성, 투명성을 보장하는 자격 증명(Verifiable Credential, Verifiable Presentation) 발급이 가능하며 이를 검증하는 데이터는 모두 블록체인에 올라가 있는 것이 특징이다. 본 논문에서는 실제 서비스와 유사한 시뮬레이션 환경을 구축하여 자격 증명의 사용자 프라이버시를 보호하는 방법인 BBS+서명 기법에 대해 알아보고자 한다.

Analyzing the Privacy Leakage Prevention Behavior of Internet Users Based on Risk Perception and Efficacy Beliefs : Using Risk Perception Attitude Framework (위험지각과 효능감에 따른 인터넷 사용자의 개인정보 유출 예방행위 분석 : 위험지각태도 프레임웍을 기반으로)

  • Jang, Ickjin;Choi, Byounggu
    • The Journal of Society for e-Business Studies
    • /
    • v.19 no.3
    • /
    • pp.65-89
    • /
    • 2014
  • Although many studies have focused on the influences and outcomes of personal information leakage, few studies have investigated how the personal information leakage prevention behavior differs depending on internet user. This study attempts to supplement the existing studies' limitations with the use of risk perception attitude (RPA) framework. More specifically, this study tries to show internet user can be classified into four groups based on perceived risk of personal information leakage and efficacy beliefs of personal information protection, and to identify how the groups differ in terms of motivation, information seeking, and behaviors for privacy leakage prevention. Analysis on survey data from 276 internet users reveals that the users can be classified into responsive, avoidance, proactive, indifference groups. Furthermore, there are differences between groups in terms of motivation, information seeking, and behaviors for personal information leakage prevention. This study contributes to expand existing literature by providing tailored guidelines for implementation of personal information protection strategies and policy.

Assurance Level Requirement Analysis on Electronic Authentication (전자 인증에 관한 보증 레벨 요구사항 분석)

  • Kim, Jun-Sub;Kwak, Jin
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2009.11a
    • /
    • pp.637-638
    • /
    • 2009
  • 디지털 ID는 온라인 환경에서 사용자를 식별하기 위한 수단으로 사용되고 있다. 하지만 온라인상에 저장된 개인정보 노출뿐만 아니라 신원도용에 따른 사용자의 프라이버시 침해 및 금전적 피해 등으로 이어질 수 있어 이에 대한 관심과 중요성이 높아지고 있다. 따라서 본 논문에서는 전자적인 수단을 통해 정보 시스템에 제시되는 사용자 신원을 확인하는 전자 인증 과정과 신원 인증에 대한 보증 레별별 요구사항을 마련하고 있는 NIST SP 800-63을 분석하고자 한다.

Safety Verification Techniques of Privacy Policy Using GPT (GPT를 활용한 개인정보 처리방침 안전성 검증 기법)

  • Hye-Yeon Shim;MinSeo Kweun;DaYoung Yoon;JiYoung Seo;Il-Gu Lee
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.34 no.2
    • /
    • pp.207-216
    • /
    • 2024
  • As big data was built due to the 4th Industrial Revolution, personalized services increased rapidly. As a result, the amount of personal information collected from online services has increased, and concerns about users' personal information leakage and privacy infringement have increased. Online service providers provide privacy policies to address concerns about privacy infringement of users, but privacy policies are often misused due to the long and complex problem that it is difficult for users to directly identify risk items. Therefore, there is a need for a method that can automatically check whether the privacy policy is safe. However, the safety verification technique of the conventional blacklist and machine learning-based privacy policy has a problem that is difficult to expand or has low accessibility. In this paper, to solve the problem, we propose a safety verification technique for the privacy policy using the GPT-3.5 API, which is a generative artificial intelligence. Classification work can be performed evenin a new environment, and it shows the possibility that the general public without expertise can easily inspect the privacy policy. In the experiment, how accurately the blacklist-based privacy policy and the GPT-based privacy policy classify safe and unsafe sentences and the time spent on classification was measured. According to the experimental results, the proposed technique showed 10.34% higher accuracy on average than the conventional blacklist-based sentence safety verification technique.

The Experimental Research of Protection Behavior depends on Privacy Concern about Personal Information Protection on Privacy Policy for KakaoTalk Users (개인정보 취급방침의 인지가 개인정보보호 행동에 미치는 영향: 카카오톡 이용자를 중심으로)

  • Lee, Eun Suk;Lee, Zoon Ky;Cha, Kyung Jin
    • The Journal of Society for e-Business Studies
    • /
    • v.21 no.2
    • /
    • pp.135-150
    • /
    • 2016
  • As the privacy issues are all around the world, the intrusion into personal privacy is concerning. For that reason, government established the article from the personal information protection law that has to notice the privacy policy to users on the online site. and the matter of privacy invasion make concern toward behavior of online user. Although there are rules to carrying legal binding force in accordance with, because it is full of text and uncomfortable to read so that its readability is low. In the same context, each other has different state of understanding with the policy for personal information has been playing an important role. In this approach, companies and government do not think this over deeply and do just for what their practical use is. That is the reason why this research start, and the result expecting for real. As the result in the participant who cognize the privacy policy display pattern, they have certain type to do. In this article, the certain behavior doing is remarkable with the privacy policy. According to privacy concern, privacy fundamentalist reveals such a compromise reaction to protect their information when they know what information which the privacy manager of service provider collect. This study arrives at the result depending on the gap of privacy group that the group of checking the policy contents, especially the group which has high privacy concern, they move forward to protect their emotion and put a constructive plan into protective action. Otherwise, the group of unchecking the policy contents and following their own thinking of privacy policy are not deemed statistically significant. Therefore, this is considered to support more various implications than the previous issues and alternatives about privacy policy pattern and user protection behavior of privacy.

The Recovery of the Deleted Certificate and the Detection of the Private-Key Encryption Password (삭제된 공인인증서의 복구 및 개인키 암호화 패스워드의 검출)

  • Choi, Youn-Sung;Lee, Young-Gyo;Lee, Yun-Ho;Park, Sang-Joon;Yang, Hyung-Kyu;Kim, Seung-Joo;Won, Dong-Ho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.17 no.1
    • /
    • pp.41-55
    • /
    • 2007
  • The certificate is used to confirm and prove the user's identity in online finance and stocks business. A user's public key is stored in the certificate(for e.g., SignCert.der) and the private key, corresponding to public key, is stored in the private key file(for e.g., SignPri.key) after encryption using the password that he/she created for security. In this paper, we show that the certificate, deleted by the commercial certificate software, can be recovered without limitation using the commercial forensic tools. In addition, we explain the problem that the private key encryption password can be detected using the SignCert.der and the SignPri.key in off-line and propose the countermeasure about the problem.