• Title/Summary/Keyword: 온라인 개인정보보호

Search Result 137, Processing Time 0.025 seconds

A Study on Development Secure Electronic Lottery System (인터넷상에서 안전한 전자복권 시스템 개발에 관한 연구)

  • 공현정;강서일;이임영;문기영
    • Proceedings of the Korea Multimedia Society Conference
    • /
    • 2003.11a
    • /
    • pp.136-139
    • /
    • 2003
  • 최근 인터넷의 급속한 보급으로 인터넷을 이용한 전자상거래 분야에 관심이 높아지고 있다. 이에 많은 오프라인 서비스들이 온라인을 통하여 제공되고 있다. 이러한 다양한 서비스들 중 복권을 온라인상에서 운영함으로써 편리성 및 비용 절약 효과를 가지을 수 있다. 그러나 개인의 프라이버시 뿐만 아니라 구입한 복권에 관한 정보 등 보안에 대한 관심이 높아지고 있다. 또한 기존 서비스 상에서 복권의 중복 구매 및 복권의 저장문제 등 취약성이 제기되고 있으므로 사용자에게 안전한 서비스에 대한 신뢰성을 줄 수 없다. 따라서 본 논문에서는 개인의 프라이버시를 보호하고 전자복권 서비스를 제공할 때 불법적인 제3자로부터 보호하기 위해 사용자가 구입한 복권에 대하여 보안 서비스를 제공함으로 안전성을 높일 수 있고 사용자에게 안전하고 신뢰성 있는 전자 복권 시스템을 제안한다.

  • PDF

Development of Online Education Program and Feasibility Study on Cyberbullying Response in Schools since COVID-19 (코로나-19 이후 증가한 학교 사이버폭력 대응에 대한 온라인 교육 프로그램 개발과 타당성 연구)

  • Choi, Eunsun;Park, Namje
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.31 no.5
    • /
    • pp.1071-1082
    • /
    • 2021
  • COVID-19 has changed a lot in our daily lives, where school classes and remote classes have been combined or converted to remote classes. Many students spent more time online, and cyberbullying, such as indiscriminate disclosure of their personal information, bullying of their classmates online, increased. In this paper, we propose an online education program as a countermeasure against cyberbullying. This program is designed for elementary, middle, and high school students and can also be used for informatics or ethics classes in the 2015 curriculum. The proposed program is divided into four major themes: 'Cyberbullying,' 'Information Security,' 'Cyber Crime,' and 'Language Violence,' and is divided into a total of ten topics according to its connection. It was organized to teach the topics evenly by grade. Also, the program's feasibility was verified by experts on the selection of educational contents and organizing of contents. In the future, it will be necessary to apply for this program and conduct an effectiveness analysis to measure whether it has effectively contributed to the decrease in cyberbullying rates among students and the improvement of coping skills.

A Method of Identifying Ownership of Personal Information exposed in Social Network Service (소셜 네트워크 서비스에 노출된 개인정보의 소유자 식별 방법)

  • Kim, Seok-Hyun;Cho, Jin-Man;Jin, Seung-Hun;Choi, Dae-Seon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.23 no.6
    • /
    • pp.1103-1110
    • /
    • 2013
  • This paper proposes a method of identifying ownership of personal information in Social Network Service. In detail, the proposed method automatically decides whether any location information mentioned in twitter indicates the publisher's residence area. Identifying ownership of personal information is necessary part of evaluating risk of opened personal information online. The proposed method uses a set of decision rules that considers 13 features that are lexicographic and syntactic characteristics of the tweet sentences. In an experiment using real twitter data, the proposed method shows better performance (f1-score: 0.876) than the conventional document classification models such as naive bayesian that uses n-gram as a feature set.

Online Privacy Protection: An Analysis of Social Media Reactions to Data Breaches (온라인 정보 보호: 소셜 미디어 내 정보 유출 반응 분석)

  • Seungwoo Seo;Youngjoon Go;Hong Joo Lee
    • Knowledge Management Research
    • /
    • v.25 no.1
    • /
    • pp.1-19
    • /
    • 2024
  • This study analyzed the changes in social media reactions of data subjects to major personal data breach incidents in South Korea from January 2014 to October 2022. We collected a total of 1,317 posts written on Naver Blogs within a week immediately following each incident. Applying the LDA topic modeling technique to these posts, five main topics were identified: personal data breaches, hacking, information technology, etc. Analyzing the temporal changes in topic distribution, we found that immediately after a data breach incident, the proportion of topics directly mentioning the incident was the highest. However, as time passed, the proportion of mentions related indirectly to the personal data breach increased. This suggests that the attention of data subjects shifts from the specific incident to related topics over time, and interest in personal data protection also decreases. The findings of this study imply a future need for research on the changes in privacy awareness of data subjects following personal data breach incidents.

Multi-type object detection-based de-identification technique for personal information protection (개인정보보호를 위한 다중 유형 객체 탐지 기반 비식별화 기법)

  • Ye-Seul Kil;Hyo-Jin Lee;Jung-Hwa Ryu;Il-Gu Lee
    • Convergence Security Journal
    • /
    • v.22 no.5
    • /
    • pp.11-20
    • /
    • 2022
  • As the Internet and web technology develop around mobile devices, image data contains various types of sensitive information such as people, text, and space. In addition to these characteristics, as the use of SNS increases, the amount of damage caused by exposure and abuse of personal information online is increasing. However, research on de-identification technology based on multi-type object detection for personal information protection is insufficient. Therefore, this paper proposes an artificial intelligence model that detects and de-identifies multiple types of objects using existing single-type object detection models in parallel. Through cutmix, an image in which person and text objects exist together are created and composed of training data, and detection and de-identification of objects with different characteristics of person and text was performed. The proposed model achieves a precision of 0.724 and mAP@.5 of 0.745 when two objects are present at the same time. In addition, after de-identification, mAP@.5 was 0.224 for all objects, showing a decrease of 0.4 or more.

사용자 인증 보안을 위한 온라인 서명검증시스템

  • 김진환
    • Review of KIISC
    • /
    • v.12 no.2
    • /
    • pp.34-40
    • /
    • 2002
  • 컴퓨터와 유\ulcorner무선 인터넷이 확산되어 더욱 보안의 중요성이 요구되면서 살아있는 개별 인간의 신체 일부를 이용한 생체인증 보안기술이 핫 이슈로 회자되고있다. 지문인증, 얼굴인증, 홍채인증, 정맥인증, DNA 인증, 뇌파인증, 손금/손모양인증, 음성인증, 서명인증 등 많은 생체인식기술들은 이미 수십 년 전부터 연구되었고, 과거 한때 상품화도 되었으나 시대의 요구에 부응하지 못하고 사라졌지만, 최근 들어서는 더욱 활발한 연구가 진행되고 있고 다양한 영역에서 상용화가 된 상태이다. 본 서명인증 보안기술은 전자펜(혹은 마우스)으로 입력된 개인의 동적인 서명을 이용하는 것으로써, 쓰는 모양, 쓰는 속도, 필체의 각도, 획수, 획순서, 펜DOWN/UP 정보 등의 여러 가지 정보를 비교\ulcorner분석하여 진서명인지 모조서명인지를 실시간으로 검증하는 것이다. 경제성, 보안성, 활용성, 안정성, 편의성 등의 여러 가지 관점에서 볼 때, 앞으로 널리 확산될 전망이다. 본 논문에서는 지난 10여 년간 직접 연구 개발하여 2000년 8월에 교수실험실창업으로 사업화한 서명기술의 개요와 응용/구축사례를 소개하고자 한다.

Research on the development of automated tools to de-identify personal information of data for AI learning - Based on video data - (인공지능 학습용 데이터의 개인정보 비식별화 자동화 도구 개발 연구 - 영상데이터기반 -)

  • Hyunju Lee;Seungyeob Lee;Byunghoon Jeon
    • Journal of Platform Technology
    • /
    • v.11 no.3
    • /
    • pp.56-67
    • /
    • 2023
  • Recently, de-identification of personal information, which has been a long-cherished desire of the data-based industry, was revised and specified in August 2020. It became the foundation for activating data called crude oil[2] in the fourth industrial era in the industrial field. However, some people are concerned about the infringement of the basic rights of the data subject[3]. Accordingly, a development study was conducted on the Batch De-Identification Tool, a personal information de-identification automation tool. In this study, first, we developed an image labeling tool to label human faces (eyes, nose, mouth) and car license plates of various resolutions to build data for training. Second, an object recognition model was trained to run the object recognition module to perform de-identification of personal information. The automated personal information de-identification tool developed as a result of this research shows the possibility of proactively eliminating privacy violations through online services. These results suggest possibilities for data-based industries to maximize the value of data while balancing privacy and utilization.

  • PDF

A Study on the Protection of Personal Privacy on Online Environment (온라인 환경에서 개인 프라이버시 보호에 관한 연구)

  • Nam, Soo-tai;Kim, Do-Goan;Jin, Chan-yong
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2014.05a
    • /
    • pp.183-186
    • /
    • 2014
  • Increasingly important user based service on the smart media era, and increasing awareness about the user experience. As the connected Internet information systems increases, one of the problems happening between users and information systems such as Internet shopping-malls, portal sites, and corporate web sites is related with the information privacy concerns issues. Thus, we have reviewed extensive previous studies on information privacy in local and foreign information systems, marketing and other fields. The purpose of this study is to provide future directions of studies on information privacy concerns by analyzing past and recent trends of the studies. By considering these realities, we were conducted review on the influencing factors of information privacy concerns on behavior intention based the online environment. Based on these findings, several theoretical and practical implications were suggested and discussed.

  • PDF

Implementation of Delivery Information Security System using DRM (DRM을 활용한 택배정보보안시스템 구현 방안)

  • Park, Doo-Jin
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2012.05a
    • /
    • pp.846-847
    • /
    • 2012
  • The domestic courier market, large and small companies working in more than 100 leading logistics service market is fully open. Year since 2001 has increased by 10%. 1.3 billion per year in 2011 saying the shipping box, and the market size is about 3 trillion won. Courier in 2012 with the growth of online shopping is expected to develop the industry further. However, these courier industry in appearance, but the consumer's personal growth and exposure, exploiting the fears of crime is high. In this paper, using DRM (Digital Rights Management) delivery method to implement information security system is proposed.

  • PDF

The research regarding the electronic prescription system development of the PKI base which uses the network (네트워크를 이용한 PKI기반의 전자처방전 시스템 개발에 관한 연구)

  • 하태진;조경옥;김종우;김영진;한승조
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2003.10a
    • /
    • pp.219-223
    • /
    • 2003
  • 현대사회는 정치, 경제, 행정, 문화 등 인류가 더불어 살아가면서 형성된 모든 영역이 정보통신 시스템을 통해 생성되고 유포되는 지식정보 기반의 사회구조로 급속히 진행되고 있고 정보화 시대가 현실화되면서 인터넷의 사용빈도도 급속히 증가하여 개인의 사생활이나 개인정보는 중요한 이슈가 되고 있는 실정이다. 네트워크와 인터넷의 발달로 많은 분야가 오프라인에서 온라인과 전자처리 방식으로 바뀌어 가고 있다. 이러한 정보통신의 변화와 개인정보의 중요성은 의료 환경에도 많은 변화를 가져오고 있다. 현재 의약분업이후 병원과 약국간의 종이 처방전 시스템에 대한 문제점이 발생되고 있다. 또한 전자처방전 시스템이 개발되어 있으나 아직 필수적인 인증 및 보안을 비롯한 각종 정보위협에 대한 대책 수립이 완전하지 않은 실정이다. 따라서 이러한 정보보호 서비스 유지 및 신뢰성을 보장해 줄 수 있는 PKI를 이용한 전자처방전 시스템을 연구하고자 한다.

  • PDF