• Title/Summary/Keyword: 온라인 프라이버시

Search Result 103, Processing Time 0.028 seconds

Legal and Ethical Insight about Witch Hunt Issues on Online News and 'Pseudo Press' (온라인 매체상의 현대식 마녀사냥 이슈와 '유사언론 행위'간 법적·윤리적 논쟁에 대한 고찰)

  • Jeung, Woon Gap
    • The Journal of the Korea Contents Association
    • /
    • v.18 no.7
    • /
    • pp.1-9
    • /
    • 2018
  • Present study investigated the crash phenomenon between freedom of press and pseudo press. For that researcher gathered online witch hunt cases from 2012 to 2017 and interpret with the logical basis of argument which needs to control pseudo press activity. On the other hand, present research arranged former studies about freedom of press and right of reputation and privacy as a counterpart that can be ethical debate. Futhermore, court case about right of small independent media where has less than 5 people also gathered. By Comparison of each ethical and legal basis, this study provide the insight which can inspire to think about real right of citizen and press.

A Study of Digital Library Service Records and User Privacy (디지털도서관서비스기록과 이용자프라이버시에 관한 연구)

  • Noh, Young-Hee
    • Journal of the Korean Society for information Management
    • /
    • v.29 no.3
    • /
    • pp.187-214
    • /
    • 2012
  • Libraries are founded to ensure the intellectual freedom of citizens, and citizens have the right to confidentiality regarding their needs, information access, and information use. Protecting users' privacy is critical to safeguarding their freedom of speech, freedom of thought, and freedom of assembly. Libraries and librarians should seriously concern themselves with their users' privacy because protecting this privacy is part of their most important mission, and, in doing so, users can truly enjoy their intellectual freedom. This study extensively investigated and analyzed the possibility of privacy invasion that may occur in libraries. As a result, cases of potential invasion of privacy in libraries were summarized in the following three categories: violations occurring in the process of national or law agencies' enforcement operations; violations occurring in the process of routine library services such as circulation, reference, online searching etc.; and violations occurring by outsourcing library services.

Risk of personal information for the sale of used goods in the online (온라인 중고물품판매에 대한 개인정보노출 위험)

  • Park, Jun-Bum;Kim, Seok-Hyun;Cho, Jin-Man;Choi, Dae-Seon;Jin, Seung-Hun
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2014.11a
    • /
    • pp.482-485
    • /
    • 2014
  • 온라인 중고물품 거래의 장점은 인터넷을 사용하는 모든 사용자에게 자신이 팔고자 하는 물건을 쉽게 알릴수 있다는것이다. 하지만 온라인에서 중고물품 거래 시에 개인의 정보를 노출할 경우가 많아지게 되는데 이는 프라이버시를 침해할 수 있다. 온라인 중고물품거래시에 사용자들은 자신이 판매하는 물건과 함께 이메일 주소나 핸드폰 번호를 노출하게 되는데 이 정보를 소셜네트워크서비스에 연결하면 특정인에 정보를 획득할 수 있게 된다. 공격자는 온라인 중고물품거래가 진행되는 곳에서 특정인에 대한 정보를 획득한뒤 소셜네트워크서비스와 정보를 연결하여 특정인에 대한 스토킹이나 피싱, 금융사기같은 범죄를 할 가능성이 있다. 본 논문에서는 개인정보노출에 대한 위험성을 알아보기 위해 중고물품 사이트에서 획득한 개인정보를 소셜네트워크서비스에 연결하여 개인 식별가능성을 실험해 보았으며 이를 막기 위한 방법을 제안하였다.

The Effect of Product Scarcity and Purchase Behavior in Location-Based Application Services (위치기반 어플리케이션 서비스에서 제품의 희소성과 구매행동과의 영향)

  • Wang Ming;Hyeokjun Kwon;Jaewon Choi
    • Information Systems Review
    • /
    • v.20 no.2
    • /
    • pp.209-226
    • /
    • 2018
  • Location-based services have distinctive service characteristics compared to the past online commerce used on the desktop. In any place, mobile communication devices can be used to access online and utilize online shopping, and it is more convenient for users. In addition, by providing shopping and service information specific to each location, it is possible to provide convenience to the consumers according to their locations. In addition, it provides scarcity of information as well as location, thereby increasing consumers' desire to purchase. In this study, we investigated the effect of scarcity on the Purchase intention of consumers in location-based services. The steps of scarcity are: first, a step without scarcity, Second, providing time limit information, Third, providing quantity limitation information, Fourth, the experiment was designed to provide time and quantity limitation, and 4 groups were analyzed through experimental stimuli The purpose of this study is to verify the moderating effect of the dependent variable on the degree of scarcity by adding 'ubiquity', 'interactivity' and 'privacy' which are characteristics of location-based service. As a result of the analysis, scarcity of time and scarcity of quantity limitation scarcity stimuli showed a moderating effect on ubiquity, interactivity and consumer's purchase intention, and these variables also directly or indirectly affected positively. Consumer confidence was found to have a negative effect on consumers' purchase intentions.

The Effect of e-servicescape on Website Trust and Repurchase Intention (e-서비스스케이프가 웹사이트 신뢰 및 재구매의도에 미치는 영향)

  • Shin, Jin-Hee;Jeong, Yong-Gil
    • The Journal of the Korea Contents Association
    • /
    • v.21 no.3
    • /
    • pp.490-504
    • /
    • 2021
  • The online market is gradually increasing due to the increase in single-person households, the development of information and communication technologies, the emergence of various new products, and price comparison competition. Companies need differentiation strategies to adapt to changes in the online environment and secure a competitive edge. In this environment, the objective is to consider the importance of consumer perception of websites in order to generate continuous growth and revenue in the online market as well as to differentiate them from competitors using an online service environment that can affect consumers' internal responses. In this study, we present aesthetic, functional, privacy, and interaction factors as components of e-servicescape to study the impact of e-servicescape on website trust, brand attitude, and repurchase intention. In the data analysis, 485 ordinary people with online shopping experience were surveyed. The questionnaire was based on a 7-point Likert scale for each question and statistical analysis was conducted using SPSS 24.0 and AMOS 25.0. The analysis shows that in e-servicescapes aesthetic and privacy factors influence website trust and brand attitudes and consequently affect repurchase intention.

A Secure RFID Search Protocol Protecting Mobile Reader's Privacy Without On-line Server (온라인 서버가 없는 환경에서 이동형 리더의 프라이버시를 보호하는 안전한 RFID 검색 프로토콜)

  • Lim, Ji-Wwan;Oh, Hee-Kuck;Kim, Sang-Jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.20 no.2
    • /
    • pp.73-90
    • /
    • 2010
  • Recently, Tan et al. introduced a serverless search protocol in which a mobile reader maintains a tag authentication list and authenticates a tag using the list without connecting authentication server. A serverless RFID system is different from general RFID systems which use on-line server models. In the serverless RFID system, since the mobility of a personalized reader must be considered, we have to protect not only the privacy of a tag but also the privacy of a mobile reader. In this paper, we define new security requirements for serverless RFID search system and propose a secure serverless RFID search system. In our system, since tag authentication information maintained by a reader is updated in every session, we can provide the backward untraceability of a mobile reader. Also we use an encrypted timestamp to block a replay attack which is major weakness of search protocols. In addition, we define a new adversary model to analyze a serverless RFID search system and prove the security of our proposed system using the model.

A Content Analysis of Web sites from a Perspective of Children's Online Privacy Protection (아동 대상 인터넷 사이트의 개인정보보호 실태와 개선 방향)

  • Kim, So-Ra;Rhee, Kee-Choon
    • Journal of the Korean Home Economics Association
    • /
    • v.45 no.8
    • /
    • pp.127-142
    • /
    • 2007
  • The objective of this study was to discuss child privacy issues at Web sites targeting children, Specifically, the study examined l)types of information required for join the membership, 2)whether privacy policies at Web sites for children abide by privacy guideline, and 3)specific examples of recommendable privacy policy and problematic privacy policy from Web sites, Total of 305 Web sites targeting children were used for content analysis, Selected Web sites included recommended sites by Korea Council of Children's Organizations and food business Web sites, The results showed that more than 70% of Web sites required private information when children join the membership. Most of these Web sites provided mailing service for children. Generally, Web sites showed problems in parents' approval procedures. Also, privacy policies at Web sites frequently omitted purpose specification principle and the security safeguard principle. Regulating online service provides and marketers targeting children would be necessary for protecting child privacy. Further, education program targeting parents and children could help them make right choices to protect children's online privacy.

Designing Anonymous App for Office Workers with Collaboration Function (협업 기능이 추가된 직장인을 위한 익명앱의 설계)

  • Mun, Ji-won;Kim, Kang-san;Kim, Yeong-eun;Kang, Da-eun;Lee, Je-min;Hwang, Jeong-min;Lee, Jae-won;Kim, Dongju
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2022.05a
    • /
    • pp.40-43
    • /
    • 2022
  • Covid-19의 영향으로 직접적인 만남이 줄어들고 온라인 커뮤니티의 사용량이 급격하게 증가하였다. 에브리타임은 대부분의 대학생이 사용하고 있는 가장 보편적인 온라인 커뮤니티이다. 이러한 서비스와 비슷한 방식으로 운영되어 이질감을 느끼지 않으면서도, 직장인의 특성을 고려한 설계로 취업 후에도 지속적으로 사용할 수 있는 커뮤니티 서비스를 제안한다. 이에 본 논문에서는 협업기능을 강화한 직장인을 위한 온라인 커뮤니티이자 익명서비스로 프라이버시를 보호할 수 있는 모바일앱을 설계했다.

Implementation of Privacy Protection Policy Language and Module For Social Network Services (소셜 네트워크 서비스를 위한 프라이버시 보호 정책언어 및 프라이버시 보호 모듈 구현)

  • Kim, Ji-Hye;Lee, Hyung-Hyo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.21 no.1
    • /
    • pp.53-63
    • /
    • 2011
  • An SNS(Social Network Service) enables people to form a social network on online as in the real world. With the rising popularity of the service, side effects of SNSs were issued. Therefore we propose and implement a policy-based privacy protection module and access control policy language for ensuring the right of control of personal information and sharing data among SNSs. The policy language for protecting privacy is based on an attribute-based access control model which grants an access to personal information based on a user's attributes. The policy language and the privacy protection module proposed to give the right of control of personal information to the owner, they can be adopted to other application domains in which privacy protection is needed as well as secure sharing data among SNSs.

Assurance Level Requirement Analysis on Electronic Authentication (전자 인증에 관한 보증 레벨 요구사항 분석)

  • Kim, Jun-Sub;Kwak, Jin
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2009.11a
    • /
    • pp.637-638
    • /
    • 2009
  • 디지털 ID는 온라인 환경에서 사용자를 식별하기 위한 수단으로 사용되고 있다. 하지만 온라인상에 저장된 개인정보 노출뿐만 아니라 신원도용에 따른 사용자의 프라이버시 침해 및 금전적 피해 등으로 이어질 수 있어 이에 대한 관심과 중요성이 높아지고 있다. 따라서 본 논문에서는 전자적인 수단을 통해 정보 시스템에 제시되는 사용자 신원을 확인하는 전자 인증 과정과 신원 인증에 대한 보증 레별별 요구사항을 마련하고 있는 NIST SP 800-63을 분석하고자 한다.