• Title/Summary/Keyword: 이용자보호

Search Result 405, Processing Time 0.022 seconds

A Study on the Factors of Experience and Habit on Information Security Behavior of New Services - based on PMT and UTAUT2 (경험 및 습관이 신규서비스의 정보보호 행동에 미치는 요인에 대한 연구 - 보호 동기이론과 UTAUT2을 중심으로)

  • Lee, Hong-Je;Kho, Hyeong-Seog;Roh, Eun-Hee;Han, Kyeong-Seok
    • Journal of Digital Contents Society
    • /
    • v.19 no.1
    • /
    • pp.93-102
    • /
    • 2018
  • This study aims to present policy implications by analyzing information security behavior factors of internet users. The research model, based on PMT and UTAUT2, consists of perceived threat, severity, social influence, self-efficacy, experience and habits, PC and privacy behaviors, security behaviors on new services and set demographic characteristics, use places of internet, use of paid products, and experiences of accident as moderate variables to analyze the effect on security behavior. The results showed that perceived severity, self-efficacy significantly influenced on experience and habits, and experience and habits and self-efficacy had a high influence on PC and privacy behavior. Also, PC and privacy behaviors have a high impact on security behavior of new services. Age, income, use of paid products, and experience of accidents have a moderating effects on security behaviors. The results of this study are expected to help policy decision making to improve the level of information security of internet users.

Application Method of Information Technology for Local Culture Sharing and Environmental Protection (지역문화 공유 및 환경보호를 위한 정보기술 적용 방안)

  • Kim, Ho Jin;Kim, Chang Soo;Jung, Gun Ju;Kim, Jin Soo;Kim, Tae Gyu
    • Journal of the Society of Disaster Information
    • /
    • v.16 no.2
    • /
    • pp.364-373
    • /
    • 2020
  • Purpose: Each local government has a variety of cultural spaces. However, users do not know exactly about cultural information or location. Therefore, information technology application methods are needed to effectively communicate the necessary information to local residents as well as to outsiders. In this paper, we studied the voluntary production of information for the sharing of local culture, and the methods for protecting the environment of the users themselves. Method: For this, information technology such as QR code, big data analysis, and interactive homepage based on SNS was used. Result: As a result, we derived a method of community creation by users, and the personal information protection from such activities. Conclusion: This research will contribute to the development of local culture by encouraging users to understand the local culture more and to participate in autonomous environmental improvement.

Extensional End-to-End Encryption Technologies to Enhance User's Financial Information Security and Considerable Security Issues (이용자의 금융거래정보 보호를 위한 확장 종단간(End-to-End) 암호화 기술과 보안고려사항)

  • Seung, Jae-Mo;Lee, Su-Mi;Noh, Bong-Nam;Ahn, Seung-Ho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.20 no.4
    • /
    • pp.145-154
    • /
    • 2010
  • End-to-End(E2E) encryption is to encrypt private and important financial information such as user's secret access numbers and account numbers from user's terminal to financial institutions. There has been found significant security vulnerabilities by various hacking in early E2E encryption system since early E2E encryption is not satisfied the basic security requirement which is that there does not exist user's financial information on plaintext in user's terminal. Extensional E2E encryption which is to improve early E2E encryption provides confidentiality and integrity to protect user's financial information from vulnerabilities such as alteration, forgery and leakage of confidential information. In this paper, we explain the extensional E2E encryption technology and present considerable security issues when the extensional E2E encryption technology is applied to financial systems.

An Analysis of Factors InFluencing Copyright Protection Decision-Making among Korean eSports Game Users (e-스포츠 콘텐츠 이용자들의 저작권보호 의사결정에 대한 영향요인 분석)

  • Choi, Eui-Yul;Jeon, Yong-Bae
    • The Journal of the Korea Contents Association
    • /
    • v.14 no.12
    • /
    • pp.723-732
    • /
    • 2014
  • The purpose of this study was to examine the factors influencing copyright protection decision-making among Korean eSports game users. Data collection was conducted over a month at an eSports arena located in Seoul. Of the surveys collected, 354 valid data (88.5% of response rate) were analyzed in SPSS Ver. 20.0 through descriptive statistics, correlation and multiple regression analysis. The results showed that copyright protection decision-making regarding eSports contents was significantly influenced by legal/moral norm, perceive group norm, and past habit/behavior. Among the factors, legal/moral norm was found to be the most influential on copyright protection decision-making.

다중접속 온라인게임서비스 상 게임 봇(Bot)의 탐지 및 제재의 근거가 되는 운영정책의 편입통제 및 법적 분쟁을 대비한 데이터 관리에 관한 소고

  • Jung, Sungwun
    • Review of KIISC
    • /
    • v.26 no.3
    • /
    • pp.15-21
    • /
    • 2016
  • 온라인 게임 서비스의 약관과 관련하여 실무상 많은 분쟁이 있는 쟁점으로서 약관과 운영정책이 어떠한 방식과 절차를 거쳐야지만 게임 운영정책이 계약의 내용이 될 수 있는 지와, 게임 서비스 운영정책의 운용과 관련하여 자주 분쟁이 발생하는 영역으로서 게임 봇(Bot)을 이용한 게임 이용자와의 법적 분쟁 시 게임 이용자의 행위를 증명하기 위하여 어떠한 데이터를 기록하고 관리하여야 하는 지에 대하여 살펴보았다.

안전한 핀테크 서비스를 위한 오픈플랫폼 표준화 동향

  • Nah, Jae Hoon
    • Review of KIISC
    • /
    • v.27 no.5
    • /
    • pp.38-42
    • /
    • 2017
  • 금융권을 중심으로 핀테크 산업이 날로 확장 일변도로 발전을 하고 있다. 핀테크 산업의 지속적인 성장을 위하여 여러 가지 기술적 대안이 고려되고 있다. 그중 기업의 가치를 높여주면서 이용자들의 요구사항을 충족시킬 수 있는 환경을 만드는 것에 대하여 많은 고민을 하고 있다. 즉 데이터를 어떻게 활용하느냐에 관심이 모아지고 있는 것이다. 그러나 데이터를 무심코 사용하다 보면 개인정보보호법을 위배하는 사례가 되는 경우가 있다. 데이터와 서비스를 자유롭게, 그리고 이용자들이 원하는 형태로 가공을 하고, 더 나아가 기업의 가치를 높일 수 있는 생태계를 만드는 오픈 플랫폼의 기술동향과 표준의 방향을 살펴본다.

Design of User Privacy Model for Strong Reliability in SNS Environment (SNS 환경에서 신뢰성이 강한 사용자 프라이버시 모델 설계)

  • Jeong, Yoon-Su;Kim, Yong-Tae
    • Journal of Digital Convergence
    • /
    • v.11 no.1
    • /
    • pp.237-242
    • /
    • 2013
  • SNS is emerging as an academic and social interest, as Facebook and Twitter are developed explosively. But, SNS has a problem of exposing user's privacy because it is originated by exchanging user's personal information and opinion. This paper proposes SNS user privacy protecting model using data separation and false data information instead of blocking which is using to protect user's personal privacy. The proposed model do not let the third party extract precise information after collecting user's context information by adding false information to separated context information. Also, it gets user's agreement beforehand if SNS service provider uses user's information not to be used illegally by the third party.

A Study on the Risk Reduction Plan of Cryptocurrency Exchange (암호화폐거래소 위험성 경감방안 연구)

  • Lim, Myungim;Jang, Hangbae
    • Journal of Platform Technology
    • /
    • v.8 no.4
    • /
    • pp.29-37
    • /
    • 2020
  • We propose a plan to reduce the operational risk of domestic cryptocurrency exchanges for protecting cryptocurrency exchange users and establishing a stable operating environment. For market participants using cryptocurrency exchanges, cryptocurrency exchange risk is greater than the price risk. In the cryptocurrency market, illegal transactions using the anonymity of cryptocurrency are occurring frequently. In addition, loss accidents due to cybercrimes and insider corruptions are continuing. And the resulting losses are passed on to the users of the exchange. In terms of operational risk, we analyze the current situation of domestic cryptocurrency exchanges and present the direction of development of each exchange platform to attract and protect users.

  • PDF

Dynamic Protection Bandwidth Allocation method for ATM Networks (ATM망의 보호 용량 동적 할당 방안)

  • Lee, Gil-Heung;Choe, Yong-Hun;Park, Won-Seo;Lee, Jae-Yong;Lee, Sang-Bae
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.26 no.6
    • /
    • pp.706-721
    • /
    • 1999
  • 망의 초기 설계 후에 입력환경의 변화로 인하여 망의 트래픽 요구량이 변화할 때 이를 용량 재분배를 통해 해결하는 방안을 제시하고 실험을 통해 분석해 보았다. 이용자 트래픽의 변동에 효율적으로 대처하고 이용자 연결의 통신 품질을 유지시키기 위하여 운용 경로 및 보호경로의 경로 및 용량 재할당방법을 연구하였다. 기존의 운용 VP만을 고려한 방안과 보호 경로의 용량을 함께 고려하는 방안의 비교를 통해 제안 방안의 특성을 조사하였다. 망의 제어 비용을 줄이기 위한 효과적인 방안으로 보호 경로의 용량을 운용 경로 용량보다 어느 정도 초과해서 할당하는 방안을 제시하였다. 제안 방안이 비록 소폭의 비용상승을 유발하지만, 트래픽이 빨리 변하는 환경에서는 오히려 비용 절감의 효과를 유발할 수 있어 효과적 방안이 될 수 있음을 알 수 있었다.