• Title/Summary/Keyword: 이용자 프라이버시

Search Result 82, Processing Time 0.028 seconds

Dynamic User Reliability Evaluation Scheme for Social Network Service (소셜 네트워크 서비스에서의 동적 사용자 신뢰도 평가 스킴)

  • Lee, Changhoon;Jung, Youngman;Jung, Jaewook;Won, Dongho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.23 no.2
    • /
    • pp.157-168
    • /
    • 2013
  • The social network service is the bidirectional media that all of the users are be able to directly produce, process, and distribute the information without distinction of the producer and consumer. Over increasing the users rapidly, the users are be able to obtain and share the various information, but the problems occur due to the spread of unreliable information on the service. Moreover, it is spreading the problems violating the privacy and decreasing the reliability of the users by exploiting the open environment. Therefore, sensitive information can be delivered only to users which information producer can trust, and the users should get the information from the trustworthy users. Due to this necessity, it needs the efficient method can evaluates the reliability of the users. In this paper, we define the reliability in the service, make the trust parameter by using the function of the service, and propose the dynamic user reliability evaluation scheme evaluating the reliability of users. We draw the trust range on the reliability of users by analyzing the proposed reliability evaluation scheme.

Factors Influencing on User Satisfaction and Recommendation Intention in Location Based Service of Smartphone (스마트폰의 위치기반 서비스가 사용자 만족과 추천의도에 미치는 영향)

  • Nam, Soo-tai;Kim, Do-goan;Jin, Chan-yong
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2013.10a
    • /
    • pp.207-210
    • /
    • 2013
  • Recently, rapid innovation of Smartphone is changing the paradigm of our daily life. Smartphone users, opinion experts more than 99 percent of the economically active population is using, it has reached the saturation past the early stages of formation. Smartphone is equipped with a general purpose OS possible the implementation of high performance environment similar level as a personal computer. Also, it is a mobile communication terminal scalable which can be removed or installed various applications. Such extensibility, it is possible to use different applications through the Apps store. In addition, it is also possible various services which are location based service. However, these services also benefit many but it also has a disadvantage of invasion of privacy and disclosure of personal information. In this research, we aim to analyze factors influencing on perceived value and risk in location based service of Smartphone. In addition, we aim to analyze the causal relationship with perceived value and risk in satisfaction and recommendation intention. This study suggests practical and theoretical implications based on the results.

  • PDF

Secure Location Information Protection Scheme from the Network Provider and the third party in Mobile Communication Environments (이동통신 환경에서 네트워크 제공자 및 제 3자로부터 안전한 위치정보 보호기법)

  • Kim, Soon-Seok;Lee, Chang-Hun
    • The KIPS Transactions:PartC
    • /
    • v.10C no.7
    • /
    • pp.867-878
    • /
    • 2003
  • In thls Paper, we Propose a new scheme, protecting information about the location of a mobile user against attacks from inside users of the mobile communication, especially the network providers. There have already been some proposals about how to protect location information of user in mobile communication environments〔1-5〕. Among them, Kesdogan et al.〔2, 3〕 proposed a new method, using so-called temporary pseudonyms and also described protection method against a passive and an active attack of network providers. However, the description of protection method against the active attack between the two is not clear. Moreover, there is an additional load that it should append a reachability manager〔1, 6〕 to the proposed system. Therefore, we propose a new scheme improving the above method of Kesdogan et al. and analyze its security and effectiveness.

Proposal for a Peer Decentralized Identity System Using Short-Range Wireless Communications (단거리 무선 통신을 이용한 개인 간 분산 신원증명 시스템 제안)

  • Yeo, Kiho;Park, Keundug;Youm, Heung Youl
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.31 no.5
    • /
    • pp.959-972
    • /
    • 2021
  • Decentralized Identity is based on the concept of self-sovereign identity, in which holders manage and provide their own credentials. However, a procedure is required to obtain credentials from issuers, and there is a risk of mess personal information leaking due to negligence of the issuers. In this paper, we propose a peer decentralized identity system based on Peer DID technology that allows only participants to verify their identity in 1:1 or 1:N small groups by matching the holder with the issuer. It is directly connected to a mobile device using short-range wireless communications such as bluetooth, and the holders create and provide their own credentials in person to the other party, thus fully realizing the self-sovereignty identity. The proposed system can simplify the identification process, improve security and privacy, and reduce costs. Furthermore, an extended architecture is possible to connect the proposed system and the distributed ledger to identify users in other domains. In the future, based on various technologies, it is also necessary to expand research on identity systems that can be utilized for human-to-thing and things-to-things authentication.

A Study on the Risk Perception and Acceptance of Location-based SNS Service of Smartphone Users (스마트폰 사용자의 위치기반 SNS 서비스에 대한 위험인식과 수용에 관한 연구)

  • Yun, Sung-Uk
    • Journal of Digital Convergence
    • /
    • v.17 no.2
    • /
    • pp.453-462
    • /
    • 2019
  • This study investigates the relationship between controllability, severity, unrealistic optimism and risk perception of risk factors related to location - based SNS services for smartphone users. For this purpose, I surveyed university students who had experience using location - based SNS service. The main results are as follows. First, controllability has a statistically significant effect on unrealistic optimism. Second, Severity had a statistically significant negative impact on unrealistic optimism. Third, Controllability did not have a statistically significant effect on risk perception, Fourth, Severity did not have a statistically significant effect on perceived risk. Fifth, Unrealistic optimism had a statistically significant negative impact on perception of risk. The results of this study will contribute to the prevention of privacy incidents and the protection of smartphone users by using location - based SNS service. On the one hand, future research will need to look at the relationship between unrealistic optimism and risk prevention or coping behavior.

Empirical Study of Determinants Influencing Intention to Recommend Contents Based on Information System Success Model (콘텐츠 추천의도에 영향을 미치는 요인에 관한 연구: 정보시스템 성공모형을 중심으로)

  • Kim, Sanghyun;Park, Hyunsun
    • Knowledge Management Research
    • /
    • v.21 no.4
    • /
    • pp.175-193
    • /
    • 2020
  • With the proliferation of information technology communication and smart device, the environment where contents are produced and distributed is changing. People can use the contents quickly and easily, and the content industry is attracting attention and creating newly added value by converging with other industries. Accordingly, there is a need for content-related companies to understand the quality of content perceived by users in order to succeed in content, and to use it strategically. Therefore, this study aims to examine the relationship between content quality factors, user satisfaction, and recommendation intention through empirical analysis based on an IS success model. The analysis was conducted using smartPLS3.0 based on a total of 301 survey responses. As a result of the study, it was found that content usefulness, accessible system quality, convenient system quality, service provider trust, and interaction had a significant effect on user's satisfaction. Perceived privacy protection had a significant effect on user satisfaction and recommendation intention. Lastly, it was found that user satisfaction had a significant effect on recommendation intention. The results of this study are expected to provide useful information and therefore content companies can understand about the quality perceived by users.

Anonymous Qualification Verifying Method on Web Environment (웹 환경에서 익명성을 제공하는 자격증명 방법)

  • Lee, Yun-Kyung;Hwang, Jung-Yeon;Chung, Byung-Ho;Kim, Jeong-Nyeo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.21 no.5
    • /
    • pp.181-195
    • /
    • 2011
  • There's a controversy about an invasion of privacy which includes a leakage of private information and linking of user's behavior on internet. Although many solutions for this problem are proposed, we think anonymous authentication, authorization, and payment mechanism is the best solution for this problem. In this paper, we propose an effective anonymity-based method that achieves not only authentication but also authorization. Our proposed method uses anonymous qualification certificate and group signature method as an underlying primitive, and combines anonymous authentication and qualification information. An eligible user is legitimately issued a group member key pair through key issuing process and issued some qualification certificates anonymously, and then, he can take the safe and convenience web service which supplies anonymous authentication and authorization. The qualification certificate can be expanded according to application environment and it can be used as payment token.

Classification of Service Types using Website Fingerprinting in Anonymous Encrypted Communication Networks (익명 암호통신 네트워크에서의 웹사이트 핑거프린팅을 활용한 서비스 유형 분류)

  • Koo, Dongyoung
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.11 no.4
    • /
    • pp.127-132
    • /
    • 2022
  • An anonymous encrypted communication networks that make it difficult to identify the trace of a user's access by passing through several virtual computers and/or networks, such as Tor, provides user and data privacy in the process of Internet communications. However, when it comes to abuse for inappropriate purposes, such as sharing of illegal contents, arms trade, etc. through such anonymous encrypted communication networks, it is difficult to detect and take appropriate countermeasures. In this paper, by extending the website fingerprinting technique that can identify access to a specific site even in anonymous encrypted communication, a method for specifying and classifying service types of websites for not only well-known sites but also unknown sites is proposed. This approach can be used to identify hidden sites that can be used for malicious purposes.

Directions for Policy to the Fourth Industrial Revolution based on Hyper-Connected Society and Smart Technology (초연결사회와 스마트기술에 따른 4차산업혁명의 정책방향)

  • Eun-Yeol Oh;Jun-Ok Shin
    • Journal of Industrial Convergence
    • /
    • v.21 no.12
    • /
    • pp.45-54
    • /
    • 2023
  • This study aims to examine trends so far and proactively seek future policy directions because the degree of implementation of hyper-connected society and smart technology at home and abroad cannot be overlooked at present in Korea. The method of the study focused on differentiating it from this study through literature research and comparison of major previous studies. As a result of the study, data security and maintenance, enhanced privacy of users and users, and related policy directions for entering a super-aged society were identified in the era of the 4th industrial revolution in Korea according to hyper-connected society and smart technology. Research limitations were difficulties in obtaining data and technical limitations in statistical quantification through trend analysis, although research analysis should be approached through quantitative and quantitative methods. It needs to be supplemented in future studies.

Healing Landscape Design for Hospital Outdoor Space - A Case of the Kyeongsang National University Hospital in Changwon - (치유경관의 개념을 적용한 병원 옥외공간 조경설계 - 창원 경상대학교 병원을 사례로 -)

  • Min, Byoung-Wook
    • Journal of the Korean Institute of Landscape Architecture
    • /
    • v.41 no.1
    • /
    • pp.82-92
    • /
    • 2013
  • This paper presents a landscape design proposal for the Kyeongsang National University Hospital in Changwon, Kyeongsangnam-do. The site is located at 555 Samjeongja-dong, Seongsan-gu, Changwon, Kyeongsangnam-do, and its area is approximately $79,743.1m^2$. The goal of the design was to create a landscape that helps the patients' recovery and public well-being as well as respects the surrounding environment. In order to achieve this goal, three design subjects were considered: maximizing the healing functions of the landscape, promoting ecologically regenerative landscape, and increasing the aesthetic value of the landscape based on the local context. For the healing aspect, first, therapeutic plants were carefully selected and various healing programs were introduced to the open space area such as the sensory garden, meditative space, the medicinal herb garden, outdoor acupressure treatment facilities, remedial playground etc. In addition, as the importance of patient's privacy is emphasized in research, the space and circulation patterns were divided according to the characteristics of the users. For ecological consideration, the design proposed to preserve and extend the existing ridgeline with pine forest, and recover the natural water system and recycle the water for the landscape management. For the aesthetic experience of the people, in contrast to the surrounding evergreen forest, diverse deciduous and flowering plants were introduced to arouse a sense of the season, and fruit bearing trees for wildlife to create a specific mood of being in nature so that people can listen to the songs of the birds and watch squirrels play etc. In addition, all the spaces and facilities were designed and placed according to universal design principles so that there would be no barrier for the patients to use them. Also, a sustainable management scheme was suggested to maintain the landscape in ecological and economical ways.