• Title/Summary/Keyword: 환경적 침해

Search Result 394, Processing Time 0.028 seconds

A Study on Privacy Influencing the Continuous Intention to Use in Closed-Type SNS: Focusing on BAND Users (폐쇄형 SNS에서 프라이버시가 지속적인 사용의도에 미치는 영향에 관한 연구: 밴드 사용자를 중심으로)

  • Lim, Byungha;Kang, Dongwon
    • Information Systems Review
    • /
    • v.16 no.3
    • /
    • pp.191-214
    • /
    • 2014
  • In this study, based on Privacy Calculus Model, we study whether users' intention of continuous use of closed-type SNS is affected by information privacy concern. In addition, we propose a model that studies if the major factors of the intention of continuous use which are trust, satisfaction and benefits could control the information privacy concern's effect on the intention of use. As a result, companies have to consider protecting the psychological privacy and information privacy of the individual when they design SNS.

A Study on Security Level-based Authentication for Supporting Multiple Objects in RFID Systems (다중 객체 지원을 위한 RFID 시스템에서 보안 레벨 기반의 인증 기법에 관한 연구)

  • Kim, Ji-Yeon;Jung, Jong-Jin;Jo, Geun-Sik;Lee, Kyoon-Ha
    • The Journal of Society for e-Business Studies
    • /
    • v.13 no.1
    • /
    • pp.21-32
    • /
    • 2008
  • RFID systems provide technologies of automatic object identification through wireless communications in invisible ranges and adaptability against various circumstances. These advantages make RFID systems to be applied in various fields of industries and individual life. However, it is difficult to use tags with distinction as tags are increasingly used in life because a tag usually stores only one object identifier in common RFID applications. In addition, RFID systems often make serious violation of privacy caused by various attacks because of their weakness of radio frequency communication. Therefore, information sharing methods among applications are necessary for expansive development of RFID systems. In this paper, we propose efficient RFID scheme. At first, we design a new RFID tag structure which supports many object identifiers of different applications in a tag and allows those applications to access them simultaneously. Secondly, we propose an authentication protocol to support the proposed tag structure. The proposed protocol is designed by considering of robustness against various attacks in low cost RFID systems. Especially, the proposed protocol is focused on efficiency of authentication procedure by considering security levels of applications. In the proposed protocol, each application goes through one of different authentication procedures according to their security levels. Finally, we prove efficiency of th proposed scheme compared with the other schemes through experiments and evaluation.

  • PDF

Lightweight Authentication Scheme for Secure Data Transmission in Terrestrial CNPC Links (지상 CNPC 링크에서 안전한 데이터 전송을 위한 경량화된 인증기법)

  • Kim, Man Sik;Jun, Moon-Seog;Kang, Jung Ho
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.6 no.9
    • /
    • pp.429-436
    • /
    • 2017
  • Unmanned Aerial Vehicles (UAV) that are piloted without human pilots can be commanded remotely via frequencies or perform pre-inputted missions. UAVs have been mainly used for military purposes, but due to the development of ICT technology, they are now widely used in the private sector. Teal Group's 2014 World UAV Forecast predicts that the UAV market will grow by 10% annually over the next decade, reaching $ 12.5 billion by 2023. However, because UAVs are primarily remotely controlled, if a malicious user accesses a remotely controlled UAV, it could seriously infringe privacy and cause financial loss or even loss of life. To solve this problem, a secure channel must be established through mutual authentication between the UAV and the control center. However, existing security techniques require a lot of computing resources and power, and because communication distances, infrastructure, and data flow are different from UAV networks, it is unsuitable for application in UAV environments. To resolve this problem, the study presents a lightweight UAV authentication method based on Physical Unclonable Functions (PUFs) that requires less computing resources in the ground Control and Non-Payload Communication (CNPC) environment, where recently, technology standardization is actively under progress.

Emotional Labor and Human Rights Protection in the case of airlines (감정노동과 인권보호 - 항공사를 중심으로)

  • Shin, Dong Chun
    • The Korean Journal of Air & Space Law and Policy
    • /
    • v.29 no.2
    • /
    • pp.87-108
    • /
    • 2014
  • Recent examples of abuse by black consumers (including air travellers) against emotional laborers have become a serious social issue in Korea in that they are likely to violate human rights of those laborers. Emotional labor is a form of emotion regulation that creates a publicly visible facial and bodily display, and also emotional management within the workforce that creates a situation in which the emotion management by workers can be exchanged in the marketplace. Example professions that require emotional labor are: nurses, doctors, waiting staff, and television actors. However, as the economy moves from a manufacturing to a service-based economy, many more workers in a variety of occupational fields are expected to manage their emotions according to employer demands when compared to the past. One of symptoms deriving from emotional labor is smile mask syndrome abbreviated SMS, which is a psychological disorder proposed by professor Makoto Natsume where subjects develop depression and physical illness as a result of prolonged, unnatural smiling. And higher degree of using emotion regulation on the job is related to higher levels of employees' emotional exhaustion, and lower levels of employees' job satisfaction. In most part, emotional laborers are more abused and hurt by so called black consumers who are raising complaints relating to products and services purchased against service providers for the purpose of maliciously getting compensation. Against this background, the Korean Government abolished "the Consumer Protection Act" and instead promulgated "the Basic Consumer Act" in September 2006 which stipulates that consumers are expected to have protection as well as responsibility and duty. The Aviation Security Act cites the examples of prohibited behaviors (unruly passengers) while they are travelling. In addition, human rights of emotional laborers could be more protected by the enhancement of etiquettes and cavalry and improvement of culture and working environment.

A Method for Scalar Multiplication on Elliptic Curves against Differential Power Analysis using Efficient Key-Randomization (효율적인 키-난수화를 사용한 차분 전력 분석 공격에 대응하는 타원곡선 위의 스칼라 곱셈 방법)

  • Jung, Seok Won
    • The Journal of the Korea Contents Association
    • /
    • v.20 no.1
    • /
    • pp.356-363
    • /
    • 2020
  • As a becoming era of Internet-of-Things, various devices are connected via wire or wirless networks. Although every day life is more convenient, security problems are also increasing such as privacy, information leak, denial of services. Since ECC, a kind of public key cryptosystem, has a smaller key size compared to RSA, it is widely used for environmentally constrained devices. The key of ECC in constrained devices can be exposed to power analysis attacks during scalar multiplication operation. In this paper, a key-randomization method is suggested for scalar multiplication on SECG parameters. It is against differential power analysis and has operational efficiency. In order to increase of operational efficiency, the proposed method uses the property 2lP=∓cP where the constant c is small compared to the order n of SECG parameters and n=2l±c. The number of operation for the Coron's key-randomization scalar multiplication algorithm is 21, but the number of operation for the proposed method in this paper is (3/2)l. It has efficiency about 25% compared to the Coron's method using full random numbers.

A Planning Framework of BIM-based Work-Type Packaging for Educational Facility Maintenance (교육시설 유지관리 BIM 기반 공종 패키지 플래닝 프레임워크)

  • Bae, Chang-Joon;Park, Sang-Hun;Yoon, Sun-Jae;Lee, Mi-Young;Koo, Kyo-jin
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.21 no.12
    • /
    • pp.200-210
    • /
    • 2020
  • The maintenance of educational facilities was assembled in 12 project classifications of the Educational Improvement Program. The priorities were decided by the evaluation scores derived from the condition investigation, and maintenance works were budgeted in the order of priorities. These priorities were a schedule for conducting maintenance and an important criterion for obtaining a construction order. Several restrictions in the condition investigation exist, which derives budgets and conducts maintenance separately based on the priorities. An educational facility manager has a restriction in quantity take-off, which results in an incorrect budget. Discomfort would occur in an educational environment, and a period of infringing safety would increase. This study proposes applying a BIM in the condition investigation and the planning framework for work-type packaging. A BIM supports a budget calculation and derives evaluation scores by linking a repair and an inspection result. The work-type packaging algorithm divides a budget allocation range and derives the result of a grouped work-types applied in an equivalent space and element. As a result of applying cases, it could shorten the duration by approximately 37.4%. Its usability in selecting a grouped work-type was evaluated through an assessment with workers.

Analysis of Daylight Availability Rights using 3D City-Model (3차원 도시모델을 이용한 건물 일조권 분석)

  • Yoo, Hwan-Hee;Goo, Sin-Hoi;Cho, Eun-Rae;Kim, Seong-Sam
    • Journal of the Korean Society of Surveying, Geodesy, Photogrammetry and Cartography
    • /
    • v.25 no.2
    • /
    • pp.165-175
    • /
    • 2007
  • Nowadays, architecture in urban areas is dominated by the goal of spanning wide spaces and creating openings large enough to distribute daylight to building interiors. Daylight availability of building in city strongly depends not only on the building's height but also on spaces between buildings. Recently numbers of disputes over the daylight availability are increasing in high density developed areas because residents' demand for pleasant residential environment is getting stronger. Therefore in this study we constructed the three-dimensional information of buildings using LiDAR data connected with digital map and then suggested conclusions by applying it to daylight availability analysis. This study presents an approach to judge accurately the violation of a right to enjoy sunshine by using altitude and azimuths of the sun, simulating three-dimensional urban space precisely, and classifying the total duration of sunshine and the continuous duration of sunshine each householder. We expect that local government performs precisely the confirmation and permission business about urban planning and design by advising this approach.

A Study on the Setting Method of the File System Audit Function of Windows for Enhancing Forensic Readiness (포렌식 준비도 제고를 위한 윈도우의 파일 시스템 감사 기능 설정 방안에 관한 연구)

  • Lee, Myeong-Su;Lee, Sang-Jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.27 no.1
    • /
    • pp.79-90
    • /
    • 2017
  • If digital forensic investigators can utilize file access logs when they audit insider information leakage cases or incident cases, it would be helpful to understand user's behaviors more clearly. There are many known artifacts related to file access in MS Windows. But each of the artifacts often lacks critical information, and they are usually not preserved for enough time. So it is hard to track down what has happened in a real case. In this thesis, I suggest a method to utilize SACL(System Access Control List) which is one of the audit functions provided by MS Windows. By applying this method of strengthening the Windows's audit settings, even small organizations that cannot adopt security solutions can build better environment for conducting digital forensic when an incident occurs.

Analysis of Security Technology for Internet of things (사물인터넷 보안 기술 분석)

  • Lee, Ho-Tae
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.17 no.4
    • /
    • pp.43-48
    • /
    • 2017
  • Today our society is approaching new intelligence information society, which has been caused by the Fourth Industrial Revolution along with the development of information and communication technology(ICT). And this has just opened a new era of Internet of Things(IoT) that connects between human and objects and between objects through network, allowing transmission and reception of information beyond the limits of space. However, many crises occurred in the existing communication environment may threaten the security of Internet of Things, by violating the three components of information security. In this paper, this study aims to analyze security technology to achieve advanced security by dividing IoT security technology for coping with security vulnerability found in different components into three groups.

A Group based Privacy-preserving Data Perturbation Technique in Distributed OSN (분산 OSN 환경에서 프라이버시 보호를 위한 그룹 기반의 데이터 퍼튜베이션 기법)

  • Lee, Joohyoung;Park, Seog
    • KIISE Transactions on Computing Practices
    • /
    • v.22 no.12
    • /
    • pp.675-680
    • /
    • 2016
  • The development of various mobile devices and mobile platform technology has led to a steady increase in the number of online social network (OSN) users. OSN users are free to communicate and share information through activities such as social networking, but this causes a new, user privacy issue. Various distributed OSN architectures are introduced to address the user privacy concern, however, users do not obtain technically perfect control over their data. In this study, the control rights of OSN user are maintained by using personal data storage (PDS). We propose a technique to improve data privacy protection that involves making a group with the user's friend by generating and providing fake text data based on user's real text data. Fake text data is generated based on the user's word sensitivity value, so that the user's friends can receive the user's differential data. As a result, we propose a system architecture that solves possible problems in the tradeoff between service utility and user privacy in OSN.