• Title/Summary/Keyword: Anonymity Control

Search Result 48, Processing Time 0.026 seconds

The Suggestion and Validation on the Structural Model of the Causes of Cyber-violence (사이버 폭력의 원인에 대한 구조모델의 제시와 검증)

  • Yoo, Sang-Mi;Kim, Mi-Ryang
    • The Journal of Korean Association of Computer Education
    • /
    • v.14 no.1
    • /
    • pp.23-33
    • /
    • 2011
  • The purpose of the study is to investigate the structural relations between variables which give influences on cyber-violence. On the basis of literal materials, those variables as self-control ability, social identity, and norm consciousness are selected as the variables of having influences on cyber-violence, and the analysis is focused on the influence that anonymity, the representative characteristic of Internet, gives them. The validation of the Model is to be done through AMOS 6.0, and the degree of Model validity is to be estimated through the values of ${\chi}^2$, RMSEA, CFI, NNFI. As the result of the analysis, it is found that social identity and norm consciousness are direct causes of cyber-violence. Anonymity does not have any direct relations with it, but it indirectly gives influences on cyber-violence, for it gives some influences on social identity and norm consciousness. That is, anonymity is a cause of weakening social identity and degrading norm consciousness, by which, it is assumed, cyber-violence is triggered.

  • PDF

A Study on the Impact of CSA on Internal Control (CSA가 내부통제에 미치는 영향)

  • Park, Seong-Kyu;Heo, Young-Kyun;Jeong, Jeong-Seob
    • Korean Business Review
    • /
    • v.18 no.2
    • /
    • pp.45-60
    • /
    • 2005
  • CSA(Control Self Assessment) is a new internal control technique whose objective is to control the human resource performance, the manager's philosophy, the business ethics, the effective communication and decision making etc. The purpose of this study is to find out if the CSA improve the quality of internal control. With the questionnaire method the following conclusions are reached. 1) Level of the management supports influence the level of the workshop participation. 2) Anonymity during the workshop session influences the level of workshop participation. 3) Level of the organizational committment influences the level of the participation 4) The level of workshop performance significantly influences the level of internal contro improvement.

  • PDF

The Relationship between Anonymity, Personal and Group Identities, and Discussion Quality in Online Discussion Communities (온라인 토론 커뮤니티에서의 익명성과 개인 및 집단 정체성, 토론의 질 간의 영향 연구)

  • Ae Ri Lee
    • Information Systems Review
    • /
    • v.21 no.3
    • /
    • pp.63-86
    • /
    • 2019
  • As the use of ICT became a part of daily social life, online community has emerged as a new type of social organization. Online community is a virtual space which enables many people to participate and contribute together to collective knowledge. Anonymity in online communities can encourage active social participation by people with various social constraints, however, anonymity can also lead to serious social pathology. As a result, it is necessary to study on what is fundamentally influencing human behavior and how people's behavior is controlled in anonymous online community. This study focuses on human identity and investigate the factors affecting human behavior control in anonymous online environment by examining various aspects of identity in online discussion community. This study empirically verifies the causal relationship between factors, including social & technical anonymities, various identity dimensions, intrinsic motivation to participate in the community, group norm conformity, and quality of discussion. It also analyzes the difference between groups by the level of anonymity, gender, age, community usage period, and discussion topic. Based on the findings, this research provides theoretical and practical implications for online community management strategies and a better culture on Internet discussion.

A Study on DRM Model Using Electronic Cash System (전자화폐 시스템을 적용한 DRM 모델에 관한 연구)

  • Lee, Deok-Gyu;Oh, Hyung-Geun;Lee, Im-Yeong
    • Journal of Korea Multimedia Society
    • /
    • v.7 no.8
    • /
    • pp.1107-1119
    • /
    • 2004
  • There is Electronic-cash system as important payment means in Electronic-commerce and the requirement of electronic cash is independence, transferability, divisibility etc. This is important requirement in DRM to provide contents as a same requirement to contents. Because contents itself can see that requirement of Electronic-cash can be transferred the control of to contents requirement as monetary concept. Can apply equally in reproduction and copy for contents, anonymity user's access etc, and several relations. In this paper, wish to put by value that is equal about Electronic-cash and contents, and apply concept of Electronic-cash through this and present DRM model after examine requirement of Electronic-cash and DRM's requirement. Concept used in this paper left copy use authority to use hierarchic tree structure and endowed anonymity for contents and anonymity about user for anonymous user. Finally, examines and compares and analyzes proposed existing methods.

  • PDF

An Offline Electronic Payment System Based on an Untraceable Blind Signature Scheme

  • Kutubi, Md. Abdullah Al Rahat;Alam, Kazi Md. Rokibul;Tahsin, Rafaf;Ali, G.G. Md. Nawaz;Chong, Peter Han Joo;Morimoto, Yasuhiko
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.5
    • /
    • pp.2628-2645
    • /
    • 2017
  • This paper proposes a new offline electronic payment (e-payment) system that satisfies the major security requirements of e-payment, i.e. anonymity, unlinkability, unforgeability, double spending control, conditional traceability, and fraud prevention. The central idea is the use of Hwang et al.'s RSA-based untraceable blind signature (BS), which disables the link between the e-coin and its owner and ensures the anonymity of both the customer and the merchant. It attaches an expiration, a deposit and the transaction dates to each e-coin in order to manage the database of the bank effectively, to correctly calculate the interest on the e-coin and to aid arbitration if a dishonest customer attempts to double-spend the coin. It also ensures the anonymity of the customer as long as the coin is spent legitimately. Only when a fraudulent e-coin transaction is detected can the bank, with the help of the central authority (a trusted entity), determine the identity of the dishonest customer. The system is referred to as offline since the bank does not need to be concurrently involved in transactions between a customer and a merchant. Finally, analyses of the performance of the prototype and the primary security requirements of the proposed system are also presented.

NON-INTERACTIVE IDENTITY-BASED DNF SIGNATURE SCHEME AND ITS EXTENSIONS

  • Lee, Kwang-Su;Hwang, Jung-Yeon;Lee, Dong-Hoon
    • Bulletin of the Korean Mathematical Society
    • /
    • v.46 no.4
    • /
    • pp.743-769
    • /
    • 2009
  • An ID-based DNF signature scheme is an ID-based signature scheme with an access structure which is expressed as a disjunctive normal form (DNF) with literals of signer identities. ID-based DNF signature schemes are useful to achieve not only signer-privacy but also a multi-user access control. In this paper, we formally define a notion of a (non-interactive) ID-based DNF signature and propose the first noninteractive ID-based DNF signature schemes that are secure under the computational Diffie-Hellman and subgroup decision assumptions. Our first scheme uses random oracles, and our second one is designed without random oracles. To construct the second one, we use a novel technique that converts a non-interactive witness indistinguishable proof system of encryption of one bit into a corresponding proof system of encryption of a bit-string. This technique may be of independent interest. The second scheme straightforwardly yields the first ID-based ring signature that achieves anonymity against full key exposure without random oracles. We finally present two extensions of the proposed ID-based DNF signature schemes to support multiple KGCs and different messages.

The Proposals of Identity Escrow Scheme to Control User's Anonymity (사용자의 익명성을 제어하는 신원 위탁 방식 제안)

  • 황보성;이임영
    • Journal of Korea Multimedia Society
    • /
    • v.3 no.6
    • /
    • pp.617-624
    • /
    • 2000
  • We introduce the concept of a Identity Escrow Scheme, an application of key escrow ideas to solve the problem of authentication. In the Identity Escrow Scheme, the User escrows a own real identity to the Issuer and receives a Authentication Information. In authentication step, between the User to the Service Provider, the User only gives a Authentication Information to the Service Provider. Therefore, the Service Provider don't know a real identity of user's. However, when the User does unlawful actions, the Lawful Agent is called by the Service Provider, and his anonymity is revoked by cooperation of the Issuer and the Lawful Agent. We propose new Identity Escrow Schemes and analyze these.

  • PDF

An Anonymous asymmetric public key traitor tracing scheme (익명성을 보장하는 비대칭 공개키 공모자 추적 기법)

  • 최은영;이동훈;홍도원
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.14 no.3
    • /
    • pp.49-61
    • /
    • 2004
  • In broadcast encryption schemes, traceability is a useful property to trace authorized subscribers, called traitors, who collude for manufacturing a pirate decoder. Unfortunately, this is usually achieved with a sacrifice of a privacy. Most traitor tracing schemes in the literature have been developed without considering a subscriber's anonymity, which is one of important requirements for electronic marketplaces to offer similar privacy as current marketplace. It would be unsatisfactory for the subscriber to reveal his/her identity to purchase multimedia contents. In this paper we propose an anonymous broadcast encryption scheme, where a user can subscribe anonymously and one purchases multimedia contents without giving a lot of information about his lifestyle, habits, and etc, but anonymity control is provided, i.e., a data supplier can date traitors.

A Study on Electronic Cash Protocol with Anonymity Control (익명성 제어 기능을 가지는 전자화폐 프로토콜에 관한 연구)

  • 오형근;이임영
    • Proceedings of the Korea Institutes of Information Security and Cryptology Conference
    • /
    • 1998.12a
    • /
    • pp.109-121
    • /
    • 1998
  • 전자상거래에 있어서 유력한 지불 시스템으로 여겨지고 있는 전자화폐 시스템에서는 상거래시 사용자의 익명성을 유지시켜 주고 있다. 그러나 이러한 익명성의 제공은 돈 세탁과 약탈 그리고 불법적인 거래 대금의 제공에 이용될 수 있으며 이러한 사회적, 경제적인 범죄로의 이용 가능성 때문에 익명성 제어에 관한 연구가 필요한 실정이다. 이에 본 고에서는 정당한 사용자의 익명성을 보장하면서 불법적인 사용자에 대해서는 그 익명성을 취소하거나 전자화폐를 추적할 수 있는 기능을 가지는 프로토콜을 제안한다.

  • PDF

Danger Element Analysis and Protocol Design of Electronic Cash Payment System (전자화폐지불시스템의 위험요소 분석 및 프로토콜 설계)

  • 허철회;조성진;정환묵
    • The Journal of Society for e-Business Studies
    • /
    • v.4 no.1
    • /
    • pp.103-115
    • /
    • 1999
  • The electronic cash, an electronic equivalent of the real paper money, has been recently proposed as one of the various payment methods for electronic commerce. In this paper, we design an electronic cash payment system based on a new electronic cash payment protocol that can effectively provide full anonymity and avoid double-spending. The protocol is suitable for use as the electronic cash control or electronic cash database. The protocol support also security and electronic cash property.

  • PDF