• Title/Summary/Keyword: Consumer protect

Search Result 125, Processing Time 0.027 seconds

Tag Identification Time Reduction Scheme of Back-End Server for Secure RFID Privacy Protection Protocol (안전한 RFID 프라이버시 보호 프로토콜을 위한 백엔드 서버의 태그 판별 시간 절감 기법)

  • Yeo Sang-Soo;Kim Soon-Seok;Kim Sung-Kwon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.16 no.4
    • /
    • pp.13-26
    • /
    • 2006
  • RFID technology is evaluated as one of core technologies for ubiquitous environment, because of its various characteristics which barcode systems don't have. However, RFID systems have consumer's privacy infringement problems, such like information leakage and location tracing. We need RFID privacy protection protocols, that satisfy three essential security requirements; confidentiality, indistinguishability and forward security, in order to protect consumer's privacy perfectly. The most secure protocol, that satisfies all of the three essential security requirements, among existing protocols, is the hash-chain based protocol that Ohkubo proposed. Unfortunately this protocol has a big disadvantage that it takes very long time to identify a tag in the back-end server. In this paper, we propose a scheme to keep security just as it is and to reduce computation time for identifying a tag in back-end server. The proposed scheme shows the results that the identification time in back-end server is reduced considerably compared to the original scheme of Ohkubo protocol.

The Analyzing the Consumer Information Leak Case of Korean Card Companies with Business Ethics CLD: Studying on Cause and Solution with System Dynamics (윤리경영 인과지도를 바탕으로 분석한 한국의 카드사 고객정보 유출 사건: 시스템다이내믹스를 활용한 원인 탐구와 해결책 모색)

  • Kim, SeungBum;Shin, Ho-Sang
    • Korean System Dynamics Review
    • /
    • v.17 no.1
    • /
    • pp.77-105
    • /
    • 2016
  • Whenever Information leak case had been happened, even though IT Infra systems were reinforced, those cases of kind were not decreased. It meant that the causes are not only the fault of IT, but also other things. So that the information leak cases should have been studied by the interdisciplinary way. There was a point of view for the Business Ethics which needed to be studied in the interdisciplinary way. Financial Information Leak Case of three representative Card Companies in Korea which is happened in 2014 was a case which was composed by many problems. These were bad circumstances, half-educated, lower salary, and the most of all, the C-Levels' ignorance of the law. By studying the CLD: Causal Loop Diagram of Business Ethics and those mentioned factors, few meanings were discovered. Firstly, this case was not a accident, but a predeterminate issue at all, because of the structural unethical corruption. Secondly, main reason of this case was not only criminals who leaked information, but also managers, especially CEO who didn't obey the law, forced that to employees. Thirdly, although those companies had moral guide and did CSR activities, it was not help to protect this information leak case. This study shows that the important thing was not the action for showing, but effective action to management for sustainability.

The Role of Mothers in Children's Privacy Protection on the Internet (인터넷에서의 아동의 프라이버시 보호와 어머니의 역할)

  • Kim, So-Ra
    • Journal of the Korean Home Economics Association
    • /
    • v.46 no.2
    • /
    • pp.59-71
    • /
    • 2008
  • The purpose of this study was to discuss the role of mothers in children's privacy protection on the Internet. Specifically, the study explored 1)children's privacy protection efforts on the Internet, 2)types of personal information children provided at Web sites, and 3)the effect of mothers' privacy protection efforts on their children's privacy protection levels. The Internet survey was conducted and total of 153 mothers and their children aged 12-13 were included for statistical analysis. The descriptive statistics and Ordinary Least Squares were used. The results yield that children showed relatively high levels in providing personal information on the Internet, while they have no sufficient competency at privacy protection. The effect of mothers' privacy protection efforts on children's privacy protection was partially supported. The longer hours of Internet use and frequent participation in online events increased the potential consequences of children's privacy invasion. Providing privacy standards for online service providers and marketers targeting children could help protect children's privacy. Moreover, education program targeting parents and children could contribute them reduce potential consequences of children's privacy invasion.

A Study on the Validity and Benefit-Cost of Labeling System for Reuse Wreath (재사용화환 표시제도 도입 타당성 및 비용-편익에 대한 연구)

  • Heo, Seung-Wook;Yang, Sung-Bum
    • Korean Journal of Organic Agriculture
    • /
    • v.28 no.3
    • /
    • pp.335-346
    • /
    • 2020
  • The objective of this study is to analyze the consumer perception of reusable wreath and present the considerations for introducing the labeling system, and to calculate the social benefits and costs of that. For this, We did an internet survey on the perceptions and willingness-to-pay for reuse wreath to 330 adults. As a result, only 56.1 percent of those who ordered wreath were found to check whether they actually arrived. 73.6% of the respondents had the willingness-to-purchase a reusable wreath if the price was reasonable, and 43.6% were in favor of labeling reused wreath as 'reused wreath'. The social benefits of introducing the reusable currency marking system are about 155,692 million won and the social cost about 43.52 million won. If reusable wreath are not recognized and purchased at the price of new one, economic and emotional losses of domestic horticulture farmers and consumers may occur. Therefore, related agencies will be able to expand sales of domestic flower producers and protect the economic and emotional benefits of consumers if they make efforts to establish and operate a reusable wreath labeling system.

Combination of Set Top Box and Asymmetric Cryptosystem for Secure Storage of Digital Broadcasting Contents (디지털 방송 콘텐츠의 안전한 저장을 위한 Set Top Box와 비대칭 암호 시스템의 결합)

  • 이혜주;최형기;홍진우
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2003.05a
    • /
    • pp.782-786
    • /
    • 2003
  • It requires protection technologies to permit consumer to store a digital broadcasting content and at the same time to protect the intellectual property from illegal action. There is content encryption as one of protection technologies. In this paper, we proposed a protection scheme for digital broadcasting content that broadcasting server. Multiplexes the encryption key into MPEG-2 TS(transport stream) to be able to encrypt received TS at set top box. The proposed method is to modify PMT(program map table) for the information related encryption key and to multiplex key as TS packets. After then the encryption key is extracted from TS stream which is encrypted in set top box.

  • PDF

A Study on the Wearing Pattern and Design Preference of Handbag for Career Women (직업여성의 핸드백 착용실태와 디자인 선호도 분석)

  • Koo, In-Sook
    • Journal of Fashion Business
    • /
    • v.12 no.4
    • /
    • pp.1-14
    • /
    • 2008
  • The domestic handbag market has potential of growth - the key to protect this growing market from foreign makers is good design and better quality. 68 people(29.6%)out of 230 survey participants report 'to own 5 handbags', and the most popular(frequently reported) maker is 'MCM', owned by 49 participants(21.3%). 150 participants(65.2%) out of 230 total participants purchase at least one handbag a year, and 136 participants(59.7%) out of 230 spend between 110,000 and 200,000 Korean wons. 52 participants(22.6%) out of 230 own high-end handbags worth 500,000 Korean won or more. Among the high-end handbags, Louis Vuitton is the most popular, owned by 19 participants. The overall criteria in handbag purchase are 'color', 'price', 'pattern and logo', 'reputation', 'material', 'storage room', and 'size', in the descending order of importance. The most frequently desired benefit in handbag purchase is 'to stay through trends' i.e. not to go out of fashion too easily. The favored designs are made with rectangle shape with large width, soft material, attached handles, leather material, modern style. The most frequently cited reason to purchase a high-end brand item is 'because of high quality'.

A Study on the Design of Discharge Voltage of Discharge Element with Control Electrode (제어전극을 갖는 방전소자의 방전개시전압 설계에 관한 연구)

  • Park, Keun-Seok;Choi, Jun-Woong;Lee, Dae-Dong
    • The Transactions of The Korean Institute of Electrical Engineers
    • /
    • v.67 no.11
    • /
    • pp.1512-1516
    • /
    • 2018
  • The power system and control system constantly reveals surge voltage such as switching surge of lighting devices and power conversion devices, operating and stops surge of rotating devices, charge & discharge surge, opening & closing surge of circuit breakers and the like. Such a surge voltages can cause damage or malfunction of the element such as CPU, Memory, semiconductor etc. In the industry, in order to protect the system from the surge voltage, a surge protector with low discharge starting voltage, fast response time, and low capacitance is required, and technical development research for that is ongoing. In this paper, in order to solve the problem of the existing GDT discharge tube not discharging from the transient voltage which is higher than the commercial voltage and lower than the discharge voltage of the discharge element, we have developed a discharge element having the control electrode & control circuit. The discharge element having the control electrode and the control circuit can control the discharge voltage according to the needs of the consumer and can satisfy the requirement of the discharge element and the technology of the surge protector downsizing technology and the surge protection technology. It is judged to be effective for development.

A Case Study on imposing anti-dumping duty against Chinese Ceramic Tile (중국산 도자기질 타일 반덤핑관세부과 사례에 관한 연구)

  • Kim, Hee-Kil
    • THE INTERNATIONAL COMMERCE & LAW REVIEW
    • /
    • v.42
    • /
    • pp.337-364
    • /
    • 2009
  • Trade remedy is the system that additional duty or import quantity restriction would be imposed on the import products, in case that unfair imports damage domestic industry or even proper import products damage significantly domestic industry. The system is secured by the act of unfair trade practice investigation & industrial damage remedy, tariff act, WTO agreement. Anti-dumping duty act is the system that duties are assessed with the equal or less amount of the difference between normal transaction price and dumping price, in case that the product imported under dumping price causes or may cause damages in domestic industry, or the development of domestic industry should be delayed practically. Recently, the problems related with anti-dumping duty imposed as the part of the trade remedy occur frequently. It is necessary to discuss whether the anti-dumping duty act is practically trade remedy which does comply with GATT regulations and WTO agreements as the criteria of international law and is in line with the intent of domestic act in the suffered country, or it does return to protective trade or reduce the protection of consumer. On the basis of this discussion, it would be difficult to impose the antidumping duty on industrial products in order to protect domestic industry, when considering the expected free trade agreements of Korea-US, Korea-China and Korea-Japan. In order to survive under the current severe competition of world trade market, companies should raise the competitiveness by themselves without relying on the current trade acts to provide with a certain protection. This thesis should bring those attentions.

  • PDF

Strategic Management And Business Ethics (경영전략과 기업윤리)

  • Jang Ik-Seon
    • Management & Information Systems Review
    • /
    • v.3
    • /
    • pp.419-438
    • /
    • 1999
  • Following is an idea to utilize the business ethics as one of business administration strategies. Firstly, conversion of perception is needed in the business administration. Neglecting the pursuit of profit, the conventional strategic goal, is not desirable, we need to, however, have a mind that the consumer and environment centered mind is indispensible to the survival and growing of a business ultimately in establishing a strategic goal of diversified environmental changes. Secondly, conversion of the Chief Executive Officer (CEO)'s attitude in business administration is needed. It is necessary for the CEO to have a strong belief that the business ethics is indispensible to the survival and growing of a business by way of fair and logical management. Therefore the business ethics should be improved since the CEO's ethics can be the standard of his business. Thirdly, the business concerned parties should be considered. The realization of business ethics should be done in a certain way so as to protect the benefit of the all concerned parties such as stockholders. employees, consumers, suppliers, competitors, the local community, etc., since a business is an organization that can exists and grows only in the coexistence with its environment and concerned parties. Fourth, the business ethics should be transformed into a business culture through the enlargement of the general principles of and of employees' behavior as a management strategy. Lastly, business ethics should be improved through continuous evaluations to accommodate its environmental change.

  • PDF

Tracking Analysis of User Privacy Damage using Smartphone (스마트폰 사용으로 인한 사용자 프라이버시 피해 현황 분석)

  • Jeong, Yoon-Su
    • Journal of Convergence Society for SMB
    • /
    • v.4 no.4
    • /
    • pp.13-18
    • /
    • 2014
  • The usage rate of user due to advances in smartphone development is higher than the usage rate to use a PC. However, smartphone usage popularized research to protect sensitive information, such as smart phone users personal information, financial information is a small state. In this paper, we analyzed the various vulnerabilities in smartphone studies to date have been looking into the corresponding port smart consumer dispute resolution methods and criteria for smartphone security attack methods and analysis. In particular, the threat of such a network, malware, Peep attack of the security threats arising from the smartphone they can avoid or mitigate threats to minimize the smartphone security damage is done to the disclosure of personal information, such as direct damage or financial loss the analysis of that method.

  • PDF