• Title/Summary/Keyword: Internet Personal Broadcasting

Search Result 201, Processing Time 0.026 seconds

Auto Detection System of Personal Information based on Images and Document Analysis (이미지와 문서 분석을 통한 개인 정보 자동 검색 시스템)

  • Cho, Jeong-Hyun;Ahn, Cheol-Woong
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.15 no.5
    • /
    • pp.183-192
    • /
    • 2015
  • This paper proposes Personal Information Auto Detection(PIAD) System to prevent leakage of Personal informations in document and image files that can be used by mobile service provider. The proposed system is to automatically detect the images and documents that contain personal informations and shows the result to the user. The PIAD is divided into the selection step for fast and accurate retrieval images and analysis which is composed of SURF, erosion and dilation, FindContours algorithm. The result of proposed PIAD system showed more than 98% accuracy by selection and analysis steps, 267 images detection of 272 images.

Manufacturing of the Portable Electric Scooter Prototype According to Variation of Wheel Number

  • Kwon, Young Woong;Ham, Sung Hoon
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.12 no.2
    • /
    • pp.51-58
    • /
    • 2020
  • With the emergence of the words Personal Mobility (P.M.) or Smart Mobility (S.M.), which are terms for personal transportation, the activities of related technologies are increasing with the research. Personal transportation is basically used as a short distance transportation method using electrical energy. As personal mobility became more popular, the resulting products and studies are spreading throughout the country. Most of the electric scooters, which are personal vehicles, are mostly imported from China. This is due to the fact that the price competitiveness of major components of electric scooters is owned in China. At this point, the domestic research direction is considered to be desirable in terms of composition and design of the electric scooter body. In this study, the models of portable electric scooters according to the number of wheels mounted on portable electric scooters were presented and the prototypes were produced accordingly. The number of wheels applied to the electric scooter was 2 and 3 and 4; the contents and advantages and disadvantages of the proposed portable electric scooter models were reviewed.

Tackling Privacy Paradox : Protecting Right to Self-determination of Personal Information by Estimating the Economic Value of Personal Information and Visualizing the Price

  • Lim, Sejoon
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.13 no.2
    • /
    • pp.244-259
    • /
    • 2021
  • The economic value of personal information has its importance as an objective measure of valuation in commercial, legal, and policy areas. Until recently, however, personal information subjects have not properly recognized the economic value of personal information, which has led to the inability to exercise the right to self-determination of personal information by unconsciously agreeing to the terms and conditions of personal information service without recognizing the value of personal information provided to the service provider when subscribing to a specific service. Therefore, we will examine the methodologies for calculating the economic value of personal information and the practical guarantee of the right to self-determination of personal information and analyze the economic value of personal information through a survey. Also, we would like to propose various ways for the subject of personal information with limited cognitive resources to visually accept the economic value of personal information required by the terms and conditions and suggest the optimal visualization of personal information economic value to exercise the right to self-determination of personal information. To do so, in this paper, we have conducted two survey experiments to estimate the economic value of personal information. Based on the price of personal information by category retrieved from surveys, we have visualized the price of personal information in various forms and asked respondents to choose the optimal infographic that best represents the value of personal information visually. As a result, we have proposed an optimal usage of the infographic to 'nudge' information subjects about their right to self-determination of personal information, therefore opening the possibility of diminishing privacy paradox.

Zero-knowledge proof algorithm for Data Privacy

  • Min, Youn-A
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.13 no.2
    • /
    • pp.67-75
    • /
    • 2021
  • As pass the three revised bills, the Personal Information Protection Act was revised to have a larger application for personal information. For an industrial development through an efficient and secure usage of personal information, there is a need to revise the existing anonymity processing method. This paper modifies the Zero Knowledge Proofs algorithm among the anonymity processing methods to modify the anonymity process calculations by taking into account the reliability of the used service company. More detail, the formula of ZKP (Zero Knowledge Proof) used by ZK-SNAKE is used to modify the personal information for pseudonymization processing. The core function of the proposed algorithm is the addition of user variables and adjustment of the difficulty level according to the reliability of the data user organization and the scope of use. Through Setup_p, the additional variable γ can be selectively applied according to the reliability of the user institution, and the degree of agreement of Witness is adjusted according to the reliability of the institution entered through Prove_p. The difficulty of the verification process is adjusted by considering the reliability of the institution entered through Verify_p. SimProve, a simulator, also refers to the scope of use and the reliability of the input authority. With this suggestion, it is possible to increase reliability and security of anonymity processing and distribution of personal information.

Design and Implementation Smart Office System Based on Remote Desktop Protocol (RDP) (원격 데스크톱 프로토콜(RDP) 기반의 스마트 오피스 시스템 설계 및 구현)

  • Kim, Cheonshik
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.14 no.2
    • /
    • pp.153-159
    • /
    • 2014
  • For smart work (smart office), RDP(Remote Desktop Protocol) connection is the most popular method. When the office workers do not have personal space, smart office is very useful. That is, they can connect personal computer using Internet at cafe or public spaces. Using the smart office, it is possible to make personal business environment to increase business efficiency. In this paper, we designed and implemented smart office using RDP (Remote Desktop Protocol). We expected that the office workers can be used smart office for business efficiency.

A Security Labeling Scheme for Privacy Protection in Personal Health Record System (개인건강기록 시스템에서 개인 프라이버시 보호를 위한 보안 레이블 기법)

  • Yi, Myung-Kyu;Yoo, Done-sik;Whangbo, Taeg-Keun
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.15 no.6
    • /
    • pp.173-180
    • /
    • 2015
  • The advent of personal healthcare record(PHR) technology has been changing the uses as well as the paradigm of internet services, and emphasizing the importance of services being personalization. But the problem of user's privacy infringement and leaking user's sensitive medical information is increasing with the fusion of PHR technology and healthcare. In this paper, we propose a security labeling scheme for privacy protection in PHR system. In the proposed scheme, PHR data can be labeled also manually based on patient's request or the security labelling rules. The proposed scheme can be used to control access, specify protective measures, and determine additional handling restrictions required by a communications security policy.

Factors Influencing the Consumer Attitude toward Product Purchasing Related to Chinese Personal Internet Broadcasting Wang Hong (인터넷 개인 방송 왕홍을 통한 제품 구매와 관련된 중국 소비자 태도에 영향을 미치는 요인)

  • Zhang, Yining;Park, Hyun Jung
    • The Journal of the Korea Contents Association
    • /
    • v.18 no.10
    • /
    • pp.1-10
    • /
    • 2018
  • This study investigates Chinese consumers who have recently purchased products through internet personal broadcasting of Wang Hong and explores how factors related to Wang Hong, broadcasting contents, and products affect purchasing satisfaction of consumers. The present study also examines whether this satisfaction affects the consumer loyalty to the shopping through the Wang Hong in the future. The results indicated that consumers' perception of the informational level rather than entertainment level of broadcasting contents had significant effects on the product satisfaction. The perceived uniqueness and credibility of Wang Hong were found to have positive impacts. In terms of products, the more consumers perceived the product to fit their images or values, and the higher the fit between the images of Wang Hong and the endorsed product, the higher the satisfaction with the product. Product satisfaction increased the customer loyalty, including the intention of repurchasing products endorsed by the Wang Hong.

Design and Implementation of Personal Information Identification and Masking System Based on Image Recognition (이미지 인식 기반 향상된 개인정보 식별 및 마스킹 시스템 설계 및 구현)

  • Park, Seok-Cheon
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.17 no.5
    • /
    • pp.1-8
    • /
    • 2017
  • Recently, with the development of ICT technology such as cloud and mobile, image utilization through social networks is increasing rapidly. These images contain personal information, and personal information leakage accidents may occur. As a result, studies are underway to recognize and mask personal information in images. However, optical character recognition, which recognizes personal information in images, varies greatly depending on brightness, contrast, and distortion, and Korean recognition is insufficient. Therefore, in this paper, we design and implement a personal information identification and masking system based on image recognition through deep learning application using CNN algorithm based on optical character recognition method. Also, the proposed system and optical character recognition compares and evaluates the recognition rate of personal information on the same image and measures the face recognition rate of the proposed system. Test results show that the recognition rate of personal information in the proposed system is 32.7% higher than that of optical character recognition and the face recognition rate is 86.6%.

A Study on Analysis of Personal Information Risk Using Importance-Performance Analysis (IPA를 이용한 개인정보 위험도 분석 연구)

  • Jeong, Su-Jin;Kim, In-Seok
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.15 no.6
    • /
    • pp.267-273
    • /
    • 2015
  • For newly incoming technologies owing to the advancements in information and communications technology, the new form of information occurs due to the combination form of personal information. In turn, personal information which is combination with existing personal information is on the increase. It is difficult to equalize the method in order to analysis the degree of risk for personal information because it is qualitative method which is defined on the current Personal Information Protection Law. This dissertation presents the model to assess the degree of risk by using the IPA(Importance-Performance Analysis) after measuring the importance and the weighted value for the personal information based on the existing the method of risk assessment. Through the model suggested in this dissertation, the subjective judgement can be excluded, the combination of personal information can be assessed and the standard criteria which is used as the objective indicators from the quantitative degree of risk can be suggested.

Understanding the Adoption of T-Commerce in Telecommunications-Broadcasting Convergence Environment (통신 방송 융합 환경에서의 T-Commerce 수용 모델에 관한 연구)

  • Ahn, JoongHo;Kim, Eunjin;Park, Chulwoo
    • Knowledge Management Research
    • /
    • v.10 no.2
    • /
    • pp.15-33
    • /
    • 2009
  • Telecommunications-broadcasting convergence in the domain of IT is a representative phenomenon that is expected to provide the saturated existing markets with a new source of profit. Especially, T-Commerce combines familiarity of TV and immediacy of the Internet which are expected to cover all the users familiar with each media and expand the existing commercial transactions. Telecommunications-broadcasting convergence in Korea, however, is focusing on technical and regulatory aspects so that research on the real users is not up to the mark yet. This is the most fundamental problem in hampering growth in the corresponding service and market. Thus, we are proposing an adoption model on T-Commerce to rapidly expand the convergence service through understanding the potential users. Perceived utilitarian and hedonic values, perceived interactivity, media substitution and personal innovativeness have been examined as the factors influencing the users' intention to adopt a new convergence service. As a result of empirical analysis, it is verified that perceived utilitarian and hedonic values and personal innovativeness directly influenced the users' intention to adopt whereas perceived interactivity had indirect affect on them. T-Commerce service providers should not only emphasize on the benefit that the older media could not provide the users with, but also provide them with more pleasure and entertaining experience during the course of satisfying the users' needs to distinguish T-Commerce from the other existing media.

  • PDF