• Title/Summary/Keyword: K-익명성

Search Result 172, Processing Time 0.029 seconds

Effect of Psychological Variables on Decision-making Time in the Online Centipede Game (온라인 지네 게임으로 알아본 심리적 변인이 의사결정 시간에 미치는 영향)

  • Kim, Bora;Kwon, Young-Mi
    • Journal of Digital Convergence
    • /
    • v.15 no.12
    • /
    • pp.169-185
    • /
    • 2017
  • Given that nowadays things get very fast due to the pervasive use of the Internet and mobile devices, decision-making time can be an important variable in the online economic decisions. Although in experimental and behavioral economics, measures like scores or earnings are usually preferred, this study argues that the time variable can be dealt with as a new decision outcome. Thus, by selecting some psychological factors presumably impactful in the online context (i.e., incidental emotions, psychological distances, and individual's impulsivity), this study tested their effect on decision time in the online centipede game. As a result, the mean decision time in the game was longer (1) in the happiness condition than in the anger condition and (2) in the friend condition than in the stranger condition. The people with attention difficulties spent a short time in the decision and the people who dislike complex problems spent a short time in explaining their decision. This study can contribute to the field as it used the decision time as the dependent variable and it tested the effect of psychological factors in the context of online decision-making. Future studies can be conducted in other online decision situations or by considering other psychological variables.

Verifying a Safe P2P Security Protocol in M2M Communication Environment (M2M 통신환경에서 안전한 P2P 보안 프로토콜 검증)

  • Han, Kun-Hee;Bae, Woo-Sik
    • Journal of Digital Convergence
    • /
    • v.13 no.5
    • /
    • pp.213-218
    • /
    • 2015
  • In parallel with evolving information communication technology, M2M(Machine-to-Machine) industry has implemented multi-functional and high-performance systems, and made great strides with IoT(Internet of Things) and IoE(Internet of Everything). Authentication, confidentiality, anonymity, non-repudiation, data reliability, connectionless and traceability are prerequisites for communication security. Yet, the wireless transmission section in M2M communication is exposed to intruders' attacks. Any security issues attributable to M2M wireless communication protocols may lead to serious concerns including system faults, information leakage and privacy challenges. Therefore, mutual authentication and security are key components of protocol design. Recently, secure communication protocols have been regarded as highly important and explored as such. The present paper draws on hash function, random numbers, secret keys and session keys to design a secure communication protocol. Also, this paper tests the proposed protocol with a formal verification tool, Casper/FDR, to demonstrate its security against a range of intruders' attacks. In brief, the proposed protocol meets the security requirements, addressing the challenges without any problems.

Distributed Key Management Using Regression Model for Hierarchical Mobile Sensor Networks (계층적인 이동 센서 네트워크에서 회귀모델을 이용한 분산 키 관리)

  • Kim Mi-Hui;Chae Ki-Joon
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.43 no.7 s.349
    • /
    • pp.1-13
    • /
    • 2006
  • In this paper, we introduce a novel key management scheme that is based on the key pre-distribution but provides the key re-distribution method, in order to manage keys for message encryption and authentication of lower-layer sensor nodes on hierarchical mobile sensor networks. The characteristics of our key management are as follows: First, the role of key management is distributed to aggregator nodes as well as a sink node, to overcome the weakness of centralized management. Second, a sink node generates keys using regression model, thus it stores only the information for calculating the keys using the key information received from nodes, but does not store the relationship between a node and a key, and the keys themselves. As the disadvantage of existing key pre-distributions, they do not support the key re-distribution after the deployment of nodes, and it is hard to extend the key information in the case that sensor nodes in the network enlarge. Thirdly, our mechanism provides the resilience to node capture(${\lambda}$-security), also provided by the existing key pre-distributions, and fourth offers the key freshness through key re-distribution, key distribution to mobile nodes, and scalability to make up for the weak points in the existing key pre-distributions. Fifth, our mechanism does not fix the relationship between a node and a key, thus supports the anonymity and untraceability of mobile nodes. Lastly, we compare ours with existing mechanisms, and verify our performance through the overhead analysis of communication, computation, and memory.

A Secure and Privacy-Aware Route Tracing and Revocation Mechanism in VANET-based Clouds (VANET 기반 클라우드 환경에서 안전과 프라이버시를 고려한 경로추적 및 철회 기법)

  • Hussain, Rasheed;Oh, Heekuck
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.24 no.5
    • /
    • pp.795-807
    • /
    • 2014
  • Vehicular Ad hoc Network (VANET) has gone through a rich amount of research and currently is making its way towards the deployment. However, surprisingly it evolved to rather more applications and services-rich breed referred to as VANET-based clouds due to the advancements in the automobile and communication technologies. Security and privacy have always been the challenges for the think tanks to deploy this technology on mass scale. It is even worse that some security issues are orthogonally related to each other such as privacy, revocation and route tracing. In this paper, we aim at a specific VANET-based clouds framework proposed by Hussain et al. namely VANET using Clouds (VuC) where VANET and cloud infrastructure cooperate with each other in order to provide VANET users (more precisely subscribers) with services. We specifically target the aforementioned conflicted privacy, route tracing, and revocation problem in VANET-based clouds environment. We propose a multiple pseudonymous approach for privacy reasons and leverage the beacons stored in the cloud infrastructure for both route tracing and revocation. In the proposed scheme, revocation authorities after colluding, can trace the path taken by the target node for a specified timespan and can also revoke the identity if needed. Our proposed scheme is secure, conditional privacy preserved, and is computationally less expensive than the previously proposed schemes.

A Secure Mobile Message Authentication Over VANET (VANET 상에서의 이동성을 고려한 안전한 메시지 인증기법)

  • Seo, Hwa-Jeong;Kim, Ho-Won
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.15 no.5
    • /
    • pp.1087-1096
    • /
    • 2011
  • Vehicular Ad Hoc Network(VANET) using wireless network is offering the communications between vehicle and vehicle(V2V) or vehicle and infrastructure(V2I). VANET is being actively researched from industry field and university because of the rapid developments of the industry and vehicular automation. Information, collected from VANET, of velocity, acceleration, condition of road and environments provides various services related with safe drive to the drivers, so security over network is the inevitable factor. For the secure message authentication, a number of authentication proposals have been proposed. Among of them, a scheme, proposed by Jung, applying database search algorithm, Bloom filter, to RAISE scheme, is efficient authentication algorithm in a dense space. However, k-anonymity used for obtaining the accurate vehicular identification in the paper has a weak point. Whenever requesting the righteous identification, all hash value of messages are calculated. For this reason, as the number of car increases, a amount of hash operation increases exponentially. Moreover the paper does not provide a complete key exchange algorithm while the hand-over operation. In this paper, we use a Received Signal Strength Indicator(RSSI) based velocity and distance estimation algorithm to localize the identification and provide the secure and efficient algorithm in which the problem of hand-over algorithm is corrected.

The Factors Related to Substance Use among Korean Adolescents: Focusing on Sexual Experiences and Risky Sexual Behaviors (한국 청소년의 약물사용 관련요인: 성경험과 위험 성행동을 중심으로)

  • Park, Min Hee;Jeon, Hae Ok
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.16 no.5
    • /
    • pp.3333-3343
    • /
    • 2015
  • The purpose of this study is to investigate factors related to substance use focusing on the sexual experiences and risky sexual behaviors among Korean adolescents. This study conducted with a secondary data analysis using the Seventh Korea Youth Risk Behavior Web-based Survey 2011 in South Korea. The study participants selected 75,643 Korean adolescents who were recruited anonymously through national web-based survey. Data were analyzed using descriptive statistics, rao-Scott ${\chi}^2$, and logistic regressions considering complex samples. Results indicated that substance use was significantly associated with sexual experiences such as sexual intercourse with the opposite sex (adjusted OR=5.691; 95% CI=4.223-7.670), sexual intercourse with the same sex (adjusted OR=21.180; 95% CI=14.704-30.507) and risky sexual behaviors such as sexual assaults (adjusted OR=9.936; 95% CI=7.217-13.680), date rape (adjusted OR=16.979; 95% CI=11.648-24.751), sexual intercourse after drinking (adjusted OR=6.564; 95% CI=3.986-10.810), unexpected pregnancies (adjusted OR=18.628; 95% CI=8.476-40.936), and sexually transmitted diseases (adjusted OR=21.872; 95% CI=13.920-34.367) in Korean adolescents. Findings of this study show that adolescents who use substances are more likely to engage in risky sexual behaviors. Therefore, intervention program should be designed to consider both substance use and sexual problems and to include the effective approaches at the family and school level.

A Study on Crime Prevention Design in Urban Apartment Complex by Application of a CPTED -focused on the Medium sized City- (중소도시 아파트단지 방범계획의 CPTED 요소 적용에 관한 연구)

  • Bahn, Sang-Chul;Shin, Hee-Taek
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.15 no.2
    • /
    • pp.1176-1187
    • /
    • 2014
  • In Contemporary residential area, especially apartment commplex, crime affect the quality of life and sustainability of cities. So our interest is an all-time high in the role that planning processes and the design of the physical environment can play in reducing the opportunity for crime. The purpose of this study try to find the possibility of application of CPTED in Urban Apartment Complex. Recently, as increase of residencial density, diverse and new types of crime are increasing in urban apartment complex. It is the current of times which demand our serious consideration. This research focused on crime reduction through the physical environmental control methods. And the concepts and contents of CPTED are studied and the case studies of developed countries are surveyed. For groping in the practical application, researched into the case study of apartment blocks in medium sized city, Cheongju. Also Local crime prevention initiatives require partnership working, both between professionals and with local communities. The result of this study has implicated, increasing importance on daily safety issue in urban life and examining the possibility of applying crime prevention and reduction program and systems.

Different Abortion Approaches in Europe and Women's Health: Implications for Korean Abortion Debates (유럽 각국의 낙태 접근과 여성건강 - 한국 낙태논쟁에 대한 함의 -)

  • Chung, Jin-Joo
    • Issues in Feminism
    • /
    • v.10 no.1
    • /
    • pp.123-158
    • /
    • 2010
  • For the last several months, abortion debates have sparkled in Korea. The government has escalated the need of active punishment of illegal abortions to solve low fertility problems, while some obstetricians and gynecologist have proclaimed stoppage of illegal abortions suing colleague doctors who has conducted illegal abortions. Women's rights groups and researchers have also responded to the abortion debate claiming that women's decisions over their pregnancy are important in making of abortion policies. To contribute to Korean abortion debates, his paper aims to analyze European experiences of abortion polices in relation to the consequences on women's health. For the analysis of European abortion experiences, three countries - Ireland, U.K, and Netherland -are chosen. These three countries are selected since their legal and social acceptance of abortion and the level of safe abortion system are different. Each country is reviewed by national abortion policy, legal regulation, medical system and the role of civil society. The analysis shows several implications for abortion debates occurring in Korea. Various systematic policy mechanisms - abortion on women' request, abortions without complicated doctor's referrals, transparent and anonymous counseling and information provision regarding abortion, training and education for medical professionals to guarantee high quality abortion, abortions funded publicly for women to improve their access to abortions, steady monitoring and auditing abortion procedures and outcomes for safe abortion and so on - are required in Korean society. Two track procedures - safe abortion on women's request and prevention of unwanted pregnancy - are needed for reproduction of healthy women and society.

A Study of Factors Affecting Group Polarization in Online Communication : Based on Anonymity (온라인 커뮤니케이션에서 집단극화 현상에 영향을 미치는 요인에 관한 연구: 익명성 관점에서)

  • Suh, Eung-Kyo
    • Journal of Distribution Science
    • /
    • v.13 no.2
    • /
    • pp.75-83
    • /
    • 2015
  • Purpose - This study aims to identify the effects of communication cues, anonymity, and social presence on group polarization in computer-mediated communication (CMC) settings. Extant literature has introduced some theoretical backgrounds of social presence and SIDE (Social Identity model of Deindividuation Effects) to explain the effects of communication cues and anonymity. The concept of social presence emphasized the mediating role on communication cues and anonymity. However, most literature did not measure social presence and compare group polarization of all condition groups. This does not sufficiently explain the result of group polarization. Research design, data, and methodology - We believe that the direct impact of anonymity on group polarization can provide a more admissible and clearer explanation for the results. In addition, this study categorizes anonymity into two levels, as anonymity of group and anonymity of self. To justify the anonymity view, a laboratory experiment was conducted. The experiment was conducted in communication cues settings (visual cue; without visual cue) and anonymity settings (identified; anonymous). Each of the four settings has 10 groups consisting of five subjects each (total 200 subjects). The subjects are undergraduates from a large university, majoring in business. All experimental procedures and calculations of choice shift and preference change follow the literature. Results - First, the removal of visual cues does not produce a significant impact on group polarization, which cannot be explained by the social presence view. Second, the anonymous condition does not significantly affect group polarization, which also cannot be explained by the social presence view. However, the anonymous condition directly affects group polarization. Specifically, anonymity of self has a stronger effect on group polarization than anonymity of group. The result explains about the leading factor affecting group polarization. This study examines another view of how computer-mediated communication may be associated with group polarization. The process and outcome data from the experiment reveal that group polarization is not affected by level of social presence, but by level of anonymity. Group discussions conducted with visual cue CMC setting and identified CMC setting result in weaker group polarization. Conversely, group discussions conducted without visual cue CMC setting and anonymous CMC setting lead to stronger group polarization. The results of the study have the following implications. First, they provide clues for business organizations to design the most appropriate media conditions and preemptive social conditions to implement when making group decisions through CMC, to maximize achievements, generate amicable agreements, or actively share information. Second, this study can be useful in analyzing different adverse effects generated through Internet use. Conclusions - This research can help explain discussions and decision-making actions on Internet forums, which have recently increased, as well as providing a foundational basis in newly establishing policies for the forums. Finally, it should be noted that many other factors such as group size, topics, and group history may affect group polarization. These should be examined in future studies.

Personification of On-line Shopping Mall -Focusing on the Social Presence- (온라인 쇼핑몰의 의인화 전략 -사회적 실재감을 중심으로-)

  • Park, Ju-Sik
    • Management & Information Systems Review
    • /
    • v.31 no.2
    • /
    • pp.143-172
    • /
    • 2012
  • While e-commerce market(B2C) grows rapidly, many experts argue that EC(B2C) transactions have not reached its full potential. A notable difference between online and offline consumer markets that is suppressing the growth of EC(B2C) is the decreased presence of human and social elements in the online shopping environments. Generally online shopping lacks human warmth and sociability. In this study, social presence in online shopping mall was proposed as a substitute for face-to-face social interaction in the traditional commerce and author explored what variables affect social presence(human warmth and sociability) on online shopping malls and how human warmth and sociability can influence on online store loyalty. To achieve research objectives, we reviewed literatures related with marketing, psychology and communication research areas. Based on literature review, we proposed a research model on the online shopping mall. To examine the proposed research model, we gathered data by using a self-report questionnaire. Respondents consists of online shoppers with at least five or more times of purchase experience in online shopping malls. Because social presence is a feeling which needs frequent contacts with malls to experience, respondents must have enough purchase experiences. The empirical results are as follows : First, shopping mall's customization efforts influence perceived social presence on the mall significantly. Second, shopping mall's responsiveness influences perceived social presence significantly. Third, perceived activity of community of online shopping mall influences perceived social presence significantly. Mall managers have to activate their customer community to reinforce social presence, resulting in trust building. Finally, perceived social presence influences trust and enjoyment on the mall significantly. And then trust and enjoyment on the mall affect store loyalty significantly. From these findings it can be inferred that perceived social presence appears determinant which is critical to the formation of core variables(trust and loyalty) in existing online shopping papers.

  • PDF