• Title/Summary/Keyword: Online Security

Search Result 664, Processing Time 0.022 seconds

A Study on the Factors of Online Information Security Behavior Failure: Focused on the Elderly (중·노년층의 온라인 개인정보보호 행동에 영향을 미치는 요인에 관한 연구; 한국과 중국 인터넷 사용자를 중심으로)

  • TIAN, YANG;Park, Minjung;Chai, Sangmi
    • The Journal of Information Systems
    • /
    • v.29 no.1
    • /
    • pp.51-74
    • /
    • 2020
  • Purpose Since the number of personal information breach incidents increased, many people have perceived the importance of personal information protection, in the recent. Especially, the number of personal information breach targeting middle-aged and elderly people rapidly increases. Therefore, the purpose of this study is to identify the factors which influence to fail of online information security behaviors among the elderly. Design/methodology/approach This study made a research model by adopting the factors deducted from the protection motivation theory. To analyze the research model, we conducted an online survey targeted on the elderly and middle ages users who have nations of Korean and Chinese respectively. Findings According to the empirical analysis result, we identified that only perceived severity and perceived vulnerability affected information security awareness. On contrast, it was also discovered that perceived barriers, self-efficacy, and response efficacy did not affect information security awareness. Additionally, the awareness of information security also did not affect information security behaviors. Middle-aged and elderly people with personal information protection education did more information security behaviors than people those who no education experiences. Korean middle-aged and elderly people with education significantly did more information protection behaviors than the people without the education.

A study on the identity theft detection model in MMORPGs (MMORPG 게임 내 계정도용 탐지 모델에 관한 연구)

  • Kim, Hana;Kwak, Byung Il;Kim, Huy Kang
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.3
    • /
    • pp.627-637
    • /
    • 2015
  • As game item trading becomes more popular with the rapid growth of online game market, the market for trading game items by cash has increased up to KRW 1.6 trillion. Thanks to this active market, it has been easy to turn these items and game money into real money. As a result, some malicious users have often attempted to steal other players' rare and valuable game items by using their account. Therefore, this study proposes a detection model through analysis on these account thieves' behavior in the Massive Multiuser Online Role Playing Game(MMORPG). In case of online game identity theft, the thieves engage in economic activities only with a goal of stealing game items and game money. In this pattern are found particular sequences such as item production, item sales and acquisition of game money. Based on this pattern, this study proposes a detection model. This detection model-based classification revealed 86 percent of accuracy. In addition, trading patterns when online game identity was stolen were analyzed in this study.

Online Game Identity Theft Detection Model based on Hacker's Behavior Analysis (온라인게임 계정도용 탐지모델에 관한 연구)

  • Choi, Hwa-Jae;Woo, Ji-Young;Kim, Huy-Kang
    • Journal of Korea Game Society
    • /
    • v.11 no.6
    • /
    • pp.81-93
    • /
    • 2011
  • Identity theft happens frequently in popular MMORPG(Massively Multi-player Online Role Playing Games) where profits can be gained easily. In spite of the importance of security about identity theft in MMORPG, few methods to prevent and detect identity theft in online games have been proposed. In this study, we investigate real identity theft cases of an online game and define the representative patterns of identity theft as the speedy type, cautious type, and bold type. We then propose the automatic identity theft detection model based on the multi-class classification. We verify the system with one of the leading online games in Korea. The multi-class detection model outperforms the existing binary-class one(hacked or not).

The Influence of Security and Risk Perception on the Reuse of Internet Banking (보안과 위험의 지각이 인터넷 뱅킹 재사용 의도에 미치는 영향)

  • Lee, Woong-Kyu
    • Asia pacific journal of information systems
    • /
    • v.17 no.1
    • /
    • pp.77-93
    • /
    • 2007
  • Risk has been considered as one of very important topics in traditional consumer behavior theoretically and practically since its tendency of minimizing errors rather than maximizing utilization in addition to its intuitive appealing with very high explaining power. In addition to a traditional view of risk, importance of risk in online transactions such as Internet banking is due to technical instability in security of the Internet as well as temporal and spatial separation of transaction partners. Therefore, risk in online transactions should be analyzed by a very comprehensive way since it is very inherent in the Internet. The objective of this study is to suggest a research model for explaining the use of online transactions in some risk related variables including risk results, security result, perceived security, and social influence and show its validity by applying it to Internet banking users. In result, hypotheses suggested by our research model are shown to be valid ones.

The Current State of Cyber-Readiness of Saudi Arabia

  • Alhalafi, Nawaf;Veeraraghavan, Prakash
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.6
    • /
    • pp.256-274
    • /
    • 2022
  • The continuous information technology and telecommunication (ICT) developments inspire several Saudi Arabia citizens to transact and interact online. However, when using online platforms, several people are likely to lose their personal information to cybercriminals. In the survey, 553 Saudi Arabia citizens and 103 information technology (IT) specialists confirm the expansion of digital economy and the need for smart cities with various services, including e-commerce and solid cyber security. 96.6% of the participants believe Saudi Arabia is digitalizing its economy; yet, 33.3% of the participants believe that residents are uninformed about living and operating in smart cities. Several people (47.29%) with medium internet speed are more aware about smart cities than those with fastest internet speed (34%). Besides, online transactions via credit cards subjected 55.5% of the participants to privacy and security issues. These findings validate the essence of cyber security awareness programs among Saudi Arabia citizens and IT professionals to boost public trust and acceptance of cybersecurity frameworks.

S.O.S : Shield of Steam Protection Based on API Call Birthmark in Online Game ESD DRM (S.O.S : Shield of Steam API 콜 버스마크 기반의 온라인 게임 ESD DRM 보호)

  • Oh, Dong Bin;Kim, Huy Kang
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.6
    • /
    • pp.1297-1307
    • /
    • 2018
  • The rise of Online game ESD(Electronic Software Distribution) like Steam, the method of game piracy are more diversified. In Online Game ESD, Software DRM is applied to game because we have to play in offline situation, but it is easily bypassed due to low security level. In this study, we analyze crack files of pirated games to learn how to bypass Steam DRM and to establish countermeasures for based on API call birthmark. The generated birthmark showed more than 85% resilience in representing crack groups and 95% credibility in detecting cracked games. With this study, it is possible to enhance the security of the online game Electronic Software Distribution platform, and to provide a high level of game piracy protection for indie game developers, especially those who can not purchase Third Party DRM to protect their own games.

Online Users' Password Security Behavior : The Effects of Fear Appeals and Message Framing, and Mechanism of Password Security Behavior (온라인 사용자의 비밀번호 보호행위 : 공포 소구와 메시지 프레이밍 효과, 그리고 비밀번호 보호행위의 동기요인)

  • Park, Jaeyoung;Kim, Jeondo;Kim, Beomsoo
    • Journal of Information Technology Services
    • /
    • v.16 no.3
    • /
    • pp.147-165
    • /
    • 2017
  • Recently, there have been numerous issues about password breaches and it is becoming important for the users to manage their passwords. In practice, the online service provider are asking the online users to change their passwords periodically. However, majority of the users are not changing their passwords regularly, and this can increase the risk of password breach. The purpose of this study is to investigate whether 'fear appeals' and 'message framing' enhance the behavior of changing passwords by the online users. Furthermore, we identify the mechanism on how the behavior of changing passwords is enabled using protection motivation theory. The results of an online experiment show that the online users who are exposed to 'fear appeals' perceived a more vulnerability and severity of password breaches, which in turn, increased the intention of changing their password. In addition, we found that perceived severity of password breaches affect fear positively. Moreover, we found that fear has significant impact on the willingness of changing passwords. Finally, Message framing plays a moderating role between fear and change intentions. That is, in a situation where 'fear appeal' is presented, it means that 'gain framing' is more effective than 'loss framing' These findings suggest that the online service providers may need to use 'fear appeals' to the online users. Security managers can address issues related to the password breaches by carefully designing 'fear appeals'.

Shopper′s Attitude toward Online Stores: Effects on Store Satisfaction and Store Loyalty (온라인 쇼핑객의 점포태도가 점포만폭도와 점포층성도에 미치는 영향)

  • 이영주;박경애
    • Journal of the Korean Home Economics Association
    • /
    • v.40 no.5
    • /
    • pp.53-62
    • /
    • 2002
  • The purposes of this study were to examine: 1)the dimensions of online store attitude; 2)the differences in the online store attitude by product category and store type; and 3)the effects of online store attitude on store satisfaction and store loyalty. Data were obtained from an online questionnaire survey to 850 online shoppers who were randomly selected from the panel of an online survey agency, and 615 responses were analyzed. Factor analysis extracted 5 dimensions of store attitude including: process and security; service; promotion and presentation; price and quality; and merchandise. MANOVA revealed a significant difference in the price and quality factor by product category and store type. Multiple regression showed that the effects of price and quality, service, and process and security on store satisfaction were significant. Also, price and quality had a significant direct effect on store loyalty which was also affected by store satisfaction.

A Study on Copyright Infringement over Online Streaming Services by Reconstructing Web Cache (웹 브라우저 캐시 재조립을 통한 온라인 스트리밍 서비스 상의 저작권 침해 가능성에 관한 연구)

  • Lim, Yirang;Chung, Hyunji;Lee, Sangjin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.4
    • /
    • pp.559-572
    • /
    • 2020
  • As internet technology advances, users can share content online, and many sharing services exist. According to a recently published digital forensic study, when playing an online streaming service, you can restore the played video by reconstructing the Chrome cache file left on local device such as a PC. This can be seen as evidence that the user watched illegal video content. From a different point of view, copyright infringement occurs when a malicious user restores video stream and share it to another site. In this paper, we selected 23 online streaming services that are widely used both at home and abroad. After streaming videos, we tested whether we can recover original video using cache files stored on the PC or not. As a result, the paper found that in most sites we can restore the original video by reconstructing cache files. Furthermore, this study also discussed methodologies for preventing copyright infringement in online streaming service.

Security Analysis on Commercial Online Music Streaming Service and Countermeasures (국내 포털사이트 음원서비스 취약점분석 및 대응방안 제안)

  • Lee, Sang-Sik;Choi, Dong-Hyun;Won, Dong-Ho;Kim, Seung-Joo
    • The KIPS Transactions:PartC
    • /
    • v.16C no.6
    • /
    • pp.681-690
    • /
    • 2009
  • Nowadays, the music industry is moving from analog to digital. Most of the big portal sites provide commercial online music streaming services according to the tendency. In this paper, we analyze the security of the Korean commercial online music streaming services which are provide by the Korea's major portal sites(Dosirak, Cyworld, and Naver). Moreover, we show attacks on commercial online music streaming services that lead to an infringement of copyright and propose technical countermeasures for online commercial music streaming services, the contributions of the present work are that the measures protect the copyright of the music.