• Title/Summary/Keyword: Online privacy

Search Result 219, Processing Time 0.026 seconds

Relationship-based Dynamic Access Control Model with Choosable Encryption for Social Network Service (소셜 네트워크 서비스를 위한 선별적 암호화 기능을 제공하는 관계 기반 동적 접근제어 모델)

  • Kwon, Keun;Jung, Youngman;Jung, Jaewook;Choi, Younsung;Jeon, Woongryul;Won, Dongho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.24 no.1
    • /
    • pp.59-74
    • /
    • 2014
  • The social network service is a online service letting users express the personality and enhancing the human network. However, these features result in side effects which diffuse personal information and make users access to treacherous information. Therefore, various access control models have been proposed. However, the access control mechanisms which encrypt data are only able to be applied for controlling access from direct node, and the access control mechanisms without data encryption allow service provider to access all the information. Moreover, both mechanisms do not consider dynamic changes in reliability of the users. In this paper, we propose relationship-based dynamic access control model including encryption of sensitive data, which consider the characteristics of SNS and improves the security of SNS.

Impacts of Information Source and E-service Quality on Mobile Shopping Behavior in KakaoTalk

  • Yi, Kyong-Hwa;Jeon, Sua;Kim, HaeJung Maria;Forney, Judith
    • Journal of Fashion Business
    • /
    • v.20 no.6
    • /
    • pp.32-51
    • /
    • 2016
  • KakaoTalk has become a reputed mobile social network and an inseparable part of people's lives by leading the mobile industry in South Korea. However, there is a lack of studies in academia regarding perception of the consumers and assessment toward the mobile marketing and services by KakaoTalk. Based on the theoretical orientation of Elaboration Likelihood Model (ELM: Petty & Cacioppo, 1986) and electronic service quality (E-S-QUAL: Parasuraman, Zeithaml, & Malhotra, 2005), this study investigates the effects of information sources (Charles & Richard, 1988), and examines the consumer perception toward the service quality of KakaoTalk. A total of 209 responses were collected, using a self-administered survey in Seoul and Gyeonggi province, South Korea from March 2015 to June 2015. A seven-point Likert scale survey was developed to measure the information sources (i.e., argument quality, post popularity, and post attractiveness), electronic service quality (i.e., efficiency, fulfillment, privacy, and system availability), attitude (i.e., usefulness, preference, and overall attitude), and behavioral intention (i.e., like intention, share intention, and purchase intention). This study reveals a consensus that an online environment is different from the traditional retail context in terms of information source and service quality. Specifically, the results indicate that argument quality greatly impacts the attitudes of the individuals and their behavioral intention toward mobile shopping via social media channel. The most powerful factor among E-S-QUAL is "efficiency." This dimension of service quality influences the customer perception of usefulness and preference as well as share and like intention toward mobile shopping on KakaoTalk.

SNS disclosure of personal information in M2M environment threats and countermeasures (M2M 환경에서의 SNS 개인정보 유출 위협 및 대응방안)

  • Go, Jun-Young;Lee, Keun-Ho
    • Journal of the Korea Convergence Society
    • /
    • v.5 no.1
    • /
    • pp.29-34
    • /
    • 2014
  • It appeared with the development of IT skills to help the social network SNS(Social Network Service) on the online form. Many people around the world and in the business environment changes is the emergence of social networks are bringing. And the rapid development of the idea, but are insignificant for the security threats that are used by many people in many companies, and social network services. In addition, although it is true that this connection is increased from the number of mobile machines to the development of M2M, that is not recognized for that vulnerability. To evaluate and identify vulnerabilities against security threats and countermeasures for the SNS access the social network on the M2M After looking for privacy and in the present.

Technical Architecture for Implementation and Adoption of Database Encryption Solution (데이터베이스 암호화 솔루션 구현 및 도입을 위한 기술적 아키텍처)

  • Lee, Byoung-Yup;Lim, Jongtae;Yoo, Jaesoo
    • The Journal of the Korea Contents Association
    • /
    • v.14 no.6
    • /
    • pp.1-10
    • /
    • 2014
  • Through the development of internet mobile devices and online business activation, sensitive data of unspecified user is being easily exposed. In such an open business environment, the outflow of sensitive personal information has often been remarked on recently for which adoption of encryption solution for database became top priority in terms of importance. In 2011, government also legislated for the protection of personal information as an information network law, and is now applying the law to a variety of industries. Firms began to comply with these regulations by establishing various measures for protection of personal information and are now quickly introducing encryption solution to reinforce security of personal information they are managing. In this paper, I present architecture and technological parts that should be considered when introducing security solution.

Suitability of Alternative Dispute Resolution for the Fashion Industry - Focused on Arbitration for the Fashion Industry - (패션산업의 대체적 분쟁해결제도 적합성 - 패션산업의 중재 제도 도입을 중심으로 -)

  • Lee, Jae-Kyoung
    • Journal of Arbitration Studies
    • /
    • v.25 no.1
    • /
    • pp.87-105
    • /
    • 2015
  • Intellectual property law is slowly fighting to keep pace with the rapid growth of the fashion industry. Copyright and patent law have proven only minimally effective in fashion, even in the US and other top fashion nations, forcing designers and fashion companies to rely on their trademarks to protect their work. Litigating trademark disputes in the fashion industry presents a host of problems as witnessed in a recent Christian Louboutin case, leading the parties to resort to Alternative Dispute Resolution(ADR) and Online Dispute Resolution(ODR). ADR methods, especially arbitration, are increasingly emerging as substitutes to litigation. Using these methods, the fashion industry (CFDA in the US case) should sincerely consider a self-regulating program in which its members, both fashion designers and corporations alike, can resolve disputes in a manner mutually beneficial to all parties in order to preserve the industry's growth, solidarity, and esteem In particular, for the US fashion industry, the ongoing Innovative Design Protection and Privacy Prevention Act(IDPPPA) anti-counterfeit legislation could have caused a chilling effect against innovation. New designers with no name and less resources who could normally flourish producing inspired-by designs may find themselves subject to copyright infringement legislation since the IDPPPA may expand the protection of established designers and brands with more resources. This fear and its implication could be solved by the fashion industry itself since fashion experts know best how to handle these fast-paced issues arising in the field. Therefore, stakeholders in the fashion industry should commit to protecting innovation within fashion on a long-term basis by establishing a panel handling an ADR process. This can mitigate the uncertainty created by the IDPPPA or any other legislation from elsewhere, which could result in a shying away from experimentation with inspired-by designs.

A Study on Security Consideration and Utilization of Domestic Encryption Algorithm for Developing Secure Smartphone Applications (안전한 스마트폰 애플리케이션 개발을 위한 보안 고려사항 및 국산암호알고리즘 적용 방안 연구)

  • Kim, Jee Yeon;Jeon, Woong Ryul;Lee, Young Sook;Kim, Mi Joo;Jung, Hyun Chul;Won, Dong Ho
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.7 no.1
    • /
    • pp.51-61
    • /
    • 2011
  • A smartphone is a mobile phone that offers more advanced computing ability and connectivity than a contemporary basic feature phone. Unlike feature phone, a smartphone allows the user to install and run more advanced applications based on a specific platform. Smartphones run complete operating system software providing a platform for application developers. A smartphone will become the default computing method for many point activities in the not-too-distant future, such as e-mail, online shopping, gaming, and even video entertainment. For smartphone that contains sensitive information and access the Internet, security is a major issue. In the 1980s, security issues were hardly noticed; however, security is a major issue for users today, which includes smart phones. Because security is much more difficult to address once deployment and implementation are underway, it should be considered from the beginning. Recently our government recognized the importance of smartphone security and published several safety tips for using the smartphone. However, theses tips are user-oriented measures. Maintaining the security of a smartphone involves the active participation of the user. Although it is a important users understand and take full advantage of the facilities afforded by smarphone, it is more important developers distribute the secure smartphone application through the market. In this paper we describe some scenarios in which user is invaded his/her privacy by smartphone stolen, lost, misplaced or infected with virus. Then we suggest the security considerations for securing smartphone applications in respect with developers. We also suggest the methods applying domestic encryption algorithms such as SEED, HIGHT and ARIA in developing secure applications. This suggested security considerations may be used by developers as well as users (especially organizations) interested in enhancing security to related security incidents for current and future use of smartphones.

An analysis of consumption behavior and consumption problem according to the digital convergence (디지털 융복합에 따른 소비행동과 소비문제)

  • Kim, Yeon-Jeong
    • Journal of Digital Convergence
    • /
    • v.14 no.2
    • /
    • pp.149-156
    • /
    • 2016
  • The purpose of this study is to estimate convergence level of digital device and service and analyze group difference of consumption behavior and problem according to digital convergence level. The research method was survey with digital business expert and 343 samples. ANOVA research method was applied. The results of research are as follows. First, the study suggests that with a self-directed consuming attitude associated with both online and offline, there are the possibility to spread social problem which has unclear boundary, the possibility of intrusion into privacy through the network flow, and the matter of the credibility of information in convergence media. Second, since digital devices are important to connect consumers to the network, consumers have anxious dependence on the devices, which causes the fatigue of information to increase rapidly.

A Study on Application of Internet-based Personal Health Record(PHR) System: Using Google Health (인터넷기반의 개인전자건강기록 시스템 적용사례 연구: 구글헬스를 중심으로)

  • Jeong, Seong-Hee
    • Journal of Digital Contents Society
    • /
    • v.10 no.3
    • /
    • pp.433-439
    • /
    • 2009
  • With the help of fast growing popularization of internet, all areas of e-Health have expanded rapidly; such that people have become interested in digital personal health record and its management. This paper examined the characteristics of personal health record and made the analysis of the structure of Google Health, the internet-based personal health record system. Google Health allows you to store and manage all of your health information, import medical records from hospitals and pharmacies, share your health records, and explore online health services. This examples represents not only a significant change of current medical systems but also enables to estimate the future stream of it. As a result, this paper, in the areas of e-Health which will be expanded in various service areas, may give you a greater sense of importance of personal health record and will eventually provide more complemental structure of future personal health record through comparative studies on the strength and weakness of it.

  • PDF

The Growth of Mobile Advertising and the Future of the Advertising Industry (모바일광고의 성장과 광고산업의 미래)

  • Lee, Chi-Hyung
    • Journal of Digital Convergence
    • /
    • v.14 no.8
    • /
    • pp.203-209
    • /
    • 2016
  • The advertising media is undergoing a dramatic change mainly due to the increased use of smartphone. This study predicts the future of the advertising industry driven by the mobile advertising using scenario planning. Targeting technologies, restriction on the use of personal information, and overcoming ad avoidance were selected as key uncertain variables expected to impact on the growth of the mobile advertising 5 years later. With the support by expert interviews, the $2{\times}2$ matric combines two cases to generate four scenarios; the one whether mobile ads surpass PC-based online ads, the other whether the combined force of mobile and PC-based ads surpass the traditional media in advertising spendings. Each scenario is articulated according to the future of key variables. The most likely scenario is that mobile will dominate the advertising media market. However, it is important not to ignore different scenarios because key variables evolves in unexpected manner and then they can become reality. The future research will combine its key variables with social and economic ones and segment technical variables in more details.

Examination of Factors Influencing the Attitude toward SNS-based Advertising and the Roles of Involvement: Focusing on Facebook News Feed Advertising (SNS 광고 태도에 영향을 주는 요인들과 관여도의 역할에 대한 고찰: 페이스북 뉴스피드 광고를 중심으로)

  • Lee, Sungjoon
    • The Journal of the Korea Contents Association
    • /
    • v.14 no.9
    • /
    • pp.188-202
    • /
    • 2014
  • This major purpose of this study is to examine factors influencing the attitude toward News Feed advertising in Facebook. For this purpose, this study posited seven determinants including informativeness, entertainment, irritation, trust, individualization, incentive and privacy concern, which can have influences on the attitude toward News Feed Advertising. and this research tests the relationships between these seven determinants and the attitude toward News Feed Advertising. An online survey was administrated to collect data and hierarchical regression analyses were employed for data analysis. The results showed that infortainment as a new combined factor of informativeness and entertainment, trust, individualization have significantly positive influences on the attitude toward News Feed advertising in Facebook. It was also shown that the moderating effect of involvement on the relationship between irritation and the attitude. The results in this study implied that it is needed to reinforce the attributes of advertising including infortainment, trust and individualization to boost the effects of News Feed advertising in Facebook on consumers.