• Title/Summary/Keyword: Online protection

Search Result 251, Processing Time 0.023 seconds

A Study on the Privacy Policy of Behavioral Advertising (행태 광고의 개인정보 조치사항에 관한 연구)

  • Kong, Hee-Kyung;Jun, Hyo-Jung;Yoon, Seokung
    • Journal of the Korea Convergence Society
    • /
    • v.9 no.3
    • /
    • pp.231-240
    • /
    • 2018
  • Recently, personal information processing are becoming more important in the behavioral advertising based on online and mobile platform. The behavioral advertising analyzes and utilizes individual's search & purchase history, hobbies, and tendency based on the personal behavior information collected using the automatic collection device. Therefore, it collects and stores other types of personal information which did't defined in Privacy Act and can analyze personal behavior. This characteristics may cause disclosure of personal information and exposure to intrusion. In this paper, we investigate and analyze the privacy policy of the advertising agencies, and discussded the measures to be taken in collecting, storing and using personal information suitable for behavior information.

Legal Study and Legislative Suggestions about Donation by Minors on Live Streaming Platforms - Focusing on protection of the counterparty - (인터넷 개인방송 플랫폼상 미성년자 후원행위에 대한 법적 고찰 및 입법론적 개선방안 - 미성년자의 상대방 보호 필요성을 중심으로 -)

  • Kil, Gi-Beom;Kim, Chang-Hyeon;Lee, Min-Jae;Yoo, Ha-Yeon
    • The Journal of the Korea Contents Association
    • /
    • v.22 no.1
    • /
    • pp.292-309
    • /
    • 2022
  • Recently, with the development of interactive communication system, demands for video live streaming service has increased. Live streamers generate revenues from donations, but existing laws are inadequate to handle these donations. Problems arise when minors donate because they have the right of revocation. In the case of donations that request benefits in return, legal characteristics and results are different from unilateral donations. If minors exercise their right of revocation, live streamers must pay back without getting proper compensation for their services. In this paper, we detect the characteristics of bilateral contract in live streaming donation, indicate the harms that live streamers can get, examine precedents and donation processes focusing on cases when minors can not exercise the right of revocation due to deception, and propose revisions that can protect the streamers without invading minors' rights. Through academically identifying ambiguous legal situations and presenting dispute prevention procedures, this paper can bring positive impacts on the online industry.

Effective Strategies for Activating IT Ethics Education: A Study on Improving Internet Ethical Education for University Students (효과적인 IT윤리 교육 활성화 방안 : 대학생들의 인터넷 윤리적 교육 개선에 대한 연구)

  • Seung-Young Jang
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.19 no.1
    • /
    • pp.197-208
    • /
    • 2024
  • In today's era, where internet technology and culture are advancing rapidly, the importance of systematic internet ethics education has been underscored to address the insufficient levels of internet ethics among college students. This research primarily focused on assessing the level of internet ethics among college students, who represent a significant proportion of internet users. The innovative Flip Learning teaching method and the introduction of the Wheeler Model, along with the application of frequency measurement theory, allowed us to explore ways to maximize the effectiveness of the education. It was confirmed that students who received internet ethics education demonstrated improved levels of ethics. This study concluded that significant progress has been made in systematizing and effectively promoting internet ethics education. It also proposed the need for systematic ethics education and provided future directions for improving internet ethics education.

A study on Development Plans for Korea's Arbitration for Intellectual Property Right (IPR) disputes (지식재산권(IPR) 분쟁에 대한 우리나라 중재 발전방안에 관한 연구)

  • Su Hyun Song;Un Jeon;Keon-Hyung Ahn
    • Journal of Arbitration Studies
    • /
    • v.34 no.1
    • /
    • pp.51-74
    • /
    • 2024
  • Korea continues to invest in the IT industry and is currently regarded as one of the five major powerhouses in the field of intellectual property. However, it is evaluated that this status is only limited, and the level of intellectual property protection and dispute resolution does not reach a level commensurate with the status of one of the five major intellectual property powers. To address these problems, the Korean government has enacted the Arbitration Industry Promotion Act in 2017, which aims to strengthen national competitiveness by fostering the arbitration system as an industry and provide systematic support so that the arbitration industry can become a future growth engine. In addition, in accordance with Article 3 of the 「Arbitration Industry Promotion Act」, the Minister of Justice must establish "the Basic Plan for Arbitration Industry Promotion" every 5 years. Great efforts must be put into establishing an Online Dispute Resolution (ODR) system at the KCAB for five years from 2024 to 2028, the Second Basic Plan for the Promotion of the Arbitration Industry period. Under these circumstances, this study presents implications and improvement measures for the development of the intellectual property-related arbitration system to protect Korea's intellectual property rights and contribute to more active intellectual property creation. In particular, this study proposes a plan to build an one-stop digital platform for KCAB to implement an efficient ODR system.

The Role of Control Transparency and Outcome Feedback on Security Protection in Online Banking (계좌 이용 과정과 결과의 투명성이 온라인 뱅킹 이용자의 보안 인식에 미치는 영향)

  • Lee, Un-Kon;Choi, Ji Eun;Lee, Ho Geun
    • Information Systems Review
    • /
    • v.14 no.3
    • /
    • pp.75-97
    • /
    • 2012
  • Fostering trusting belief in financial transactions is a challenging task in Internet banking services. Authenticated Certificate had been regarded as an effective method to guarantee the trusting belief for online transactions. However, previous research claimed that this method has some loopholes for such abusers as hackers, who intend to attack the financial accounts of innocent transactors in Internet. Two types of methods have been suggested as alternatives for securing user identification and activity in online financial services. Control transparency uses information over the transaction process to verify and to control the transactions. Outcome feedback, which refers to the specific information about exchange outcomes, provides information over final transaction results. By using these two methods, financial service providers can send signals to involved parties about the robustness of their security mechanisms. These two methods-control transparency and outcome feedback-have been widely used in the IS field to enhance the quality of IS services. In this research, we intend to verify that these two methods can also be used to reduce risks and to increase the security protections in online banking services. The purpose of this paper is to empirically test the effects of the control transparency and the outcome feedback on the risk perceptions in Internet banking services. Our assumption is that these two methods-control transparency and outcome feedback-can reduce perceived risks involved with online financial transactions, while increasing perceived trust over financial service providers. These changes in user attitudes can increase the level of user satisfactions, which may lead to the increased user loyalty as well as users' willingness to pay for the financial transactions. Previous research in IS suggested that the increased level of transparency on the process and the result of transactions can enhance the information quality and decision quality of IS users. Transparency helps IS users to acquire the information needed to control the transaction counterpart and thus to complete transaction successfully. It is also argued that transparency can reduce the perceived transaction risks in IS usage. Many IS researchers also argued that the trust can be generated by the institutional mechanisms. Trusting belief refers to the truster's belief for the trustee to have attributes for being beneficial to the truster. Institution-based trust plays an important role to enhance the probability of achieving a successful outcome. When a transactor regards the conditions crucial for the transaction success, he or she considers the condition providers as trustful, and thus eventually trust the others involved with such condition providers. In this process, transparency helps the transactor complete the transaction successfully. Through the investigation of these studies, we expect that the control transparency and outcome feedback can reduce the risk perception on transaction and enhance the trust with the service provider. Based on a theoretical framework of transparency and institution-based trust, we propose and test a research model by evaluating research hypotheses. We have conducted a laboratory experiment in order to validate our research model. Since the transparency artifact(control transparency and outcome feedback) is not yet adopted in online banking services, the general survey method could not be employed to verify our research model. We collected data from 138 experiment subjects who had experiences with online banking services. PLS is used to analyze the experiment data. The measurement model confirms that our data set has appropriate convergent and discriminant validity. The results of testing the structural model indicate that control transparency significantly enhances the trust and significantly reduces the risk perception of online banking users. The result also suggested that the outcome feedback significantly enhances the trust of users. We have found that the reduced risk and the increased trust level significantly improve the level of service satisfaction. The increased satisfaction finally leads to the increased loyalty and willingness to pay for the financial services.

  • PDF

Technical Architecture for Implementation and Adoption of Database Encryption Solution (데이터베이스 암호화 솔루션 구현 및 도입을 위한 기술적 아키텍처)

  • Lee, Byoung-Yup;Lim, Jongtae;Yoo, Jaesoo
    • The Journal of the Korea Contents Association
    • /
    • v.14 no.6
    • /
    • pp.1-10
    • /
    • 2014
  • Through the development of internet mobile devices and online business activation, sensitive data of unspecified user is being easily exposed. In such an open business environment, the outflow of sensitive personal information has often been remarked on recently for which adoption of encryption solution for database became top priority in terms of importance. In 2011, government also legislated for the protection of personal information as an information network law, and is now applying the law to a variety of industries. Firms began to comply with these regulations by establishing various measures for protection of personal information and are now quickly introducing encryption solution to reinforce security of personal information they are managing. In this paper, I present architecture and technological parts that should be considered when introducing security solution.

Current status of E-commerce market in China and implication (중국 전자상거래 시장의 최근동향 및 시사점)

  • Baek, Young-Mi
    • Journal of Digital Convergence
    • /
    • v.13 no.1
    • /
    • pp.111-124
    • /
    • 2015
  • The economic growth in China takes the step of the Internet/Mobile revolution together. The high internet penetration provided the opportunity to increase the e-commerce market with fast speed. However, due to imbalance of the growth speed and preparation, the problems on various infrastructures and regulations were generated. Therefore, this study investigateed the current status of e-commerce market and sub-categories. This study also discussed about the problem of e-commerce logistics system, consumer protection, R&D investment, and human resources and provided the considerations for the future improvement. Finally, this study diagnosed the mobile payment and internet finance market and new e-commerce tax regulation, and then suggested institutional implications for the international standardization. This study is meaningful to provide the first implication to the Korean exporters after Chinese government had announced market open strategy for the 5 year e-commerce development plan.

Intent to Use a Smartphone Application for Radiation Monitoring in Correlation with Anxiety about Exposure to Radiation, Recognition of Risks, and Attitudes toward the Use of Radiation

  • Han, Eunkyoung;Rott, Carsten;Hong, Seung-Woo
    • Journal of Radiation Protection and Research
    • /
    • v.42 no.4
    • /
    • pp.205-211
    • /
    • 2017
  • Background: Radiation is used in a variety of areas, but it also poses potential risks. Although radiation is often used with great effectiveness in many applications, people perceive potential risks associated with radiation and feel anxious about the possibility of radiation exposure. Various methods of measuring radiation doses have been developed, but there is no way for the general public to measure their doses with ease. Currently, many people use smartphones, which provide information about the location of an individual phone through network connections. If a smartphone application could be developed for measuring radiation dosage, it would be a very effective way to measure individuals' radiation doses. Thus, we conducted a survey study to assess the social acceptance of such a technology by the general public and their intent to use that technology to measure radiation doses, as well as to investigate whether such an intention is correlated with anxiety and attitudes toward the use of radiation. Materials and Methods: A nationwide online survey was conducted among 355 Koreans who were 20 years old or older. Results and Discussion: Significant differences were found between the genders in attitudes, perceptions of radiation risk, and fears of exposure to radiation. However, a significant difference according to age was observed only in the intent to use a smartphone dose measurement application. Attitudes towards the use of radiation exerted a negative effect on radiation risk perception and exposure anxiety, whereas attitudes towards the use of radiation, risk perception, and anxiety about exposure were found to have a positive impact on the intent to use a smartphone application for dose measurements. Conclusion: A survey-based study was conducted to investigate how the general public perceives radiation and to examine the acceptability of a smartphone application as a personal dose monitoring device. If such an application is developed, it could be used not only to monitor an individual's dose, but also to contribute to radiation safety information infrastructure by mapping radiation in different areas, which could be utilized as a useful basis for radiation research.

Fraud Detection in E-Commerce

  • Alqethami, Sara;Almutanni, Badriah;AlGhamdi, Manal
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.6
    • /
    • pp.312-318
    • /
    • 2021
  • Lack of knowledge and digital skills is a threat to the information security of the state and society, so the formation and development of organizational culture of information security is extremely important to manage this threat. The purpose of the article is to assess the state of information security of the state and society. The research methodology is based on a quantitative statistical analysis of the information security culture according to the EU-27 2019. The theoretical basis of the study is the theory of defense motivation (PMT), which involves predicting the individual negative consequences of certain events and the desire to minimize them, which determines the motive for protection. The results show the passive behavior of EU citizens in ensuring information security, which is confirmed by the low level of participation in trainings for the development of digital skills and mastery of basic or above basic overall digital skills 56% of the EU population with a deviation of 16%. High risks to information security in the context of damage to information assets, including software and databases, have been identified. Passive behavior of the population also involves the use of standard identification procedures when using the Internet (login, password, SMS). At the same time, 69% of EU citizens are aware of methods of tracking Internet activity and access control capabilities (denial of permission to use personal data, access to geographical location, profile or content on social networking sites or shared online storage, site security checks). Phishing and illegal acquisition of personal data are the biggest threats to EU citizens. It have been identified problems related to information security: restrictions on the purchase of products, Internet banking, provision of personal information, communication, etc. The practical value of this research is the possibility of applying the results in the development of programs of education, training and public awareness of security issues.

A Study on the Quantitative Evaluation of Initial Coin Offering (ICO) Using Unstructured Data (비정형 데이터를 이용한 ICO(Initial Coin Offering) 정량적 평가 방법에 대한 연구)

  • Lee, Han Sol;Ahn, Sangho;Kang, Juyoung
    • Smart Media Journal
    • /
    • v.11 no.5
    • /
    • pp.63-74
    • /
    • 2022
  • Initial public offering (IPO) has a legal framework for investor protection, and because there are various quantitative evaluation factors, objective analysis is possible, and various studies have been conducted. In addition, crowdfunding also has several devices to prevent indiscriminate funding as the legal system for investor protection. On the other hand, the blockchain-based cryptocurrency white paper (ICO), which has recently been in the spotlight, has ambiguous legal means and standards to protect investors and lacks quantitative evaluation methods to evaluate ICOs objectively. Therefore, this study collects online-published ICO white papers to detect fraud in ICOs, performs ICO fraud predictions based on BERT, a text embedding technique, and compares them with existing Random Forest machine learning techniques, and shows the possibility on fraud detection. Finally, this study is expected to contribute to the study of ICO fraud detection based on quantitative methods by presenting the possibility of using a quantitative approach using unstructured data to identify frauds in ICOs.