• Title/Summary/Keyword: Personal Network Exposure

Search Result 28, Processing Time 0.023 seconds

A Study on a Prevention Method for Personal Information Exposure (개인정보 노출을 예방하는 방법에 관한 연구)

  • Lee, Ki-Sung;Ahn, Hyo-Beom;Lee, Su-Youn
    • Convergence Security Journal
    • /
    • v.12 no.1
    • /
    • pp.71-77
    • /
    • 2012
  • Along with the development of Internet services such as Social Network Service (SNS) and blog Service, the privacy is very important in these services. But personal data is not safety from exposure to internet service. If personal data is leak out, the privacy is disclosed to hacker or illegal person and the personal information can be used in a cyber crime as phishing attacks. Therefore, the model and method that protects to disclose privacy is requested in SNS and blog services. The model must evaluate degree of exposure to protect privacy and the method protects personal information from Internet services. This paper proposes a model to evaluate risk for privacy with property of personal data and exposure level of internet service such as bulletin board. Also, we show a method using degree of risk to evaluate with a proposed model at bulletin board.

Mere Exposure Effect on Travel Intention of Educated Young People in Asia: Results from a Cross-Country Survey

  • Yunjuan Luo;Sarah Prusoff LoCascio;Jantima Kheokao;Sung Kyum Cho;Ravindran Gopalan;Nutthapon Jitprapai;Dorien Kartikawangi;Nik Norma Nik Hasan;Rowena Capulong Reyes;Kanyika Shaw;Indeok Song;Nikko Visperas
    • Asian Journal for Public Opinion Research
    • /
    • v.12 no.2
    • /
    • pp.122-141
    • /
    • 2024
  • Drawing on mere exposure effect, we proposed that more exposure to a city, as measured by the number of channels of exposure, would increase familiarity, city image, and intention to visit that city. We conducted a survey of university students in seven Asian countries, asking them about a total of 14 cities, at least one from each of the surveyed countries. Exposure was found to be a significant antecedent and was most powerful when mediated by familiarity. Some types of exposure were stronger than others. Personal exposure, in the form of having visited a city or knowing someone who has, was the strongest type of exposure, with more than double the effect of media exposure. Social media, which is difficult to classify as either personal or media, was assessed separately and had a much smaller effect. The mere exposure effect exists whether the intention to visit a city is related to pleasure (tourism) or business.

A Coordinated Ciphertext Policy Attribute-based PHR Access Control with User Accountability

  • Lin, Guofeng;You, Lirong;Hu, Bing;Hong, Hanshu;Sun, Zhixin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.4
    • /
    • pp.1832-1853
    • /
    • 2018
  • The personal health record (PHR) system is a promising application that provides precise information and customized services for health care. To flexibly protect sensitive data, attribute-based encryption has been widely applied for PHR access control. However, escrow, exposure and abuse of private keys still hinder its practical application in the PHR system. In this paper, we propose a coordinated ciphertext policy attribute-based access control with user accountability (CCP-ABAC-UA) for the PHR system. Its coordinated mechanism not only effectively prevents the escrow and exposure of private keys but also accurately detects whether key abuse is taking place and identifies the traitor. We claim that CCP-ABAC-UA is a user-side lightweight scheme. Especially for PHR receivers, no bilinear pairing computation is needed to access health records, so the practical mobile PHR system can be realized. By introducing a novel provably secure construction, we prove that it is secure against selectively chosen plaintext attacks. The analysis indicates that CCP-ABAC-UA achieves better performance in terms of security and user-side computational efficiency for a PHR system.

A Study on Microblog Service Continuous Use Intention: Focusing on Influence (마이크로블로그 서비스의 지속사용의도에 관한 연구)

  • Kim, Gyung-Jun;Lee, Ho;Son, Soo-Min
    • The Journal of Information Systems
    • /
    • v.23 no.1
    • /
    • pp.73-91
    • /
    • 2014
  • Microblog is emerging as a new communication service because of its usefulness and real-time accessability. Recently, microblog services, such as twitter and me2day in Korea, are getting a great attention. Continuous use intention is critical to sustain the service. However, most recent studies are based on Technology Acceptance Model(TAM) and Expectation Confirmation Model(ECM). These models are only focused on individual factors and overlook social influence factors. Social influence has been indicated as a critical factor of technology adoption and diffusion in social context(Davis, 1989; Fulk et al., 1987). In this study, we explore factors related to social influence which effect on continuous use intention for 'me2day' that is one of the most famous microblog in Korea. The purpose of this study is to understand continuous use intention and examine the relationship among social influence factors, social presence, and continuous use intention. To understand the phenomenon of continuous use intention in microblog service, this study employed social influence theory and expanded it by adding personal network exposure and group norm as additional social influence factors. The results show that social identity, group norms, and social presence positively influences continuous use intention. Contrary to our expectation, personal network exposure does not influence on continuous use intention. Academically, this research can contribute to microblog research field through elucidating the relationship among social influence factors, social presence, and continuous use intention. Although there is not enough research which is considered social influence factors as major explanation for continuous use intention, this study can give novel point of view to understand continuous use intention of microblog. Practically, service providers could consider ways to encourage users to continually use microblog service by reinforcing social influence factors and social presence.

Research for improving vulnerability of unmanned aerial vehicles (무인항공기 보안 취약점 개선을 위한 연구)

  • Lee, Kyung-Hwan;Ryu, Gab-Sang
    • Smart Media Journal
    • /
    • v.7 no.3
    • /
    • pp.64-71
    • /
    • 2018
  • Utilization of unmanned aerial vehicles (UAVs) are rapidly expanding to various fields ranging from defense, industry, entertainment and personal hobbies. Due to the increased activities of unmanned airplanes, many security problems have emerged, including flight path errors to undesired destinations, secondary threats due to exposed securities caused by the capture of unmanned airplanes in hostile countries. In this paper, we find security vulnerabilities in UAVs such as GPS spoofing, hacking captured video information, malfunction due to signal attenuation through jamming, and exposure of personal information due to image shooting. In order to solve this problem, the stability of the unstructured data is secured by setting the encryption of the video shooting information section using the virtual private network (VPN) to prevent the GPS spoofing attack. In addition, data integrity was ensured by applying personal information encryption and masking techniques to minimize the secondary damage caused by exposure of the UAV and to secure safety. It is expected that it will contribute to the safe use and stimulation of industry in the application field of UAV currently growing.

Study on the Effect of Self-Disclosure Factor on Exposure Behavior of Social Network Service (자기노출 요인이 소셜 네트워크 서비스의 노출행동에 미치는 영향에 관한 연구)

  • Do Soon Kwon;Seong Jun Kim;Jung Eun Kim;Hye In Jeong;Ki Seok Lee
    • Information Systems Review
    • /
    • v.18 no.3
    • /
    • pp.209-233
    • /
    • 2016
  • Internet companies that utilize social network have increased in number. The introduction of diverse social media services facilitated innovative changes in e-business. Social network service (SNS), which is a domain of social media, is a web-based service designed to strengthen human relations in the Internet and build new social relations. The remarkable growth of social network services and the profit generation and perception of this service are the new growth engines of this digital age. Given this development, many global IT companies views SNS as the most powerful form of social media. Thus, they invest efforts to develop business models using SNS.2) This study verifies the impact of privacy exposure in SNS as a result of privacy invasion. This study examines the purpose of using the SNS and user's awareness of the significance of personal information, which are key factors that affect self-disclosure of personal information. This study utilizes theory of reasoned action (TRA) to provide a theoretical platform that describes the specific behavior and emotional response of individuals. This study presents a research model that considers negative attitude (negatude). In this model, self-disclosure in SNS is considered a TRA. TRA is a subjective norm, a behavioral intention, and a key variable of exposure behavior. A survey was conducted on college students at Y university in Seoul to empirically verify the research model. The students have experiences in using SNS. A total of 198 samples were collected. Path analysis was applied to analyze the relations of factors. The results of path analysis show the statistically insignificant impact of privacy invasion on negatude, subjective norm, behavioral intention, and exposure behavior. The impact of unrecognized privacy invasion was also considered insignificant. The impacts of intention to use SNS on negatude, subjective norm, behavioral intention, and exposure behavior was significant. A significant impact was also found for the significance of personal information on subjective norm, behavioral intention, and exposure behavior, whereas the impact on negatude was insignificant. The impact of subjective norm on behavioral intention was significant. Lastly, the impact of behavioral intention on exposure behavior was insignificant. These findings are significant because the study examined the process of self-disclosure by integrating psychological and social factors based on theoretical discussion.

Implementation of user authentication and access control system using x.509 v3 certificate in Home network system (홈 네트워크 시스템에서 x.509 v3 인증서를 이용한 사용자 인증 및 접근제어 시스템의 구현)

  • Lee, Kwang-Hyoung;Lee, Young-Gu
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.11 no.3
    • /
    • pp.920-925
    • /
    • 2010
  • A home network system is made up of home devices and wire and wireless network can not only be the subject of cyber attack from a variety factors of threatening, but also have security weakness in cases of hacking, vicious code, worm virus, DoS attack, tapping of communication network, and more. As a result, a variety of problems such as abuse of private life, and exposure and stealing of personal information arose. Therefore, the necessity for a security protocol to protect user asset and personal information within a home network is gradually increasing. Thus, this dissertation designs and suggests a home network security protocol using user authentication and approach-control technology to prevent the threat by unauthorized users towards personal information and user asset in advance by providing the gradual authority to corresponding devices based on authorized information, after authorizing the users with a Public Key Certificate.

Web-based Personal Dose Management System for Data Recording on Dosimeter Usage: A Case of Tanzania Atomic Energy Commission

  • Mseke, Angela;Ngatunga, John Ben;Sam, Anael;Nyambo, Devotha G.
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.2
    • /
    • pp.15-22
    • /
    • 2022
  • Modern technology drives the world, increasing performance while reducing labor and time expenses. Tanzania Atomic Energy Commission (TAEC) tracks employee's levels of exposure to radiation sources using dosimeters. According to legal compliance, workers wear dosimeters for three months and one month at the workplace. However, TAEC has problems in tracking, issuing and returning dosimeters because the existing tracking is done manually. The study intended to develop a Personal Dose Management System (PDMS) that processes and manages the data collected by dosimeters for easy and accurate records. During the requirements elicitation process, the study looked at the existing system. PDMS' requirement gathering included document reviews, user interviews, and focused group discussions. Development and testing of the system were implemented by applying the evolutionary prototyping technique. The system provides a login interface for system administrators, radiation officers, and Occupational Exposed Workers. The PDMS grants TAEC Staff access to monitor individual exposed workers, prints individual and institutional reports and manages workers' information. The system reminds the users when to return dosimeters to TAEC, generate reports, and facilitates dispatching and receiving dosimeters effectively. PDMS increases efficiency and effectiveness while minimizing workload, paperwork, and inaccurate records. Therefore, based on the results obtained from the system, it is recommended to use the system to improve dosimeter data management at the institution.

RCBAC(Relationship-Content based Access Control) Model for User Privacy Protection of Digital Contents in Web 2.0 Environment (웹 2.0 환경에서 사용되는 디지털 컨텐츠의 사용자 프라이버시 보호를 위한 RCBAC 모델)

  • Cho, Eun-Ae;Moon, Chang-Joo;Park, Dae-Ha;Kim, Jeong-Dong;Kang, Dong-Su;Baik, Doo-Kwon
    • Journal of Digital Contents Society
    • /
    • v.9 no.4
    • /
    • pp.697-705
    • /
    • 2008
  • The recent web technology has been developed by three mainsprings which include integration, virtualization, and socialization. The web technology provides the increment of the social networking ability. However it deepens the exposure of privacy about personal information as more complicating and difficult problems. Representatively, it is impossible to define and manage the specific relation, so the personal information and interest can be inferred from collecting and summarizing the contents. Also, there are some problems that it is hard to construct the information owner's own social network. Thus this paper proposes the RCBAC(Relationship-Content based Access Control) Model which applies both the concepts of Relationship and Content Semantic to the existing access control methods to protect the user's own digital contents in web 2.0 environment. This method prevents privacy such as personal inclination from being exposed and enables to define and manage the specific relation. By doing this the information owners can construct their social network. This social network can be applied and extended to web contents.

  • PDF

Effects of Self-Presentation and Privacy Concern on an Individual's Self-Disclosure : An Empirical Study on Twitter (자기표현욕구와 개인정보노출우려가 자기노출의도에 미치는 영향 : 트위터를 중심으로)

  • Lee, Sae-Bom;Fan, Liu;Lee, Sang-Chul;Suh, Yung-Ho
    • Korean Management Science Review
    • /
    • v.29 no.2
    • /
    • pp.1-20
    • /
    • 2012
  • While feeling anxious about the risk of exposure of personal information and privacy, users of microblogs and social network services are continuously using them. This study aims to develop a model to investigate this phenomenon. Specifically, this study explores the relationship between personal characteristics (represented by privacy concern and self-presentation) and an individual's self-disclosure. An individual's personal belief (represented by perceived risk and perceived trust) is also tested as an mediator between the relationship. Through a questionnaire survey to 183 twitter users in Korea, the results indicate that self-presentation has a direct influence on self-disclosure as well as an indirect influence through perceived trust. In contrast, privacy concern has not a direct but an indirect negative influence on self-disclosure through perceived risk. In conclusion, self-presentation has a stronger influence on self-disclosure then privacy concern to Twitter users. An individual who has a higher propensity for self-presentation will form a stronger perceived trust on Twitter, which in turn, affects the individual's self-disclosure. On the other hand, an individual who is more concerned with personal privacy will feel more serious about perceived risk, which in turn, negatively influences one's perception of the trust in Twitter as well as his desire for self-disclosure.