• Title/Summary/Keyword: Personal Security

Search Result 1,576, Processing Time 0.024 seconds

A Study on the Effect of Digital Literacy Education in Personal Information Security Perception (디지털리터러시 교육이 개인 정보 보안 인식에 미치는 영향 연구)

  • Kwon, Jungin
    • Convergence Security Journal
    • /
    • v.20 no.4
    • /
    • pp.161-167
    • /
    • 2020
  • Convergence ethics education for digital culture in cyberspace is limited to specific areas such as personal information and copyright. Education on the ability to accept information and provide information in cyberspace in which digital natives communicate, share and exchange is inadequate. As a result, the dysfunction of abusing the personal information of others without recognizing the importance of information security has recently emerged as a social problem. In this study, among digital netizen who communicate and exchange information the most in cyberspace, digital literacy education was conducted for students in the first and second grades of university, and then they investigated the change in information security perception. Based on this, we intend to prepare fundamental measures for systematic cultivation of digital literacy education necessary for the Digital Cultural Society.

Association Analysis on The Completion Rate of Security education and Cyber Terror Response According to Personal and Job characteristics (인적 및 직무특성과 보안교육 이수율 및 사이버테러 대응과의 연관성 분석)

  • Shin, Hyun Jo;Lee, Kyung Bok;Park, Tae Hyoung
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.10 no.4
    • /
    • pp.97-107
    • /
    • 2014
  • The development of ICT has led positive aspects such as popularization of Internet. It, on the other hand, is causing a negative aspect, Cyber Terror. Although the causes for recent and continuous increase of cyber security incidents are various such as lack of technical and institutional security measure, the main cause which threatens the cyber security is the users' lack of awareness and attitude. The purpose of this study is the positive analysis of how the personal and job characteristics influence the cyber security training participation rate and the response ability to cyber terror response training with a sample case of K-corporation employees. In this paper, the relationship among career, gender, department, whether he/she is a cyber security specialist, whether he/she is a regular employee), "ratio of cyber security training courses during recent three years", "ratio that he/she has opened the malicious email in cyber terror response training during recent three years", "response index of virus active-x installation (higher index means poorer response)" is closely examined. Moreover, based on the examination result, the practical and political implications regarding K-corporation's cyber security courses and cyber terror response training are studied.

Personal Information Protection Behavior for Information Quality : Health Psychology Theory Perspectives (정보품질을 위한 개인정보 보호행위: 건강심리이론 관점을 중심으로)

  • Jee, Bum-Suk;Fan, Liu;Lee, Sang-Chul;Suh, Yung-Ho
    • Journal of Korean Society for Quality Management
    • /
    • v.39 no.3
    • /
    • pp.432-443
    • /
    • 2011
  • The purpose of this research is to understand users' information protection behavior on personal information security from health psychology theory perspectives. Empirical results indicate that users' information protection behavior on personal information is predicted by perceived threat and perceived responsiveness. Perceived threat is determined by perceived susceptibility and perceived severity. Perceived responsiveness is determined by response efficacy and self-efficacy, but response cost is not significant. These findings provide an enriched understanding about users' information protection behavior on personal information security.

Empirical Validation of Personal Information Violation Risk for Cryptocurrency with Use Intention

  • Kim, Jeong-Wook;Choi, Chul-Yong
    • Journal of the Korea Society of Computer and Information
    • /
    • v.23 no.9
    • /
    • pp.141-156
    • /
    • 2018
  • The purpose of this study is how personal information violation risks affect the intention to use domestic cryptocurrency services. VAM(Value based Adoption Model) model is validated as a theoretical background, selecting perceived ease of use, perceived usefulness and perceived security as a benefit factors, and considers perceived cost, technical complexity, and risk of personal information violation risks as sacrifice factors. The method of this study used questionnaire survey to collect 150 data on user's perception on cryptocurrency services, and also performed a structural equation modeling method using by AMOS 23. The result of this paper shows that all hypotheses are accepted statistically significant except 2 hypothesis. This research is concluded that perceived value is affected on statistically positive impact on perceived ease of use, perceived usefulness and perceived security, and negative impact on risk of personal information violation risk, not statistically perceived fee and technical complexity.

A Study of Self-Checklist for Personal Information Protection of FinTech Service: For the Simple Payment Service (핀테크 서비스의 개인정보보호 자가평가항목 개발에 관한 연구: 간편결제 서비스 중심)

  • Kang, Min Soo;Back, Seung Jo;Lim, Jong In
    • The Journal of Society for e-Business Studies
    • /
    • v.20 no.4
    • /
    • pp.77-102
    • /
    • 2015
  • FinTech service industry has been growing rapidly around the world. It has driven innovation in financial and payment service industry with different channels such as mobile based on Information and Communications Technology (ICT). However, FinTech service is vulnerable to different security threats due to use the valuable data such as personal information and financial information. It is undeniable that collection and use of those information may increase the possibility of identity theft or privacy breach. In this paper will develop a self-checklist for the Simple Payment service users (Privacy Pragmatists) who want to make a rational decision to protect their personal information. The checklist is going to let the users assess the personal information protection by performing the assessment themself when they use the service. The body of this paper is going to analyze the items of the checklist and through the analysis, will suggest a security policy for personal information protection of FinTech service.

Study to detect and block leakage of personal information : Android-platform environment (개인정보 유출 탐지 및 차단에 관한 연구 : 안드로이드 플랫폼 환경)

  • Choi, Youngseok;Kim, Sunghoon;Lee, Dong Hoon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.23 no.4
    • /
    • pp.757-766
    • /
    • 2013
  • The Malicious code that targets Android is growing dramatically as the number of Android users are increasing. Most of the malicious code have an intention of leaking personal information. Recently in Korea, a malicious code 'chest' has appeared and generated monetary damages by using malicious code to leak personal information and try to make small purchases. A variety of techniques to detect personal information leaks have been proposed on Android platform. However, the existing techniques are hard to apply to the user's smart-phone due to the characteristics of Android security model. This paper proposed a technique that detects and blocks file approaches and internet connections that are not allowed access to personal information by using the system call hooking in the kernel and white-list based approach policy. In addition, this paper proved the possibility of a real application on smart-phone through the implementation.

A Study on the Influence of the Perception of Personal Information Security of Youth on Security Attitude and Security Behavior (청소년의 개인정보보안 인식이 보안의도와 보안행동에 미치는 영향에 관한 연구)

  • Park, KyungA
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.24 no.4
    • /
    • pp.79-98
    • /
    • 2019
  • In this paper, the security behaviors and attitudes related with the personal information of teenagers were investigated using empirical data based on rational behavior theory and protection motivation theory. An experiment for teenagers was conducted on Excel and the statistical packages (i.e., SPSS 21.0 and SmartPLS2.0.M3) to see how self-efficiency, security attitude, security intention and individual innovation affect their security behaviors. The experimental results showed that the security behaviors and attitudes of teenagers between internet and information devices are closely related, and the social influences can affect personal self-efficacy and security attitudes. Finally, we can know that teenagers should recognize the importance of security and protect their personal information safely through continuous education and training so that they can be linked to security behaviors.

A Study on the Improvement for An Illegality Detective Agency and Messenger Office (불법 흥신소 및 심부름센터 개선방안에 관한 연구)

  • Kim, Il Gon;Jung, Kwi Young
    • Convergence Security Journal
    • /
    • v.14 no.6_2
    • /
    • pp.53-62
    • /
    • 2014
  • This study is aimed what improvement for an illegality detective aagency and messenger office. First, administrators or managers who are involved with personal information protection should make a full-fledged effort to gather information. Second, counseling or related programs should be provided for small and mid-sized security firms to guarantee thorough personal information protection. Third, Korea Security Association should improve the educational system related to personal information protection to resolve problems with this education currently provided for managers and employees of these companies.

A Study on the Protection for Personal Information in Private Security Provider's (경비업자의 개인정보보호에 관한 연구)

  • Ahn, Hwang-Kwon;Kim, Il-Gon
    • Convergence Security Journal
    • /
    • v.11 no.5
    • /
    • pp.99-108
    • /
    • 2011
  • The purpose of this study is to profile actual conditions of personal information protection systems operated in overseas countries and examine major considerations of personal information that security service providers must know in the capacity of privacy information processor, so that it may contribute to preventing potential occurrence of any legal disputes in advance. Particularly, this study further seeks to describe fundamental idea and principle of said Personal Information Protection Act; enhancement of various safety measures (e.g. collection / use of privacy data, processing of sensitive information / personal ID information, and encryption of privacy information); restrictions on installation / operation of video data processing devices; and penal regulations as a means of countermeasure against leakage of personal information, while proposing possible solutions to cope with these matters. Using cases among foreign countries for this study. Possible solutions proposed by this study can be summed up as follows: By changing minds with sufficient legal reviews, it is required for security service providers to 1) clearly and further specify any purposes of collecting and using privacy information, if possible, 2) obtain any privacy information by legitimate means as it is necessary to collect such information, 3) stop providing any personal information for the 3rd parties or for any other purposes except fundamental purposes of using privacy information, and 4) have full knowledge about duty of safety measure in accordance with safe maintenance of privacy information and protect any personal information from unwanted or intentional leakage to others.

A Study on Improving Security Controls in the Electronic Financial Transaction (전자금융거래 시 보안 통제 사항의 개선 연구)

  • Lee, Gangshin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.4
    • /
    • pp.881-888
    • /
    • 2015
  • Financial Authorities have added security controls to the Electronic Financial Transaction Act and the Supervisory Regulation according to the recent frequent personal credit information leakages. Accordingly, the security level has been upgraded. But it is necessary to study more security controls to add. This paper deduces 19 security controls over the mean value to be added to the financial area receiving 15 security consultant's help.