• Title/Summary/Keyword: Personal Sensitive Information

Search Result 179, Processing Time 0.027 seconds

e-Passport Security Technology using Biometric Information Watermarking (바이오정보 워터마킹을 이용한 전자여권 보안기술)

  • Lee, Yong-Joon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.21 no.4
    • /
    • pp.115-124
    • /
    • 2011
  • There has been significant research in security technology such as e-passport standards, as e-passports have been introduced internationally. E-passports combine the latest security technologies such as smart card, public key infrastructure, and biometric recognition, so that these technologies can prevent unauthorized copies and counterfeits. Biometric information stored in e-passports is the most sensitive personal information, and it is expected to bring the highest risk of damages in case of its forgery or duplication. The present e-passport standards cannot handle security features that verify whether its biometric information is copied or not. In this paper, we propose an e-passport security technology in which biometric watermarking is used to prevent the copy of biometric information in the e-passport. The proposed method, biometric watermarking, embeds the invisible date of acquisition into the original data during the e-passport issuing process so that the human visual system cannot perceive its invisibly watermarked information. Then the biometric sample, having its unauthorized copy, is retrieved at the moment of reading the e-passport from the issuing database. The previous e-passport security technology placed an emphasis on both access control readers and anti-cloning chip features, and it is expected that the proposed feature, copy protection of biometric information, will be demanded as the cases of biometric recognition to verify personal identity information has increased.

Impact of Privacy Concern and Institutional Trust on Privacy Decision Making: A Comparison of E-Commerce and Location-Based Service (프라이버시 염려와 제도적 신뢰가 프라이버시 의사결정에 미치는 영향: 전자상거래와 위치기반서비스의 비교)

  • Kim, Sanghee;Kim, Jongki
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.22 no.1
    • /
    • pp.69-87
    • /
    • 2017
  • This Research Attempted to Clarify the Eeffect of Privacy Concern and Institutional Trust on Privacy Decision based on Privacy Calculus Perspective. We Developed a Research Model Suggesting that the Influence of Privacy Benefit and Privacy risk on the Information Disclosure Behavior and the Influence of Privacy Concern and Institutional Trust on the Privacy Calculus. In this Regard, in Order to Examine the Difference According to the Target whose Personal Information was Collected, an Empirical Analysis was Conducted to Compare the E-commerce Field and LBS(Location Based Service) Field. The Results of Empirical Analysis are as follows. First, it is Founded that other Relations were All Statistically Significant Except the Relation between Privacy Risk and Information Disclosure Behavior in the LBS group. Next, as a Results of Comparison of Constructs in the E-commerce and Institutional trust than the LBS group, Identifying that the Consumers are more Sensitive to the Personal Information Collected in the E-commerce site.

A Study on Security Weakness and Threats in Personal Health Record Services (개인건강기록 서비스에서 보안취약성 및 위협요소에 관한 연구)

  • Yi, Myung-Kyu;Hwang, Hee-Joung
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.15 no.6
    • /
    • pp.163-171
    • /
    • 2015
  • Personal Health Records(PHR) service offers patients a convenient and easy-to-use solution for managing their personal health records, crucial medical files, and emergency contacts. In spite of the indispensable advantages, PHR service brings critical challenges that cannot be avoided from consumer side if the security of the data is concerned. The problem of user's privacy infringement and leaking user's sensitive medical information is increasing with the fusion of PHR technology and healthcare. In this paper, therefore, we analyze the various security aspects that are vulnerable to the PHR service and needed to be resolved. Moreover, we analyze the security requirements from the point of view of the PHR users and application service providers and provides the PHR security mechanism for addressing PHR security threats and satisfying PHR security requirements.

Factors Affecting an Individual's Intention to Disclose Personal Health Information: From Privacy Calculus Perspective (개인의 건강정보 제공의도에 영향을 미치는 요인: 프라이버시 계산 관점에서)

  • Jeong, Euiseon;Lee, Sang-Chul;Suh, Yung-Ho
    • Journal of Korean Society for Quality Management
    • /
    • v.46 no.4
    • /
    • pp.877-898
    • /
    • 2018
  • Purpose: This study empirically examines the effect of Communication Privacy Management(CPM) factors and Privacy Calculus factors to the intention to disclose Personal Health Information(PHI) in the context of healthcare ecosystem. Also, it investigates the moderating effects of CPM factors in the relationship between privacy calculus variables and the intention to disclose PHI. Methods: We conducted scenario-based repeated-measures quasiexperiment and used total 364 samples for analysis. Confirmatory factor analysis and repeated-measure ANOVA were employed using SPSS 24.0. Results: All CPM factors, such as type of information, requesting purpose, and requesting stakeholder, directly influence to the intention to disclose PHI, whereas only the medium trust out of the Privacy Calculus factors has direct influence on the intention to disclose PHI. With regard to the moderating effects, the requesting stakeholder is the most influential and the information type is the least influential construct. Conclusion: The findings suggest that healthcare system should be designed to provide more definite and personalized benefits to customers to enhance social and individual benefits by getting more participation from customers. Also, it is desirable that the requesting stakeholder of PHI would be non-profit organizations such as hospital, government or public agencies to secure more willingness of PHI from people. Furthermore, it is implied that extensive information gathering and utilization, instead of excluding sensitive information or critical patients' records, is recommended which is substantial to invigorate the healthcare industry.

A Study on the Classification of Cyber Dysfunction and the Social Cognition Analysis in the Intelligent Information Society (지능정보사회의 사이버 역기능 분류와 사회적 인식 분석)

  • Lim, Gyoo Gun;Ahn, Jae Ik
    • Journal of Information Technology Services
    • /
    • v.19 no.1
    • /
    • pp.55-69
    • /
    • 2020
  • The Internet cyber space has become more important as it enters the intelligent information society of the 4th Industrial Revolution beyond the information age through the development of ICT, the expansion of personalized services through mobile and SNS, the development of IoT, big data, and artificial intelligence. The Internet has formed a new paradigm in human civilization, but it has focused only on the efficiency of its functions. Therefore, various side effects such as information divide, cyber terrorism, cyber violence, hacking, and personal information leakage are emerging. In this situation, facing the intelligent information society can lead to an uncontrollable chaos. Therefore, this study classifies the cyber dysfunction of intelligent information society and analyzes social cognition, suggests cyber dysfunction standard of intelligent information society, and examines the seriousness of dysfunction, and suggests technical research directions for future technologies and services. The dysfunctional classification of the intelligent information society was classified into five areas of cyber crime and terrorism, infringement of rights, intelligent information usage culture, intelligent information reliability, and social problems by FGI methodology. Based on the classification, the social perception of current and future cyber dysfunction severity was surveyed and it showed female is more sensitive than male about the dysfunction. A GAP analysis confirmed social awareness that the future society would be more serious about AI and cyber crime

A Survey on Trust Computation in the Internet of Things

  • Truong, Nguyen B.;Jayasinghe, Upul;Um, Tai-Won;Lee, Gyu Myoung
    • Information and Communications Magazine
    • /
    • v.33 no.2
    • /
    • pp.10-27
    • /
    • 2016
  • Internet of Things defines a large number of diverse entities and services which interconnect with each other and individually or cooperatively operate depending on context, conditions and environments, produce a huge personal and sensitive data. In this scenario, the satisfaction of privacy, security and trust objectives plays a critical role in the success of the Internet of Things. Trust here can be considered as a key property to establish trustworthy and seamless connectivity among entities and to guarantee secure services and applications. The aim of this study is to provide a survey on various trust computation strategies and identify future trends in the field. We discuss trust computation methods under several aspects and provide comparison of the approaches based on trust features, performance, advantages, weaknesses and limitations of each strategy. Finally the research discuss on the gap of the trust literature and raise some research directions in trust computation in the Internet of Things.

Digital Evidence Collection Procedure for Hardware Unique Information Collection (하드웨어 고유 정보 수집에 대한 디지털 증거 수집 절차)

  • Pak, Chan-ung;Lee, Sang-jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.4
    • /
    • pp.839-845
    • /
    • 2018
  • Sensitive data is encrypted and stored as privacy policy is strengthened through frequent leakage of personal information. For this reason, the cryptographically owned encrypted data is a very important analysis from the viewpoint of digital forensics. Until now, the digital evidence collection procedure only considers imaging, so hardware specific information is not collected. If the encryption key is generated by information that is not left in the disk image, the encrypted data can not be decrypted. Recently, an application for performing encryption using hardware specific information has appeared. Therefore, in this paper, hardware specific information which does not remain in file form in auxiliary storage device is studied, and hardware specific information collection method is introduced.

Privacy-Preserving Collection and Analysis of Medical Microdata

  • Jong Wook Kim
    • Journal of the Korea Society of Computer and Information
    • /
    • v.29 no.5
    • /
    • pp.93-100
    • /
    • 2024
  • With the advent of the Fourth Industrial Revolution, cutting-edge technologies such as artificial intelligence, big data, the Internet of Things, and cloud computing are driving innovation across industries. These technologies are generating massive amounts of data that many companies are leveraging. However, there is a notable reluctance among users to share sensitive information due to the privacy risks associated with collecting personal data. This is particularly evident in the healthcare sector, where the collection of sensitive information such as patients' medical conditions poses significant challenges, with privacy concerns hindering data collection and analysis. This research presents a novel technique for collecting and analyzing medical data that not only preserves privacy, but also effectively extracts statistical information. This method goes beyond basic data collection by incorporating a strategy to efficiently mine statistical data while maintaining privacy. Performance evaluations using real-world data have shown that the propose technique outperforms existing methods in extracting meaningful statistical insights.

Memory Injection Technique and Injected DLL Analysis Technique in Windows Environment (윈도우 환경에서의 메모리 인젝션 기술과 인젝션 된 DLL 분석 기술)

  • Hwang, Hyun-Uk;Chae, Jong-Ho;Yun, Young-Tae
    • Convergence Security Journal
    • /
    • v.6 no.3
    • /
    • pp.59-67
    • /
    • 2006
  • Recently the Personal Computer hacking and game hacking for the purpose of gaining an economic profit is increased in Windows system. Malicious code often uses methods which inject dll or code into memory in target process for using covert channel for communicating among them, bypassing secure products like personal firewalls and obtaining sensitive information in system. This paper analyzes the technique for injecting and executing code into memory area in target process. In addition, this analyzes the PE format and IMPORT table for extracting injected dll in running process in affected system and describes a method for extracting and analyzing explicitly loaded dll files related with running process. This technique is useful for finding and analyzing infected processes in affected system.

  • PDF

A Study on Legal Issues of Data Portability and the Direction of Legislative Policy (개인정보 이동권의 법적 이슈와 입법 정책 방향)

  • Yi, Chang-Beom
    • Informatization Policy
    • /
    • v.28 no.4
    • /
    • pp.54-75
    • /
    • 2021
  • The right to data portability needs to be introduced to strengthen the self-control of data subjects and promote personal data use. However, the right to data portability constitutes a high risk of invasion of privacy of data subjects and may infringe on the property rights of data controllers, so careful and thorough design is warranted. The right to data portability can intensify the concentration and monopoly of personal data, result in problems of overseas transfer of personal data held by public institutions, and enrich only the profits of giant platforms by burdening the data subject with high transfer cost. By contrast, SMEs are more likely to endure a personal data deprivation. From the proposed amendment to the Personal Data Protection Act are raised various legal issues such as. i) Whether to include inferred/derived data, personal data held by public institutions, activity data, sensitive data, and personal data of third parties within the scope of data portability; ii) whether SMEs are included in the data porting organization; iii) whether to exclude SMEs or large platforms from the scope of the data receiving organization; iv) Whether to allow the right to transmit to other data controllers, v) Whether to allow the overseas transfer of personal data held by public institutions, vi) How to safely exercise the right to data portability, vii) the scope of responsibility and immunity of a data porting organization, etc. The purpose of this paper is to propose the direction for legislative action based on various legal issues related to data portability.