• Title/Summary/Keyword: Privacy Data

Search Result 1,309, Processing Time 0.026 seconds

Content Centric Networking Naming Scheme for Efficient Data Sharing (효율적인 데이타 교환을 위한 Content-Centric Networking 식별자 방안)

  • Kim, Dae-Youb
    • Journal of Korea Multimedia Society
    • /
    • v.15 no.9
    • /
    • pp.1126-1132
    • /
    • 2012
  • To enhance network efficiency, CCN allow intermediate network nodes between a content consumer and a content publisher to temporarily cache transmitted contents. Then the network nodes immediately return back the cached contents to another consumers when the nodes receives relevant contents request messages from the consumers. For that, CCN utilizes hierarchical content names to forward a request message as well as a response message. However, such content names semantically contain much information about domain/user as well as content itself. So it is possible to invade users' privacy. In this paper, we first review both the problem of CCN name in the view point of privacy and proposed schemes. Then we propose an improved name management scheme for users' privacy preservation.

Protection of Consumer Privacy in Electronic Commerce -Focused on On-line Monitoring Survey of Electronic Commerce Firms- (전자상거래에 있어서 소비자 프라이버시 보호에 관한 연구 -인터넷 전자상거래업체의 온라인모니터링조사를 중심으로-)

  • Kim, Hea-Seon;Seo, Min-Kyo;Chun, Cheong-Ghi
    • International Commerce and Information Review
    • /
    • v.6 no.2
    • /
    • pp.219-242
    • /
    • 2004
  • This study is conducted to find out whether companies which use electronic commerce for their business are collecting the least personal information. of consumers that are necessary for providing electronic commerce services to consumers. Investigators visited website of 799 electronic commerce companies, and checked out the personal informations of consumers that were asked when they join the site as a member. The collected data were analyzed with frequency, percentage, and cross-tab analysis using SPSS program. Generally most electronic commerces required more personal information of consumers than necessary for providing their services to consumers. These phenomena are partly due to the fact that regulations regarding consumer privacy in electronic commerce are advisory rather than mandatory at present. Therefore, it is suggested that mandatory regulation which makes companies poot their identification within a certain area of their web page has to enforced for the protection of consumer privacy in electronic commerce. And it would be more efficient if consumers are consistently educated about self protection guideline regarding personal information in using electronic commerce in addition to a mandatory regulation.

  • PDF

OAuth-based User Authentication Framework for Internet of Things (IoT 환경에 적합한 OAuth 기반의 사용자 인증 프레임워크)

  • Yu, Sung-Tae;Oh, Soo-Hyun
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.16 no.11
    • /
    • pp.8057-8063
    • /
    • 2015
  • It is expected that internet of things can be used for various fields such as smart home, smart building and smart city as the representative case of ICT that sensor, communication and interface technologies operate organically and the researches of the technologies regarding internet of things are being carried out in each countries worldwide. However, many problems rise against internet of things continuously in respect of security. Among them, the problem of privacy is the one that should be solved definitely regarding internet of things. If user data does not remain during the process of user authentication, such the privacy problem can be solved. In this paper, we propose the framework of user authentication based on OAuth that is suitable for the environment of internet of things that can solve privacy problem and analyze its security.

Internet of Things (IoT) Framework for Granting Trust among Objects

  • Suryani, Vera;Sulistyo, Selo;Widyawan, Widyawan
    • Journal of Information Processing Systems
    • /
    • v.13 no.6
    • /
    • pp.1613-1627
    • /
    • 2017
  • The concept of the Internet of Things (IoT) enables physical objects or things to be virtually accessible for both consuming and providing services. Undue access from irresponsible activities becomes an interesting issue to address. Maintenance of data integrity and privacy of objects is important from the perspective of security. Privacy can be achieved through various techniques: password authentication, cryptography, and the use of mathematical models to assess the level of security of other objects. Individual methods like these are less effective in increasing the security aspect. Comprehensive security schemes such as the use of frameworks are considered better, regardless of the framework model used, whether centralized, semi-centralized, or distributed ones. In this paper, we propose a new semi-centralized security framework that aims to improve privacy in IoT using the parameters of trust and reputation. A new algorithm to elect a reputation coordinator, i.e., ConTrust Manager is proposed in this framework. This framework allows each object to determine other objects that are considered trusted before the communication process is implemented. Evaluation of the proposed framework was done through simulation, which shows that the framework can be used as an alternative solution for improving security in the IoT.

Testing an Irrational Model of Information Privacy Based on Competence Needs Satisfaction

  • Kim, Gimun;Yoon, Jongsoo
    • Journal of the Korea Society of Computer and Information
    • /
    • v.23 no.12
    • /
    • pp.241-248
    • /
    • 2018
  • Recently, there have been calls for approaching from the irrationality point of view to better explain the privacy paradox phenomenon. This study is a kind of response to them. The aim of the study is to investigate how satisfying competence needs, one of basic psychological needs suggested in self-determination theory, affects irrational information disclosure decision (i.e., risk-benefit assessment). To do this, the study builds an irrationality-based model in which competence needs satisfaction affects both perceived risks negatively and perceived benefits (i.e., relationship building and maintenance), which in turn determine a level of self-disclosure. Based on the data from Facebook users which is collected by a large sample survey (N=1050), the study analyzes it using Mplus, a powerful structure equation modeling tool. The study results reveal that while the relationship between competence needs satisfaction and perceived relationship building and maintenance is statistically significant, the relationship between competence needs satisfaction and perceived risks insignificant. These findings imply that people who is in a high level of competence needs satisfaction is more likely to respond to some opportunities for social benefits and in turn disclose more information about self.

Residents' Opinions on Apartment Living in Lahore, Pakistan

  • Fatima, Tehniyat;Bano, Shermeen;Hussain, Basharat;Zaidi, Rabiya;Shahzad, Asif
    • Asian Journal for Public Opinion Research
    • /
    • v.9 no.3
    • /
    • pp.266-292
    • /
    • 2021
  • Vertical growth is viewed as the solution to the problem of urban housing. The present study aims to be multifocal in approaching the phenomenon of apartment living in Lahore, Pakistan. The primary focus of the research was to evaluate the satisfaction with and favorability of vertical living among the dwellers; however, the research was extended to include the in-depth experiences of adolescents regarding privacy because it was observed that this age group was being neglected severely in the distribution of privacy in apartments, as well as in research. The data was first collected from 150 respondents through a survey, and then interviews of 10 adolescents were conducted to explore notion of privacy. The findings highlight that, despite being satisfied with the infrastructural aspects of the building, the residents do not prefer vertical living over horizontal housing. The adolescents in apartments also prefer horizontal housing over vertical living to avoid the feeling of crowdedness that is associated with vertical growth due to shared space and proximity. The utilization of spaces within apartments is associated with certain elements of development of the personality during this age. The findings of the present study can be helpful for sustainable vertical housing policy development and implementation.

The privacy protection algorithm of ciphertext nearest neighbor query based on the single Hilbert curve

  • Tan, Delin;Wang, Huajun
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.16 no.9
    • /
    • pp.3087-3103
    • /
    • 2022
  • Nearest neighbor query in location-based services has become a popular application. Aiming at the shortcomings of the privacy protection algorithms of traditional ciphertext nearest neighbor query having the high system overhead because of the usage of the double Hilbert curves and having the inaccurate query results in some special circumstances, a privacy protection algorithm of ciphertext nearest neighbor query which is based on the single Hilbert curve has been proposed. This algorithm uses a single Hilbert curve to transform the two-dimensional coordinates of the points of interest into Hilbert values, and then encrypts them by the order preserving encryption scheme to obtain the one-dimensional ciphertext data which can be compared in numerical size. Then stores the points of interest as elements composed of index value and the ciphertext of the other information about the points of interest on the server-side database. When the user needs to use the nearest neighbor query, firstly calls the approximate nearest neighbor query algorithm proposed in this paper to query on the server-side database, and then obtains the approximate nearest neighbor query results. After that, the accurate nearest neighbor query result can be obtained by calling the precision processing algorithm proposed in this paper. The experimental results show that this privacy protection algorithm of ciphertext nearest neighbor query which is based on the single Hilbert curve is not only feasible, but also optimizes the system overhead and the accuracy of ciphertext nearest neighbor query result.

Design and Implementation of Context-aware Application on Smartphone Using Speech Recognizer

  • Kim, Kyuseok
    • Journal of Advanced Information Technology and Convergence
    • /
    • v.10 no.2
    • /
    • pp.49-59
    • /
    • 2020
  • As technologies have been developing, our lives are getting easier. Today we are surrounded by the new technologies such as AI and IoT. Moreover, the word, "smart" is a very broad one because we are trying to change our daily environment into smart one by using those technologies. For example, the traditional workplaces have changed into smart offices. Since the 3rd industrial revolution, we have used the touch interface to operate the machines. In the 4th industrial revolution, however, we are trying adding the speech recognition module to the machines to operate them by giving voice commands. Today many of the things are communicated with human by voice commands. Many of them are called AI things and they do tasks which users request and do tasks more than what users request. In the 4th industrial revolution, we use smartphones all the time every day from the morning to the night. For this reason, the privacy using phone is not guaranteed sometimes. For example, the caller's voice can be heard through the phone speaker when accepting a call. So, it is needed to protect privacy on smartphone and it should work automatically according to the user context. In this aspect, this paper proposes a method to adjust the voice volume for call to protect privacy on smartphone according to the user context.

A Study on Factors Affecting Consumer's Word-of-Mouth Intention of O2O service: Focused on Chinese Smart Order Service (O2O 서비스 구전의도에 영향을 미치는 요인에 대한 연구: 중국 스마트 오더 서비스를 중심으로)

  • Yu, Jun;You, Jae Hyun
    • The Journal of Information Systems
    • /
    • v.32 no.2
    • /
    • pp.1-24
    • /
    • 2023
  • Purpose The aim of this study is to investigate how system quality, privacy concerns, and usefulness impact user satisfaction and word-of-mouth intention towards smart order services among Chinese consumers. The study also seeks to provide both theoretical and practical implications based on the findings. Design/methodology/approach This study conducted an empirical study on Chinese consumers through an online survey on 274 users of smart order service in China. To analyze the data, frequency analysis, reliability analysis, and confirmatory factor analysis were performed using SPSS 26.0 and AMOS 26.0 statistical programs, and structural equation model was used for hypothesis testing. Findings The study results are as follows. First, system quality was found to have a positive effect on usefulness and user satisfaction. Second, privacy concerns were found to have a positive effect on user satisfaction, but not on usefulness. Third, user satisfaction was found to have a positive effect on consumers' word-of-mouth intention of the smart order service. Finally, mediating effects were found between system quality and user satisfaction through usefulness, as well as between system quality, perceived privacy concern, and usefulness through user satisfaction.

A Study of Consumers' Perceived Risk, Privacy Concern, Information Protection Policy, and Service Satisfaction in the Context of Parcel Delivery Services

  • Se Hun Lim;Jungyeon Sung;Daekil Kim;Dan J. Kim
    • Asia pacific journal of information systems
    • /
    • v.27 no.3
    • /
    • pp.156-175
    • /
    • 2017
  • The proposed conceptual framework is based in the relationships among knowledge of personal information security, trust on the personal information security policies of parcel delivery service companies, privacy concern, trust in and risk of parcel delivery services, and user satisfaction with parcel delivery services. Drawing upon both cognitive theory of emotion and cognitive emotion theory that complement each other, we propose a research model and examine the relationships between cognitive and emotional factors and the usage of parcel delivery services. The proposed model is validated using data from customers who have previously used parcel delivery services. The results show a significant relationship between the cognitive and affective factors and the usage of parcel delivery services. This study enhances our understanding of parcel delivery services based on the consumers' psychological processes and presents useful implications on the importance of privacy and security in these services.