• Title/Summary/Keyword: Privacy Invasion

Search Result 158, Processing Time 0.033 seconds

A Categorization Method based on RCBAC for Enhanced Contents and Social Networking Service for User (사용자를 위한 향상된 콘텐츠 및 소셜 네트워킹 서비스 제공을 위한 RCBAC 기반 분류 방법)

  • Cho, Eun-Ae;Moon, Chang-Joo;Park, Dae-Ha
    • Journal of Digital Contents Society
    • /
    • v.13 no.1
    • /
    • pp.101-110
    • /
    • 2012
  • Recently, social network sites are very popular with the enhancement of mobile device function and distribution. This gives rise to the registrations of the people on the social network sites and the usage of services on the social sites is also getting active. However, social network sites' venders do not provide services enough compared to the demand of users' to share contents from diverse roots by users effectively. In addition, the personal information can be revealed improperly in processes sharing policies and it is obvious that it raises a privacy invasion problem when users access the contents created from diverse devices according to the relationship by policies. However, the existing methods for the integration management of social network are weak to solve this problem. Thus, we propose a model to preserve user privacy, categorize contents efficiently, and give the access control permissions at the same time. In this paper, we encrypt policies and the trusted third party classifies the encrypted policies when the social network sites share the generated contents by users. In addition, the proposed model uses the RCBAC model to manage the contents generated by various devices and measures the similarity between relationships after encrypting when the user policies are shared. So, this paper can contribute to preserve user policies and contents from malicious attackers.

An Empirical Study of SNS Users' Switching Intention Toward Closed SNS (SNS 이용자의 폐쇄형 SNS로의 전환의도에 영향을 미치는 요인에 관한 연구)

  • Park, Hyunsun;Kim, Sanghyun
    • Information Systems Review
    • /
    • v.16 no.3
    • /
    • pp.135-160
    • /
    • 2014
  • Most Social Network Service (SNS) provide online chat, video and file sharing, blogging and others. Because of this advantage, people depend on SNS to communicate with others. However, recently SNS encourage people to reveal too much information broadly so SNS users are concerned about privacy invasion and data spill. They also feel fatigue in process of touching people they don't know while using SNSs. That is the reason why they attempt to switch from opened SNS to Closed SNS. Therefore, the purpose of this study is to empirically investigate and analyze the effect of the factors on the SNS users' switching behavior when using SNS. To accomplish this purpose, this research adopted "Push-Pull-Mooring (PPM)" framework. The PPM is proposed by population geologist, who used it to explain the incentives of demographic migration. Following PPM model, this research empirically examines the three categories of antecedents for SNS switching intention toward closed SNS: push (i.e., weak connection, privacy concern, relative complexity), pull (i.e., enjoyment, belongingness, peer influence), mooring (i.e., SNS fatigue, user resistance) factors. The survey was conducted for 285 users on SNS communities in Korea. The results of this study are as follows; First, wear connection and privacy concern are significantly related to SNS switching intention. Second, enjoyment and belongingness are significantly related to SNS switching intention. Finally, the results show that SNS fatigue has a moderating effect on the links between push factors and SNS switching Intention. Also, user resistance has a moderating effect on the links between pull factors and SNS switching Intention. These findings contribute to the SNS literature both theoretically and practically.

RFID Tag Identification with Scalability Using SP-Division Algorithm on the Grid Environment (그리드 환경에서 SP분할 알고리즘을 이용한 확장성 있는 RFID 태그 판별)

  • Shin, Myeong-Sook;Ahn, Seong-Soo;Lee, Joon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.13 no.10
    • /
    • pp.2105-2112
    • /
    • 2009
  • Recently RFID system has been adopted in various fields rapidly. However, we ought to solve the problem of privacy invasion that can be occurred by obtaining information of RFID Tag without any permission for popularization of RFID system To solve the problems, it is Ohkubo et al.'s Hash-Chain Scheme which is the safest method. However, this method has a problem that requesting lots of computing process because of increasing numbers of Tag. Therefore, We suggest the way (process) satisfied with all necessary security of Privacy Protection Shreme and decreased in Tag Identification Time in this paper. First, We'll suggest the SP-Division Algorithm seperating SPs using the Performance Measurement consequence of each node after framing the program to create Hash-Chain Calculated table to get optimized performance because of character of the grid environment comprised of heterogeneous system. If we compare consequence fixed the number of nodes to 4 with a single node, equal partition, and SP partition, when the total number of SPs is 1000, 40%, 49%, when the total number of SPs is 2000, 42%, 51%, when the total number of SPs is 3000, 39%, 49%, and when the total number of SPs is 4000, 46%, 56% is improved.

An Exploratory Research on Causality among Information Technology Stress Creators in Organizations (조직 내 정보 기술 스트레스 유발요인들 간의 인과관계에 대한 탐색적 연구)

  • Yim, Myung-Seong
    • Journal of Digital Convergence
    • /
    • v.10 no.8
    • /
    • pp.1-14
    • /
    • 2012
  • The purpose of this study is to explore the causality among technostress creators. In doing so, we can suggest the ways how to reduce a technostress of employees. Research results suggest that pace of change has a positive effect on the work overload and has a negative effect on work-home conflict. Complexity of technology positively influences not only work overload but job insecurity. Work overload has a significant effect on work-home conflict. Finally, work-home conflict has a positive effect on job insecurity. Conclusions and implications are discussed.

Study on Decision-making and Control of Personal Data Posted on the Internet (인터넷에 올라와 있는 개인정보의 자기결정권과 통제권에 관한 연구)

  • Yoon, KyungBae
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.14 no.4
    • /
    • pp.227-232
    • /
    • 2014
  • Recent development and generalization of Internet technology contributes to the large scale of commerce and capital followed by appearance and growth of large portal sites. As a result, the personal data on the Internet not deleted for a long period of time is a new risk factor, for example, the invasion of people's privacy. In particular, exposing personal data like witch-hunts is a critical issue so that the person concerned cannot carry on with normal life. This study suggests the necessity of the right to request personal data deletion related to a person concerned on Internet sites, a method of introducing the right in Korea, and a method of improving the application.

A Study of Anti-collision algorithm based on RFID for Medical Service (의료 서비스를 위한 RFID 기반 충돌방지 알고리즘에 관한 연구)

  • Park, Joo-Hee;Park, Yong-Min
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2006.11a
    • /
    • pp.434-437
    • /
    • 2006
  • Today, Hospital Information System that integrates ubiquitous technologies are introduced in limited basis due to problems like standardization and limits on medical use, where responsibilities lie, legal safeguard on transmission, invasion of privacy etc. Particularly, problems like absence of tag design suitable for medical environment, compatibility issue with previous medical information system. In order to solve such problems, we have designed medical tags for the first time that are consistent with future ubiquitous environment by deciding on medically suitable field with 96bit tag offered by EFC as its base. Second, improving on previous multi-tag recognizing crash prevention algorithm, we have designed a priority anti-collision algorithm that reflects priorities on the needs in medical environment.

  • PDF

A Design of Device Identification and Communication Method for Secure Device Monitoring based Smart Phone (스마트폰 기반에서 안전한 디바이스 모니터링을 위한 디바이스 식별 및 통신 기법 설계)

  • Jin, Byungwook;Ahn, Heuihak;Jun, Moonseog
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.13 no.1
    • /
    • pp.69-78
    • /
    • 2017
  • As the smartphone-based devices are diffused and developed rapidly, they provide the convenience to the users. The abovementioned sentence technologies are being used not only in the existing sensor and wireless network technology but also in the application services of the diverse fields application services such as smart appliance, smart car, smart health care, etc. and the new fusion paradigm from the industry is presented by undertaking the researches in diverse area by the enterprises and research institutions. However, the smart environment exposes its weaknesses in the mobile terminal area, existing wireless network and IT security area. In addition, due to new and variant ways of attack, not only the critical information are disclosed However also the financial damages occur. This paper proposed the protocol to perform the smartphone-based safe device monitoring and safe communication. The proposed protocol designed the management procedure of registration, identification, communication protocol and device update management protocol and the safety against the attack techniques such as the an-in-the-middle-attack, impersonation attack, credential threat, information leaks and privacy invasion was analyzed. It was observed that the proposed protocol showed the performance improved by approximately 52% in the communication process than the existing system.

Policy Proposal to Improve Illegal Web Blocking Policy Based on SNI Blocking Technique (SNI 차단 기법 기반의 불법 웹 차단 기술적 정책 개선)

  • Park, Jeonghun;Jeong, Wonchi;Oh, Sangik;Park, Namje
    • Journal of Korea Multimedia Society
    • /
    • v.23 no.3
    • /
    • pp.430-439
    • /
    • 2020
  • The government of the Republic of Korea has introduced SNI blocking method since February 2019 to block illegal sites. Currently, this policy has been considered as a controversial policy in South Korea therefore, about 270,000 South Koreans have been calmed down by and the presidential office petition because people believe that blocking https by SNI would invasion of privacy and freedom of use of the Internet. As soon as the SNI blocking method was used, the bypass method was opened to the Internet, causing side effects. In this study, identifies the development of Internet blocking technology and the development of new technology that bypasses the technology. It also examines Internet censorship in other countries and identifies problems in blocking technology. Through this study would present policy suggestions and technical methodologies for sound Internet use.

Discussions on Regulation and Use of Police Drones (경찰활동상 드론규제와 활용을 위한 논의)

  • Park, Han-Ho;Kim, Sung-Hwan
    • The Journal of the Korea Contents Association
    • /
    • v.17 no.7
    • /
    • pp.408-415
    • /
    • 2017
  • The aim of this study is to discuss some of the prominent ideas which use drone for police works. Focusing on the extent of the utility and practicability of using drone in policing, this paper attempts to address both positive and negative aspects in conjunction with related statutes and regulations. This study uses a qualitative case study approach and offers three practical implications including: (1) enacting a law that covers using drones in policing, (2) hiring technical professionals or training police officers to prevent illegal drones and to implement a variety of policing strategies, and (3) collecting data and information on crime and criminals and then developing the best way to respond to these problems.

A Study on The Housing Condition and Planning for The Suburban Housing Complexes (단지형 도시근교주거의 실태 및 주거계획에 관한 연구)

  • Song Bin-Na;Ju Seo-Ryeung
    • Korean Institute of Interior Design Journal
    • /
    • v.14 no.5 s.52
    • /
    • pp.141-150
    • /
    • 2005
  • The purpose of this study is to understand the present status of life style and housing demands of residents in Yoing-in and Kwang-Ju in Kyung-Ki province, Korea. Field study methods were carried out practically using participant observation method and open-ended interview method, and the data were gotten by sketch, recording, photograph and memo. As a result, the followings were proposed. First, it was necessary to hide or reduce of the neighborhood's noise or direct view because those people thought the invasion of the privacy problem was very severe. The master planning of the complex method could be an alternative plan for this kind of problems. Second, it was needed to be the planning that could follow up the out-door friendly situations. To achieve this, the in between living space are needed that connected the outside and inside of the house. Third, the planning of the housing space should flexible for each participant's needs of the future. To achieve this, each unit in the suburban housing complexes should be fixed to the each character of the people's various needs.