• Title/Summary/Keyword: Privacy Protection

Search Result 869, Processing Time 0.031 seconds

Balancing the Fair Use of Personal Information and Data Protection (개인정보의 적절한 이용과 보호의 균형)

  • Kim, Beom-Su
    • CRM연구
    • /
    • v.1 no.1
    • /
    • pp.71-85
    • /
    • 2006
  • 인터넷 웹사이트를 통한 개인정보의 대량 유통, 상품배송기관을 통한 개인정보의 유출, 명의도용, 신용정보유출 등의 정보프라이버시 침해의 사례가 많이 발표되면서, 개인정보의 적절한 이용과 정보 프라이버시(Information Privacy)의 보호에 대한 관심이 날로 높아져가고 있다. 이러한 사회 현상과 시민의 관심을 반영하여 개인정보 보호를 위한 다양한 법률과 제도가 최근에 검토되고 있다. 이 연구에서는 이름, 전화번호, 주소, 전자우편주소 등 비교적 민감하지 않은 개인정보를 기업의 마케팅이나 홍보에 이용하는 경우의 좁은 의미에서의 개인정보 보호에 초점을 맞추었다. 이러한 개인정보 및 개인정보서비스 와 관련된 법률, 정책 및 제도를 정보의 생성과 이용의 흐름 및 경제주체를 중심으로 적절한 정보의 이용이 보장 되면서 개인의 정보프라이버시가 보호될 수 있는 방안을 마련하는 방법을 체계적으로 검토하였다. 해외의 개인정보서비스 산업의 사례 조사를 통하여 향후 우리나라에서 개인정보서비스산업이 활성화되었을 때 개인의 만족증대, 실질적인 정보보호 수준의 향상, 고용창출, 기업활동의 효율화, 관련기업의 국제경쟁력 고양 등의 기대효과가 있음을 보였다. 또한, 개인정보의 적절한 이용과 보호, 그리고 정보서비스산업의 활성화를 위하여 관련 법률의 제정 및 개정, 정보보호 제도의 개발 및 효과적 운영, 장기적 정보서비스 산업 활성화 정책 수립과 단계적 추진, 활성화를 위한 정부 및 민간 재원 확보, 사회적 공감대 형성, 지속적인 연구 등을 제안한다.

  • PDF

The Trustable Billing System for Mobile Internet (무선 인터넷에서 신뢰할 수 있는 과금 시스템)

  • 장석철;이임영
    • Journal of Korea Multimedia Society
    • /
    • v.5 no.3
    • /
    • pp.298-306
    • /
    • 2002
  • As the mobile communication related services are becoming popular, the payment issues on charging for the content services are getting more and more attention. Many contents providers are having difficulties for correctly charging services they provide, because they do not have appropriate payment systems yet. There are also the privacy protection issues, security problems that arise during transactions, and the authentication issues for both the user and the business, to be taken care of. In this paper, the billing system in the mobile internet environment will be discussed. Topics related to the key distribution for exchanging data, and the authentication mechanism for communications will be discussed. Based on this, a trustworthy billing system will be proposed.

  • PDF

Study on Security Threat and Requirement for Personal Health Management in u-Health Environment (u-헬스 환경에서 개인건강관리를 위한 보안 위협 및 요구사항에 관한 연구)

  • Kim, Soon-Seok;Park, Hong-Jin
    • Journal of Advanced Navigation Technology
    • /
    • v.14 no.4
    • /
    • pp.504-511
    • /
    • 2010
  • The personal bio-information supplied from the PHD(Personal Health Device) for personal health management is very sensitive in relation to a personal living body in an aspect of privacy protection. On the assumption thai the information is about a patient, it is more serious problem if it is revealed to a third party. However. the established ISO (International Organizations for Standardization) standard protocol[1] in October 2009 has just considered a transmission part for mutual exchange of bio-information between individuals, but has never actually considered security elements. Accordingly, this paper is to show all sorts of security threats according to personal health management in the u-health environment and security requirements newly.

An Authentication Scheme for Emergency Vehicle Priority Transit Service in VANET (VANET 기반의 긴급 차량 우선통과 서비스를 위한 인증 기법)

  • Yoon, Young-Kyun;Jung, Sou-Hwan
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.33 no.10C
    • /
    • pp.749-757
    • /
    • 2008
  • In this paper, we propose an authentication scheme for EVPT (Emergency Vehicle Priority Transit) service in Vehiclar Ad-hoc Networks (VANET) enable a variety of vehicle comfort services, traffic management applications, and infotainment services. These are the basis for a new generation of preventive and active safety functions. By intelligently controlling signalling at intersections, providing additional information to the driver and warning the driver in critical situations. we therefore focus on vehicle-to-infrastructure communication for the authentication between emergency vehicles and traffic lights system. This authentication process should identify the vehicle, and provide privacy protection.

Framework for assessing responsiveness to personal data breaches based on Capture-the-Flag

  • Oh, Sangik;Kim, Byung-Gyu;Park, Namje
    • Journal of Multimedia Information System
    • /
    • v.7 no.3
    • /
    • pp.215-220
    • /
    • 2020
  • Many state agencies and companies collect personal data for the purpose of providing public services and marketing activities and use it for the benefit and results of the organization. In order to prevent the spread of COVID-19 recently, personal data is being collected to understand the movements of individuals. However, due to the lack of technical and administrative measures and internal controls on collected personal information, errors and leakage of personal data have become a major social issue, and the government is aware of the importance of personal data and is promoting the protection of personal information. However, theory-based training and document-based intrusion prevention training are not effective in improving the capabilities of the privacy officer. This study analyzes the processing steps and types of accidents of personal data managed by the organization and describes measures against personal data leakage and misuse in advance. In particular, using Capture the Flag (CTF) scenarios, an evaluation platform design is proposed to respond to personal data breaches. This design was proposed as a troubleshooting method to apply ISMS-P and ISO29151 indicators to reflect the factors and solutions to personal data operational defects and to make objective measurements.

The Study of Design and Implementation of RFID Emergency Medical Information System(REMIS) (RFID와 HL7을 이용한 응급 의료 정보 시스템 설계 및 구현에 관한 연구)

  • Hong, Kyu-Seog;Hwang, Sung-Oh;Lee, Hyun-Sook;Yoon, Young-Ro
    • Journal of Biomedical Engineering Research
    • /
    • v.28 no.5
    • /
    • pp.703-712
    • /
    • 2007
  • In this paper, we designed the RFID(Radio Frequency Identification) Emergency Medical Information System(REMIS). This REMIS offers the emergency patient's medical information using RFID and HL7(Health Level 7) to an emergency medical technician. In emergency situation as like coma, if the communication, from the patient's current location to the hospital, is possible, REMIS offer the medical information of the patient through REMIS server to an emergency medical technician. In the state of communication blocked, REMIS can offer the patient identification and the emergency information through RFID tag, which the patient wear, to an emergency medical technician. When this system was designed, the protection of the patient's medical information and their privacy was considered, and the HL7 was used to be compatible with another medical systems. Therefore, in this paper, REMIS was designed that it is always possible to offer the emergency patient's information to an emergency medical technician regardless of any communication status and to improve the emergency rescue process, effectively.

A Conceptual Study on the Development of Intelligent Detection Model for the anonymous Communication bypassing the Cyber Defense System (사이버 방어체계를 우회하는 익명통신의 지능형 탐지모델개발을 위한 개념연구)

  • Jung, Ui Seob;Kim, Jae Hyun;Jeong, Chan Ki
    • Convergence Security Journal
    • /
    • v.19 no.4
    • /
    • pp.77-85
    • /
    • 2019
  • As the Internet continues to evolve, cyber attacks are becoming more precise and covert. Anonymous communication, which is used to protect personal privacy, is also being used for cyber attacks. Not only it hides the attacker's IP address but also encrypts traffic, which allows users to bypass the information protection system that most organizations and institutions are using to defend cyber attacks. For this reason, anonymous communication can be used as a means of attacking malicious code or for downloading additional malware. Therefore, this study aims to suggest a method to detect and block encrypted anonymous communication as quickly as possible through artificial intelligence. Furthermore, it will be applied to the defense to detect malicious communication and contribute to preventing the leakage of important data and cyber attacks.

A SECURITY ARCHITECTURE FOR THE INTERNET OF THINGS

  • Behrens, Reinhard;Ahmed, Ali
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.12
    • /
    • pp.6092-6115
    • /
    • 2017
  • This paper demonstrates a case for an end-to-end pure Application Security Layer for reliable and confidential communications within an Internet of Things (IoT) constrained environment. To provide a secure key exchange and to setup a secure data connection, Transport Layer Security (TLS) is used, which provides native protection against replay attacks. TLS along with digital signature can be used to achieve non-repudiation within app-to-app communications. This paper studies the use of TLS over the JavaScript Object Notation (JSON) via a The Constrained Application Protocol (CoAP) RESTful service to verify the hypothesis that in this way one can provide end-to-end communication flexibility and potentially retain identity information for repudiation. As a proof of concept, a prototype has been developed to simulate an IoT software client with the capability of hosting a CoAP RESTful service. The prototype studies data requests via a network client establishing a TLS over JSON session using a hosted CoAP RESTful service. To prove reputability and integrity of TLS JSON messages, JSON messages was intercepted and verified against simulated MITM attacks. The experimental results confirm that TLS over JSON works as hypothesised.

Development of Education Learning Program for AES Cryptography Algorithm (AES 암호 알고리즘 교육용 학습 프로그램 개발)

  • Lee, Dong-Bum;Jeong, Myeong-Soo;Kwak, Jin
    • The Journal of Korean Association of Computer Education
    • /
    • v.14 no.4
    • /
    • pp.53-61
    • /
    • 2011
  • Recently, the importance of information security is emphasized in IT related field. The agency related to information security implements the policies to emphasize the security and protection of the privacy. However, the issue in many companies and users is that awareness of security is still poor. Therefore, in this paper, we develope the learning program for AES(advanced encryption standard) block cipher, to raise the awareness of security. Also, wish to cause interest about AES cipher because user confirms process that is encryption/decryption through program of this paper directly and prove awareness about information security.

  • PDF

A Monitoring Way and Installation of Monitoring System using Intelligent CCTV under the u-City Environment (u-City 환경에서 지능형 CCTV를 이용한 감시시스템 구현 및 감시방법)

  • Kim, Ik-Soon;Yoo, Jae-Duck;Kim, Bae-Hun
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.3 no.4
    • /
    • pp.295-303
    • /
    • 2008
  • Under the obligations which is a protection of privacy and a respect for human rights of each person critical is caused by time about surveillance system and CCTV markets which stagnate during that about 911 terror after that securities about importance raising and direction of a ceremony crime prevention are caused by with world grafting of up-to-date IT technique of domestic and changes with the intelligent style surveillance system which leads and quite from the remote place the dead zone this the image which is photographed the Internet leads and with the intelligent style CCTV surveillance systems will be able to control which area at real-time watch and is embodied.

  • PDF