• Title/Summary/Keyword: Privacy by design

Search Result 267, Processing Time 0.026 seconds

Planning Directions of Community Facilities Integrating Generations based on Local Communities

  • Jae Hee CHUNG;Ji Min KIM;Su Jin LEE;Sung Ze YI
    • The Journal of Economics, Marketing and Management
    • /
    • v.12 no.1
    • /
    • pp.39-51
    • /
    • 2024
  • Purpose: This study aims to derive planning directions of community facilities integrating generations based on local communities to promote sustainable intergenerational exchange by analyzing the spatial configuration and programs of domestic and foreign generation-integrated community facilities based on local communities. Research design, data and methodology: Through theoretical consideration, the concept of intergenerational integration, types of intergenerational exchange, and spatial arrangement types were identified. Then, case study analysis of domestic and foreign community facilities with well-planned intergenerational exchange spaces and programs were conducted to identify intergenerational integration, and to derive community facility planning direction. Results: The results of this research are as follows. First, in terms of humanware, in order to revitalize continuous exchange between the 1st, 2nd, and 3rd generations, a systematic support system is needed to build mutual trust through voluntary participation by each generation. Second, it is important to provide a variety of shared spaces while maintaining the uniqueness of each facility from a hardware perspective, and must be planned in such a way that selective interaction takes place with privacy and interaction in mind. Third, in terms of software, programs that meet the characteristics of each user must be provided. Conclusions: It is expected that the results of this research can be used as basic data for planning community facilities that integrate generations based on local communities, contributing to the search for sustainable ways to revitalize intergenerational exchange in the future.

Secure Distributed Data Management Architecture for Consumer Protection of Smart Grid (스마트 그리드의 소비자 보호를 위한 안전한 분산 데이터 관리 구조)

  • Park, Nam-Je;Song, You-Jin;Park, Kwang-Yong
    • The Journal of the Korea Contents Association
    • /
    • v.10 no.9
    • /
    • pp.57-67
    • /
    • 2010
  • Smart grid technology can expand energy efficiency into the home by monitoring consumer energy usage in real time and communicating with household devices that respond to demands to shut off during periods of non-use, allowing individual consumers to control their electricity usage more effectively. But, the information collected on a smart grid will form a library of personal information, the mishandling of which could be highly invasive of consumer privacy. There will be major concerns if consumer-focused principles of transparency and control are not treated as essential design principles from beginning to end. In this paper, using. All-Or-Nothing Transform encryption mode for providing smart grid security, we propose efficient distributed data Management based on XOR operation. The contribution of this paper is to provide a secure algorithm that manages efficiently distributed data in the field of private data in smart grid environment.

A Design of GPS based Personal Location Self-Control Software on Android Platform (안드로이드 기반 GPS 개인위치정보 자기제어 구조 설계)

  • Jang, Won-Jun;Lee, Hyung-Woo
    • Journal of the Korea Convergence Society
    • /
    • v.1 no.1
    • /
    • pp.23-29
    • /
    • 2010
  • The various kinds of application is distributed for the Smart phone user recently. There is the advantage that the open source application on Android operating system based Smart phone supports a multi tasking service. Layar, Wikitude, and Sherpa and the other applications using the GPS location information like an a2b etc. were developed in the Smart phone environment. However, the existing Cell-ID based location information can be directly collected by the mobile ISP unit which the mobile carrier installs, the personal privacy problem occurs. Therefore, the personal location information is possible to be exposed publicly without any access control procedure. Therefore, in this research, the self-control mechanism on the GPS location information at the Smart phone is designed and presented. Through this, it is possible to develop diverse applications providing enhanced access control and GPS location management on the Android based Smart Phone.

The Determinants for Discontinued Use of SNS: Perspectives of Rational Choice Theory and Social Comparison Theory (SNS중단의도의 결정요인: 합리적 선택이론 및 사회적 비교이론을 중심으로)

  • Yoo, Hyung-Wook;Son, Dal-Ho
    • The Journal of Information Systems
    • /
    • v.26 no.4
    • /
    • pp.39-62
    • /
    • 2017
  • Purpose The purpose of this study is to investigate the factors which affect users' fatigue and reluctant intention of using a SNS. In particular, this study focused on the fatigue of SNS users, as the recent excessive use of SNS has led to negative effects such as invasion of privacy, addition and social overload. fatigue This research will explain how producing adverse effects by using SNS caused psychological and mental depression. Previous researches explained that mental fatigue associated with SNS is not simple one and it is complicated with various psychological factors. Considering this fact, this study introduced a behavioral economics concept and a social comparison theory in the research model. Design/methodology/approach For research purposes, this study developed research hypotheses in order to empirically examine the factors that affect SNS users' fatigue and reluctant intention. The empirical research was based on a poll done through 800 research candidates in the SNS fields and the final 451 responses were collected and used in statistical data analysis. The adaptability, trust, and validity to measurement model were verified and the structural relationship in the research model was analyzed through these 451 responses. Findings First of all, maintenance fatigue of SNS had a positive significant effect on coupling and fatigue of SNS and information privacy had a non-significant effect on fatigue. Second, coupling had a negative significant effect on rational inattention, however, perceived cost had a non-significant effect on rational inattention. Third, lateral/upward comparison had a positive significant on user's negative emotions. Meanwhile, user's negative emotions did not have a significant effect on rational inattention.

Applied Method to Trusted Digital Content Distribution Architecture (신뢰할 수 있는 디지털 콘텐츠 유통 아키텍처 방안)

  • Kim, Hye-Ri;Hong, Seng-Phil;Lee, Chul-Soo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.18 no.6A
    • /
    • pp.151-162
    • /
    • 2008
  • As the innovative internet technologies and multimedia are being rapidly developed, digital content is a remarkable new growth industry and supplied by various channel. For example, domestic sales volume in digital contents marked an annual increase of 14.7% since 2003. Against the merits of digital content distribution, Information reengineering aspects are getting more serious issues in these days such as infringement of copyright, flood of inappropriate content, invasion and infringement of privacy, etc. In this paper, we are making a suggestion of the TDCDA-Trusted Digital Content Distribution Architecture in order to solve above problems. TDCDA is provided to how well-define and design the trusted path in digital contents distribution in internet environments using a secure distribution mechanism, digital content integrity and copyright protection. Finally, we also proposed the TDCDA algorithm and applicable guidelines for feasible approach in real computing environment.

GDPR Compliant Consent Procedure for Personal Information Collection in the IoT Environment (IoT 환경에서 GDPR에 부합하는 개인정보수집 동의 절차)

  • Lee, Goo Yeon;Bang, Junil;Cha, Kyung Jin;Kim, Hwa Jong
    • The Journal of Korean Institute of Information Technology
    • /
    • v.17 no.5
    • /
    • pp.129-136
    • /
    • 2019
  • Many IoT devices like sensors lack screen and input devices, thus making them hard to meet the consent conditions that GDPR requires. This is acting as a legal barrier for further advancement in the business field. In this paper, we designed the process for consent of personal information collection that meets the legal conditions. In this design, user's personal data is received in an encrypted form by data collecting server first. The encrypted personal data can be decrypted after associating with user agent based on the consent procedure of the collection of personal information. During the consent procedure, user agent understands the privacy policy about personal information collection and offers the key to decrypt the data. This kind of personal information collection agreement procedure will satisfy the transparent and freely given consent requirements of GDPR. Thus, we can speculate from here that the proposed procedure will contribute to the evolution of IoT business area dealing with personal information.

Distributed Data Management based on t-(v,k,1) Combinatorial Design (t-(v,k,1) 조합 디자인 기반의 데이터 분산 관리 방식)

  • Song, You-Jin;Park, Kwang-Yong;Kang, Yeon-Jung
    • The KIPS Transactions:PartC
    • /
    • v.17C no.5
    • /
    • pp.399-406
    • /
    • 2010
  • Many problems are arisen due to the weakness in the security and invasion to privacy by malicious attacker or internal users while various data services are available in ubiquitous network environment. The matter of controlling security for various contents and large capacity of data has appeared as an important issue to solve this problem. The allocation methods of Ito, Saito and Nishizeki based on traditional polynomial require all shares to restore the secret information shared. On the contrary, the secret information can be restored if the shares beyond the threshold value is collected. In addition, it has the effect of distributed DBMS operation which distributes and restores the data, especially the flexibility in realization by using parameters t,v,k in combinatorial design which has regularity in DB server and share selection. This paper discuss the construction of new share allocation method and data distribution/storage management with the application of matrix structure of t-(v,k,1) design for allocating share when using secret sharing in management scheme to solve the matter of allocating share.

Analysis of the Space Planning Guidance about the Temporary Shelter Emphasizing Habitability for Disaster Victims in U.S. (거주성 관점의 미국 이재민 임시대피시설 공간계획 관련 지침분석)

  • Kim, Mi-Kyung;Choi, Seon-Mi;Choi, You-Ra
    • Korean Institute of Interior Design Journal
    • /
    • v.26 no.5
    • /
    • pp.42-51
    • /
    • 2017
  • The purpose of this study was to analyze the information about the disaster temporary shelter space planning guidance described in the U.S. shelter guidelines in terms of the habitability for disaster victims and to address the implications and potential impacts of its findings for the improvement of the shelter design standards and guidelines in Korea. The researchers reviewed four federal and non-governmental organization shelter field and design guidelines and attributes regarding the shelter space planning were classified in accordance with four habitability categories: Safety, Health, Convenience, and Comfort. Three major findings emerged from this study: 1)A total of 72 items about the shelter space planning were extracted from guidelines, and the majority of items are concerned with dormitory areas and sanitary spaces. Other items were about accessibility, children respite care area, signage, health service areas, food preparation and serving areas, parking and drop-off areas, registration and waiting areas, shelter manager and staff areas, lounge and storage areas, and household pets area. 2)Most of these items are strongly related to the convenience category(66.7%), followed by comfort(40.3%), safety(30.6%), and health(25.0%). 3)The habitability of the disaster temporary shelter can be established with considerations on the needs of disaster victims and vulnerable people, minimum occupancy space per person, separate sanitary spaces for the privacy, safe and convenient access routes to the shelter, and the provision of children areas for safety and comfort. The study findings will contribute to the development of the disaster shelter guidelines in Korea by suggesting shelter space planning indicators related to the habitability for the governmental and non-governmental organizations' immediate and systematic responses to the disaster.

Security Design of Information Security for Wireless Local Area Network (무선 네트워크망의 정보보호를 위한 시스템 설계)

  • Kim, Jung-Tae;Jung, Sung-Min
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2003.05a
    • /
    • pp.729-732
    • /
    • 2003
  • Security and privacy issues complicate wireless local area network deployment. for a wired network, certain levels of security are maintained since access to the physical medium is restricted to the devices physically connected to the network. Though wireless local area networks offer some built-in security features, security breaches are possible if appropriate precautions are not taken. This paper describes security issues related to wireless local area networks and presents a software approach for restricting and controlling wireless access. The system authenticates users on the basis of identity, privileges and access hardware by distributed software agents that implement security policy and restrict unauthorized access.

  • PDF

Design of Financial Information Security Model based on Enterprise Information Security Architecture (전사적 정보보호 아키텍처에 근거한 금융 정보보호 모델 설계)

  • Kim, Dong Soo;Jun, Nam Jae;Kim, Hee Wan
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.6 no.4
    • /
    • pp.307-317
    • /
    • 2010
  • The majority of financial and general business organizations have had individual damage from hacking, worms, viruses, cyber attacks, internet fraud, technology and information leaks due to criminal damage. Therefore privacy has become an important issue in the community. This paper examines various elements of the information security management system and discuss about Information Security Management System Models by using the analysis of the financial statue and its level of information security assessment. These analyses were based on the Information Security Management System (ISMS) of Korea Information Security Agency, British's ISO27001, GMITS, ISO/IEC 17799/2005, and COBIT's information security architecture. This model will allow users to manage and secure information safely. Therefore, it is recommended for companies to use the security management plan to improve the companies' financial and information security and to prevent from any risk of exposing the companies' information.