• Title/Summary/Keyword: Privacy policy

Search Result 410, Processing Time 0.024 seconds

The Mobile Meeting Authentication Scheme Providing Mobility and Privacy (이동성과 프라이버시를 제공하는 모바일 회의 인증 기법)

  • Yun, Sunghyun
    • Journal of Digital Convergence
    • /
    • v.12 no.2
    • /
    • pp.243-248
    • /
    • 2014
  • The demand for messenger service goes on growing rapidly with widespread use of smartphones. Generally, the smartphone messenger provides group communication functions in which users can make the group and communicate with each other. In the mobile meeting, the attendees can participate in the meeting with use of smartphone messengers wherever they are. To make the mobile meeting put to practical use, the mobility and privacy should be ensured to attendees. To satisfy the mobility requirement, the user which is not belong to the group members should not be able to participate in the meeting. To ensure the privacy requirement, the attendees should have not to repudiate the meeting results. In this study, the mobile meeting authentication scheme is proposed which provides mobility and privacy. The proposed scheme consists of meeting group creation, group key generation, group signature and verification protocols. All attendees should have to participate in the signature verification because it is based on the challenge-response type protocol. Thus, it's not possible to collude with malicious attendees to change the meeting results.

Privacy Calculus and the Role of Information Transparency in Personal Information Disclosure (온라인상의 개인 정보 제공에 있어서 정보 투명성의 역할 - 프라이버시 계산 모형을 중심으로 -)

  • Lee, Dong-Joo;Bang, Youngsok;Bae, Yoon Soo
    • Informatization Policy
    • /
    • v.17 no.2
    • /
    • pp.68-85
    • /
    • 2010
  • This study extends the privacy calculus model to investigate the role of information transparency in influencing individual decision making on information disclosure. The proposed model integrates perceived usefulness and ease of use as benefit-side factors and information privacy risk as a risk-side factor accompanying information disclosure, and theorizes the effects of information transparency on the factors. The research model was tested using data gathered from 163 respondents through an online survey method. Results suggest that users'perception of information transparency not only increases the perceived benefits from the online site but also mitigates the risk related with information disclosure, resulting in higher intention to provide personal information to the site. Further, we find that online firms may improve users' perception of information transparency by providing explanation on why particular personal information is required and how it will be used.

  • PDF

A Study on development of privacy indicators in the context of cloud service level agreement (클라우드 개인정보보호를 위한 SLA 지표 개발)

  • Kim, Jungduk;Park, Dae-Ha;Youm, Heung-Youl
    • Journal of Digital Convergence
    • /
    • v.13 no.2
    • /
    • pp.115-120
    • /
    • 2015
  • As the cloud services, the underlying technology of the digital convergence environment, have been widely adopted in the business, personal information protection has been recognized as one of the major issues to resolve. When cloud services are used to process the personal information, the personal information protection law speculates the establishment of a contract or service level agreement(SLA). This research presents 7 privacy indicators and 13 metrics which can be included in cloud SLA, based on the analysis of related regulation and standards and the SMART(Specific, Measurable, Action-oriented, Relevant and Timely) model. The proposed indicators are examined using the Focus Group Interview method in terms of materiality and feasibility. The results show that all the proposed indicators are meaningful and useful.

Study on Privacy in the IPTV Broadcasting Service (IPTV 방송서비스에서의 개인정보보호에 관한 연구)

  • Lee, Jinhyuk;Kim, Seungjoo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.26 no.3
    • /
    • pp.701-712
    • /
    • 2016
  • The number of subscriber of digital pay TV service such as Digital Cable TV and IPTV is increasing from various kind of service provider world widely. These services require personal information of users to provide VOD(Video on Demand) and customized contents. Therefore, massive amount of personal information collected by service provider can cause social confusion such as leakage of privacy and property damage. This paper investigates whether broadcasting stations are providing enough notification for privacy policy and methodology of collecting private information in proper way. Furthermore, we analyze actual network traffic of IPTV service between user and service provider to suggest solution of privacy protection along with current status analysis.

Current State of the Art and Review of Google and Baidu Search Engines' Privacy Policies Using Sentiment Analysis and Opinion Mining (구글과 바이두 검색엔진의 개인정보에 대한 감성분석과 마이닝)

  • Li, Jiapei;Li, Xiaomeng;Xiam, Xiam;Kang, Sun-kyung;Lee, Hyun Chang;Shin, Seong-yoon
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2017.05a
    • /
    • pp.158-159
    • /
    • 2017
  • Sentiment analysis is the review of written or verbal communications to determine some measure of emotion or feeling in the communication. Search engines are one of the most popular sites visited on the Internet generating hundreds of billions of hits per month worldwide. Obviously privacy policies related to these search sites are extremely important. Our study reviews the privacy policies of the two largest search engines, Google and Baidu to determine the overall sentiment of their privacy policies. Significant individual findings and significant differences were found using several sentiment and opinion analysis methods.

  • PDF

Privacy Protection Scheme of Healthcare Patients using Hierarchical Multiple Property (계층적 다중 속성을 이용한 헬스케어 환자의 프라이버시 보호 기법)

  • Shin, Seung-Soo
    • Journal of Digital Convergence
    • /
    • v.13 no.1
    • /
    • pp.275-281
    • /
    • 2015
  • The recent health care is growing rapidly want to receive offers users a variety of medical services, can be exploited easily exposed to a third party information on the role of the patient's hospital staff (doctors, nurses, pharmacists, etc.) depending on the patient clearly may have to be classified. In this paper, in order to ensure safe use by third parties in the health care environment, classify the attributes of patient information and patient privacy protection technique using hierarchical multi-property rights proposed to classify information according to the role of patient hospital officials The. Hospital patients and to prevent the proposed method is represented by a mathematical model, the information (the data consumer, time, sensor, an object, duty, and the delegation circumstances, and so on) the privacy attribute of a patient from being exploited illegally patient information from a third party the prevention of the leakage of the privacy information of the patient in synchronization with the attribute information between the parties.

Meta-Analysis of Information Privacy Using TSSEM (TSSEM을 이용한 정보 프라이버시 메타분석)

  • Kim, Jongki
    • Journal of Digital Convergence
    • /
    • v.17 no.11
    • /
    • pp.149-156
    • /
    • 2019
  • With widespread use of information technologies, information privacy issues have been gaining more attention by not only the public but also researchers. The number of studies on the issues has been increasing exponentially, which makes incomprehensible the whole picture of research outcome. Thus, it is necessary to conduct a systematic examination of past research. This study developed two competing models with four essential constructs in information privacy research and empirically tested the models with data obtained from previous studies. This study employed a quantitative meta-analysis method called TSSEM. It is one of MASEM methods in which structural equation modeling and meta-analysis are integrated. The analysis results indicated that risk-centric model exhibited much better model fits than those of concern-centric model. This study implies that traditional concern-centric model should be questioned it's explanatory power of the model and researchers may consider alternative risk-centric model to explain user's intention to provide privacy information.

Design and Analysis of a Secure Protocol for the P3P Standard (S-P3P: P3P 표준을 반영한 보안 프로토콜 설계 및 분석)

  • Choi, Hyun-Woo;Jang, Hyun-Su;Ko, Kwang-Sun;Kim, Gu-Su;Eom, Young-Ik
    • The KIPS Transactions:PartC
    • /
    • v.14C no.7
    • /
    • pp.545-552
    • /
    • 2007
  • P3P(Platform for Privacy Preference) that is used in the World Wide Web is a standard to define and negotiate policies about definition, transmission, collection, and maintenance of personal information. Current P3P standard provides methods that define client personal information protection policy and P3P policy associated with web server. It also provides a method that compares these two policies. The current P3P standard, however, does not handle detail functions for safe transmission of the personal information and data. Also, it does not handle problems that can be induced by the detail functions. In this paper, in order to solve these problems, we propose a Secure P3P(S-P3P) protocol, which is a security protocol for the current P3P standard, offers mutual authentication between the web server and the client, and guarantees integrity and confidentiality of the messages and data. Furthermore, a S-P3P protocol provides non-repudiation on transmission and reception of personal information that is transmitted from the client to the web server.

E-government, Big Brother, Information Capitalism - Focusing on the NEIS Problem (전자정부, 빅 브라더, 정보자본주의 - 네이스 문제를 중심으로 -)

  • Hong Seong-Tae
    • Journal of Science and Technology Studies
    • /
    • v.4 no.1 s.7
    • /
    • pp.31-57
    • /
    • 2004
  • Controversies over NEIS(Network of Education Information System) began with very deep concern about infringement of human rights stemming from NEIS. A large information system which accumulates and uses huge size of individual information is always able to deeply infringe on human rights. But the ministry of education would not do the best not to be 'Big Brother' being dazzled by instrumental efficiency of information technology. NEIS has demonstrated problems of the information policy of Korea strongly driven in the name of 'E-goverment'. It has very strong characteristic of the statist economic growth policy focusing on more economic possibility than other. In this situation, making money is easily considered more important than protecting human rights. Information capitalism is nurtured at the sacrifice of human rights. So, we have to face problems of 'E-goverment' in order to correct the NEIS problem, The most important task to correct the NEIS problem is to make an element law protecting privacy and to establish an independent national institute protecting privacy

  • PDF

An Evaluation of the Necessity of Security Management of Personal Information Consignees : using Privacy Policy and ISMS data (개인정보 수탁사의 보안관리 대상 식별 방안 연구 : 개인정보처리방침 및 정보보호인증 데이터 이용)

  • Choi, Won-Nyeong;Kook, Kwang-Ho
    • Convergence Security Journal
    • /
    • v.20 no.3
    • /
    • pp.79-88
    • /
    • 2020
  • Business consignment using personal information is increasing for the operating profit and work efficiency of Internet companies. If the personal information leakage accident occurs at the consignee, the consigner who provided personal information will be damaged greatly. The purpose of this study is to analyze the business attributes of consignee using consigned personal information and present a model that can be used to select companies with high risk of personal information leakage by considering the importance of the involved personal information. For this, personal information consignment relations, consignment services, and personal information items used were analyzed. Social network analysis and cluster analysis were applied to select companies with high network centrality that are advisable to obtain information security certification. The results of this study could be used to establish information protection strategies for private or public enterprises that manage companies using personal information.