• Title/Summary/Keyword: Privacy policy

Search Result 410, Processing Time 0.024 seconds

A Study on the Criminal Threat and Privacy Protection with a Proxy Service (프록시 서비스를 통한 범죄 위협과 프라이버시 보호에 관한 연구)

  • Kang, Shin-Beom;Lee, Sang-Jin;Lim, Jong-In
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.2
    • /
    • pp.317-326
    • /
    • 2012
  • Internet service provider is able to collect personal information to prevent the violations of the rights of service providers and customers using internet. But there are still many debates going on between a personal privacy and a regulation. Proxy servers are used in various technical purposes include bypass access. Although the proxy server users are increasing but there are not any proper institutional mechanisms and regulations to protect users. In this study, we discuss the two sides of a proxy service includes its privacy protection function and the cyber-crime threat and propose supplementary measures to mediate between the interests of public and private.

Structure and Challenges of a Security Policy on Small and Medium Enterprises

  • Almeida, Fernando;Carvalho, Ines;Cruz, Fabio
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.2
    • /
    • pp.747-763
    • /
    • 2018
  • Information Technology (IT) plays an increasingly important role for small and medium-sized enterprises. It has become fundamental for these companies to protect information and IT assets in relation to risks and threats that have grown in recent years. This study aims to understand the importance and structure of an information security policy, using a quantitative study that intends to identify the most important and least relevant elements of an information security policy document. The findings of this study reveal that the top three most important elements in the structure of a security policy are the asset management, security risk management and define the scope of the policy. On the other side, the three least relevant elements include the executive summary, contacts and manual inspection. Additionally, the study reveals that the importance given to each element of the security policy is slightly changed according to the sectors of activity. The elements that show the greatest variability are the review process, executive summary and penalties. On the other side, the purpose of the policy and the asset management present a stable importance for all sectors of activity.

A Study on the Factors for Violation of Information Security Policy in Financial Companies : Moderating Effects of Perceived Customer Information Sensitivity (금융회사 정보보안정책의 위반에 영향을 주는 요인 연구 : 지각된 고객정보 민감도에 따른 조절효과)

  • Lee, Jeong-Ha;Lee, Sang-Yong Tom
    • Journal of Information Technology Applications and Management
    • /
    • v.22 no.4
    • /
    • pp.225-251
    • /
    • 2015
  • This paper analyzed factors for employees to violate information security policy in financial companies based on the theory of reasoned action (TRA), general deterrence theory (GDT), and information security awareness and moderating effects of perceived sensitivity of customer information. Using the 376 samples that were collected through both online and offline surveys, statistical tests were performed. We found that the perceived severity of sanction and information security policy support to information policy violation attitude and subjective norm but the perceived certainty of sanction and general information security awareness support to only subjective norm. Also, the moderating effects of perceived sensitivity of customer information against information policy violation attitude and subjective norm were supported. Academic implications of this study are expected to be the basis for future research on information security policy violations of financial companies; Employees' perceived sanctions and information security policy awareness have an impact on the subjective norm significantly. Practical implications are that it can provide a guide to establish information security management strategies for information security compliance; when implementing information security awareness training for employees to deter violations by emphasizing the sensitivity of customer information, a company should make their employees recognize that the customer information is very sensitive data.

A Study on the Factors of Experience and Habit on Information Security Behavior of New Services - based on PMT and UTAUT2 (경험 및 습관이 신규서비스의 정보보호 행동에 미치는 요인에 대한 연구 - 보호 동기이론과 UTAUT2을 중심으로)

  • Lee, Hong-Je;Kho, Hyeong-Seog;Roh, Eun-Hee;Han, Kyeong-Seok
    • Journal of Digital Contents Society
    • /
    • v.19 no.1
    • /
    • pp.93-102
    • /
    • 2018
  • This study aims to present policy implications by analyzing information security behavior factors of internet users. The research model, based on PMT and UTAUT2, consists of perceived threat, severity, social influence, self-efficacy, experience and habits, PC and privacy behaviors, security behaviors on new services and set demographic characteristics, use places of internet, use of paid products, and experiences of accident as moderate variables to analyze the effect on security behavior. The results showed that perceived severity, self-efficacy significantly influenced on experience and habits, and experience and habits and self-efficacy had a high influence on PC and privacy behavior. Also, PC and privacy behaviors have a high impact on security behavior of new services. Age, income, use of paid products, and experience of accidents have a moderating effects on security behaviors. The results of this study are expected to help policy decision making to improve the level of information security of internet users.

A Study on the FinTech : The consideration of the Security (핀테크의 보안 고려사항에 대한 연구)

  • Lee, Yujin;Chang, Beomhwan;Lee, Youngsook
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.12 no.3
    • /
    • pp.111-123
    • /
    • 2016
  • Recently, mobile devices have been widely used. Therefore, the service users want that are not constrained by time and space. Among them, electronic payment services, mobile finance service is enjoying a tremendous popularity. The FinTech is the result of the fusion of finance and ICT(Information & Communication Technology). Security experts is pointed the FinTech security risk. New technology and Innovative FinTech services are even available, Insecure FinTech services is insignificant. In this paper we were surveyed market and product trends of FinTech and analyzed the threats about FinTech. Also, we analyzed the security considerations for FinTech using a questionnaire. As a result, users considers secure payment process and privacy. Therefore, we proposed security considerations for each vulnerability. So, we must be resolved of security technology and policy issues. If establishing a secure payment process and the unclear legal issue is resolved, FinTech service will provide a secure financial services to the user.

Applied to Privacy Information Access Control Mechanism in Ubiquitous Environments (유비쿼터스 환경내의 개인정보 접근통제 메커니즘 작용 방안)

  • Hong Seng-Phil;Jang Hyun-Me
    • Proceedings of the Korea Institutes of Information Security and Cryptology Conference
    • /
    • 2006.06a
    • /
    • pp.627-630
    • /
    • 2006
  • 정보사회에서 인터넷을 기반으로 한 IT관련 기술의 빠른 증가와 더불어 유비쿼터스 환경의 연구 또한 점점 가시화 되어 지고 있다. 이와 더불어, 웹 기반의 분산 컴퓨팅 환경 내에서 관련 정보들의 수집, 보관, 공유, 이동이 활발해지면서, 개인정보의 불법적 유출, 남용에 따른 사생활 침해문제를 해결하기 위한 방안에 관심이 집중되고 있다. 이에 본 논문에서는 유비쿼터스 환경 내에서의 신뢰할 수 있는 개인정보 아키텍처를 구현하기 위한 3단계의 개인정보 보호 메커니즘/통합사용자 인증 메커니즘 CAM(Consolidated Authentication Mechanism), 개인정보정책 메커니즘 PPM(Privacy Policy Mechanism), 개인정보 통제 메커니즘 OCM(Output Control Mechanism)을 제시하였다. 또한 사용자에게 개인정보 사용시 정보의 중요도에 따른 "알림(Notice)" 기능을 웹 브라우저 내 개인정보 적용 기술(P3P)과 연동하여 제공하고, 접근 제어하는 기술적 적용 방안을 소개함으로써 개인 정보의 연동시 오 남용 방지 방안과 시스템 환경 내 실용 가능성(feasibility)을 소개하였다.

  • PDF

Determinants of Consumer Trust in e-Business (e비즈니스에서 신뢰의 결정요인에 관한 연구)

  • Kwak, Won-Seob
    • Journal of Digital Convergence
    • /
    • v.2 no.2
    • /
    • pp.29-44
    • /
    • 2004
  • The main objective of this study is to investigate the determinants of consumer trust in e-business. It examines consumer perceptions trust in a Web site and address following research questions: What factors influence consumer trust in a Web site and what specific Web site cues are associated with trust and satisfaction? We test our hypothesis in a empirical data from 568 consumers across 4 Web sites. By factor analysis, the results show that Web site characteristics are such as product information and purchase process , system stability, navigation, privacy(security), design, information of seller, pay methods, and customer service. We also find that brand and Web site characteristics such as Web site design, navigation, privacy(security), and customer service can explain over 59% of the variance in Web site trust and 60% in satisfaction. The results offer important implication for Web site strategies that include the manipulation of factors influencing Web site trust. And the future directions of the present research are discussed.

  • PDF

Analysis of Living Space of One Room Housing Through Plan of House (주택 평면을 통한 원룸 주거 공간 분석 - 사례를 중심으로 -)

  • Kim, Han-Soo
    • Journal of the Korean housing association
    • /
    • v.25 no.3
    • /
    • pp.145-153
    • /
    • 2014
  • This study analyzes the physical environments of studio-housing and suggests alternative solutions for the problems of studio-housing. Based on solving the problems of it through previous research review, the research methods are decided on-site survey and the housing floor plan analysis. The results of this study are follows. First, parking lots make passengers uncomfortable. Narrow spaces between buildings cause problems in terms of light, ventilation, and privacy. Moreover, the short of green space makes living conditions less amenable. Second, the narrow corridors of studio-housing buildings bring about bad effects on walking and privacy. The living conditions becomes worse due to the illegal remodeling. Third, even though a multi-family housing provision for low or middle-income families is a good housing policy, new design policies or interventions are needed to make residents' behavior comfortable.

Autonomic Computing Architecture for Privacy Protection in Ubiquitous Environment (유비쿼터스 환경에서 개인정보보호를 위한 오토노믹 컴퓨팅 아키텍쳐)

  • Lee, Taek;Lim, Jung-Eun;In, Hoh Peter
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2004.04a
    • /
    • pp.274-276
    • /
    • 2004
  • 기존의 컴퓨팅환경에서 유비쿼터스 컴퓨팅 환경으로의 전환이 이루어지면서 사용자는 언제 어디서나 네트워크에 연결될 수 있다. 이는 역으로 말하면 언제 어디서나 사용자의 정보가 네트워크에 유출될 수도 있다는 것을 의미한다. 컴퓨팅 환경에서 보안성과 편리성의 추구는 서로 상반되는 Trade-off 문제이다. 이 논문에서는 오토노믹 컴퓨팅(Autonomic Computing)의 개념 [1, 2]을 이용, 정해진 개인정보 보호정책(Privacy Policy)에 기반 하여 개인정보를 보호하고 서비스 사용자의 환경 변화에 대안 상황인지(Situation-Aware)를 통해 유연한 개인정보 보호정책을 적용할 수 있는 아키텍쳐를 제안함으로서 보안성(개인정보보호)과 편리성(사용자 개입의 최소화)의 문제를 다루어보았다.

  • PDF

Autonomic Computing Architecture for Privacy Protection in Ubiquitous Environment (유비쿼터스 환경에서 개인정보보호를 위한 오토노믹 컴퓨팅 아키텍쳐)

  • Lim, Jung-Eun;Lee, Taek;In, Hoh Peter;Baik, Doo-Kwon
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2004.05a
    • /
    • pp.1553-1556
    • /
    • 2004
  • 기존의 컴퓨팅환경에서 유비쿼터스 컴퓨팅환경으로의 전환이 이루어지면서 사용자는 언제 어디서나 네트워크에 연결될 수 있다. 이는 역으로 말하면 언제 어디서나 사용자의 정보가 네트워크에 유출될 수도 있다는 것을 의미한다. 컴퓨팅 환경에서 개인정보의 보호와 편리성의 추구는 서로 상반되는 문제이다. 이 논문에서는 오토노믹 컴퓨팅(Autonomic Computing)의 개념을 이용, 정해진 개인정보 보호정책(Privacy Policy)에 기반 하여 개인정보를 보호하고 서비스 사용자의 환경 변화에 대한 상황인지(Situation-Aware)를 통해 유연한 개인정보 보호정책을 적용 할 수 있는 아키텍쳐를 제안함으로서 유비쿼터스 환경이 주는 편리성과 개인 정보 보호를 극대화 할 수 있을 것으로 기대된다.

  • PDF